咨询与建议

限定检索结果

文献类型

  • 2,989 篇 期刊文献
  • 2,562 篇 会议
  • 4 册 图书

馆藏范围

  • 5,555 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,622 篇 工学
    • 2,308 篇 计算机科学与技术...
    • 1,939 篇 软件工程
    • 831 篇 信息与通信工程
    • 438 篇 生物工程
    • 429 篇 电气工程
    • 410 篇 控制科学与工程
    • 322 篇 电子科学与技术(可...
    • 297 篇 化学工程与技术
    • 254 篇 生物医学工程(可授...
    • 246 篇 机械工程
    • 232 篇 光学工程
    • 183 篇 材料科学与工程(可...
    • 165 篇 动力工程及工程热...
    • 159 篇 交通运输工程
    • 143 篇 仪器科学与技术
    • 137 篇 建筑学
    • 131 篇 土木工程
  • 2,050 篇 理学
    • 1,008 篇 数学
    • 533 篇 物理学
    • 522 篇 生物学
    • 331 篇 统计学(可授理学、...
    • 307 篇 化学
    • 146 篇 系统科学
  • 1,047 篇 管理学
    • 615 篇 管理科学与工程(可...
    • 479 篇 图书情报与档案管...
    • 219 篇 工商管理
  • 293 篇 医学
    • 236 篇 临床医学
    • 161 篇 基础医学(可授医学...
  • 174 篇 法学
    • 141 篇 社会学
  • 153 篇 农学
  • 114 篇 经济学
    • 113 篇 应用经济学
  • 41 篇 教育学
  • 16 篇 文学
  • 13 篇 军事学
  • 6 篇 艺术学
  • 1 篇 历史学

主题

  • 174 篇 semantics
  • 146 篇 feature extracti...
  • 135 篇 deep learning
  • 129 篇 training
  • 90 篇 computational mo...
  • 81 篇 data models
  • 77 篇 machine learning
  • 74 篇 convolution
  • 70 篇 data mining
  • 68 篇 predictive model...
  • 61 篇 neural networks
  • 60 篇 accuracy
  • 56 篇 visualization
  • 54 篇 object detection
  • 52 篇 big data
  • 49 篇 task analysis
  • 49 篇 graph neural net...
  • 48 篇 forecasting
  • 47 篇 optimization
  • 46 篇 costs

机构

  • 164 篇 school of inform...
  • 149 篇 key laboratory o...
  • 133 篇 school of econom...
  • 96 篇 school of comput...
  • 93 篇 state key labora...
  • 83 篇 fujian provincia...
  • 77 篇 henan key labora...
  • 76 篇 research center ...
  • 73 篇 school of comput...
  • 72 篇 school of comput...
  • 70 篇 college of big d...
  • 67 篇 university of ch...
  • 66 篇 guangdong key la...
  • 58 篇 hubei key labora...
  • 53 篇 shandong provinc...
  • 53 篇 shenzhen researc...
  • 52 篇 key laboratory o...
  • 50 篇 school of inform...
  • 48 篇 peng cheng labor...
  • 48 篇 school of softwa...

作者

  • 46 篇 shi yong
  • 40 篇 zhang rui
  • 40 篇 yong shi
  • 40 篇 chen hong
  • 39 篇 chang kuo-chi
  • 38 篇 wu xindong
  • 38 篇 pan jeng-shyang
  • 34 篇 liu yang
  • 33 篇 wang meng
  • 33 篇 zhang jing
  • 32 篇 xue xingsi
  • 32 篇 du xiaoyong
  • 30 篇 wen ji-rong
  • 29 篇 li cuiping
  • 28 篇 chu kai-chun
  • 28 篇 huang qingming
  • 27 篇 liu jun
  • 27 篇 xindong wu
  • 25 篇 hong chen
  • 25 篇 li shaobo

语言

  • 5,198 篇 英文
  • 247 篇 其他
  • 118 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of knowledge Engineering with Big Data"
5555 条 记 录,以下是171-180 订阅
排序:
Facile synthesis of W-Mo bimetallic oxides with high adsorption properties from secondary resources
收藏 引用
Tungsten 2024年 第4期6卷 806-820页
作者: Jia-Li Cheng Yang-Si Liu Xiao-Li Xi Zuo-Ren Nie Collaborative Innovation Center of Capital Resource-Recycling Material Technology College of Materials Science and EngineeringBeijing University of TechnologyBeijing100124China National Engineering Laboratory for Industrial Big-Data Application Technology Beijing University of TechnologyBeijing100124China Key Laboratory of Advanced Functional Materials Ministry of EducationBeijing University of TechnologyBeijing100124China
A simple solvothermal method was used to obtain W-Mo bimetallic oxides from W-Mo alloy scrap,and pure metal powders were also used as the raw materials to simulate *** products had a sea urchin-like structure with abu... 详细信息
来源: 评论
A remote sensing work-flow recommendation algorithm based on logical structure
A remote sensing work-flow recommendation algorithm based on...
收藏 引用
2022 International Conference on Signal Processing, Computer Networks, and Communications, SPCNC 2022
作者: Zuo, Xianyu Wu, Yaohua Liu, Yang Lin, Yinghao Zhang, Lei Henan Key Laboratory of Big Data Analysis and Processing School of Computer and Information Engineering Henan University Kaifeng475001 China
With the development of remote sensing products towards the direction of civilianization and popularization, work-flow customization plays an important role in the production of remote sensing products. The traditiona... 详细信息
来源: 评论
IGED:Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论
Machine Learning for Signal Demodulation in Underwater Wireless Optical Communications
收藏 引用
China Communications 2024年 第5期21卷 297-313页
作者: Ma Shuai Yang Lei Ding Wanying Li Hang Zhang Zhongdan Xu Jing Li Zongyan Xu Gang Li Shiyin Department of Strategic and Advanced Interdisciplinary Research Peng Cheng LaboratoryShenzhen 518055China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China Data-driven Intelligent Information System Laboratory Shenzhen Research Institute of Big DataShenzhen 518172China Ocean College Zhejiang UniversityZhoushan 316021China State Key Laboratory of Millimeter Waves Southeast UniversityNanjing 210096China
The underwater wireless optical communication(UWOC)system has gradually become essential to underwater wireless communication *** other existing works on UWOC systems,this paper evaluates the proposed machine learning... 详细信息
来源: 评论
YOLOvis: a yolo style object detection network for drone vision  3
YOLOvis: a yolo style object detection network for drone vis...
收藏 引用
3rd International Conference on Machine Vision, Automatic Identification, and Detection, MVAID 2024
作者: Peng, Yanfei Li, Jincheng Guo, Xinyue School of Electronic and Information Engineering Liaoning University of Technology and Engineering Huludao125105 China Liaoning Key Laboratory of Radio Frequency and Big Data for Intelligent Applications Huludao125105 China
In recent years, with the rapid development of drone photography technology, drones have emerged as a new method for photography and observation. We have applied object detection technology to drone photography and pr... 详细信息
来源: 评论
DCEL:classifier fusion model for Android malware detection
收藏 引用
Journal of Systems engineering and Electronics 2024年 第1期35卷 163-177页
作者: XU Xiaolong JIANG Shuai ZHAO Jinbo WANG Xinheng Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China School of Computing and Engineering University of West LondonLondon W55RFUK
The rapid growth of mobile applications,the popularity of the Android system and its openness have attracted many hackers and even criminals,who are creating lots of Android ***,the current methods of Android malware ... 详细信息
来源: 评论
Short Text Topic Modeling Techniques, Applications, and Performance: A Survey
收藏 引用
IEEE Transactions on knowledge and data engineering 2022年 第3期34卷 1427-1445页
作者: Qiang, Jipeng Qian, Zhenyu Li, Yun Yuan, Yunhao Wu, Xindong Department of Computer Science Yangzhou University Jiangsu225009 China Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Hefei University of Technology Hefei Anhui230026 China Mininglamp Academy of Sciences Minininglamp Beijing China
Analyzing short texts infers discriminative and coherent latent topics that is a critical and fundamental task since many real-world applications require semantic understanding of short texts. Traditional long text to... 详细信息
来源: 评论
Lightweight Dual Grouped Large-Kernel Convolutions for Salient Object Detection Network  31st
Lightweight Dual Grouped Large-Kernel Convolutions for Sali...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Liu, Jiajie Zhang, Zhibin Engineering Research Center of Ecological Big Data Ministry of Education Beijing China Key Laboratory of Wireless Networks and Mobile Computing Inner Mongolia University Hohhot010021 China
Most existing Salient Object Detection (SOD) methods focus on achieving better performance, often resulting in models with a large number of parameters. However, there is limited research on lightweight models in this... 详细信息
来源: 评论
data-Driven Dynamic Optimization of Electronic Fences in Free-Float Bike Sharing Systems  24
Data-Driven Dynamic Optimization of Electronic Fences in Fre...
收藏 引用
24th COTA International Conference of Transportation Professionals: Resilient, Intelligent, Connected, and Lowcarbon Multimodal Transportation, CICTP 2024
作者: Wei, Zhonghua Ma, Houqiang Li, Jiale Li, Zongze Li, Yunxuan Beijing Key Laboratory of Traffic Engineering Beijing Univ. of Technology Beijing China Key Laboratory of Transport Industry of Big Data Application Technologies for Comprehensive Transport Beijing Jiaotong Univ. Beijing China
As an emerging technical means of free-float bike sharing parking management, electronic fencing solves the problem of chaotic parking. Existing research mostly conducts static optimal site selection for electronic fe... 详细信息
来源: 评论
A DL Intrusion Detection Method for Low-Rate Denial of Service Attacks
A DL Intrusion Detection Method for Low-Rate Denial of Servi...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and Computers, IPEC 2023
作者: Wu, Yuhong Lv, Yunshan Hu, Xiangdong School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Key Laboratory of Public Big Data Security Technology Chongqing Chongqing China School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China
Denial of service (DoS) attacks is among the most harmful network threats. Low-rate DoS (LDoS) attacks feature good concealment and are likely to evade detection by conventional signal analysis-based methods. A LDoS a... 详细信息
来源: 评论