咨询与建议

限定检索结果

文献类型

  • 66,058 篇 会议
  • 44,608 篇 期刊文献
  • 783 册 图书

馆藏范围

  • 111,449 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 70,402 篇 工学
    • 43,625 篇 计算机科学与技术...
    • 35,599 篇 软件工程
    • 16,239 篇 信息与通信工程
    • 10,750 篇 控制科学与工程
    • 9,393 篇 电气工程
    • 9,031 篇 电子科学与技术(可...
    • 7,575 篇 生物工程
    • 5,885 篇 化学工程与技术
    • 5,731 篇 光学工程
    • 5,694 篇 机械工程
    • 5,243 篇 生物医学工程(可授...
    • 4,046 篇 材料科学与工程(可...
    • 4,027 篇 动力工程及工程热...
    • 3,929 篇 仪器科学与技术
    • 2,575 篇 网络空间安全
    • 2,564 篇 交通运输工程
    • 2,398 篇 安全科学与工程
  • 39,917 篇 理学
    • 19,016 篇 数学
    • 13,471 篇 物理学
    • 8,620 篇 生物学
    • 6,304 篇 统计学(可授理学、...
    • 5,619 篇 化学
    • 3,843 篇 系统科学
  • 17,676 篇 管理学
    • 11,295 篇 管理科学与工程(可...
    • 7,027 篇 图书情报与档案管...
    • 4,465 篇 工商管理
  • 5,045 篇 医学
    • 4,053 篇 临床医学
    • 3,604 篇 基础医学(可授医学...
    • 2,203 篇 药学(可授医学、理...
  • 2,709 篇 法学
    • 2,214 篇 社会学
  • 1,805 篇 经济学
  • 1,393 篇 农学
  • 974 篇 教育学
  • 436 篇 文学
  • 260 篇 军事学
  • 209 篇 艺术学
  • 9 篇 哲学
  • 8 篇 历史学

主题

  • 2,822 篇 feature extracti...
  • 2,794 篇 accuracy
  • 2,505 篇 deep learning
  • 2,432 篇 training
  • 2,227 篇 computational mo...
  • 1,998 篇 computer science
  • 1,797 篇 machine learning
  • 1,601 篇 optimization
  • 1,391 篇 semantics
  • 1,386 篇 predictive model...
  • 1,183 篇 internet of thin...
  • 1,167 篇 data models
  • 1,146 篇 real-time system...
  • 1,144 篇 convolutional ne...
  • 1,136 篇 data mining
  • 1,132 篇 support vector m...
  • 1,113 篇 neural networks
  • 1,006 篇 image segmentati...
  • 920 篇 artificial intel...
  • 852 篇 educational inst...

机构

  • 2,471 篇 school of comput...
  • 1,542 篇 school of comput...
  • 1,365 篇 school of comput...
  • 1,091 篇 cavendish labora...
  • 1,026 篇 university of ch...
  • 1,015 篇 department of ph...
  • 982 篇 school of comput...
  • 944 篇 physikalisches i...
  • 937 篇 oliver lodge lab...
  • 832 篇 school of comput...
  • 686 篇 school of comput...
  • 575 篇 school of comput...
  • 547 篇 chitkara univers...
  • 529 篇 school of physic...
  • 528 篇 fakultät physik ...
  • 527 篇 horia hulubei na...
  • 526 篇 school of physic...
  • 516 篇 department of ph...
  • 512 篇 imperial college...
  • 504 篇 h.h. wills physi...

作者

  • 269 篇 niyato dusit
  • 265 篇 a. gomes
  • 262 篇 barter w.
  • 244 篇 c. alexa
  • 241 篇 j. m. izen
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 236 篇 blake t.
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 234 篇 beiter a.
  • 229 篇 bellee v.
  • 229 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 222 篇 s. chen
  • 221 篇 brundu d.
  • 221 篇 borsato m.
  • 220 篇 boettcher t.
  • 212 篇 bencivenni g.

语言

  • 95,517 篇 英文
  • 13,827 篇 其他
  • 2,163 篇 中文
  • 69 篇 日文
  • 33 篇 德文
  • 32 篇 法文
  • 8 篇 朝鲜文
  • 8 篇 斯洛文尼亚文
  • 2 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science and Engineering Anhui University of Science and Technology"
111449 条 记 录,以下是641-650 订阅
排序:
A Semantic-Driven Generative Information Extraction Framework Oriented to Patent Text  21
A Semantic-Driven Generative Information Extraction Framewor...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhao, Yushan Wang, Tengke Zhang, Shunxiang Anhui University of Science and Technology School of Mathematics and Big Data Huainan China Anhui University of Science and Technology School of Computer Science and Engineering Huainan China
Generative information extraction for patent text relies on a text-to-structure encoder-decoder framework, facilitating the automatic construction of patent knowledge bases. Existing models challenge to capture the lo... 详细信息
来源: 评论
Unsupervised anomaly detection and localization via bidirectional knowledge distillation
收藏 引用
Neural Computing and Applications 2024年 第29期36卷 18499-18514页
作者: Wang, Xiaoming Wang, Yongxiong Pan, Zhiqun Wang, Guangpeng School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200093 China
Knowledge distillation has demonstrated significant potential in addressing the challenge of unsupervised anomaly detection (AD). The representation discrepancy of anomalies in the teacher–student (T-S) model pr... 详细信息
来源: 评论
Based on Generative Adversarial Networks Seed Generation Method for Fuzzing  3
Based on Generative Adversarial Networks Seed Generation Met...
收藏 引用
3rd International Conference on Big Data, Information and computer Network, BDICN 2024
作者: Cheng, Zekai Guo, Yongkang Li, Xiaoke Hu, Jiahao School of Computer Science and Technology Anhui University of Technolgy Ma'anshan Anhui China
Fuzzing, as one of the effective methods for vulnerability detection, has shown significant impact in discovering potential software vulnerabilities. However, the quality of seed inputs remains a critical factor influ... 详细信息
来源: 评论
An End-to-End Two-Branch Network Towards Robust Video Fingerprinting
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2371-2384页
作者: Xu, Yingying Zhou, Yuanding Li, Xinran Zhao, Gejian Qin, Chuan University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China
With the increasing number of edited videos, many robust video fingerprinting schemes have been proposed to solve the problem of video content authentication. However, most of them either deal with the temporal and sp... 详细信息
来源: 评论
African Bison Optimization Algorithm:A New Bio-Inspired Optimizer with engineering Applications
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 603-623页
作者: Jian Zhao Kang Wang Jiacun Wang Xiwang Guo Liang Qi School of Science University of Science and Technology LiaoningAnshan114051China Team of Artificial Intelligence Theory and Application University of Science and Technology LiaoningAnshan114051China Department of Computer Science and Software Engineering Monmouth UniversityWest Long BranchNJ 07764USA Information and Control Engineering College Liaoning Petrochemical UniversityFushun113000China Department of Computer Science and Technology Shandong University of Science and TechnologyQingdao266590China
This paper introduces the African Bison Optimization(ABO)algorithm,which is based on biological *** is inspired by the survival behaviors of the African bison,including foraging,bathing,jousting,mating,and *** foragin... 详细信息
来源: 评论
Automated object recognition in high-resolution optical remote sensing imagery
收藏 引用
National science Review 2023年 第6期10卷 38-41页
作者: Yazhou Yao Tao Chen Hanbo Bi Xinhao Cai Gensheng Pei Guoye Yang Zhiyuan Yan Xian Sun Xing Xu Hai Zhang School of Computer Science and Engineering Nanjing University of Science and Technology Aerospace Information Research Institute Chinese Academy of Sciences School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Key Laboratory of Network Information System Technology (NIST) Aerospace Information Research Institute Chinese Academy of Sciences Department of Computer Science and Technology Tsinghua University School of Computer Science and Engineering University of Electronic Science and Technology of China Pazhou Laboratory (Huangpu) School of Mathematics Northwest University
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
来源: 评论
Dynamic recrystallization behavior and finite element analysis of a low-alloy high-strength steel
收藏 引用
Journal of Iron and Steel Research International 2024年 第11期31卷 2828-2851页
作者: Yu-hao Liu Hao-qing Tang Guo-ming Zhu Bao-qiao Wu Jie Wang Meng Xia School of Materials Science and Engineering University of Science and Technology BeijingBeijing100083China Ma’anshan Iron&Steel Co. Ltd.Ma’anshan243000AnhuiChina
The axial single-pass high temperature compression test of a hot-rolled extra-large heavy H-beam steel continuous casting billet (Q420 steel) under different deformation conditions through the Gleeble-1500D thermomech... 详细信息
来源: 评论
Visual creativity through concept combination using quantum cognitive models
收藏 引用
Scientia Iranica 2024年 第2期31卷 118-135页
作者: Tabriz, M. Ahrabi Atani, T. Rafiei Ashtiani, M. Jahed-Motlagh, M.R. Laboratory School of Computer Engineering Iran University of Science and Technology Tehran16846-13114 Iran
Computational creativity modeling, including concept combination, enables us to foster deeper abilities of Artificial Intelligence (Al) agents. All hough concept combination lias been addressed in a lot of computation... 详细信息
来源: 评论
Scheduling Dual-Arm Multi-Cluster Tools With Regulation of Post-Processing Time
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第8期10卷 1730-1742页
作者: Qinghua Zhu Bin Li Yan Hou Hongpeng Li Naiqi Wu IEEE the School of Computer Science and Technology Guangdong University of TechnologyGuangzhou 510006China the Institute of Systems Engineering and Collaborative Laboratory for Intelligent Science and Systems Macao University of Science and TechnologyMacao 999078China
As wafer circuit width shrinks down to less than ten nanometers in recent years,stringent quality control in the wafer manufacturing process is increasingly *** to the coupling of neighboring cluster tools and coordin... 详细信息
来源: 评论
Blockchain-enabled IoT access control model for sharing electronic healthcare data
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 8127-8148页
作者: Ilyas, Benkhaddra Kumar, Abhishek Ali, Setitra Mohamed Lei, Hang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China Chandigarh University Gharuan Mohali Punjab140413 India School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ... 详细信息
来源: 评论