咨询与建议

限定检索结果

文献类型

  • 331 篇 期刊文献
  • 317 篇 会议

馆藏范围

  • 648 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 412 篇 工学
    • 247 篇 计算机科学与技术...
    • 208 篇 软件工程
    • 83 篇 信息与通信工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 53 篇 电气工程
    • 53 篇 控制科学与工程
    • 51 篇 机械工程
    • 41 篇 光学工程
    • 38 篇 电子科学与技术(可...
    • 28 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 18 篇 仪器科学与技术
    • 15 篇 土木工程
    • 12 篇 建筑学
    • 12 篇 交通运输工程
    • 10 篇 力学(可授工学、理...
    • 10 篇 动力工程及工程热...
  • 273 篇 理学
    • 134 篇 数学
    • 89 篇 物理学
    • 76 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 29 篇 化学
    • 26 篇 系统科学
  • 86 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
  • 38 篇 医学
    • 28 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
    • 10 篇 公共卫生与预防医...
  • 10 篇 农学
  • 7 篇 教育学
  • 6 篇 法学
  • 3 篇 经济学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 feature extracti...
  • 18 篇 semantics
  • 18 篇 training
  • 14 篇 deep learning
  • 14 篇 accuracy
  • 12 篇 face recognition
  • 12 篇 dna
  • 11 篇 algorithm design...
  • 11 篇 robustness
  • 10 篇 computational mo...
  • 9 篇 image segmentati...
  • 9 篇 cryptography
  • 8 篇 reinforcement le...
  • 8 篇 three-dimensiona...
  • 8 篇 educational inst...
  • 8 篇 data mining
  • 8 篇 visualization
  • 7 篇 conferences
  • 7 篇 image encryption
  • 7 篇 machine learning

机构

  • 55 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 27 篇 school of comput...
  • 27 篇 anhui province k...
  • 24 篇 school of comput...
  • 21 篇 key laboratory o...
  • 20 篇 anhui province k...
  • 17 篇 university of ch...
  • 17 篇 key laboratory o...
  • 15 篇 school of mechan...
  • 14 篇 state key labora...
  • 12 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 11 篇 affective comput...
  • 10 篇 peng cheng labor...
  • 9 篇 key laboratory o...
  • 8 篇 hubei key labora...
  • 8 篇 neuroscience and...
  • 8 篇 shenzhen institu...
  • 8 篇 shenzhen institu...

作者

  • 76 篇 zhang qiang
  • 63 篇 qiang zhang
  • 48 篇 wei xiaopeng
  • 39 篇 fuji ren
  • 31 篇 xiaopeng wei
  • 26 篇 zhou changjun
  • 24 篇 min hu
  • 24 篇 changjun zhou
  • 23 篇 ren fuji
  • 23 篇 wang bin
  • 18 篇 hu min
  • 17 篇 zhou shihua
  • 17 篇 xiaohua wang
  • 16 篇 zhou dongsheng
  • 14 篇 bin wang
  • 12 篇 sun xiao
  • 12 篇 xiao sun
  • 11 篇 zhao lasheng
  • 11 篇 zheng xuedong
  • 10 篇 dongsheng zhou

语言

  • 605 篇 英文
  • 31 篇 其他
  • 15 篇 中文
检索条件"机构=Key Laboratory of Advanced and Intelligent Computing"
648 条 记 录,以下是11-20 订阅
排序:
An Encoded Double Auxiliary Pilot Channel Estimation Method for Intrinsic Interference Cancellation in FBMC/OQAM Systems  6
An Encoded Double Auxiliary Pilot Channel Estimation Method ...
收藏 引用
6th IEEE International Conference on Artificial Intelligence in Engineering and Technology, IICAIET 2024
作者: Xing, Sixuan Xiang, Jianhong Wang, Ying Qi, Liangang Zhong, Yu College of Information and Communication Engineering Harbin Engineering University Harbin China Harbin Engineering University Key Laboratory of Advanced Ship Communication and Information Technology Harbin China Agile and Intelligent Computing Key Laboratory Chengdu China
Filter bank multicarrier technique (FBMC) is considered as a promising modulation technique suitable for future communications. However, the presence of intrinsic interference prevents the efficient implementation of ... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Noise Detection and Removal for Underground Communication Systems Based on L2 N onnal Inner Product  6
Noise Detection and Removal for Underground Communication Sy...
收藏 引用
6th IEEE International Conference on Artificial Intelligence in Engineering and Technology, IICAIET 2024
作者: Yu, Bangwei Wang, Yong Qi, Liangang Liu, Yang College of Information and Communication Engineering Harbin Engineering University Harbin China Harbin Engineering University Key Laboratory of Advanced Ship Communication and Information Technology Harbin China Sichuan Key Laboratory of Agile Intelligent Computing Chengdu China
In underground communication systems, continuous mud pulse signals are susceptible to pump noise during transmission, resulting in a high bit error rate(BER). In this paper, a Normal Inner Product Orthogonal Matching ... 详细信息
来源: 评论
On Simple Perturbation of the α-Universal Triple I Algorithm via Specific Interval Implication Operators  1
收藏 引用
3rd International Conference on Artificial Intelligence Logic and Applications, AILA 2023
作者: Tang, Yiming Guo, Anyi Zhang, Li Gao, Jianwei Li, Shujie Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer and Information Hefei University of Technology Hefei230601 China
Fuzzy reasoning aims to describe things with fuzzy and uncertain concepts and convert them into information that computers can process. Wang thought that the inference algorithm based on Compositional Rule of Inferenc... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论
GP-Net: Global Perceptual Network with Adaptive Gradient Clipping for Emotional Image Classification  8
GP-Net: Global Perceptual Network with Adaptive Gradient Cli...
收藏 引用
8th International Conference on intelligent computing and Signal Processing, ICSP 2023
作者: Wang, Xiaohua Yang, Jie Hu, Min Wu, Xia Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer Science and Information Engineering Hefei China
Traditional image emotion recognition focuses only on the emotion information embedded in the subject or part of the image, while ignoring the global emotion information. In this paper, we propose a new network based ... 详细信息
来源: 评论
The positive mass theorem for asymptotically flat manifolds with isolated conical singularities
收藏 引用
Science China Mathematics 2024年
作者: Xianzhe Dai Yukai Sun Changliang Wang Department of Mathematics University of California Santa Barbara Key Laboratory of Pure and Applied Mathematics School of Mathematical SciencesPeking University School of Mathematical Sciences and Institute for Advanced Study Key Laboratory of Intelligent Computing and Applications (Ministry of Education)Tongji University
We prove the positive mass theorem for asymptotically flat(AF for short) manifolds with finitely many isolated conical singularities. We do not impose the spin condition. Instead, we use the conformal blow-up techniqu...
来源: 评论
MFN: Explainable DNA triple helixes Stabilized Design based on mCGR and flow network
MFN: Explainable DNA triple helixes Stabilized Design based ...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wen, Xiaoru Sun, Lijun Xie, Lei Zheng, Yanfen Cao, Ben Wang, Bin Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian China Dalian University of Technology School of Computer Science and Technology Dalian China
DNA triple helix structure, as a highly specific gene targeting tool, enable gene regulation by precisely identifying and binding to target DNA sequences. However, the limits of design quality and efficiency affect th... 详细信息
来源: 评论
Impulsive Control of Heterogeneous Multi-agent Systems with Saturation Constraint and Time Delay
Impulsive Control of Heterogeneous Multi-agent Systems with ...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Jiao, Ranran Li, Bo Chen, Xiangyong Jiang, Xiaowei School of Automation China University of Geosciences Hubei Key Laboratory of Advanced Control Intelligent Automation of Complex Systems Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan China School of Finance Anhui University of Finance and Economics Bengbu China Key Laboratory of Complex systems and Intelligent Computing in Universities of Shandong Linyi University Linyi China
This paper addresses the problem of leader-following consensus in heterogeneous multi-agent systems (HMAS) with input saturation and communication delay. Given the practical differences between leader and follower dim... 详细信息
来源: 评论
BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks  10
BContext2Name: Naming Functions in Stripped Binaries with Mu...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Xia, Bing Ge, Yunxiang Yang, Ruinan Yin, Jiabin Pang, Jianmin Tang, Chongjun Dept.ZhongYuan University of Technology Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Dept.ZhongYuan University of Technology Henan Key Laboratory on Public Opinion Intelligent Analysis Zhengzhou China Dept.ZhongYuan University of Technology Zhengzhou China Dept.Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Conducting binary function naming helps reverse engineers understand the internal workings of the code and perform malicious code analysis without accessing the source code. However, the loss of debugging information ... 详细信息
来源: 评论