咨询与建议

限定检索结果

文献类型

  • 2,511 篇 会议
  • 1,882 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,730 篇 工学
    • 1,639 篇 计算机科学与技术...
    • 1,318 篇 软件工程
    • 537 篇 信息与通信工程
    • 418 篇 控制科学与工程
    • 389 篇 电子科学与技术(可...
    • 370 篇 电气工程
    • 303 篇 生物工程
    • 282 篇 光学工程
    • 241 篇 机械工程
    • 207 篇 生物医学工程(可授...
    • 193 篇 仪器科学与技术
    • 150 篇 化学工程与技术
    • 143 篇 动力工程及工程热...
    • 122 篇 交通运输工程
    • 104 篇 材料科学与工程(可...
    • 99 篇 土木工程
    • 90 篇 建筑学
  • 1,471 篇 理学
    • 680 篇 数学
    • 452 篇 物理学
    • 349 篇 生物学
    • 220 篇 统计学(可授理学、...
    • 162 篇 化学
    • 148 篇 系统科学
  • 697 篇 管理学
    • 460 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 217 篇 医学
    • 182 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 99 篇 法学
    • 82 篇 社会学
  • 78 篇 经济学
  • 50 篇 农学
  • 39 篇 教育学
  • 14 篇 文学
  • 12 篇 军事学
  • 5 篇 艺术学

主题

  • 90 篇 feature extracti...
  • 83 篇 deep learning
  • 71 篇 computer science
  • 70 篇 data mining
  • 70 篇 training
  • 68 篇 computational mo...
  • 67 篇 accuracy
  • 65 篇 semantics
  • 63 篇 optimization
  • 61 篇 machine learning
  • 44 篇 object detection
  • 42 篇 protocols
  • 41 篇 reliability
  • 41 篇 mathematical mod...
  • 39 篇 wireless sensor ...
  • 39 篇 analytical model...
  • 39 篇 data models
  • 38 篇 neural networks
  • 38 篇 predictive model...
  • 37 篇 computer archite...

机构

  • 102 篇 national enginee...
  • 80 篇 school of comput...
  • 48 篇 national enginee...
  • 47 篇 school of comput...
  • 46 篇 school of comput...
  • 44 篇 school of cyber ...
  • 40 篇 school of optica...
  • 38 篇 school of comput...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 29 篇 school of comput...
  • 28 篇 hubei province k...
  • 27 篇 huazhong univers...
  • 26 篇 school of comput...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 24 篇 department of co...
  • 24 篇 school of comput...
  • 24 篇 state key labora...
  • 23 篇 hubei engineerin...

作者

  • 111 篇 hai jin
  • 97 篇 jin hai
  • 31 篇 xiaofei liao
  • 28 篇 shen linlin
  • 27 篇 yang yang
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 hu shengshan
  • 21 篇 chen shu-ching
  • 21 篇 liao xiaofei
  • 17 篇 wang xingjun
  • 17 篇 deqing zou
  • 17 篇 shyu mei-ling
  • 17 篇 zhang zhigang
  • 17 篇 zhigang zhang
  • 16 篇 zhang leo yu
  • 16 篇 ai bo
  • 16 篇 xin xin
  • 15 篇 long zheng
  • 15 篇 陈景标

语言

  • 3,837 篇 英文
  • 444 篇 其他
  • 117 篇 中文
  • 10 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of System Engineering and Computer Science"
4409 条 记 录,以下是1111-1120 订阅
排序:
Designing of a Solar MPPT Controller with the Technique of Differentiation Between Uniform Irradiance and Partial Shading Conditions  9
Designing of a Solar MPPT Controller with the Technique of D...
收藏 引用
9th IEEE International Conference on Power and Energy, PECon 2022
作者: Ahmed, Sajib Mekhilef, Saad Mubin, Marizan Tey, Kok Soon Rawa, Muhyaddin University of Malaya Power Electronics and Renewable Energy Research Laboratory Faculty of Engineering Department of Electrical Engineering Kuala Lumpur50603 Malaysia School of Science Computing and Engineering Technologies Swinburne University of Technology HawthornVIC3122 Australia University of Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia King Abdulaziz University Center of Research Excellence in Renewable Energy and Power Systems Jeddah21589 Saudi Arabia
Solar energy is considered one of the best essential energy sources to solve the present power crisis. The solar photovoltaic system has a low conversion efficiency that inflicts maximum power extractions. The non-lin... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong School of Computer Science and Technology Xidian University Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xi’an710071 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210016 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
Intrusion Detection using Deep Neural Network Algorithm on the Internet of Things  11
Intrusion Detection using Deep Neural Network Algorithm on t...
收藏 引用
11th IEEE International Conference on Communication, Networks and Satellite, COMNETSAT 2022
作者: Ikhwan, Syariful Wibowo, Adi Warsito, Budi School of Postgraduate Studies Diponegoro University Doctoral Program of Information System Semarang Indonesia Institut Teknologi Telkom Purwokerto D3 Telecommunication Engineering Banyumas Indonesia Diponegoro University Computer Science Informatics Department of Science and Mathematics Faculty Semarang Indonesia Diponegoro University Statistics Department of Science and Mathematics Faculty Semarang Indonesia
The increasing use of IoT devices on future networks is very helpful for humans in their lives. However, the increase in devices connected to IoT networks also increases the potential for attacks against those network... 详细信息
来源: 评论
Advanced Data Segmentation and Encryption Approach using Fog Computing
Advanced Data Segmentation and Encryption Approach using Fog...
收藏 引用
Automation and Computation (AUTOCOM), International Conference on
作者: Kamred Udham Singh Neeraj Varshney Pushpendra Kumar Pradeep Kumar Sharma Umang Deep Mishra Teekam Singh School of Computing Graphic Era Hill University Dehradun India Department of Computer Engineering & Applications GLA University Mathura UP India Scanno System Greater Noida HCL Technology UP Unique Institute of Management & Technology Muradnagar Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun
Data security in conventional applications was only available at the application layer. Within the scope of the intended research, the safety of the merchandise is ensured. The deficiencies that are present in the sec...
来源: 评论
MVC-VPR: Mutual Learning of Viewpoint Classification and Visual Place Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Gu, Qiwen Wang, Xufei Zhang, Fenglin Zhao, Junqiao Tao, Siyue Ye, Chen Feng, Tiantian Jiang, Changjun Department of Computer Science and Technology School of Electronics and Information Engineering Tongji University Shanghai China The Shanghai Research Institute for Intelligent Autonomous System Tongji University Shanghai China The MOE Key Lab of Embedded System and Service Computing Tongji University Shanghai China School of Surveying and Geo-Informatics Tongji University Shanghai China
Visual Place Recognition (VPR) aims to robustly identify locations by leveraging image retrieval based on descriptors encoded from environmental images. However, drastic appearance changes of images captured from diff... 详细信息
来源: 评论
Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yang Wan, Yao Zhang, Hongyu Sui, Yulei Wei, Wucai Zhao, Wei Xu, Guandong Jin, Hai Huazhong University of Science and Technology China Chongqing University China University of New South Wales Australia University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
The Natural Language to Visualization (NL2Vis) task aims to transform natural-language descriptions into visual representations for a grounded table, enabling users to gain insights from vast amounts of data. Recently... 详细信息
来源: 评论
Shared Incentive system for Clinical Pathway Experience
Shared Incentive System for Clinical Pathway Experience
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weiqi Dai Wenhao Zhao Xia Xie Song Wu Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Hainan University Haikou China
The phenomenon of unbalanced regional medical resources has led to large differences in the implementation experience of clinical pathways in hospitals with different medical levels. However, due to the fear of privac... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haozhao Wang Wenchao Xu Yunfeng Fan Ruixuan Li Pan Zhou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing The Hong Kong Polytechnic University Hong Kong Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co...
来源: 评论
Efficient Module-Lattice-based Certificateless Online/Offline Signcryption Scheme for Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Bai, Ye He, Debiao Yang, Zhichao Luo, Min Peng, Cong Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Naval University of Engineering Department of Information Security Wuhan430000 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
The Internet of Medical Things (IoMT) has achieved remote diagnosis and real-time health monitoring through intelligent sensor devices and Internet of Things (IoT) technology, providing great convenience for analyzing... 详细信息
来源: 评论
Secure Relay Selection for UAV-empowered Two Way Untrusted Relaying Networks
Secure Relay Selection for UAV-empowered Two Way Untrusted R...
收藏 引用
Mobile Internet, Cloud Computing and Information Security (MICCIS), International Conference on
作者: Kan Yu Zhiyong Feng Lin Yang Dianxia Chen Dong Li Xiaoshan Ma The School of Computer Science and Engineering Macau University of Science and Technology Taipa P. R. China The Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing P.R. China School of Computer Science and Engineering Macau University of Science and Technolog China The National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute AMS PLA Beijing P.R. China The Education Tianjin Ren’ai College Tianjin P.R. China The School of Computer Science and Engineering Macau University of Science and Technology P. R. China The Academy of Military Sciences of PLA Beijing P.R. China
In this paper, we examine the security aspects of two-way untrusted relaying networks (TWURNs) through the lens of physical layer security (PLS). These networks involve the exchange of confidential information between... 详细信息
来源: 评论