咨询与建议

限定检索结果

文献类型

  • 1,841 篇 会议
  • 1,541 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,255 篇 工学
    • 1,736 篇 计算机科学与技术...
    • 1,412 篇 软件工程
    • 520 篇 信息与通信工程
    • 284 篇 控制科学与工程
    • 244 篇 生物工程
    • 222 篇 电气工程
    • 172 篇 光学工程
    • 159 篇 机械工程
    • 159 篇 生物医学工程(可授...
    • 145 篇 电子科学与技术(可...
    • 94 篇 化学工程与技术
    • 88 篇 安全科学与工程
    • 80 篇 动力工程及工程热...
    • 78 篇 仪器科学与技术
    • 78 篇 网络空间安全
    • 73 篇 交通运输工程
    • 67 篇 建筑学
  • 1,024 篇 理学
    • 581 篇 数学
    • 275 篇 生物学
    • 252 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 95 篇 化学
  • 678 篇 管理学
    • 437 篇 管理科学与工程(可...
    • 287 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 143 篇 医学
    • 130 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 58 篇 药学(可授医学、理...
  • 94 篇 法学
    • 63 篇 社会学
  • 59 篇 教育学
  • 54 篇 经济学
  • 33 篇 农学
  • 12 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 2 篇 哲学

主题

  • 104 篇 feature extracti...
  • 93 篇 deep learning
  • 92 篇 training
  • 75 篇 computational mo...
  • 74 篇 semantics
  • 69 篇 software enginee...
  • 62 篇 computer science
  • 61 篇 machine learning
  • 60 篇 accuracy
  • 58 篇 data mining
  • 48 篇 software
  • 47 篇 predictive model...
  • 43 篇 convolution
  • 43 篇 data models
  • 43 篇 convolutional ne...
  • 42 篇 educational inst...
  • 42 篇 optimization
  • 41 篇 internet of thin...
  • 41 篇 image segmentati...
  • 41 篇 cloud computing

机构

  • 81 篇 college of compu...
  • 64 篇 school of comput...
  • 55 篇 state key labora...
  • 44 篇 school of comput...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 41 篇 school of comput...
  • 41 篇 university of ch...
  • 39 篇 software enginee...
  • 39 篇 faculty of compu...
  • 37 篇 state key labora...
  • 31 篇 school of comput...
  • 30 篇 institute of com...
  • 29 篇 school of softwa...
  • 29 篇 national enginee...
  • 28 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 school of softwa...
  • 27 篇 school of comput...
  • 27 篇 institute of sof...

作者

  • 27 篇 quanyin zhu
  • 26 篇 shen linlin
  • 23 篇 shi yinghuan
  • 21 篇 gao yang
  • 20 篇 wang wei
  • 18 篇 liu wei
  • 16 篇 gao shangbing
  • 16 篇 tao dacheng
  • 16 篇 du bo
  • 15 篇 wang zheng
  • 15 篇 zhang jian
  • 14 篇 wei sun
  • 14 篇 xiaorui zhang
  • 13 篇 xiang-yang li
  • 13 篇 chen bin
  • 13 篇 tian chunwei
  • 13 篇 qi lei
  • 12 篇 wang hui
  • 12 篇 hu ruimin
  • 12 篇 yunhao liu

语言

  • 3,069 篇 英文
  • 286 篇 其他
  • 68 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Software Engineering Huaiyin Institute of Technology"
3419 条 记 录,以下是451-460 订阅
排序:
A Review of Research on Accurate Segmentation of Multimodal Tumor Images
收藏 引用
Journal of Electronic Research and Application 2024年 第6期8卷 124-129页
作者: Hao He Zixuan Yin Mingzhu Dong Anhui Institute of Information Technology School of Computer and Software EngineeringWuhu 241100China Bohai University FinanceSchool of EconomicsJinzhou 121000China Hefei University of Technology Xuancheng Campus HospitalXuancheng 242000China
Accurate segmentation of tumor images is a key core technology for the diagnosis and treatment of tumor *** this paper,we analyze a variety of novel and targeted algorithms to solve these problems,summarize,and elabor... 详细信息
来源: 评论
Multi-Path Attention Inverse Discrimination Network for Offline Signature Verification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3057-3071页
作者: Xiaorui Zhang Yingying Wang Wei Sun Qi Cui Xindong Wei School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China
Signature verification,which is a method to distinguish the authenticity of signature images,is a biometric verification technique that can effectively reduce the risk of forged signatures in financial,legal,and other... 详细信息
来源: 评论
Digital Human Techniques for Education Reform  24
Digital Human Techniques for Education Reform
收藏 引用
7th International Conference on Educational technology Management, ICETM 2024
作者: Guo, Peirong Zhang, Qi Tian, Chunwei Xue, Wanli Feng, Xiaocheng School of Software Northwestern Polytechnical University Shaanxi Xi’an China School of Economics and Management Harbin Institute of Technology at Weihai Shandong Weihai China Shenzhen Research Institute of Northwestern Polytechnical University Northwestern Polytechnical University Guangdong Shenzhen China School of Computer Science and Engineering Tianjin University of Technology Tianjin China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology Heilongjiang Harbin China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Guangdong Shenzhen China
The rapid evolution of artificial intelligence, big data, and generative AI models has ushered in significant transformations across various sectors, including education. Digital Human Technique, an innovative technol... 详细信息
来源: 评论
Hybrid Deep Learning Algorithm For MRI Brain Alzheimer's Disease Prediction
Hybrid Deep Learning Algorithm For MRI Brain Alzheimer's Dis...
收藏 引用
2023 International Conference on Energy, Materials and Communication engineering, ICEMCE 2023
作者: Karthikeyan, D. Nivasini, R. Raja, Kiruba Thangam Madhivadhani, D. Sivakumar, B. Krishna Priya, A.T.R. Srm Institute of Science and Technology Department of Electrical and Electronics Engineering Kattankulathur Chennai India Iitm Research Park Guvi Geek Networks Tamilnadu Chennai India Vit University School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Vellore India Kings Engineering College Department of Electronics and Communication Engineering Sriperumbudur Chennai India Rohini College of Engineering and Technology Department of Computer Science and Engineering Kanyakumari India
Magnetic resonance imaging (MRI) has been used to study the structural makeup of the brain and analyse several neurological disorders and diseased areas. For the adoption of preventative measures, early recognition of... 详细信息
来源: 评论
Sim-to-Real Grasp Detection with Global-to-Local RGB-D Adaptation
Sim-to-Real Grasp Detection with Global-to-Local RGB-D Adapt...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Haoxiang Ma Ran Qin Modi Shi Boyang Gao Di Huang State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Geometry Robotics and the School of Computer Science and Technology Harbin Institute of Technology Harbin China
This paper focuses on the sim-to-real issue of RGB-D grasp detection and formulates it as a domain adaptation problem. In this case, we present a global-to-local method to address hybrid domain gaps in RGB and depth d... 详细信息
来源: 评论
Enhancing Android malware detection via knowledge distillation on homogenized function call graphs
收藏 引用
Knowledge-Based Systems 2025年 323卷
作者: Wang, Zhendong Zhang, Kaiyi Yang, Shuxin He, Daojing Chan, Sammy School of Information Engineering Jiangxi University of Science and Technology Jiangxi Ganzhou341000 China Software Engineering Institute Nanchang University Jiangxi Nanchang330047 China School of Computer Science and Technology Harbin Institute of Technology Guangdong Shenzhen518055 China Department of Electrical Engineering City University of Hong Kong Hong Kong
Graph neural network (GNN)-based Android malware detection has demonstrated significant potential for accuracy enhancement. However, existing function call graph (FCG) classification methods face two critical limitati... 详细信息
来源: 评论
DQN-Based Applications Offloading with Multiple Interdependent Tasks in Mobile Edge Computing  19th
DQN-Based Applications Offloading with Multiple Interdepend...
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Tu, Jiaxue Zhu, Dongge Xia, Yunni Li, Yin Ma, Yong Li, Fan Peng, Qinglan College of Computer Science Chongqing University Chongqing China Electric Power Research Institute of State Grid Ningxia Electric Power Co. Ltd. Ningxia Yinchuan China Guangzhou Institute of Software Application Technology Guangzhou China School of Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang China Sichuan University Chengdu China School of Artificial Intelligence Henan University Zhengzhou China
Recently, Vehicular Edge Computing (VEC) is evolving as a solution for offloading computationally intensive tasks in in-vehicle environments. However, when the number of vehicles and users is large, pure edge resource... 详细信息
来源: 评论
A novel deep learning approach for investigating liquid fuel injection in combustion system
收藏 引用
Discover Artificial Intelligence 2025年 第1期5卷 1-14页
作者: Inam, Syed Azeem Khan, Abdullah Ayub Ahmed, Noor Mazhar, Tehseen Shahzad, Tariq Khan, Sunawar Saeed, Mamoon M. Hamam, Habib Department of Artificial Intelligence and Mathematical Science Sindh Madressatul Islam University Sindh Karachi Pakistan Department of Computer Science and Information Technology Shaheed Benazir Bhutto University Lyari Karachi Pakistan Department of Computer Science Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology Karachi Pakistan Department of Computer Science School Education Department Government of Punjab Layyah31200 Pakistan School of Computer Science National College of Business Administration and Economics Lahore54000 Pakistan Department of Computer Engineering COMSATS University Islamabad Sahiwal Campus Sahiwal57000 Pakistan Department of Software Engineering Islamia University of Bahawalpur Bahawalnagar62300 Pakistan Sana’a00967 Yemen Faculty of Engineering Uni de Moncton MonctonNBE1A3E9 Canada Department of Electrical and Electronic Engineering Sciences University of Johannesburg Johannesburg South Africa Av. Grandes Ecoles BP 1989 Libreville Gabon Bridges for Academic Excellence Spectrum Center-ville Tunis Tunisia
The intricacies and instability of introducing cryogenic propellants into the combustion system have piqued the curiosity of scientists studying the procedure. The latest innovation is utilizing data-driven machine le... 详细信息
来源: 评论
Dual Cross-Stage Partial Learning for Detecting Objects in Dehazed Images
Dual Cross-Stage Partial Learning for Detecting Objects in D...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Jinbiao Zhao Zhao Zhang Jiahuan Ren Haijun Zhang Zhongqiu Zhao Meng Wang School of Computer Science and Information Engineering Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China Department of Computer Science Harbin Institute of Technology Shenzhen China
Performing an object detection task after the restoration of a hazy image, or rather detecting with the network backbone directly, will result in the inclusion of information mixed with dehazing, which tends to interf... 详细信息
来源: 评论
Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection against Multipath Routing
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2155-2171页
作者: Zhao, Ziming Li, Zhaoxuan Xie, Xiaofei Liu, Zhipeng Li, Tingting Yu, Jiongchi Zhang, Fan Chen, Binbin School of Software Technology Zhejiang University Ningbo315100 China College of Computer Science and Technology Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Scientific and Technological Innovation Center 311200 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province 310027 China Jiaxing Research Institute Zhejiang University 314000 China Zhengzhou Xinda Institute of Advanced Technology Zhengzhou450001 China Singapore State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security UCAS Beijing100049 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore Advanced Digital Sciences Center Singapore138632 Singapore Singapore University of Technology and Design SingaporeB96049 Singapore
With the popularity of encryption protocols, machine learning (ML)-based traffic analysis technologies have attracted widespread attention. To adapt to modern high-speed bandwidth, recent research is dedicated to adva... 详细信息
来源: 评论