咨询与建议

限定检索结果

文献类型

  • 4,216 篇 期刊文献
  • 4,131 篇 会议
  • 5 册 图书

馆藏范围

  • 8,352 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,333 篇 工学
    • 3,718 篇 计算机科学与技术...
    • 3,086 篇 软件工程
    • 1,151 篇 信息与通信工程
    • 779 篇 生物工程
    • 687 篇 控制科学与工程
    • 664 篇 电气工程
    • 492 篇 生物医学工程(可授...
    • 472 篇 电子科学与技术(可...
    • 422 篇 光学工程
    • 357 篇 化学工程与技术
    • 323 篇 机械工程
    • 236 篇 动力工程及工程热...
    • 221 篇 仪器科学与技术
    • 206 篇 材料科学与工程(可...
    • 172 篇 交通运输工程
    • 169 篇 安全科学与工程
  • 3,157 篇 理学
    • 1,637 篇 数学
    • 898 篇 生物学
    • 755 篇 物理学
    • 578 篇 统计学(可授理学、...
    • 403 篇 化学
    • 270 篇 系统科学
  • 1,441 篇 管理学
    • 814 篇 管理科学与工程(可...
    • 673 篇 图书情报与档案管...
    • 330 篇 工商管理
  • 538 篇 医学
    • 426 篇 临床医学
    • 320 篇 基础医学(可授医学...
    • 216 篇 药学(可授医学、理...
  • 244 篇 法学
    • 194 篇 社会学
  • 170 篇 经济学
    • 168 篇 应用经济学
  • 143 篇 农学
  • 79 篇 教育学
  • 23 篇 文学
  • 19 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 240 篇 semantics
  • 224 篇 feature extracti...
  • 217 篇 deep learning
  • 199 篇 training
  • 156 篇 computational mo...
  • 153 篇 machine learning
  • 138 篇 accuracy
  • 130 篇 predictive model...
  • 128 篇 data models
  • 113 篇 convolution
  • 111 篇 data mining
  • 104 篇 big data
  • 95 篇 neural networks
  • 91 篇 forecasting
  • 89 篇 optimization
  • 87 篇 graph neural net...
  • 85 篇 task analysis
  • 83 篇 federated learni...
  • 78 篇 image segmentati...
  • 77 篇 object detection

机构

  • 146 篇 shenzhen researc...
  • 129 篇 state key labora...
  • 127 篇 big data researc...
  • 116 篇 college of big d...
  • 102 篇 national enginee...
  • 101 篇 college of compu...
  • 89 篇 national enginee...
  • 88 篇 school of comput...
  • 84 篇 university of sc...
  • 76 篇 university of ch...
  • 75 篇 peng cheng labor...
  • 72 篇 school of comput...
  • 71 篇 state key labora...
  • 65 篇 school of big da...
  • 64 篇 beijing advanced...
  • 60 篇 hubei key labora...
  • 59 篇 shandong provinc...
  • 59 篇 school of econom...
  • 58 篇 school of comput...
  • 58 篇 school of mathem...

作者

  • 78 篇 chen enhong
  • 76 篇 hai jin
  • 75 篇 liu qi
  • 52 篇 zhang rui
  • 50 篇 jin hai
  • 45 篇 qi liu
  • 42 篇 liu jun
  • 41 篇 xiaofei liao
  • 40 篇 xia yong
  • 39 篇 zhou pan
  • 36 篇 zhou tao
  • 36 篇 pan jeng-shyang
  • 34 篇 li yang
  • 34 篇 wang meng
  • 33 篇 shen linlin
  • 32 篇 wang yang
  • 30 篇 liu yang
  • 30 篇 huang zhenya
  • 29 篇 wang shuai
  • 29 篇 wu xindong

语言

  • 6,609 篇 英文
  • 1,632 篇 其他
  • 148 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 3 篇 葡萄牙文
  • 3 篇 斯洛文尼亚文
  • 1 篇 荷兰文
检索条件"机构=Major in Data Science and Big Data Technology"
8352 条 记 录,以下是4911-4920 订阅
排序:
Full-Atom Protein Pocket Design via Iterative Refinement
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zaixi Lu, Zepu Hao, Zhongkai Zitnik, Marinka Liu, Qi Anhui Province Key Lab of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence Anhui Hefei China Dept. of Comp. Sci. and Tech. Institute for AI THBI Lab BNRist Center Tsinghua-Bosch Joint ML Center Tsinghua China Harvard University United States
The design of de novo functional proteins that bind specific ligand molecules is paramount in therapeutics and bio-engineering. A critical yet formidable task in this endeavor is the design of the protein pocket, whic... 详细信息
来源: 评论
Deep Neural Network based Relation Extraction: An overview
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Hailin Qin, Ke Zakari, Rufai Yusuf Lu, Guoming Yin, Jin Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
Knowledge is a formal way of understanding the world, providing a human-level cognition and intelligence for the next-generation artificial intelligence (AI). One of the representations of knowledge is semantic relati... 详细信息
来源: 评论
An Intelligent Recognition Algorithm for Urban Utility Tunnel Surface Intrusion via Spatio-temporal-spectral Joint Information Extraction with FPN Network
An Intelligent Recognition Algorithm for Urban Utility Tunne...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Tao He Zhijun Yan Shixiong Zhang Deming Liu Hao Li Qizhen Sun Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan P. R. China School of Optical and Electronic Information Huazhong University of Science and Technology Wuhan P. R. China
An intelligent recognition algorithm for utility tunnel surface intrusion based on spatio-temporal-spectral joint information extraction with FPN network is proposed. Finally, the average recognition accuracy of 93.8%... 详细信息
来源: 评论
Enhanced Adsorption of Copper Citrate Complex by Ferromanganese Oxides-Biochar from Water: Performance and Mechanism
SSRN
收藏 引用
SSRN 2024年
作者: Zhu, Ying Lei, Xiang Liu, Jianguo Li, Yiting Fan, Wenhong Key Laboratory of Environmental Pollution Control and Remediation Universities of Inner Mongolia Autonomous Region College of Resources and Environmental Engineering Inner Mongolia University of Technology Inner Mongolia Hohhot010051 China School of Materials Science and Engineering Beihang University Beijing100191 China Beijing Advanced Innovation Center for Big Data-Based Precision Medicine Beihang University Beijing100191 China
Due to the stable structure of complex metals, their removal is more challenging compared to metal ions. Additionally, the removal mechanism of metal complexes is closely related to their structure. This study develop... 详细信息
来源: 评论
Vflh: A Following-the-Leader-History Based Algorithm for Adaptive Online Convex Optimization with Stochastic Constraints
SSRN
收藏 引用
SSRN 2022年
作者: Yang, Yifan Chen, Lin Zhou, Pan Ding, Xiaofeng Department of Computer Science University of California Santa BarbaraCA93106 United States National Engineering Research Center for Big Data Technology and System Lab Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430072 China
This paper considers online convex optimization (OCO) with generated i.i.d. stochastic constraints, where the distribution of environment is changing and the performance is measured by \textit{adaptive regret}. The st... 详细信息
来源: 评论
Label Incorporated Graph Neural Networks for Text Classification
Label Incorporated Graph Neural Networks for Text Classifica...
收藏 引用
International Conference on Pattern Recognition
作者: Yuan Xint Linli Xu Junliang Guo Jiquan Li Xin Sheng Yuanyuan Zhou Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China IFLYTEK Co. Ltd. Information Science Center University of Science and Technology of China
Graph Neural Networks (GNNs) have achieved great success on graph-structured data, and their applications on traditional data structures such as natural language processing and semi-supervised text classification have... 详细信息
来源: 评论
The Research on Disruptive technology Identification Based on Scientific and Technological Information Mining and Expert Consultation: A Case Study on the Energy Field  2nd
The Research on Disruptive Technology Identification Based o...
收藏 引用
2nd International Conference on Artificial Intelligence in China, ChinaAI 2020
作者: Lyu, Lucheng Wang, Xuezhao Chen, Wei Zhang, Xin Chen, Xiaoli Liu, Xiwen National Science Library Chinese Academy of Sciences Beijing100190 China Department of Library Information and Archives Management School of Economics and Management University of Chinese Academic of Sciences Beijing100190 China Wuhan Library Chinese Academy of Sciences Wuhan430071 China Hubei Key Laboratory of Big Data in Science and Technology Wuhan430071 China
Disruptive technology identification is of great significance to the development of the countries and enterprises. In this paper, both quantitative analysis and qualitative analysis are combined to propose a disruptiv... 详细信息
来源: 评论
Sequence-to-Sequence Knowledge Graph Completion Based On Gated Attention Unit
Sequence-to-Sequence Knowledge Graph Completion Based On Gat...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Fengge Yi Xiumei Wei Xiaojing Liu Xuesong Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Key Laboratory of High-end Server & Storage Technology Jinan China
We present GauKGT5, a sequence-to-sequence model proposed for knowledge graph completion (KGC). Our research extends the KGT5 model, a recent sequence-to-sequence link prediction (LP) model. GauKGT5 takes advantage of...
来源: 评论
Meta-Path Based Graph Contrastive Learning for Micro-Video Recommendation
SSRN
收藏 引用
SSRN 2022年
作者: He, Ying Wu, Gongqing Cai, Desheng Hu, Xuegang Key Laboratory of Knowledge Engineering with Big Data The Ministry of Education of China Hefei University of Technology China School of Computer Science and Information Engineering Hefei University of Technology Hefei230009 China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230009 China
Nowadays, micro-video sharing platforms have become popular tools for people creating and viewing micro-videos in daily life. Micro-video recommendation task has attracted significant attention from researchers, recen... 详细信息
来源: 评论
MFF-AMD: Multivariate Feature Fusion for Android Malware Detection  17th
MFF-AMD: Multivariate Feature Fusion for Android Malware Det...
收藏 引用
17th EAI International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2021
作者: Xu, Guangquan Feng, Meiqi Jiao, Litao Liu, Jian Dai, Hong-Ning Wang, Ding Panaousis, Emmanouil Zheng, Xi College of Intelligence and Computing Tianjin University Tianjin China Big Data School Qingdao Huanghai University Qingdao China Faculty of Information Technology Macau University of Science and Technology Macau SAR Taipa China School of EECS Peking University Beijing China University of Greenwich London United Kingdom Department of Computing Macquarie University Sydney Australia
Researchers have turned their focus on leveraging either dynamic or static features extracted from applications to train AI algorithms to identify malware precisely. However, the adversarial techniques have been conti... 详细信息
来源: 评论