咨询与建议

限定检索结果

文献类型

  • 2,503 篇 会议
  • 1,888 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 4,408 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,751 篇 工学
    • 1,656 篇 计算机科学与技术...
    • 1,331 篇 软件工程
    • 543 篇 信息与通信工程
    • 422 篇 控制科学与工程
    • 389 篇 电子科学与技术(可...
    • 373 篇 电气工程
    • 303 篇 生物工程
    • 289 篇 光学工程
    • 242 篇 机械工程
    • 207 篇 生物医学工程(可授...
    • 193 篇 仪器科学与技术
    • 147 篇 化学工程与技术
    • 142 篇 动力工程及工程热...
    • 123 篇 交通运输工程
    • 104 篇 材料科学与工程(可...
    • 95 篇 土木工程
    • 89 篇 建筑学
  • 1,487 篇 理学
    • 691 篇 数学
    • 457 篇 物理学
    • 352 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 159 篇 化学
    • 151 篇 系统科学
  • 701 篇 管理学
    • 462 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 222 篇 医学
    • 187 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 99 篇 法学
    • 82 篇 社会学
  • 78 篇 经济学
  • 52 篇 农学
  • 41 篇 教育学
  • 14 篇 文学
  • 13 篇 军事学
  • 5 篇 艺术学

主题

  • 88 篇 feature extracti...
  • 82 篇 deep learning
  • 71 篇 computer science
  • 71 篇 training
  • 69 篇 data mining
  • 67 篇 computational mo...
  • 64 篇 optimization
  • 64 篇 semantics
  • 63 篇 accuracy
  • 62 篇 machine learning
  • 43 篇 object detection
  • 43 篇 protocols
  • 41 篇 mathematical mod...
  • 40 篇 reliability
  • 39 篇 wireless sensor ...
  • 39 篇 analytical model...
  • 38 篇 neural networks
  • 38 篇 predictive model...
  • 38 篇 data models
  • 36 篇 computer archite...

机构

  • 102 篇 national enginee...
  • 79 篇 school of comput...
  • 47 篇 national enginee...
  • 46 篇 school of comput...
  • 44 篇 school of comput...
  • 44 篇 school of cyber ...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 29 篇 school of comput...
  • 27 篇 huazhong univers...
  • 27 篇 hubei province k...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 24 篇 state key labora...
  • 23 篇 college of compu...
  • 23 篇 department of co...

作者

  • 110 篇 hai jin
  • 96 篇 jin hai
  • 31 篇 xiaofei liao
  • 28 篇 shen linlin
  • 27 篇 yang yang
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 hu shengshan
  • 21 篇 chen shu-ching
  • 21 篇 liao xiaofei
  • 18 篇 zhigang zhang
  • 17 篇 wang xingjun
  • 17 篇 deqing zou
  • 17 篇 zhang zhigang
  • 16 篇 zhang leo yu
  • 16 篇 ai bo
  • 16 篇 shyu mei-ling
  • 16 篇 xin xin
  • 15 篇 li peng
  • 15 篇 long zheng

语言

  • 4,050 篇 英文
  • 229 篇 其他
  • 115 篇 中文
  • 10 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of System Engineering and Computer Science"
4408 条 记 录,以下是971-980 订阅
排序:
Investigation of Creating Accessibility Linked Data Based on Publicly Available Accessibility Datasets  23
Investigation of Creating Accessibility Linked Data Based on...
收藏 引用
Proceedings of the 2023 13th International Conference on Communication and Network Security
作者: Yufeng Li Xu Yan Mingxuan Xiao Weimin Wang Fei Zhang Department of Digital Information Technology Zhejiang Technical Institute of Economics China and Department of Electronics and Computer Science University of Southampton United Kingdom Department of Computer Science Trine University USA Department of Computer Science McDonald (China) Co. Ltd. China and Department of Computer Science SouthWest JiaoTong University China Department of Computer Science Alibaba International China and School of Engineering Hong Kong University of Science and Technology China Department of Computer Science Trine University USA and Department of Geographic Information System Yangtze University China
With the fast growth of web, the web is full of diverse data. Linked Data is data on the web that gives URIs to entities and links different data from different domains together, which results in the part of the web i... 详细信息
来源: 评论
Tactile-Based Object Pose Estimation Employing Extended Kalman Filter  8
Tactile-Based Object Pose Estimation Employing Extended Kalm...
收藏 引用
8th IEEE International Conference on Advanced Robotics and Mechatronics, ICARM 2023
作者: Lin, Qiguang Yan, Chaojie Li, Qiang Ling, Yonggen Zheng, Yu Lee, Wangwei Wan, Zhaoliang Huang, Bidan Liu, Xiaofeng College of IoT Engineering Hohai University Jiangsu Key Laboratory of Special Robotic Technology Jiangsu Changzhou213022 China Zhejiang University Institute of Cyber-System and Control State Key Laboratory of Industrial Control and Technology Hangzhou China Bielefeld33619 Germany Tencent Robotics X Shenzhen China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
In this paper, we present a new approach to estimate the pose of an object being manipulated by a multi-fingered robotic hand. The method utilizes advanced tactile sensors with high spatial resolution to optimize the ... 详细信息
来源: 评论
A Study of Data Augmentation for Imbalance Problem in Network Traffic
A Study of Data Augmentation for Imbalance Problem in Networ...
收藏 引用
Blockchain Technology and Information Security (ICBCTIS), International Conference on
作者: Xu Wang Shimin Sun Li Han School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong University Tianjin China National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys...
来源: 评论
A Scheme for Authentication and Traceability of 5G Mobile Terminal Based on IPv6 and Blockchain
A Scheme for Authentication and Traceability of 5G Mobile Te...
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Xinsheng Ji Ying Zhao Xingxing Liao Jie Yang Chunxiao Wang Department of Computer Science and Technology Tsinghua University Beijing China National Digital Switching System Engineering & Technological R&D Center Zhengzhou China Purple Mountain Laboratories Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
To satisfy the service-side requirements for network layer authentication and traceability of users, this paper proposes a method for mobile terminal authentication and identity tracing based on IPv6 and blockchain. O... 详细信息
来源: 评论
SCVCNet: Sliding cross-vector convolution network for cross-task and inter-individual-set EEG-based cognitive workload recognition
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Qi Chen, Li Zhan, Zhiyuan Zhang, Jianhua Yin, Zhong The Department of Control Science and Engineering the School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200093 China The OsloMet Artificial Intelligence Lab Department of Computer Science Oslo Metropolitan University OsloN-0130 Norway The Engineering Research Center of Optical Instrument and System Ministry of Education Shanghai Key Lab of Modern Optical System University of Shanghai for Science and Technology Shanghai200093 China
This paper presents a generic approach for applying the cognitive workload recognizer by exploiting common electroencephalogram (EEG) patterns across different human-machine tasks and individual sets. We propose a neu... 详细信息
来源: 评论
Employment of ANN for Predictive Motor Maintenance and Bearing Fault Detection Using Park's Vector Analysis  5
Employment of ANN for Predictive Motor Maintenance and Beari...
收藏 引用
5th IEEE International Symposium in Robotics and Manufacturing Automation, ROMA 2022
作者: Mahesh, Abishek Aadhavan, B. Aadhi Meenaa, V. Valli Omar, Madiah Binti Ibrahim, Rosdiazli Bin Salehuddin, Nurliana Farhana Sujatha, R Vellore Institute of Technology Computer Science Tamil Nadu Vellore India Vellore Institute of Technology School of Electronics Engineering Tamil Nadu Vellore India Institute of Autonomous System Universiti Teknologi Petronas Perak Seri Iskandar31750 Malaysia
Predictive maintenance is an emerging concept that is gaining mainstream popularity in industrial automation. It involves continuous monitoring of the machinery's health, status and performance in real-time. Hence... 详细信息
来源: 评论
Geometric Constellation Shaping for Wireless Optical Intensity Channels: An Information-Theoretic Approach
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Suhua Li, Tianqi Fang, Zhaoxi Zhou, Jing Zhang, Wenyi School of Automation Beijing Information Science and Technology University Beijing100192 China National Computer System Engineering Research Institute of China Beijing100083 China Department of Computer Science and Engineering Shaoxing University Shaoxing312000 China Henan Key Laboratory of Visible Light Communications Zhengzhou450002 China Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei230027 China
A simple geometric shaping method is proposed for optical wireless communication systems based on intensity modulation and direct detection (IM/DD) from an information-theoretic perspective. Constellations consisting ... 详细信息
来源: 评论
Brain tumor classification model of ResNet-50 network based on different data enhancement algorithms  8
Brain tumor classification model of ResNet-50 network based ...
收藏 引用
8th International Conference on Intelligent Computing and Signal Processing, ICSP 2023
作者: Zou, Menghan Ma, Mingze Wang, Anan Li, Yujie Toe, Teoh Teik Harbin Institute of Technology Weihai School of Computer Science and Technology WeiHai China Harbin Institute of Technology Weihai Welding Technology and Engineering WeiHai China Harbin Institute of Technology Weihai Marine Information Engineering WeiHai China Harbin Institute of Technology Weihai Information Management and Information System WeiHai China Nanyang Technological University Ntu Business Ai Lab Singapore
The accuracy and stability of brain tumor MRI image classification is significant for the healthcare system, but the traditional models have the defects of difficulty in handling complex features and unstable classifi... 详细信息
来源: 评论
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack
3DHacker: Spectrum-based Decision Boundary Generation for Ha...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Yunbo Tao Daizong Liu Pan Zhou Yulai Xie Wei Du Wei Hu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wangxuan Institute of Computer Technology Peking University
With the maturity of depth sensors, the vulnerability of 3D point cloud models has received increasing attention in various applications such as autonomous driving and robot navigation. Previous 3D adversarial attacke...
来源: 评论
Method for Evaluating the Performance of Aircraft Collaborative Decision-Making Based on Dynamic Bayesian Network
Method for Evaluating the Performance of Aircraft Collaborat...
收藏 引用
Electronics and Devices, Computational science (ICEDCS), International Conference on
作者: Wenbo Zhang Boxiao Yu Jiahui Tong Jing Li National Key Laboratory of Complex System Control and Intelligent Agent Cooperation Beijing Electro-Mechanical Engineering Institute Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China
This research addresses the challenge of assessing equipment decision-making effectiveness in environments characterized by uncertainty and multiple influencing factors. We propose a novel approach involving the creat... 详细信息
来源: 评论