咨询与建议

限定检索结果

文献类型

  • 14,631 篇 期刊文献
  • 11,956 篇 会议
  • 71 册 图书

馆藏范围

  • 26,658 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,314 篇 工学
    • 10,684 篇 计算机科学与技术...
    • 8,875 篇 软件工程
    • 3,524 篇 信息与通信工程
    • 2,238 篇 控制科学与工程
    • 2,169 篇 生物工程
    • 2,036 篇 电气工程
    • 1,531 篇 电子科学与技术(可...
    • 1,460 篇 生物医学工程(可授...
    • 1,385 篇 光学工程
    • 1,184 篇 化学工程与技术
    • 978 篇 机械工程
    • 832 篇 仪器科学与技术
    • 722 篇 动力工程及工程热...
    • 626 篇 交通运输工程
    • 590 篇 材料科学与工程(可...
  • 11,033 篇 理学
    • 5,321 篇 数学
    • 3,303 篇 物理学
    • 2,620 篇 生物学
    • 2,099 篇 统计学(可授理学、...
    • 1,226 篇 化学
    • 967 篇 系统科学
    • 825 篇 地球物理学
  • 4,276 篇 管理学
    • 2,491 篇 管理科学与工程(可...
    • 1,910 篇 图书情报与档案管...
    • 1,181 篇 工商管理
  • 1,862 篇 医学
    • 1,479 篇 临床医学
    • 1,079 篇 基础医学(可授医学...
    • 662 篇 公共卫生与预防医...
    • 640 篇 药学(可授医学、理...
  • 792 篇 法学
    • 675 篇 社会学
  • 581 篇 经济学
  • 450 篇 农学
  • 306 篇 教育学
  • 65 篇 文学
  • 45 篇 军事学
  • 35 篇 艺术学
  • 5 篇 历史学
  • 1 篇 哲学

主题

  • 667 篇 deep learning
  • 538 篇 accuracy
  • 525 篇 feature extracti...
  • 488 篇 training
  • 384 篇 machine learning
  • 377 篇 semantics
  • 321 篇 computational mo...
  • 284 篇 predictive model...
  • 262 篇 data models
  • 257 篇 optimization
  • 252 篇 neural networks
  • 242 篇 internet of thin...
  • 242 篇 reinforcement le...
  • 224 篇 image segmentati...
  • 215 篇 big data
  • 203 篇 convolution
  • 190 篇 object detection
  • 186 篇 task analysis
  • 184 篇 real-time system...
  • 181 篇 data mining

机构

  • 505 篇 university of ch...
  • 428 篇 department of ph...
  • 392 篇 iccub universita...
  • 302 篇 imperial college...
  • 296 篇 stfc rutherford ...
  • 296 篇 physik-institut ...
  • 292 篇 nikhef national ...
  • 289 篇 center for high ...
  • 287 篇 school of physic...
  • 286 篇 cavendish labora...
  • 285 篇 department of ph...
  • 285 篇 institute of par...
  • 283 篇 school of physic...
  • 283 篇 oliver lodge lab...
  • 283 篇 school of physic...
  • 281 篇 yandex school of...
  • 281 篇 physikalisches i...
  • 281 篇 shenzhen researc...
  • 280 篇 h.h. wills physi...
  • 277 篇 van swinderen in...

作者

  • 233 篇 beiter a.
  • 222 篇 barter w.
  • 205 篇 bellee v.
  • 194 篇 casse g.
  • 193 篇 bowcock t.j.v.
  • 173 篇 brundu d.
  • 155 篇 blake t.
  • 151 篇 betancourt c.
  • 148 篇 niyato dusit
  • 148 篇 bencivenni g.
  • 146 篇 back j.j.
  • 146 篇 bay a.
  • 142 篇 boettcher t.
  • 142 篇 borisyak m.
  • 142 篇 albrecht j.
  • 141 篇 borsato m.
  • 140 篇 a. jawahery
  • 140 篇 m. gandelman
  • 140 篇 t. gershon
  • 140 篇 amato s.

语言

  • 20,143 篇 英文
  • 6,236 篇 其他
  • 374 篇 中文
  • 8 篇 日文
  • 7 篇 德文
  • 7 篇 法文
  • 6 篇 斯洛文尼亚文
  • 3 篇 葡萄牙文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=School of Data Science and Big Data Technology"
26658 条 记 录,以下是4651-4660 订阅
排序:
Salix-Leaf: Find Main Veins of Signal Clusters for Practical Parallel Decoding
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Li, Yajun Zhao, Jumin Li, Dengao Wu, Hejun Xu, Shuang Bai, Ruiqin Taiyuan University of Technology College of Electronic Information and Optical Engineering Taiyuan China Key Laboratory of Big Data Fusion Analysis and Application of Shanxi Province Taiyuan China Intelligent Perception Engineering Technology Center of Shanxi Taiyuan China Taiyuan University of Technology College of Computer Science and Technology College of Data Science Taiyuan China Sun Yat-sen University Department of Computer Science Guangzhou China
Parallel decoding of backscatter improves communication throughput by enabling concurrent transmission of backscatter tags. In practical applications of parallel decoding, it is extremely difficult to distinguish coll... 详细信息
来源: 评论
Small Object Detection via Precise Region-Based Fully Convolutional Networks
收藏 引用
Computers, Materials & Continua 2021年 第11期69卷 1503-1517页
作者: Dengyong Zhang Jiawei Hu Feng Li Xiangling Ding Arun Kumar Sangaiah Victor SSheng Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and TechnologyChangsha410114China School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411004China School of Computing Science and Engineering Vellore Institute of Technology(VIT)Vellore632014India Department of Computer Science Texas Tech UniversityLubbock79409TXUSA
In the past several years,remarkable achievements have been made in the field of object *** performance is generally improving,the accuracy of small object detection remains low compared with that of large object *** ... 详细信息
来源: 评论
A Q-learning-based Multi-timescale Resilience Enhancement Approach for Power Grids with High Renewables
A Q-learning-based Multi-timescale Resilience Enhancement Ap...
收藏 引用
Power science and technology (ICPST), IEEE International Conference on
作者: Yanting Huang Qing Zhong Akang Wang Shunjiang Lin Chaoyi Peng Shunbo Lei School of Science and Engineering The Chinese University of Hong Kong Shenzhen Shenzhen Research Institute of Big Data Shenzhen China School of Electric Power Engineering South China University of Technology Guangzhou China Shenzhen Research Institute of Big Data Shenzhen China Power Dispatch and Control Center China Southern Power Grid Guangzhou China
Power grid resilience is critically undermined by extreme weather events, especially when coupled with uncertain renewable energy generation, which can lead to a severe power outage. When facing such outages, it is es... 详细信息
来源: 评论
A Probabilistic Multi-Model Framework for Efficient Search and Rescue of Lost Autonomous Underwater Vehicles  5
A Probabilistic Multi-Model Framework for Efficient Search a...
收藏 引用
5th International Conference on big data and Artificial Intelligence and Software Engineering, ICBASE 2024
作者: Cao, Ying Zhang, Shuoning Kang, Zijian Fang, Shixin Guangdong University of Science & Technology Department of Management Guangdong Dongguan China Xiamen University Malaysia Department of Mathematics Selangor Sepang Malaysia Xiamen University Malaysia School of Computing and Data Science Selangor Sepang Malaysia Xiamen University Malaysia School of Humanities and Communication Selangor Sepang Malaysia
This research explores methods for locating a lost submersible in the ocean by developing several probabilistic and search models. The problem is based on the premise that a submersible sends signals every 5 minutes, ... 详细信息
来源: 评论
Improved CP-ABE Algorithm Based on Identity and Access Control
Improved CP-ABE Algorithm Based on Identity and Access Contr...
收藏 引用
science and technology Innovation (IAECST), International Academic Exchange Conference on
作者: Dehua Zhang Xiaopeng Yang Ziyi Jia Hao Li Xiaobo Guo Qiang Wang Big Data Center of Hebei Province Shijiazhuang China Science and Technology on Communication Networks Laboratory Shijiazhuang China
To address the security vulnerabilities such as user privacy leakage and identity forgery of the traditional CP-ABE algorithm, we propose an improved CP-ABE algorithm in this paper. To achieve higher security, a hybri...
来源: 评论
Vision mamba mender  24
Vision mamba mender
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Jiacong Hu Anda Cao Zunlei Feng Shengxuming Zhang Yi Wang Lingxiang Jia Mingli Song College of Computer Science and Technology Zhejiang University and State Key Laboratory of Blockchain and Data Security Zhejiang University College of Computer Science and Technology Zhejiang University School of Software Technology Zhejiang University and State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security School of Software Technology Zhejiang University College of Computer Science and Technology Zhejiang University and State Key Laboratory of Blockchain and Data Security Zhejiang University and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security
Mamba, a state-space model with selective mechanisms and hardware-aware architecture, has demonstrated outstanding performance in long sequence modeling tasks, particularly garnering widespread exploration and applica...
来源: 评论
Word-of-Mouth Promotion: How to Attract Consistent Consumers as a Promoter for the B2C Model
Word-of-Mouth Promotion: How to Attract Consistent Consumers...
收藏 引用
Trends in Quantum Computing and Emerging Business Technologies (TQCEBT), International Conference on
作者: R. Gunavathi S. Vijayalakshmi M. Savithri S.B. Thamarai Selvi School of Data Science Christ University Computer Science and Engineering K.S.Rangasamy College of Technology
The primary goal of this research article is to discover the consumers' behaviour while spending time on the e-commerce platform and to use the consumers who have positive Word-of-Mouth on the products to motivate... 详细信息
来源: 评论
An SAV Method for Imaginary Time Gradient Flow Model in Density Functional Theory
收藏 引用
Advances in Applied Mathematics and Mechanics 2023年 第3期15卷 719-736页
作者: Ting Wang Jie Zhou Guanghui Hu Department of Mathematics Faculty of Science and TechnologyUniversity of MacaoMacao SARChina School of Mathematics and Computational Science Xiangtan UniversityXiangtanHunan 411105China Zhuhai UM Science&Technology Research Institute ZhuhaiGuangdong 519030China Guangdong-Hong Kong-Macao Joint Laboratory for Data-Driven Fluid Mechanics and Engineering Applications University of MacaoMacao SARChina
In this paper,based on the imaginary time gradient flow model in the density functional theory,a scalar auxiliary variable(SAV)method is developed for the ground state calculation of a given electronic structure *** h... 详细信息
来源: 评论
Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocol  23
Provably Secure Symmetric-Key Privacy-Preserving authenticat...
收藏 引用
Proceedings of the 2023 13th International Conference on Communication and Network Security
作者: Liang Ni Hengsheng Zhou Yawei Zhang Xiaoyan Liu Bingke Gu School of Computer Scienc Zhongyuan University of Technology China and Henan Development and Innovation Laboratory of Industrial Internet Security Big Data Zhongyuan University of Technology China School of Computer Science Zhongyuan University of Technology China School of Computer Science Zhongyuan University of Technology China and School of Computer Science Fujian Normal University China
In recent years, the rapid development of Quantum Computing technology has had a huge impact on the security of traditional Public Key Cryptography. However, the security of Hash functions and Symmetric Cryptographic ... 详细信息
来源: 评论
PDA-GCN: Predicting Piwi-interacting RNA-Disease Associations Based on Graph Convolution Network
PDA-GCN: Predicting Piwi-interacting RNA-Disease Association...
收藏 引用
IEEE International Conference on Bioinformatics and Computational Biology (ICBCB)
作者: Honglin Su Hui Gao Trusted Cloud Computing and Big Data Engineering Lab University of Electronic Science and Technology of China Sichuan China
Piwi-interacting RNAs (piRNAs) play a significant role in multiple complex human diseases. In order to understand disease pathogenesis at the molecular level, identifying potential associations between piRNAs and dise...
来源: 评论