咨询与建议

限定检索结果

文献类型

  • 226 篇 期刊文献
  • 199 篇 会议
  • 7 册 图书

馆藏范围

  • 432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 287 篇 工学
    • 194 篇 计算机科学与技术...
    • 149 篇 软件工程
    • 49 篇 电气工程
    • 49 篇 信息与通信工程
    • 35 篇 电子科学与技术(可...
    • 35 篇 控制科学与工程
    • 30 篇 生物工程
    • 26 篇 化学工程与技术
    • 20 篇 生物医学工程(可授...
    • 18 篇 材料科学与工程(可...
    • 17 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 11 篇 仪器科学与技术
    • 11 篇 土木工程
    • 10 篇 冶金工程
  • 164 篇 理学
    • 91 篇 数学
    • 59 篇 物理学
    • 33 篇 生物学
    • 28 篇 统计学(可授理学、...
    • 21 篇 化学
    • 13 篇 系统科学
  • 83 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 34 篇 医学
    • 28 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
    • 12 篇 药学(可授医学、理...
  • 9 篇 经济学
  • 8 篇 法学
  • 6 篇 教育学
  • 4 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 16 篇 deep learning
  • 12 篇 security
  • 11 篇 feature extracti...
  • 11 篇 machine learning
  • 10 篇 accuracy
  • 9 篇 computational mo...
  • 9 篇 artificial intel...
  • 7 篇 data models
  • 6 篇 covid-19
  • 6 篇 big data
  • 6 篇 convolution
  • 6 篇 algorithm design...
  • 6 篇 training
  • 5 篇 internet of thin...
  • 5 篇 computer science
  • 5 篇 intrusion detect...
  • 5 篇 data mining
  • 5 篇 predictive model...
  • 5 篇 decision making
  • 5 篇 sentiment analys...

机构

  • 14 篇 school of inform...
  • 8 篇 school of comput...
  • 7 篇 institute of app...
  • 7 篇 school of softwa...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 school of softwa...
  • 6 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of comput...
  • 5 篇 state key labora...
  • 4 篇 department of so...
  • 4 篇 school of softwa...
  • 4 篇 institute of app...
  • 4 篇 department of so...
  • 4 篇 department of so...
  • 4 篇 institute of com...
  • 4 篇 department of ma...
  • 4 篇 college of appli...
  • 4 篇 department of co...

作者

  • 12 篇 liu risheng
  • 9 篇 zeng shangzhi
  • 9 篇 zhang jin
  • 8 篇 astrova irina
  • 7 篇 koschel arne
  • 6 篇 zhen liu
  • 5 篇 cai shaowei
  • 5 篇 sun le
  • 5 篇 jinfeng yang
  • 5 篇 vincent omollo n...
  • 5 篇 wang yiyuan
  • 4 篇 amlan chakrabart...
  • 4 篇 he jinyuan
  • 4 篇 kai shi
  • 4 篇 yang jinfeng
  • 4 篇 praschl christop...
  • 4 篇 valentina emilia...
  • 4 篇 fuqiang qiao
  • 4 篇 na lei
  • 4 篇 neha sharma

语言

  • 416 篇 英文
  • 14 篇 其他
  • 2 篇 中文
检索条件"机构=School of Software and Applied Science and Technology"
432 条 记 录,以下是71-80 订阅
排序:
Multi-phase-field simulation of austenite peritectic solidification based on a ferrite grain
收藏 引用
Chinese Physics B 2021年 第1期30卷 572-577页
作者: Chao Yang Jing Wang Junsheng Wang Yu Liu Guomin Han Haifeng Song Houbing Huang School of Materials Science and Engineering Beijing Institute of TechnologyBeijing 100081China Advanced Research Institute of Multidisciplinary Science Beijing Institute of TechnologyBeijing 100081China Laboratory of Computational Physics Institute of Applied Physics and Computational MathematicsBeijing 100088China Software Center for High Performance Numerical Simulation China Academy of Engineering PhysicsBeijing 100088China
A multi-phase-field model is implemented to investigate the peritectic solidification of Fe-C alloy. The nucleation mode of austenite is based on the local driving force, and two different thicknesses of the primary a... 详细信息
来源: 评论
Social Distance Monitoring Using Object Detection and Tracking Techniques In the Era of COVID-19
Social Distance Monitoring Using Object Detection and Tracki...
收藏 引用
International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS)
作者: Bingshu Wang Ruofan Chang Ze Wang Shuang Feng Chuanbin Zhang School of Software Northwestern Polytechnical University Xi'an China School of Applied Mathematics Beijing Normal University Zhuhai China Faculty of Science and Technology University of Macau Macau China
The COVID-19 has been posing threats to peoples health around the world due to its simple transmission route, strong mutation ability, and high infection. Currently, the superb vaccine breakthrough ability of mutant s...
来源: 评论
An End-to-End Conformer-Based Speech Recognition Model for Mandarin Radiotelephony Communications in Civil Aviation  16th
An End-to-End Conformer-Based Speech Recognition Model for M...
收藏 引用
16th Chinese Conference on Biometric Recognition, CCBR 2022
作者: Shi, Yihua Ma, Guanglin Ren, Jin Zhang, Haigang Yang, Jinfeng Institute of Applied Artificial Intelligence of the Guangdong-Hong Kong-Macao Greater Bay Area Shenzhen Polytechnic Shenzhen518055 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
In civil aviation radiotelephony communications, misunderstandings between air traffic controllers and flight crews can result in serious aviation accidents. Automatic semantic verification is a promising assistant so... 详细信息
来源: 评论
Target Detection Models Based on deep Learning
Target Detection Models Based on deep Learning
收藏 引用
2022 International Conference on Cloud Computing, Performance Computing, and Deep Learning, CCPCDL 2022
作者: Fu, Haoluo Li, Yuming Wang, Weining Xu, Xuanbo P.C. Rossin College of Engineering and Applied Science Lehigh University BethlehemPA18015 United States College of Computer Science Guangdong University of Technology Guangdong Guangzhou510006 China College of software Xinjiang University Xinjiang830046 China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China
Object detection is one of the most basic and important tasks in the field of computer vision, and it is the foundation of high-level vision tasks such as behaviour recognition and human-computer interaction. With the... 详细信息
来源: 评论
Experimental Research of the Radiator Thermal Performance Test Equipment and Its Application in Heating System
收藏 引用
Energy Engineering 2021年 第2期118卷 399-410页
作者: Lian Zhang Linjun Fan Xin Xu Baowen Cao Heng Zhang Lihong Song Basic Experimental and Training Center Tianjin Sino-German University of Applied SciencesTianjin300350China College of Mechanical Engineering Tianjin University of Science and TechnologyTianjin300222China Tianjin Qicheng Science and Technology Co. Ltd.Tianjin300193China Software and Communication School Tianjin Sino-German University of Applied SciencesTianjin300350China School of Energy Engineering Tianjin Sino-German University of Applied SciencesTianjin300350China
Radiator thermal performance test equipment plays a key role in the processing of developing a new type of heat radiator and its application *** precise of temperature controlling,temperature measuring andflow measuri... 详细信息
来源: 评论
Entirety of Quantum Uncertainty and Its Experimental Verification
收藏 引用
Chinese Physics Letters 2021年 第7期38卷 11-16页
作者: Jie Xie Li Zhou Aonan Zhang Huichao Xu Man-Hong Yung Ping Xu Nengkun Yu Lijian Zhang National Laboratory of Solid State Microstructures College of Engineering and Applied Sciences and School of PhysicsNanjing UniversityNanjing 210093China Collaborative Innovation Center of Advanced Microstructures Nanjing UniversityNanjing 210093China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Shenzhen Institute for Quantum Science and Engineering and Department of Physics Southern University of Science and TechnologyShenzhen 518055China Shenzhen Key Laboratory of Quantum Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Institute for Quantum Information&State Key Laboratory of High Performance Computing College of ComputerNational University of Defense TechnologyChangsha 410073China Centre for Quantum Software and Information School of SoftwareFaculty of Engineering and Information TechnologyUniversity of Technology SydneyNSWAustralia
As a foundation of quantum physics,uncertainty relations describe ultimate limit for the measurement uncertainty of incompatible ***,uncertainty relations are formulated by mathematical bounds for a specific *** we pr... 详细信息
来源: 评论
Automated File Labeling for Heterogeneous Files Organization Using Machine Learning
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3263-3278页
作者: Sagheer Abbas Syed Ali Raza MAKhan Muhammad Adnan Khan Atta-ur-Rahman Kiran Sultan Amir Mosavi School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Department of Computer Science GC University LahorePakistan Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Department of Software Pattern Recognition and Machine Learning LabGachon UniversitySeongnam13120Korea Department of Computer Science College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal University(IAU)P.O.Box 1982Dammam31441Saudi Arabia Department of CIT The Applied CollegeKing Abdulaziz UniversityJeddah31261Saudi Arabia John von Neumann Faculty of Informatics Obuda UniversityBudapest1034Hungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaBratislava81107Slovakia Faculty of Civil Engineering TU-DresdenDresden01062Germany
File labeling techniques have a long history in analyzing the anthological trends in computational *** situation becomes worse in the case of files downloaded into systems from the ***,most users either have to change... 详细信息
来源: 评论
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack Tree and Fuzzy Logic  3
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack T...
收藏 引用
3rd IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Naik, Nitin Jenkins, Paul Grace, Paul Naik, Dishita Song, Jingping Prajapat, Shaligram Mishra, Durgesh Yang, Longzhi Boongoen, Tossapon Iam-On, Natthakan School of Informatics and Digital Engineering Aston University United Kingdom Cardiff School of Technologies Cardiff Metropolitan University United Kingdom Birmingham City University United Kingdom Software College Northeastern University China International Institute of Professional Studies Devi Ahilya University India School of Computer Science & Information Technology Symbiosis University of Applied Sciences India Northumbria University Department of Computer and Information Sciences United Kingdom Aberystwyth University Department of Computer Science United Kingdom
Organisations and users have been experiencing significant rises in cyberattacks and their severity, which means that they require a greater awareness and understanding of the anatomy of cyberattacks, to prevent and m... 详细信息
来源: 评论
Explainable-AI-based two-stage solution for WSN object localization using zero-touch mobile transceivers
收藏 引用
science China(Information sciences) 2024年 第7期67卷 27-45页
作者: Kai FANG Junxin CHEN Han ZHU Thippa Reddy GADEKALLU Xiaoping WU Wei WANG School of Mathematics and Computer Science Zhejiang A&F University School of Software Dalian University of Technology Faculty of Applied Sciences Macao Polytechnic University Department of Electrical and Computer Engineering Lebanese American University School of Information Engineering Huzhou University Guangdong-Hong Kong-Macao Joint Laboratory for Emotional Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University
Artificial intelligence technology is widely used in the field of wireless sensor networks(WSN).Due to its inexplicability, the interference factors in the process of WSN object localization cannot be effectively elim... 详细信息
来源: 评论
HOTS3D: Hyper-Spherical Optimal Transport for Semantic Alignment of Text-to-3D Generation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zezeng Wang, Weimin Li, Wenhai Lei, Na Gu, Xianfeng International Information and Software Institute Dalian University of Technology Dalian116620 China School of Software Dalian University of Technology Dalian116620 China Department of Computer Science and Applied Mathematics State University of New York at Stony Brook Stony BrookNY11794-2424 United States
Recent CLIP-guided 3D generation methods have achieved promising results but struggle with generating faithful 3D shapes that conform with input text due to the gap between text and image embeddings. To this end, this... 详细信息
来源: 评论