咨询与建议

限定检索结果

文献类型

  • 71,309 篇 会议
  • 50,320 篇 期刊文献
  • 819 册 图书

馆藏范围

  • 122,448 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 78,362 篇 工学
    • 46,678 篇 计算机科学与技术...
    • 37,893 篇 软件工程
    • 17,581 篇 信息与通信工程
    • 11,810 篇 控制科学与工程
    • 10,556 篇 电气工程
    • 10,094 篇 电子科学与技术(可...
    • 8,221 篇 生物工程
    • 7,308 篇 化学工程与技术
    • 6,490 篇 机械工程
    • 6,128 篇 光学工程
    • 5,780 篇 材料科学与工程(可...
    • 5,688 篇 生物医学工程(可授...
    • 5,002 篇 动力工程及工程热...
    • 4,316 篇 仪器科学与技术
    • 2,798 篇 交通运输工程
    • 2,711 篇 网络空间安全
    • 2,683 篇 安全科学与工程
    • 2,380 篇 土木工程
    • 2,368 篇 冶金工程
  • 44,046 篇 理学
    • 20,664 篇 数学
    • 14,925 篇 物理学
    • 9,340 篇 生物学
    • 6,887 篇 化学
    • 6,733 篇 统计学(可授理学、...
    • 4,108 篇 系统科学
  • 18,984 篇 管理学
    • 12,233 篇 管理科学与工程(可...
    • 7,415 篇 图书情报与档案管...
    • 4,787 篇 工商管理
  • 5,525 篇 医学
    • 4,434 篇 临床医学
    • 3,872 篇 基础医学(可授医学...
  • 2,875 篇 法学
  • 1,904 篇 经济学
  • 1,494 篇 农学
  • 1,029 篇 教育学
  • 457 篇 文学
  • 309 篇 军事学
  • 227 篇 艺术学
  • 13 篇 历史学
  • 10 篇 哲学

主题

  • 2,972 篇 feature extracti...
  • 2,838 篇 accuracy
  • 2,596 篇 deep learning
  • 2,583 篇 training
  • 2,311 篇 computational mo...
  • 2,154 篇 computer science
  • 1,913 篇 machine learning
  • 1,685 篇 optimization
  • 1,479 篇 semantics
  • 1,420 篇 predictive model...
  • 1,235 篇 data models
  • 1,217 篇 internet of thin...
  • 1,194 篇 support vector m...
  • 1,185 篇 data mining
  • 1,176 篇 neural networks
  • 1,165 篇 real-time system...
  • 1,161 篇 convolutional ne...
  • 1,048 篇 image segmentati...
  • 974 篇 artificial intel...
  • 904 篇 educational inst...

机构

  • 2,477 篇 school of comput...
  • 1,555 篇 school of comput...
  • 1,394 篇 school of comput...
  • 1,088 篇 cavendish labora...
  • 1,008 篇 department of ph...
  • 981 篇 school of comput...
  • 979 篇 university of ch...
  • 940 篇 physikalisches i...
  • 938 篇 oliver lodge lab...
  • 749 篇 school of comput...
  • 704 篇 school of comput...
  • 572 篇 school of comput...
  • 536 篇 horia hulubei na...
  • 531 篇 fakultät physik ...
  • 528 篇 chitkara univers...
  • 527 篇 school of physic...
  • 524 篇 school of physic...
  • 522 篇 department of ph...
  • 515 篇 school of optica...
  • 514 篇 imperial college...

作者

  • 277 篇 niyato dusit
  • 268 篇 a. gomes
  • 257 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 234 篇 s. chen
  • 229 篇 beiter a.
  • 229 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 223 篇 bellee v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 215 篇 brundu d.
  • 210 篇 bencivenni g.

语言

  • 112,052 篇 英文
  • 7,665 篇 其他
  • 2,685 篇 中文
  • 78 篇 日文
  • 25 篇 德文
  • 25 篇 法文
  • 8 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and Engineering Xi’an University of Technology"
122448 条 记 录,以下是1-10 订阅
排序:
Performance evaluation for multi-target tracking with temporal dimension specifics
收藏 引用
Chinese Journal of Aeronautics 2024年 第2期37卷 446-458页
作者: Zhenzhen SU Hongbing JI Cong TIAN Yongquan ZHANG School of Computer Science and Technology Xidian UniversityXi’an 710071China School of Electronic Engineering Xidian UniversityXi’an 710071China
With the great development of Multi-Target Tracking(MTT)technologies,many MTT algorithms have been proposed with their own advantages and *** to the fact that requirements to MTT algorithms vary from the application s... 详细信息
来源: 评论
A blockchain-based privacy-preserving and collusion-resistant scheme(PPCR)for double auctions
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 116-125页
作者: Xuedan Jia Liangmin Wang Ke Cheng Pujie Jing xiangmei Song School of Computer Science and Communication Engineering Jiangsu UniversityZhenjiang 212013China School of Cyber Science and Engineering Southeast UniversityNanjing 211102China School of Computer Science and Technology Xidian UniversityXi’an 710071China
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general ***,most e-auction schemes involve a trusted auctioneer,which is not always credible in **... 详细信息
来源: 评论
A Base Station Deployment Algorithm for Wireless Positioning Considering Dynamic Obstacles
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4573-4591页
作者: Aiguo Li Yunfei Jia Department of Network Engineering Xi’an University of Science and TechnologyXi’an710600China College of Computer Science and Technology Xi’an University of Science and TechnologyXi’an710600China
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under t... 详细信息
来源: 评论
EDU-GAN:Edge Enhancement Generative Adversarial Networks with Dual-Domain Discriminators for Inscription Images Denoising
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1633-1653页
作者: Yunjing Liu Erhu Zhang Jingjing Wang Guangfeng Lin Jinghong Duan School of Mechanical and Precision Instrument Engineering Xi’an University of TechnologyXi’an710048China Department of Information Science Xi’an University of TechnologyXi’an710054China School of Faculty of Painting Packaging Engineering and Digital MediaXi’an University of TechnologyXi’an710048China School of Computer Science and Engineering Xi’an University of TechnologyXi’an710048China
Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research *** fromnatural images,character images pay more attention to stroke ***,existingmodelsmainly cons... 详细信息
来源: 评论
Effect and Mechanism of Rare Earth Hydrotalcite Inhibiting Coal Spontaneous Combustion
收藏 引用
Journal of Wuhan university of technology(Materials science) 2024年 第1期39卷 50-59页
作者: 张小娟 LIU Bo 罗振敏 SUN Lu School of Safety Science and Engineering Xi’an University of Science and TechnologyXi’an 710054China
A hydrotalcite(layered double hydroxide, LDH) inhibitor which is suitable for the whole process of coal spontaneous combustion and a LDH inhibitor containing rare earth lanthanum elements were prepared. The inhibition... 详细信息
来源: 评论
Quantifying Bytes:Understanding Practical Value of Data Assets in Federated Learning
收藏 引用
Tsinghua science and technology 2025年 第1期30卷 135-147页
作者: Minghao Yao Saiyu Qi Zhen Tian Qian Li Yong Han Haihong Li Yong Qi School of Computer Science and Technology Xi’an Jiaotong UniversityXi’an 710049China School of Cyber Science and Engineering Xi’an Jiaotong UniversityXi’an 710049China
The data asset is emerging as a crucial component in both industrial and commercial *** valuable knowledge from the data benefits decision-making and ***,the usage of data assets raises tension between sensitive infor... 详细信息
来源: 评论
Total ionizing dose effect modeling method for CMOS digital-integrated circuit
收藏 引用
Nuclear science and Techniques 2024年 第2期35卷 32-46页
作者: Bo Liang Jin-Hui Liu xiao-Peng Zhang Gang Liu Wen-Dan Tan xin-Dan Zhang School of Computer Science and Technology Xidian UniversityXi’an 710071China
Simulating the total ionizing dose(TID)of an electrical system using transistor-level models can be difficult and expensive,particularly for digital-integrated circuits(ICs).In this study,a method for modeling TID eff... 详细信息
来源: 评论
Individualized Data Generation in Personalized Federated Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6628-6642页
作者: Cai, Yunyun xi, Wei Shen, Yuhao Sun, Cerui Wang, Shuai Gong, Wei Zhao, Jizhong Xi'an Jiaotong University Faculty of Electronic and Information Engineering Xi'an China Southeast University School of Computer Science and Engineering Nanjing China University of Science and Technology of China School of Computer science and Technology Hefei China
Most Personalized Federated Learning (PFL) algorithms merge the model parameters of each client with other (similar or generic) model parameters to optimize the personalized model (PM). However, the merged model param... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng xiNG Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4763-4779页
作者: Jingjing Nie Zhenhua Chen College of Safety Science and Engineering Xi’an University of Science and TechnologyXi’an710054China College of Computer Science and Technology Xi’an University of Science and TechnologyXi’an710054China
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical *** is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is es... 详细信息
来源: 评论