咨询与建议

限定检索结果

文献类型

  • 1,841 篇 会议
  • 1,541 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,255 篇 工学
    • 1,736 篇 计算机科学与技术...
    • 1,412 篇 软件工程
    • 520 篇 信息与通信工程
    • 284 篇 控制科学与工程
    • 244 篇 生物工程
    • 222 篇 电气工程
    • 172 篇 光学工程
    • 159 篇 机械工程
    • 159 篇 生物医学工程(可授...
    • 145 篇 电子科学与技术(可...
    • 94 篇 化学工程与技术
    • 88 篇 安全科学与工程
    • 80 篇 动力工程及工程热...
    • 78 篇 仪器科学与技术
    • 78 篇 网络空间安全
    • 73 篇 交通运输工程
    • 67 篇 建筑学
  • 1,024 篇 理学
    • 581 篇 数学
    • 275 篇 生物学
    • 252 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 95 篇 化学
  • 678 篇 管理学
    • 437 篇 管理科学与工程(可...
    • 287 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 143 篇 医学
    • 130 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 58 篇 药学(可授医学、理...
  • 94 篇 法学
    • 63 篇 社会学
  • 59 篇 教育学
  • 54 篇 经济学
  • 33 篇 农学
  • 12 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 2 篇 哲学

主题

  • 104 篇 feature extracti...
  • 93 篇 deep learning
  • 92 篇 training
  • 75 篇 computational mo...
  • 74 篇 semantics
  • 69 篇 software enginee...
  • 62 篇 computer science
  • 61 篇 machine learning
  • 60 篇 accuracy
  • 58 篇 data mining
  • 48 篇 software
  • 47 篇 predictive model...
  • 43 篇 convolution
  • 43 篇 data models
  • 43 篇 convolutional ne...
  • 42 篇 educational inst...
  • 42 篇 optimization
  • 41 篇 internet of thin...
  • 41 篇 image segmentati...
  • 41 篇 cloud computing

机构

  • 81 篇 college of compu...
  • 64 篇 school of comput...
  • 55 篇 state key labora...
  • 44 篇 school of comput...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 41 篇 school of comput...
  • 41 篇 university of ch...
  • 39 篇 software enginee...
  • 39 篇 faculty of compu...
  • 37 篇 state key labora...
  • 31 篇 school of comput...
  • 30 篇 institute of com...
  • 29 篇 school of softwa...
  • 29 篇 national enginee...
  • 28 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 school of softwa...
  • 27 篇 school of comput...
  • 27 篇 institute of sof...

作者

  • 27 篇 quanyin zhu
  • 26 篇 shen linlin
  • 23 篇 shi yinghuan
  • 21 篇 gao yang
  • 20 篇 wang wei
  • 18 篇 liu wei
  • 16 篇 gao shangbing
  • 16 篇 tao dacheng
  • 16 篇 du bo
  • 15 篇 wang zheng
  • 15 篇 zhang jian
  • 14 篇 wei sun
  • 14 篇 xiaorui zhang
  • 13 篇 xiang-yang li
  • 13 篇 chen bin
  • 13 篇 tian chunwei
  • 13 篇 qi lei
  • 12 篇 wang hui
  • 12 篇 hu ruimin
  • 12 篇 yunhao liu

语言

  • 3,069 篇 英文
  • 286 篇 其他
  • 68 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Software Engineering Huaiyin Institute of Technology"
3419 条 记 录,以下是441-450 订阅
排序:
Multiple Time-Periods POI Recommendation Model Based on Distributed ELM
Multiple Time-Periods POI Recommendation Model Based on Dist...
收藏 引用
International Conference on Communications, Information System and computer engineering (CISCE)
作者: Zhen Zhang Yaqi Gong Xiangguo Zhao Jun Chen Jianyu Ren Jintao Ouyang School of Electrical Engineering Yingkou Institute of Technology Yingkou China School of Computer Science and Technology Shenyang University of Chemical Technology Shenyang China School of Software Northeastern University Shenyang China
To solve the problems of low efficiency of algorithm execution and not fully considering the POI needs of users in different time-periods in point-of-interest (POI) recommendation. In this paper, propose a Multiple ti... 详细信息
来源: 评论
Depth-Centric Dehazing and Depth-Estimation from Real-World Hazy Driving Video  39
Depth-Centric Dehazing and Depth-Estimation from Real-World ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Fan, Junkai Wang, Kun Yan, Zhiqiang Chen, Xiang Gao, Shangbing Li, Jun Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education School of Computer Science and Engineering Nanjing University of Science and Technology China Huaiyin Institute of Technology China
In this paper, we study the challenging problem of simultaneously removing haze and estimating depth from real monocular hazy videos. These tasks are inherently complementary: enhanced depth estimation improves dehazi... 详细信息
来源: 评论
An Output Feedback Game-Theoretic Approach for Defense Against Stealthy GNSS Spoofing Attacks
An Output Feedback Game-Theoretic Approach for Defense Again...
收藏 引用
American Control Conference (ACC)
作者: Surabhi Athalye Filippos Fotiadis Kyriakos G. Vamvoudakis Jérôme Hugues School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta GA USA Daniel Guggenheim School of Aerospace Engineering Georgia Institute of Technology Atlanta GA USA Carnegie Mellon University/Software Engineering Institute Pittsburgh PA USA
We employ a game-theoretic approach to mitigate stealthy spoofing attacks on an aerial cyber-physical system. The attacker's objective is to drive the vehicle away from its nominal trajectory while misleading the ... 详细信息
来源: 评论
Development of a Control System for a Lower Limb Exoskeleton Rehabilitation Robot for Stroke Patients with Standing Instability
Development of a Control System for a Lower Limb Exoskeleton...
收藏 引用
Cognitive Computing and Complex Data (ICCD), International Conference on the
作者: Muxin Du Qingqing Wang Liucun Zhu Zhen Liu Lei Shi Yudong Fang Yinxi Gu School of Mechanical and Marine Engineering Beibu Gulf University Qinzhou China School of Electric and Information Engineering Beibu Gulf University Qinzhou China Sentinel Institute of Science and Technology Beibu Gulf University Qinzhou China School of Information Nagasaki Institute of Applied Science Nagasaki Japan Guangzhou Shiyuan Electronic Technology Company Limited Qinzhou China Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai'an China
Lower-limb exoskeleton robots can medically assist stroke patients in standing and walking, but there is little research on lower-limb exoskeleton robots that assist in standing balance. In this paper, we design the s... 详细信息
来源: 评论
Research on Campus Physical Measurement System Based on CNN-LSTM
Research on Campus Physical Measurement System Based on CNN-...
收藏 引用
第二十届分布式计算及其应用国际学术研讨会
作者: Mengzhong Wei Yuting Fu Chao Li Yuanyuan Li Wanli Feng Quanyin Zhu Huaiyin Institute of Technology Computer & Software Engineering
In response to the 14 th Five-Year Plan and the2035 long-term goal outline,the goals of building smart communities and smart industries are clearly *** from the campus,there are many physical test projects in colleges... 详细信息
来源: 评论
KDTL: knowledge-distilled transfer learning framework for diagnosing mental disorders using EEG spectrograms
收藏 引用
Neural Computing and Applications 2024年 第30期36卷 18919-18934页
作者: Singh, Shreyash Jadli, Harshit Padma Priya, R. Surya Prasath, V.B. Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore India Division of Biomedical Informatics Cincinnati Children’s Hospital Medical Center CincinnatiOH45229 United States Department of Pediatrics University of Cincinnati College of Medicine CincinnatiOH45257 United States Department of Biomedical Informatics College of Medicine University of Cincinnati CincinnatiOH45267 United States Department of Computer Science University of Cincinnati CincinnatiOH45221 United States
Electroencephalography (EEG) is a well-known modality in neuroscience and is widely used in identifying and classifying neurological disorders. This paper investigates how EEG data can be used along with knowledge dis... 详细信息
来源: 评论
AI Integration in the IT Professional Workplace: A Scoping Review and Interview Study with Implications for Education and Professional Competencies  2024
AI Integration in the IT Professional Workplace: A Scoping R...
收藏 引用
29th Working Group Reports on Innovation and technology in computer Science Education, ITiCSE WGR 2024
作者: Clear, Tony Cajander, Åsa Clear, Alison Mcdermott, Roger Daniels, Mats Divitini, Monica Forshaw, Matthew Humble, Niklas Kasinidou, Maria Kleanthous, Styliani Kultur, Can Parvini, Ghazaleh Polash, Mohammad Zhu, Tingting Department of Computer Science and Software Engineering Auckland University of Technology Auckland New Zealand Department of Information Technology Uppsala University Uppsala Sweden School of Business Eastern Institute of Technology Auckland New Zealand School of Computing Robert Gordon University Aberdeen United Kingdom Dpt. of Computer Science Norwegian University of Science and Technology Trondheim Norway The Alan Turing Institute Newcastle Upon Tyne United Kingdom Open University of Cyprus Nicosia Cyprus The Open University of Cyprus Nicosia Cyprus School of Computer Science Carnegie Mellon University PittsburghPA United States Manning College of Information and Computer Sciences University of Massachusetts Amherst Amherst United States School of Computer Science University of Sydney Sydney Australia Department of Geography Geomatics and Environment University of Toronto Mississauga Toronto Canada School of Computer Science Newcastle University Newcastle upon Tyne United Kingdom
As Artificial Intelligence (AI) continues transforming workplaces globally, particularly within the Information technology (IT) industry, understanding its impact on IT professionals and computing curricula is crucial... 详细信息
来源: 评论
Data Poisoning Attack to X-armed Bandits  21
Data Poisoning Attack to X-armed Bandits
收藏 引用
21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
作者: Luo, Zhi Li, Youqi Chen, Lixing Xu, Zichuan Zhou, Pan Huazhong University of Science and Technology School of Cyber Science and Engineering China Beijing Institute of Technology School of Cyberspace Science and Technology School of Computer Science China Shanghai Jiao Tong University Institute of Cyber Science and Technology China Dalian University of Technology School of Software China Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China
X-armed bandits have achieved the state-of-the-art performance in optimizing unknown stochastic continuous functions, which can model many machine learning tasks, specially in big data-driven personalized recommendati... 详细信息
来源: 评论
Through the Sci-Fi Lens: Exploring Social Media's Influence on Body Image and Bullying Among Adolescents in Boarding schools  21
Through the Sci-Fi Lens: Exploring Social Media's Influence ...
收藏 引用
21st International Learning and technology Conference, L and T 2024
作者: Mustapha, Jawahir Che Ghazali, Muhammad Azmin Mohamed Abdullah, Munaisyah Sulaiman, Nor Intan Saniah Rahman, Hezlin Aryani Abd Universiti Kuala Lumpur Malaysian Institute of Information Technology Informatics & Analytics Section Kuala Lumpur Malaysia Universiti Kuala Lumpur Malaysian Institute of Information Technology Computer Engineering Tech. Section Kuala Lumpur Malaysia Universiti Kuala Lumpur Malaysian Institute of Information Technology Software Engineering Section Kuala Lumpur Malaysia Universiti Utara Malaysia College of Arts and Science School of Quantitative Sciences Kedah Malaysia Universiti Teknologi Mara Centre of Statistical and Decision Science Studies Faculty of Computer and Mathematical Sciences Selangor Malaysia
This research investigates the complex relationships between social media, body image, and bullying among adolescent boarding school students, with an emphasis on the Malaysian context. Utilizing science fiction as a ... 详细信息
来源: 评论
Question-Answer Cross Language Image Matching for Weakly Supervised Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Songhe Zhuo, Wei Xie, Jinheng Shen, Linlin Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Class Activation Map (CAM) has emerged as a popular tool for weakly supervised semantic segmentation (WSSS), allowing the localization of object regions in an image using only image-level labels. However, existing CAM... 详细信息
来源: 评论