咨询与建议

限定检索结果

文献类型

  • 862 篇 会议
  • 797 篇 期刊文献

馆藏范围

  • 1,659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,102 篇 工学
    • 690 篇 计算机科学与技术...
    • 586 篇 软件工程
    • 233 篇 信息与通信工程
    • 135 篇 生物工程
    • 133 篇 控制科学与工程
    • 116 篇 电气工程
    • 108 篇 电子科学与技术(可...
    • 102 篇 核科学与技术
    • 91 篇 光学工程
    • 77 篇 机械工程
    • 76 篇 生物医学工程(可授...
    • 51 篇 仪器科学与技术
    • 48 篇 化学工程与技术
    • 42 篇 材料科学与工程(可...
    • 36 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 31 篇 交通运输工程
    • 29 篇 土木工程
  • 702 篇 理学
    • 325 篇 物理学
    • 280 篇 数学
    • 147 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 50 篇 化学
    • 41 篇 系统科学
  • 261 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 125 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 63 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 41 篇 法学
    • 35 篇 社会学
  • 20 篇 教育学
  • 19 篇 经济学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 46 篇 deep learning
  • 38 篇 semantics
  • 35 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 22 篇 graph neural net...
  • 21 篇 machine learning
  • 21 篇 accuracy
  • 20 篇 data models
  • 18 篇 convolutional ne...
  • 17 篇 object detection
  • 17 篇 convolution
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting
  • 15 篇 conferences

机构

  • 139 篇 irfu cea univers...
  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 125 篇 charles universi...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 122 篇 zhejiang univers...
  • 121 篇 infn sezione di ...
  • 121 篇 department of ph...
  • 120 篇 imperial college...
  • 120 篇 university of de...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,454 篇 英文
  • 173 篇 其他
  • 42 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory on Computer Technology Application"
1659 条 记 录,以下是181-190 订阅
排序:
Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence  1
收藏 引用
3rd EAI International Conference on Edge Computing and IoT, EAI ICECI 2022
作者: Gao, Yanxia Liu, Yiwen Mi, Chunqiao Tang, Pengju Shi, Yuanquan School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
The refinement and intelligent control of shield tunneling is the development trend of modern tunnel construction technology. In order to better predict and control the surface subsidence caused by shield excavation, ... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论
Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence  1
收藏 引用
3rd EAI International Conference on Edge Computing and IoT, EAI ICECI 2022
作者: Changkai, Lu Yiwen, Liu Yanxia, Gao Yuanquan, Shi Xiaoning, Peng School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
In recent years, gestures have been widely used in many fields. For example, human-computer interaction, virtual reality, gesture translation, etc. The reason for its rapid development is due to the emergence of deep ... 详细信息
来源: 评论
A Hybrid Blockchain Scheme for Tracing Manufacturing Processes and Trading Transactions  22
A Hybrid Blockchain Scheme for Tracing Manufacturing Process...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with applications, ISPA 2024
作者: Yuan, Ye Yang, Mingxing Xiong, Ruoting Sun, Yani Zhang, Xianchao Ren, Wei HuBei Land Resources Vocational College China China University of Geosciences Gemological Institute Wuhan China University of East Anglia School of Computing Science United Kingdom Yunnan Innovation Institute Beihang University Yunnan Key Laboratory of Blockchain Application Technology Kunming China Jiaxing University Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province Jiaxing China State Key Laboratory of Geo-Information Engineering Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology Mnr Beijing China Ministry of Education China China University of Geosciences School of Computer Science Wuhan China
Blockchain can be envisioned as an enabling framework in terms of cryptography and distributed computing to construct trusted data records among un-trusted users. It can be applied in two typical scenarios - historica... 详细信息
来源: 评论
Edge Intelligence Based Garbage Classification Detection Method  1
收藏 引用
3rd EAI International Conference on Edge Computing and IoT, EAI ICECI 2022
作者: Zhu, Ruijia Liu, Yiwen Gao, Yanxia Shi, Yuanquan Peng, Xiaoning School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
To address the problem that the classification and cleaning of garbage in city streets is always ineffective nowadays, the paper proposes a garbage detection method based on edge intelligence. The edge intelligence no... 详细信息
来源: 评论
Intrusion Detection Based on Deep Belief Network and Stacking Method  3
Intrusion Detection Based on Deep Belief Network and Stackin...
收藏 引用
3rd International Conference on computer Communication and Network Security, CCNS 2022
作者: Wang, Jia Bao Miao, Xiang Hua Li, Xiang Faculty of Information Engineering and Automation Kunming University of Science and Technology Yunnan Kunming650500 China Yunnan Key Laboratory of Computer Technology Application Kunming University of Science and Technology Yunnan Kunming650500 China
After data preprocessing, the feature dimension of NSL-KDD dataset increases from 42 dimensions to 122 dimensions. High dimensional data will make it more difficult for the model to learn the characteristics of the da... 详细信息
来源: 评论
Breaking Speaker Recognition with Paddingback
Breaking Speaker Recognition with Paddingback
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhe Ye Diqun Yan Li Dong Kailai Shen Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Zhejiang Key Laboratory of Mobile Network Application Technology China
Machine Learning as a Service (MLaaS) has gained popularity due to advancements in Deep Neural Networks (DNNs). However, untrusted third-party platforms have raised concerns about AI security, particularly in backdoor...
来源: 评论
Multiple Attention-Guided Neural Architecture Search for Hyperspectral Image Classification  4
Multiple Attention-Guided Neural Architecture Search for Hyp...
收藏 引用
4th International Conference on Video, Signal and Image Processing, VSIP 2022
作者: Song, Yingluo Wang, Aili Dai, Shiyu Wu, Haibin Iwahori, Yuji Heilongjiang Province Key Laboratory of Laser Spectroscopy Technology and Application Harbin University of Science and Technology Harbin150080 China Department of Computer Science Chubu University Aichi487-8501 Japan
Hyperspectral images(HSIs) have rich spatial and spectral information, which provide a strong basis for distinguishing different landcover objects. The HSI classification methods based on deep learning have achieved g... 详细信息
来源: 评论
A 3D Geometry Model of Vocal Tract Based on Smart Internet of Things
收藏 引用
computer Systems Science & Engineering 2023年 第7期46卷 783-798页
作者: Ming Li Kuntharrgyal Khysru Haiqiang Shi Qiang Fang Jinrong Hu Yun Chen Tianjin Medical University General Hospital Tianjin300041China Key Laboratory of Artificial Intelligence Application Technology State Ethnic Affairs Commission Qinghai Minzu UniversityXining810007China Chinese Academy of Sciences Beijing300308China School of Computer Science Chengdu University of Information and TechnologyChengduSichuan610225China College of Intelligence and Computing Tianjin UniversityTianjin300350China
The Internet of Things(IoT)plays an essential role in the current and future generations of information,network,and communication development and *** research focuses on vocal tract visualization and modeling,which ar... 详细信息
来源: 评论
Efficient Deep learning-based Real-time Migration Strategies for Containers in SDN
Efficient Deep learning-based Real-time Migration Strategies...
收藏 引用
Next Generation Data-driven Networks (NGDN), International Conference on
作者: Shan Huang Yanan Liu Yanuo Li Feili He Xiaodong Duan School of Computer Science and Engineering Dalian Minzu University Key Laboratory of Big Data Application Technology of the State Ethnic Affairs Commission Dalian Ethnic Culture Digital Technology Key Laboratory Dalian China
Container technology is widely used and improve the efficiency of container real-time migration has become an important research topic. Existing studies mainly focus on optimizing iterative dumping of containers witho... 详细信息
来源: 评论