咨询与建议

限定检索结果

文献类型

  • 11,252 篇 期刊文献
  • 8,757 篇 会议
  • 118 册 图书

馆藏范围

  • 20,127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,316 篇 工学
    • 6,376 篇 计算机科学与技术...
    • 5,044 篇 软件工程
    • 2,375 篇 信息与通信工程
    • 2,305 篇 电子科学与技术(可...
    • 2,103 篇 电气工程
    • 1,655 篇 光学工程
    • 1,537 篇 生物工程
    • 1,482 篇 控制科学与工程
    • 1,366 篇 生物医学工程(可授...
    • 1,081 篇 化学工程与技术
    • 1,072 篇 材料科学与工程(可...
    • 810 篇 机械工程
    • 802 篇 仪器科学与技术
    • 662 篇 动力工程及工程热...
    • 455 篇 力学(可授工学、理...
    • 389 篇 冶金工程
  • 9,250 篇 理学
    • 4,961 篇 物理学
    • 2,998 篇 数学
    • 1,878 篇 生物学
    • 1,266 篇 化学
    • 1,105 篇 统计学(可授理学、...
    • 613 篇 系统科学
  • 2,515 篇 管理学
    • 1,603 篇 管理科学与工程(可...
    • 922 篇 图书情报与档案管...
    • 707 篇 工商管理
  • 1,443 篇 医学
    • 1,177 篇 临床医学
    • 963 篇 基础医学(可授医学...
    • 596 篇 药学(可授医学、理...
    • 441 篇 公共卫生与预防医...
  • 476 篇 法学
    • 384 篇 社会学
  • 293 篇 农学
  • 259 篇 经济学
  • 235 篇 教育学
  • 82 篇 文学
  • 36 篇 军事学
  • 36 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 407 篇 deep learning
  • 315 篇 computer science
  • 214 篇 machine learning
  • 169 篇 computational mo...
  • 166 篇 feature extracti...
  • 151 篇 accuracy
  • 149 篇 internet of thin...
  • 147 篇 image segmentati...
  • 140 篇 optimization
  • 127 篇 support vector m...
  • 123 篇 wireless communi...
  • 121 篇 data mining
  • 111 篇 neural networks
  • 110 篇 hadron colliders
  • 106 篇 magnetic resonan...
  • 104 篇 bandwidth
  • 102 篇 training
  • 98 篇 hadrons
  • 94 篇 throughput
  • 90 篇 computer archite...

机构

  • 1,076 篇 cavendish labora...
  • 1,008 篇 department of ph...
  • 962 篇 physikalisches i...
  • 948 篇 oliver lodge lab...
  • 621 篇 infn laboratori ...
  • 600 篇 infn sezione di ...
  • 590 篇 university of ch...
  • 589 篇 fakultät physik ...
  • 577 篇 infn sezione di ...
  • 576 篇 infn sezione di ...
  • 562 篇 school of physic...
  • 522 篇 iccub universita...
  • 521 篇 horia hulubei na...
  • 510 篇 school of physic...
  • 501 篇 department of ph...
  • 495 篇 imperial college...
  • 494 篇 center for high ...
  • 491 篇 h.h. wills physi...
  • 491 篇 nikhef national ...
  • 486 篇 stfc rutherford ...

作者

  • 264 篇 beiter a.
  • 260 篇 a. gomes
  • 259 篇 barter w.
  • 249 篇 bellee v.
  • 245 篇 c. alexa
  • 243 篇 j. m. izen
  • 236 篇 c. amelung
  • 235 篇 g. bella
  • 235 篇 j. strandberg
  • 234 篇 d. calvet
  • 234 篇 s. chen
  • 231 篇 g. spigo
  • 229 篇 f. siegert
  • 226 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 221 篇 brundu d.
  • 218 篇 j. wang
  • 213 篇 r. ströhmer
  • 211 篇 y. tayalati
  • 209 篇 betancourt c.

语言

  • 19,122 篇 英文
  • 748 篇 其他
  • 240 篇 中文
  • 16 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Digital Technology Center and Department of Computer Science and Engineering"
20127 条 记 录,以下是291-300 订阅
排序:
Belief Combination of Classifiers for Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第4期9卷 652-667页
作者: Zuowei Zhang Songtao Ye Yiru Zhang Weiping Ding Hao Wang IEEE the Research Center for Optical Fiber Sensing Zhejiang Laboratory the School of Automation Northwestern Polytechnical University the School of Cyber Engineering Xidian University the Department of Computer Science CY Cergy Paris Université the School of Information Science and Technology Nantong University the School with of Cyber Engineering Xidian University the Department of Computer Science Norwegian University of Science and Technology
Data with missing values,or incomplete information,brings some challenges to the development of classification,as the incompleteness may significantly affect the performance of *** this paper,we handle missing values ... 详细信息
来源: 评论
Image Classification Using Federated Learning  6th
Image Classification Using Federated Learning
收藏 引用
6th International Conference on Recent Trends in Image Processing and Pattern Recognition, RTIP2R 2023
作者: Byeon, Haewon Ullah, Ajdar Syed, Ziauddin Siddiqui, Alighazi Aftab, Aasif Sarfaraz, Mohd Department of Digital Anti-Aging Healthcare Inje University Gimhae50834 Korea Republic of School of Mechanical and Manufacturing Engineering National University of Science and Technology Islamabad44000 Pakistan Department of Computer Science College of Computer Science and Information Technology Jazan University Jazan45142 Saudi Arabia Department of Information Technology and Security College of Computer Science and Information Technology Jazan University Jazan45142 Saudi Arabia
Multiple users can jointly train a universal model using federated learning, a revolutionary AI approach, without having to reveal their personal data. With this strategy, anonymity is maintained while a secure learni... 详细信息
来源: 评论
An Efficient Design of Multiplier for Using in Nano-Scale IoT Systems Using Atomic Silicon
收藏 引用
IEEE Internet of Things Journal 2023年 第16期10卷 14908-14909页
作者: Ahmadpour, Seyed-Sajad Heidari, Arash Navimpour, Nima Jafari Asadi, Mohammad-Ali Yalcin, Senay Kadir Has University Department of Computer Engineering Istanbul34083 Turkey Islamic Azad University Tabriz Branch Department of Computer Engineering Tabriz*** Iran Kadir Has University Faculty of Engineering and Natural Sciences Department of Computer Engineering Istanbul34083 Turkey National Yunlin University of Science and Technology Future Technology Research Center Douliou64002 Taiwan Nisantasi University Department of Computer Engineering Istanbul34485 Turkey
Because of recent technological developments, such as Internet of Things (IoT) devices, power consumption has become a major issue. Atomic silicon quantum dot (ASiQD) is one of the most impressive technologies for dev... 详细信息
来源: 评论
Dual-Path Spectrogram Refinement Network for Robust Speaker Verification
收藏 引用
Journal of Shanghai Jiaotong University (science) 2025年 1-9页
作者: Wang, Zonghui Fang, Zhihua He, Liang School of Computer Science and Technology Xinjiang University Urumqi830017 China School of Intelligence Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Signal Detection and Processing Urumqi830017 China Department of Electronic Engineering Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China
The accuracy and reliability of automatic speaker verification (ASV) face significant challenges in noisy environments. In recent years, joint training of speech enhancement front-end and ASV back-end has been widely ... 详细信息
来源: 评论
Anomalous Sound Detection Using Time-Frequency Feature and Mixbatch
收藏 引用
Journal of Shanghai Jiaotong University (science) 2025年 1-8页
作者: Huang, Shun Zhang, Yunxiang Fang, Zhihua Tang, Minrui Xu, Ruifeng He, Liang School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Signal Detection and Processing Urumqi830017 China School of Intelligence Science and Technology Xinjiang University Urumqi830017 China Department of Electronic Engineering Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China
The sound emitted by machines under abnormal working conditions exhibits various frequency patterns. Currently, the most advanced anomalous sound detection (ASD) approach is to apply a multi-head self-attention mechan... 详细信息
来源: 评论
Improving ECAPA-TDNN Performance with Coordinate Attention
收藏 引用
Journal of Shanghai Jiaotong University (science) 2024年 1-7页
作者: Liu, Shuanghong Song, Zhida He, Liang School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Signal Detection and Processing Urumqi830017 China Department of Electronic Engineering and Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China
The current mainstream networks, such as squeeze and excitation residual neural network (SE-ResNet) and emphasized channel attention, propagation and aggregation based time delay neural network (ECAPA-TDNN), enhance t... 详细信息
来源: 评论
Efficient Convolutional Neural Network Based Side Channel Attacks Based on AES Cryptography  21
Efficient Convolutional Neural Network Based Side Channel At...
收藏 引用
21st IEEE Student Conference on Research and Development, SCOReD 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Aman, Azana Hafizah Abdulkadir, Rabiu Aliyu Islam, Shayla Farhan, Basim Abdulkareem Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
In recent years, profiled side-channel attacks have emerged as a particularly potent kind of side-channel attack that can circumvent cryptographic equipment's security. Convolutional neural networks (CNNs) have be... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Hussein, Zainab Mohammed Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Chain of Condition: Construct, Verify and Solve Conditions for Conditional Question Answering
Chain of Condition: Construct, Verify and Solve Conditions f...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Lin, Jiuheng Lai, Yuxuan Feng, Yansong Wangxuan Institute of Computer Technology Peking University China State Key Laboratory of General Artificial Intelligence Peking University China Department of Computer Science The Open University of China China Engineering Research Center of Integration and Application of Digital Learning Technology Ministry of Education China
Conditional question answering (CQA) is an important task that aims to find probable answers and identify missing conditions. Existing approaches struggle with CQA due to two challenges: (1) precisely identifying nece... 详细信息
来源: 评论