咨询与建议

限定检索结果

文献类型

  • 10,171 篇 期刊文献
  • 8,373 篇 会议
  • 111 册 图书

馆藏范围

  • 18,655 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,807 篇 工学
    • 6,614 篇 计算机科学与技术...
    • 5,514 篇 软件工程
    • 2,227 篇 信息与通信工程
    • 1,464 篇 生物工程
    • 1,394 篇 电气工程
    • 1,339 篇 控制科学与工程
    • 1,180 篇 电子科学与技术(可...
    • 1,151 篇 光学工程
    • 1,088 篇 生物医学工程(可授...
    • 931 篇 化学工程与技术
    • 721 篇 仪器科学与技术
    • 587 篇 机械工程
    • 561 篇 材料科学与工程(可...
    • 493 篇 动力工程及工程热...
    • 447 篇 网络空间安全
  • 8,142 篇 理学
    • 3,140 篇 物理学
    • 3,093 篇 数学
    • 1,838 篇 生物学
    • 1,303 篇 统计学(可授理学、...
    • 1,049 篇 地球物理学
    • 979 篇 化学
    • 543 篇 系统科学
  • 2,678 篇 管理学
    • 1,541 篇 管理科学与工程(可...
    • 1,194 篇 图书情报与档案管...
    • 791 篇 工商管理
  • 1,414 篇 医学
    • 1,116 篇 临床医学
    • 892 篇 基础医学(可授医学...
    • 571 篇 公共卫生与预防医...
    • 493 篇 药学(可授医学、理...
  • 497 篇 法学
    • 434 篇 社会学
  • 377 篇 农学
  • 348 篇 经济学
  • 170 篇 教育学
  • 64 篇 文学
  • 31 篇 军事学
  • 17 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 648 篇 deep learning
  • 558 篇 accuracy
  • 427 篇 machine learning
  • 323 篇 feature extracti...
  • 306 篇 real-time system...
  • 289 篇 computational mo...
  • 273 篇 predictive model...
  • 265 篇 training
  • 216 篇 internet of thin...
  • 216 篇 support vector m...
  • 202 篇 optimization
  • 198 篇 convolutional ne...
  • 186 篇 neural networks
  • 168 篇 semantics
  • 146 篇 reliability
  • 143 篇 reinforcement le...
  • 139 篇 scalability
  • 132 篇 image segmentati...
  • 131 篇 data models
  • 129 篇 big data

机构

  • 605 篇 university of ch...
  • 430 篇 department of ph...
  • 394 篇 iccub universita...
  • 309 篇 imperial college...
  • 300 篇 physik-institut ...
  • 298 篇 stfc rutherford ...
  • 298 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 h.h. wills physi...
  • 289 篇 school of physic...
  • 288 篇 cavendish labora...
  • 287 篇 department of ph...
  • 287 篇 institute of par...
  • 287 篇 physikalisches i...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 283 篇 yandex school of...
  • 283 篇 school of physic...
  • 281 篇 horia hulubei na...
  • 280 篇 massachusetts in...

作者

  • 231 篇 beiter a.
  • 222 篇 barter w.
  • 204 篇 bellee v.
  • 195 篇 casse g.
  • 193 篇 bowcock t.j.v.
  • 178 篇 brundu d.
  • 166 篇 blake t.
  • 163 篇 betancourt c.
  • 153 篇 borsato m.
  • 150 篇 bencivenni g.
  • 148 篇 back j.j.
  • 148 篇 bay a.
  • 144 篇 boettcher t.
  • 144 篇 borisyak m.
  • 142 篇 amato s.
  • 142 篇 cattaneo m.
  • 142 篇 albrecht j.
  • 140 篇 bediaga i.
  • 140 篇 braun s.
  • 140 篇 bizzeti a.

语言

  • 17,220 篇 英文
  • 1,276 篇 其他
  • 161 篇 中文
  • 7 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 土耳其文
检索条件"机构=Institute of Data Science and Technology"
18655 条 记 录,以下是81-90 订阅
排序:
Machine learning empowered UAV-based beamforming design in ISAC systems
收藏 引用
science China(Information sciences) 2025年 第5期68卷 285-286页
作者: Xiangyang DUAN Xiaoqi ZHANG Shuqiang XIA Zhongbin WANG Yihua MA Weijie YUAN State Key Laboratory of Mobile Network and Mobile Multimedia Technology Wireless and Computing Research InstituteZTE Corporation School of Electrical and Data Engineering University of Technology Sydney School of Automation and Intelligent Manufacturing Southern University of Science and Technology
Integrated sensing and communication (ISAC) has been proposed as an enabling technology for the realization of the next-generation wireless system,which focuses on performing wireless communication and sensing *** the...
来源: 评论
Leveraging Blockchain for Development of Time Limit-Based Multi-authorized Secure Digital Signature Framework  5th
Leveraging Blockchain for Development of Time Limit-Based Mu...
收藏 引用
5th International Conference on Advances in Information Communication technology and Computing, AICTC 2024
作者: Mallikharjuna Rao, K. Kumar, Ashutosh Agrawal, Deepesh Reyya, Shikhar Data Science and Artificial Intelligence International Institute of Information Technology Naya Raipur Naya Raipur India Computer Science and Engineering International Institute of Information Technology Naya Raipur Naya Raipur India
This article deeply dives into a shift in document security by introducing innovative authentication measures. Conventional digital signature methods are less secure and can easily be forged. Our research explores the... 详细信息
来源: 评论
The Digital Twin City in Enhancing Flood Evacuation Systems: Future Opportunities and Challenges
收藏 引用
IEEE Access 2025年 13卷 32371-32383页
作者: Setijadi Prihatmanto, Ary Prasetyadi, Abdurrakhman Yoganingrum, Ambar Sutriadi, Ridwan Hadiana, Ana Bandung Institute of Technology School of Electrical and Informatics Engineering Bandung40132 Indonesia National Research and Innovation Agency Research Center for Data and Information Science Bandung40231 Indonesia Bandung Institute of Technology School of Architecture Planning and Policy Development Bandung40132 Indonesia
In recent decades, the increasing frequency and severity of natural disasters have necessitated the development of more effective disaster management systems. This paper explores the potential of digital twin technolo... 详细信息
来源: 评论
Gesture Showdown: Rock Paper Scissors with AI Vision
Gesture Showdown: Rock Paper Scissors with AI Vision
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information technology, ICCCIT 2025
作者: Hemal Babu, H. Yeshwanth, C.D. Shravan, N. Bose, K. Regin Rajalakshmi Institute of Technology Department of Artificial Intelligence and Data Science Chennai India Rajalakshmi Institute of Technology Department of AI&DS and Cloud Computing Chennai India
This paper presents a gesture-based RockPaper-Scissors game that leverages computer vision and hand gesture recognition to enable intuitive human-computer interaction. Utilizing MediaPipe's pre-trained hand tracki... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
Prediction of Liver Cirrhosis Disease by using XGBOOST Majority Voting Technique in Machine Learning  2
Prediction of Liver Cirrhosis Disease by using XGBOOST Major...
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Saranya, Ms. K. Pandeeswari, N. KIT - KalaignarKarunanidhi Institute of Technology Department of Artificial Intelligence and Data Science Coimbatore India PSNA College of Engineering and Technology Department of Information Technology Dindigul India
Cirrhosis is a disease where chronic liver injury causes the liver to become extensively scarred. The liver's capacity to operate is compromised when healthy liver cells are replaced by scar tissue. Chronic infect... 详细信息
来源: 评论
A perspective on describing nucleonic flow and pionic observables within the ultra-relativistic quantum molecular dynamics model
收藏 引用
Nuclear science and Techniques 2025年 第3期36卷 105-118页
作者: Yang-Yang Liu Jun-Ping Yang Yong-Jia Wang Qing-Feng Li Zhu-Xia Li Cheng-Jun Xia Ying-Xun Zhang China Nuclear Data Center China Institute of Atomic EnergyBeijing 102413China School of Science Huzhou UniversityHuzhou 313000China Institute of Modern Physics Chinese Academy of SciencesLanzhou 730000China Center for Gravitation and Cosmology College of Physical Science and TechnologyYangzhou UniversityYangzhou 225009China Guangxi Key Laboratory of Nuclear Physics and Technology Guangxi Normal UniversityGuilin 541004China
In this work,we study the impacts of the isospin-independent momentum-dependent interaction(MDI)and near-threshold NN→NΔcross sections(σ_(NN→NΔ))on the nucleonic flow and pion production observables in the ultra-... 详细信息
来源: 评论
An Entorhinal-Hippocampal Loop Model Based on Non-negative Sparse Coding
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第1期106卷 113-127页
作者: Zhao, Kaixin Ren, Menghui College of Computer Science and Technology Henan Institute of Technology Xinxiang453003 China School of Electrical and Information Engineering Zhengzhou University Zhengzhou450001 China Manufacturing IoT Big Data Engineering Technology Research Center of Henan Province Xinxiang453003 China
In our study, we investigate how the brain maps environmental spaces into understandable maps through hippocampal place cells and entorhinal cortex grid cells. We uncover that the hippocampus and entorhinal cortex are... 详细信息
来源: 评论
A study on Electronic Health Records (EHR) in India: Security challenges, initiatives and blockchain integration  4th
A study on Electronic Health Records (EHR) in India: Securit...
收藏 引用
4th International Conference on Computational Methods in science and technology, ICCMST 2024
作者: Bhargava, Misha Mahi, Samarjit Rao, Vidya Department of Data Science and Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal India
With its vast population and extensive healthcare requirements, India is moving toward digitalizing its health records. Safeguarding Electronic Health Records (EHRs) is crucial given the increase in security breaches ... 详细信息
来源: 评论