咨询与建议

限定检索结果

文献类型

  • 1,196 篇 会议
  • 774 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 1,978 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,230 篇 工学
    • 867 篇 计算机科学与技术...
    • 714 篇 软件工程
    • 337 篇 信息与通信工程
    • 190 篇 控制科学与工程
    • 187 篇 生物工程
    • 147 篇 电气工程
    • 138 篇 生物医学工程(可授...
    • 120 篇 光学工程
    • 119 篇 电子科学与技术(可...
    • 90 篇 网络空间安全
    • 85 篇 机械工程
    • 76 篇 化学工程与技术
    • 60 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 48 篇 仪器科学与技术
  • 699 篇 理学
    • 321 篇 数学
    • 230 篇 物理学
    • 204 篇 生物学
    • 120 篇 统计学(可授理学、...
    • 84 篇 化学
    • 52 篇 系统科学
  • 357 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 152 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 119 篇 医学
    • 83 篇 基础医学(可授医学...
    • 79 篇 临床医学
    • 59 篇 公共卫生与预防医...
    • 49 篇 药学(可授医学、理...
  • 74 篇 法学
    • 62 篇 社会学
  • 34 篇 经济学
  • 28 篇 农学
  • 22 篇 教育学
  • 20 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 85 篇 accuracy
  • 75 篇 deep learning
  • 56 篇 feature extracti...
  • 53 篇 training
  • 49 篇 convolutional ne...
  • 45 篇 real-time system...
  • 43 篇 machine learning
  • 40 篇 computational mo...
  • 39 篇 predictive model...
  • 31 篇 optimization
  • 29 篇 artificial intel...
  • 28 篇 semantics
  • 28 篇 security
  • 28 篇 data models
  • 24 篇 support vector m...
  • 23 篇 reliability
  • 23 篇 technological in...
  • 22 篇 adaptation model...
  • 21 篇 cloud computing
  • 20 篇 scalability

机构

  • 55 篇 department of co...
  • 54 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 graduate school ...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 department of ph...
  • 39 篇 ochanomizu unive...
  • 39 篇 fakultät für phy...

作者

  • 42 篇 xia yong
  • 42 篇 zhang yanning
  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert

语言

  • 1,617 篇 英文
  • 339 篇 其他
  • 25 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Masters of Computer Application School of Computer Science and Engineering"
1978 条 记 录,以下是1071-1080 订阅
排序:
Real-time Glass Recycling Quality Assurance and Contamination Reduction with IoT and Random Forest algorithm
Real-time Glass Recycling Quality Assurance and Contaminatio...
收藏 引用
International Conference on Inventive Computation Technologies (ICICT)
作者: K. Balasubadra B. Shadaksharappa Senthil Kumar Seeni V. Sridevi Thamizhamuthu R C. Srinivasan Department of Information Technology R.M.D. Engineering College Kavaraipettai Chennai Tamil Nadu India Department of Computer Science and Engineering Sri Sairam College of Engineering Anekal Bengaluru Karnataka India Department of Mobile Application Development Cognizant Technology Solutions Buffalo Grove Illinois United States of America Electrical and Electronics Engineering Academy of Maritime Education and Training Deemed to be University Chennai Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Campus-Chengalpattu Chennai Tamil Nadu India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamil Nadu India
The recycling industry is crucial to environmental protection and resource conservation. Glass recycling has great sustainability potential, but quality assurance and contaminant reduction are major challenges. Integr... 详细信息
来源: 评论
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Zesong Tong, Wei Zhang, Zhiwei Li, Jian Yang, Weidong Shen, Yulong The Hangzhou Institute of Technology Xidian University Hangzhou China The School of Computer Science and Technology Xidian University Xi’an China The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi’an China Shaanxi Key Laboratory of Network and System Security Xi’an China
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity aut... 详细信息
来源: 评论
Securing the Private Key in Your Blockchain Wallet: A Continuous Authentication Approach Based on Behavioral Biometric  2
Securing the Private Key in Your Blockchain Wallet: A Contin...
收藏 引用
2nd International Conference on Artificial Intelligence and computer science, AICS 2020
作者: Hu, Teng Liu, Xiaolei Niu, Weina Ding, Kangyi Wang, Yanping Zhang, Xiaosong Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China China Institute of Computer Application China Academy of Engineering Physics China Peng Cheng Laboratory Cyberspace Security Research Center China
As blockchain is increasingly valued, the application of blockchain and its security has become a research hotspot. Not only that, more and more ordinary users are paying attention to the blockchain and beginning to t... 详细信息
来源: 评论
Dilemma in All-optical Characterization of Single-layer NiI2 Multiferroics
arXiv
收藏 引用
arXiv 2023年
作者: Jiang, Yucheng Wu, Yangliu Zhang, Jinlei Wei, Jingxuan Peng, Bo Qiu, Cheng-Wei Department of Electrical and Computer Engineering National University of Singapore 4 Engineering Drive 3 Singapore117583 Singapore Jiangsu Key Laboratory of Micro and Nano Heat Fluid Flow Technology and Energy Application School of Physical Science and Technology Suzhou University of Science and Technology Suzhou215009 China 8 Somapah Road Singapore487372 Singapore National Engineering Research Center of Electromagnetic Radiation Control Materials School of Electronic Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
The search for two-dimensional multiferroic materials is an exciting yet challenging endeavor. Recently, Song et al. reported the exciting discovery of type-II multiferroic order in an antiferromagnetic (AFM) NiI2 sin... 详细信息
来源: 评论
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking
Blockchain-Based Identity Authentication Oriented to Multi-C...
收藏 引用
IEEE International Conference on Blockchain (Blockchain)
作者: Zesong Dong Wei Tong Zhiwei Zhang Jian Li Weidong Yang Yulong Shen Hangzhou Institute of Technology Xidian University Hangzhou China Shaanxi Key Laboratory of Network and System Security Xi’an China Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi’an China School of Computer Science and Technology Xidian University Xi’an China
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity aut...
来源: 评论
PseudoSC: A Binary Approximation to Stochastic Computing within Latent Operation-Space for Ultra-Lightweight on-Edge DNNs
PseudoSC: A Binary Approximation to Stochastic Computing wit...
收藏 引用
Design Automation Conference
作者: Jihe Wang Zhaoqing Wang Danghui Wang School of Computer Science Northwestern Polytechnical University Xi’an China Engineering Research Center of Embedded System Integration Ministry of Education Northwestern Polytechnical University Xi’an China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Northwestern Polytechnical University Xi’an China
Recently, stochastic computing (SC) is increasingly popular in constructing MAC for on-edge DNNs benefiting from its outstanding energy-efficiency, including its adequate precision and gate-level operation. However, c...
来源: 评论
UncertainBEV: Uncertainty-aware BEV fusion for roadside 3D object detection
收藏 引用
Image and Vision Computing 2025年 159卷
作者: Xu, Jianqiang Song, Chunying Shi, Chao Liu, Huafeng Wang, Qiong School of Computer Science and Engineering Nanjing University of Science and Technology NanJing210014 China School of Mechanical Engineering Beijing Institute of Technology BeiJing100081 China Institute of Computer Application Technology NORINCO Group BeiJing100089 China
With the rapid development of autonomous driving technology and intelligent transportation systems, multimodal fusion-based Bird's-Eye-View (BEV) perception has become a key technique for environmental understandi... 详细信息
来源: 评论
Model-enhanced vector index  23
Model-enhanced vector index
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Hailin Zhang Yujing Wang Qi Chen Ruiheng Chang Ting Zhang Ziming Miao Yingyan Hou Yang Ding Xupeng Miao Haonan Wang Bochen Pang Yuefeng Zhan Hao Sun Weiwei Deng Qi Zhang Fan Yang Xing Xie Mao Yang Bin Cui School of Computer Science & Key Lab of High Confidence Software Technologies Peking University and Microsoft Microsoft Microsoft and Aerospace Information Research Institute & Key Laboratory of Target Cognition and Application Technology Chinese Academy of Sciences Microsoft and Institute of Information Engineering Chinese Academy of Sciences Carnegie Mellon University National University of Singapore School of Computer Science & Key Lab of High Confidence Software Technologies Peking University and National Engineering Laboratory for Big Data Analysis and Applications Peking University
Embedding-based retrieval methods construct vector indices to search for document representations that are most similar to the query representations. They are widely used in document retrieval due to low latency and d...
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Huiying Zou Jia Duan Xi Liu Wei Ren Tao Li Xianghan Zheng Kim-Kwang Raymond Choo School of Computer Science China University of Geosciences Wuhan China The Third Surveying and Mapping Institute of Hunan Province Hunan Engineering Research Center of Geographic Information Security and Application Hunan China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR CASM Beijing China College of Computer and Big Data Fuzhou University School of Information and Intelligent Engineering Sanya College China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio USA
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
ZuantuSet: A Collection of Historical Chinese Visualizations and Illustrations
arXiv
收藏 引用
arXiv 2025年
作者: Mei, Xiyao Zhang, Yu Yang, Chaofan Shi, Rui Yuan, Xiaoru National Key Laboratory of General Artificial Intelligence School of Intelligence Science and Technology Peking University Beijing China Department of Computer Science University of Oxford Oxford United Kingdom Center for Research on Ancient Chinese History Peking University Beijing China National Engineering Laboratory for Big Data Analysis and Application Peking University Beijing China PKU-WUHAN Institute for Artificial Intelligence Wuhan China
Historical visualizations are a valuable resource for studying the history of visualization and inspecting the cultural context where they were created. When investigating historical visualizations, it is essential to... 详细信息
来源: 评论