咨询与建议

限定检索结果

文献类型

  • 619 篇 期刊文献
  • 444 篇 会议

馆藏范围

  • 1,063 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 706 篇 工学
    • 443 篇 计算机科学与技术...
    • 354 篇 软件工程
    • 165 篇 信息与通信工程
    • 102 篇 电气工程
    • 91 篇 控制科学与工程
    • 89 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 53 篇 机械工程
    • 46 篇 光学工程
    • 43 篇 动力工程及工程热...
    • 37 篇 仪器科学与技术
    • 32 篇 化学工程与技术
    • 32 篇 生物医学工程(可授...
    • 27 篇 材料科学与工程(可...
    • 20 篇 建筑学
    • 19 篇 交通运输工程
    • 18 篇 土木工程
  • 449 篇 理学
    • 203 篇 数学
    • 185 篇 物理学
    • 64 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 47 篇 系统科学
    • 42 篇 化学
    • 19 篇 大气科学
  • 217 篇 管理学
    • 132 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 35 篇 医学
    • 33 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 23 篇 法学
    • 19 篇 社会学
  • 18 篇 农学
  • 15 篇 经济学
  • 10 篇 文学
  • 7 篇 教育学
  • 3 篇 艺术学
  • 2 篇 哲学
  • 2 篇 军事学

主题

  • 28 篇 feature extracti...
  • 22 篇 semantics
  • 21 篇 deep learning
  • 19 篇 higgs bosons
  • 18 篇 hadron colliders
  • 15 篇 training
  • 14 篇 computer science
  • 14 篇 laboratories
  • 14 篇 wireless sensor ...
  • 14 篇 clustering algor...
  • 13 篇 convolution
  • 13 篇 data mining
  • 12 篇 computational mo...
  • 12 篇 algorithm design...
  • 12 篇 blockchain
  • 12 篇 accuracy
  • 12 篇 top quark
  • 12 篇 information proc...
  • 10 篇 internet of thin...
  • 10 篇 supersymmetric m...

机构

  • 91 篇 faculty of scien...
  • 91 篇 departamento de ...
  • 91 篇 department for p...
  • 91 篇 institute of phy...
  • 90 篇 department of ph...
  • 90 篇 department of ph...
  • 90 篇 dipartimento di ...
  • 90 篇 yerevan physics ...
  • 90 篇 kirchhoff-instit...
  • 90 篇 institute of phy...
  • 89 篇 graduate school ...
  • 89 篇 physikalisches i...
  • 88 篇 department of ph...
  • 88 篇 physics departme...
  • 87 篇 institut für ast...
  • 87 篇 instituto de fís...
  • 87 篇 national researc...
  • 86 篇 fakultät für phy...
  • 86 篇 department of ph...
  • 85 篇 dipartimento di ...

作者

  • 82 篇 f. buehrer
  • 82 篇 a. t. law
  • 82 篇 c. alexa
  • 82 篇 j. m. izen
  • 82 篇 s. veneziano
  • 82 篇 d. di valentino
  • 82 篇 g. bella
  • 82 篇 j. strandberg
  • 82 篇 d. calvet
  • 82 篇 c. amelung
  • 82 篇 n. orlando
  • 82 篇 c. gumpert
  • 82 篇 h. a. gordon
  • 82 篇 y. tayalati
  • 82 篇 g. spigo
  • 82 篇 v. chiarella
  • 82 篇 f. siegert
  • 82 篇 a. c. könig
  • 82 篇 a. dimitrievska
  • 82 篇 f. deliot

语言

  • 1,005 篇 英文
  • 34 篇 中文
  • 26 篇 其他
检索条件"机构=Jiangsu Key Laboratory of Computer Information Process Technology"
1063 条 记 录,以下是21-30 订阅
排序:
Autonomous trajectory tracking control method for an agricultural robotic vehicle
收藏 引用
International Journal of Agricultural and Biological Engineering 2024年 第1期17卷 215-224页
作者: Jin Yan Wenguang Zhang Yong Liu Wei Pan Xiaoyu Hou Zhiyu Liu School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China School of Information Engineering Xuzhou University of TechnologyXuzhou 221018JiangsuChina National Key Laboratory of Transient Physics Nanjing University of Science and TechnologyNanjing 210094China School of Mechanical Engineering Nanjing University of Science and TechnologyNanjing 210094China
To address the nonlinearities and external disturbances in unstructured and complex agricultural environments,this paper investigates an autonomous trajectory tracking control method for agricultural ground ***,this p... 详细信息
来源: 评论
Power amplifier circuit defect detection based on improved Patch SVDD
Power amplifier circuit defect detection based on improved P...
收藏 引用
作者: Xie, Zhonghui Kong, Wa Zhou, Xinyu Zhang, Wence Zhong, Yujie Xia, Jing School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang China Department of Electronic Information Engineering Hong Kong Polytechnic University Hong Kong
In the manufacturing process of power amplifier (PA), various defects on the circuit surface will seriously affect the circuit performance and its operation. To solve the above problems, this article proposes a circui... 详细信息
来源: 评论
Research on Metaverse Security and Forensics
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 799-825页
作者: Guangjun Liang Jianfang Xin Qun Wang Xueli Ni Xiangmin Guo Pu Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina School of Intelligent Engineering Nanjing Institute of Railway TechnologyNanjingChina
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment ***,while the metaverse brings unprecedente... 详细信息
来源: 评论
Method of adaptive learning feature model fusion and verification based on metamodels  3
Method of adaptive learning feature model fusion and verific...
收藏 引用
3rd International Symposium on computer Applications and information Systems, ISCAIS 2024
作者: Wang, Chenyu Zhu, Yi Wu, Zixin Hao, Guosheng School of Computer Science and Technology Jiangsu Normal University Xuzhou221000 China Jiangsu Province Education Informatization Engineering Technology Research Center Jiangsu Normal University Xuzhou221000 China The Key Laboratory of the Software Development and Verification Technology The Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing210016 China
As the advancement of computer technique and artificial intelligence technology, education based on computer technology has become a hot topic, and the wave of educational informatization is rising. Among them, adapti... 详细信息
来源: 评论
Sharing of Encrypted Lock keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption
收藏 引用
China Communications 2022年 第5期19卷 164-177页
作者: Zhiwei Wang Liping Qian Danwei Chen Guozi sun School of Computer Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Guangxi Key Laboratory of Cryptography and Information Security Department of Computer SciencesGuilin University of Electronic TechnologyGuilin 541004China
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE ... 详细信息
来源: 评论
Energy-Efficient Multi-Trip Routing for Municipal Solid Waste Collection by Contribution-Based Adaptive Particle Swarm Optimization
收藏 引用
Complex System Modeling and Simulation 2023年 第3期3卷 202-219页
作者: Xiaoning Shen Hongli Pan Zhongpei Ge Wenyan Chen Liyan Song Shuo Wang Collaborative Innovation Center of Atmospheric Environment and Equipment Technology and also with the Jiangsu Key Laboratory of Big Data Analysis TechnologySchool of AutomationNanjing University of Information Science and TechnologyNanjing 210044China School of Automation Nanjing University of Information Science and TechnologyNanjing 210044China Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation the Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China School of Computer Science University of BirminghamBirminghamB152TTUK
Waste collection is an important part of waste management *** costs and carbon emissions can be greatly reduced by proper vehicle ***,each vehicle can work again after achieving its capacity limit and unloading the **... 详细信息
来源: 评论
A Survey of the Researches on Grid-Connected Solar Power Generation Systems and Power Forecasting Methods Based on Ground-Based Cloud Atlas
收藏 引用
Energy Engineering 2023年 第2期120卷 385-408页
作者: Xing Deng Feipeng Da Haijian Shao Xia Wang School of Automation Key Laboratory of Measurement and Control for CSEMinistry of EducationSoutheast UniversityNanjing210096China School of Computer Science Jiangsu University of Science and TechnologyZhenjiang212003China School of Information Science and Technology Nantong UniversityNantong226019China
Photovoltaic power generating is one of the primary methods of utilizing solar energy resources,with large-scale photovoltaic grid-connected power generation being the most efficient way to fully utilize solar *** ord... 详细信息
来源: 评论
CASSOR: Class-Aware Sample Selection for Ordinal Regression with Noisy Labels  20th
CASSOR: Class-Aware Sample Selection for Ordinal Regression...
收藏 引用
20th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2023
作者: Yuan, Yue Wan, Sheng Zhang, Chuang Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing China Jiangsu Key Laboratory of Image and Video Understanding for Social Security Nanjing China
Ordinal regression aims at solving the classification problem, where the categories are related in a natural order. Due to the difficulty in distinguishing between highly relevant categories, label noise is frequently... 详细信息
来源: 评论
Automatic depression recognition by intelligent speech signal processing:A systematic survey
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第3期8卷 701-711页
作者: Pingping Wu Ruihao Wang Han Lin Fanlong Zhang Juan Tu Miao Sun Jiangsu Key Laboratory of Public Project Audit School of Engineering AuditNanjing Audit UniversityNanjingChina School of Information Engineering Nanjing Audit UniversityNanjingChina Key Laboratory of Modern Acoustics(MOE) School of PhysicsNanjing UniversityNanjingChina Faculty of Electrical Engineering Mathematics&Computer ScienceDelft University of TechnologyDelftThe Netherlands
Depression has become one of the most common mental illnesses in the *** better prediction and diagnosis,methods of automatic depression recognition based on speech signal are constantly proposed and updated,with a tr... 详细信息
来源: 评论
A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharing  18th
A Data Security Protection Method for Deep Neural Network Mo...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Zhao, Xinjian Li, Qianmu Wang, Qi Chen, Shi Li, Tengfei Li, Nianzhe State Grid Jiangsu Information and Telecommunication Company Jiangsu Nanjing210024 China School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China State Grid Smart Grid Research Institute Co. Ltd. Jiangsu Nanjing210003 China State Grid Key Laboratory of Information and Network Security Jiangsu Nanjing210003 China
With the rapid development of digital economy, numerous business scenarios, such as smart grid, energy network, intelligent transportation, etc., require the design and distribution of deep neural network (DNN) models... 详细信息
来源: 评论