咨询与建议

限定检索结果

文献类型

  • 4,156 篇 期刊文献
  • 4,070 篇 会议
  • 5 册 图书
  • 1 篇 科技报告

馆藏范围

  • 8,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,265 篇 工学
    • 3,672 篇 计算机科学与技术...
    • 3,070 篇 软件工程
    • 1,125 篇 信息与通信工程
    • 777 篇 生物工程
    • 652 篇 控制科学与工程
    • 627 篇 电气工程
    • 488 篇 生物医学工程(可授...
    • 458 篇 电子科学与技术(可...
    • 421 篇 光学工程
    • 357 篇 化学工程与技术
    • 316 篇 机械工程
    • 233 篇 动力工程及工程热...
    • 213 篇 仪器科学与技术
    • 196 篇 材料科学与工程(可...
    • 168 篇 交通运输工程
    • 164 篇 安全科学与工程
  • 3,135 篇 理学
    • 1,634 篇 数学
    • 889 篇 生物学
    • 746 篇 物理学
    • 578 篇 统计学(可授理学、...
    • 394 篇 化学
    • 271 篇 系统科学
  • 1,420 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 663 篇 图书情报与档案管...
    • 330 篇 工商管理
  • 513 篇 医学
    • 414 篇 临床医学
    • 316 篇 基础医学(可授医学...
    • 213 篇 药学(可授医学、理...
  • 242 篇 法学
    • 192 篇 社会学
  • 168 篇 经济学
    • 166 篇 应用经济学
  • 138 篇 农学
  • 74 篇 教育学
  • 23 篇 文学
  • 19 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 229 篇 semantics
  • 217 篇 feature extracti...
  • 208 篇 deep learning
  • 202 篇 training
  • 150 篇 computational mo...
  • 147 篇 machine learning
  • 130 篇 accuracy
  • 128 篇 predictive model...
  • 124 篇 data models
  • 111 篇 convolution
  • 105 篇 big data
  • 103 篇 data mining
  • 96 篇 neural networks
  • 91 篇 forecasting
  • 89 篇 graph neural net...
  • 86 篇 task analysis
  • 82 篇 optimization
  • 79 篇 image segmentati...
  • 76 篇 object detection
  • 72 篇 visualization

机构

  • 146 篇 shenzhen researc...
  • 128 篇 big data researc...
  • 126 篇 state key labora...
  • 115 篇 college of big d...
  • 102 篇 national enginee...
  • 101 篇 college of compu...
  • 93 篇 national enginee...
  • 87 篇 school of comput...
  • 83 篇 university of sc...
  • 75 篇 peng cheng labor...
  • 75 篇 school of comput...
  • 72 篇 state key labora...
  • 69 篇 university of ch...
  • 67 篇 beijing advanced...
  • 63 篇 school of big da...
  • 60 篇 hubei key labora...
  • 60 篇 school of econom...
  • 59 篇 shandong provinc...
  • 59 篇 fujian provincia...
  • 58 篇 school of mathem...

作者

  • 79 篇 hai jin
  • 78 篇 chen enhong
  • 75 篇 liu qi
  • 52 篇 zhang rui
  • 47 篇 jin hai
  • 44 篇 qi liu
  • 41 篇 xiaofei liao
  • 41 篇 xia yong
  • 40 篇 liu jun
  • 40 篇 zhou pan
  • 37 篇 zhou tao
  • 35 篇 shen linlin
  • 34 篇 pan jeng-shyang
  • 33 篇 li yang
  • 33 篇 wang meng
  • 32 篇 wang yang
  • 31 篇 liu yang
  • 30 篇 huang zhenya
  • 30 篇 wu xindong
  • 29 篇 wang shuai

语言

  • 7,565 篇 英文
  • 548 篇 其他
  • 127 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Major in Data Science and Big Data Technology"
8232 条 记 录,以下是4681-4690 订阅
排序:
A Drug Box Recognition System Based on Deep Learning and Cloud-Edge Collaboration for Pharmacy Automation
A Drug Box Recognition System Based on Deep Learning and Clo...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Honglei Zhu Anming Dong Jiguo Yu Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Drug box recognition is an integral part of the pharmacy automation system (PAS), which checks for discrepancies between the drugs provided by the system and the doctor’s prescription with the help of modern image re...
来源: 评论
HOPE-L: A Lossless database Watermarking Method in Homomorphic Encryption Domain
HOPE-L: A Lossless Database Watermarking Method in Homomorph...
收藏 引用
Smart City and Informatization (iSCI), IEEE International Conference on
作者: Xueqi Zhang Haiyong Xie Hui Lin University of Science and Technology of China Anhui China National Engineering Laboratory for Public Safety Risk Perception and Control by Big Data Beijing China
Cloud computing has been widely adopted in the Internet economy; however, this poses numerous risks including illegal data copying and digital copyright infringement, leading to the challenge on protecting the securit... 详细信息
来源: 评论
GK: A Graphormer Architecture Based Knowledge Graph Reasoning Model for Link Prediction
GK: A Graphormer Architecture Based Knowledge Graph Reasonin...
收藏 引用
IEEE International Conference on big data and Cloud Computing (BdCloud)
作者: Yueiia Wu Jian-tao Zhou Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing College of Computer Science Inner Mongolia University National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China
Knowledge Graph has become a dominant research field in graph theory, but its incompleteness and sparsity hinder its application in various fields. Knowledge Graph Reasoning aims to alleviate these problems by deducin... 详细信息
来源: 评论
An efficient face recognition attack method based on generative adversarial networks and cosine metrics  5
An efficient face recognition attack method based on generat...
收藏 引用
5th Asian Conference on Artificial Intelligence technology, ACAIT 2021
作者: Ding, Hu He, Shumeng Wu, Yanwen Jin, Yongli Gan, Lin Xu, Gaodi Yang, Houqun Hainan University School of Computer Science and Technology Hainan Haikou China Chongqing University School of Big Data and Software Engineering Chongqing China Anhui University School of Computer Science and Technology Anhui Hefei China Purdue University Elmore Family School of Computer and Electrical Engineering West Lafayette United States Hainan Association for Artificial Intelligence Hainan Haikou China
Deep neural networks are vulnerable to attacks on adversarial samples. These attacks are caused by adding small magnitude perturbations to the input samples, which may lead to misclassification of the deep neural netw... 详细信息
来源: 评论
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome
A residual attention-based privacy-preserving biometrics mod...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Cheng Tian Song Liu Jinbao Li Guangchen Wang Luyue Kong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Medicine Shandong Medical College Jinan China
Transcriptome prediction from genetic variation data is an important task in the privacy-preserving and biometrics field, which can better protect genomic data and achieve biometric recognition through transcriptome. ... 详细信息
来源: 评论
Predicting Transcription Factor Binding Signals Based on a Novel Encoder-Decoder Framework  2nd
Predicting Transcription Factor Binding Signals Based on a N...
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Wang, Siguo Li, Zhipeng Zhang, Qinhu Ningbo Institute of Digital Twin Eastern Institute of Technology No. 568 Tongxin Road Zhuangshi Street Zhejiang Ningbo315201 China Big Data and Intelligent Computing Research Center Guangxi Academy of Science Nanning530007 China Institute for Regenerative Medicine Medical Innovation Center and State Key Laboratory of Cardiology School of Medicine Shanghai East Hospital Tongji University Shanghai200123 China
The transcription process is the initial step in gene expression and the core of the regulatory mechanism, in which transcription factors control gene expression through interactions with particular DNA sequences. The... 详细信息
来源: 评论
2d Human Pose Estimation with Explicit Anatomical Keypoints Structure Constraints
SSRN
收藏 引用
SSRN 2023年
作者: Ji, Zhangjian Wang, Zilong Zhang, Ming Chen, Yapeng Qian, Yuhua No.92 Wucheng Rd. Xiaodian District Taiyuan China School of Computer & Information Technology Shanxi University Taiyuan China Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education Shanxi University Taiyuan China Institute of Big Data Science and Industry Shanxi University Taiyuan China
Recently, human pose estimation mainly focuses on how to design a more effective and better deep network structure as human features extractor, and most designed feature extraction networks only introduce the position... 详细信息
来源: 评论
On efficient expanding training datasets of breast tumor ultrasound segmentation model
收藏 引用
Computers in Biology and Medicine 2024年 183卷 109274-109274页
作者: Zhang, Caicai Mei, Mei Mei, Zhuolin Wu, Bin Chen, Shasha Lu, Minfeng Lu, Chenglang School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering 528 Binwen Road Binjiang District Zhejiang Hangzhou310053 China Department of Ultrasound The Second Affiliated Hospital Zhejiang University School of Medicine 88 Jiefang Road Shangcheng District Zhejiang Hangzhou310009 China School of Computer and Big Data Science Jiujiang University 551 Qianjin East Road Jiangxi Jiujiang332005 China
Automatic segmentation of breast tumor ultrasound images can provide doctors with objective and efficient references for lesions and regions of interest. Both dataset optimization and model structure optimization are ... 详细信息
来源: 评论
Training of Spiking Neural Network joint Curriculum Learning Strategy
arXiv
收藏 引用
arXiv 2023年
作者: Tang, Lingling Chu, Jielei Gong, Zhiguo Li, Tianrui The School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China The State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China
Starting with small and simple concepts, and gradually introducing complex and difficult concepts is the natural process of human learning. Spiking Neural Networks (SNNs) aim to mimic the way humans process informatio... 详细信息
来源: 评论
Equivariant Graph Hierarchy-Based Neural Networks
arXiv
收藏 引用
arXiv 2022年
作者: Han, Jiaqi Huang, Wenbing Xu, Tingyang Rong, Yu Department of Computer Science and Technology Tsinghua University China Gaoling School of Artificial Intelligence Renmin University of China China Beijing Key Laboratory of Big Data Management and Analysis Methods Beijing China Tencent AI Lab China
Equivariant Graph neural Networks (EGNs) are powerful in characterizing the dynamics of multi-body physical systems. Existing EGNs conduct flat message passing, which, yet, is unable to capture the spatial/dynamical h... 详细信息
来源: 评论