咨询与建议

限定检索结果

文献类型

  • 3,621 篇 会议
  • 2,350 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 5,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,646 篇 工学
    • 2,085 篇 计算机科学与技术...
    • 1,660 篇 软件工程
    • 724 篇 信息与通信工程
    • 619 篇 控制科学与工程
    • 583 篇 电气工程
    • 563 篇 电子科学与技术(可...
    • 409 篇 生物工程
    • 366 篇 光学工程
    • 334 篇 机械工程
    • 291 篇 生物医学工程(可授...
    • 263 篇 动力工程及工程热...
    • 252 篇 仪器科学与技术
    • 195 篇 化学工程与技术
    • 150 篇 材料科学与工程(可...
    • 147 篇 交通运输工程
    • 116 篇 土木工程
    • 105 篇 建筑学
  • 1,972 篇 理学
    • 940 篇 数学
    • 614 篇 物理学
    • 456 篇 生物学
    • 298 篇 统计学(可授理学、...
    • 221 篇 系统科学
    • 208 篇 化学
  • 878 篇 管理学
    • 582 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 291 篇 医学
    • 245 篇 临床医学
    • 180 篇 基础医学(可授医学...
    • 112 篇 药学(可授医学、理...
  • 126 篇 法学
    • 105 篇 社会学
  • 101 篇 经济学
  • 68 篇 农学
  • 49 篇 教育学
  • 19 篇 文学
  • 17 篇 军事学
  • 9 篇 艺术学

主题

  • 128 篇 feature extracti...
  • 97 篇 deep learning
  • 95 篇 computational mo...
  • 88 篇 optimization
  • 87 篇 accuracy
  • 86 篇 training
  • 85 篇 data mining
  • 81 篇 semantics
  • 76 篇 machine learning
  • 71 篇 computer science
  • 63 篇 mathematical mod...
  • 55 篇 neural networks
  • 53 篇 analytical model...
  • 52 篇 object detection
  • 51 篇 wireless sensor ...
  • 51 篇 predictive model...
  • 50 篇 bandwidth
  • 49 篇 protocols
  • 47 篇 reliability
  • 47 篇 computer archite...

机构

  • 103 篇 national enginee...
  • 79 篇 school of comput...
  • 77 篇 school of contro...
  • 52 篇 purdue universit...
  • 46 篇 school of comput...
  • 46 篇 national enginee...
  • 44 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 37 篇 school of inform...
  • 37 篇 school of cyber ...
  • 31 篇 national enginee...
  • 29 篇 school of electr...
  • 29 篇 department of el...
  • 29 篇 school of comput...
  • 28 篇 huazhong univers...
  • 26 篇 hubei province k...
  • 25 篇 hubei key labora...
  • 25 篇 key laboratory o...

作者

  • 101 篇 hai jin
  • 67 篇 jin hai
  • 31 篇 yang yang
  • 31 篇 mei-ling shyu
  • 31 篇 xiaofei liao
  • 30 篇 hamid soltanian-...
  • 30 篇 shu-ching chen
  • 27 篇 shen linlin
  • 26 篇 chen shu-ching
  • 26 篇 soltanian-zadeh ...
  • 22 篇 robbi rahim
  • 22 篇 f. malek
  • 22 篇 hu shengshan
  • 21 篇 liao xiaofei
  • 19 篇 wang xingjun
  • 18 篇 shyu mei-ling
  • 17 篇 xiao feng
  • 17 篇 wang wei
  • 17 篇 deqing zou
  • 17 篇 ai bo

语言

  • 5,545 篇 英文
  • 283 篇 其他
  • 147 篇 中文
  • 11 篇 日文
  • 5 篇 朝鲜文
检索条件"机构=School of System and Computer Engineering"
5989 条 记 录,以下是181-190 订阅
排序:
A Hierarchical Traffic Sign Image Recognition Algorithm Keeping the Local Topology  7
A Hierarchical Traffic Sign Image Recognition Algorithm Keep...
收藏 引用
7th International Conference on Advanced Algorithms and Control engineering, ICAACE 2024
作者: Liu, Longhui Gong, Wenhui Wang, Wenjie Zeng, Zhiqiang Li, Wei Xiamen Global Navigation Satellite System Development & Application Co. Ltd. Xiamen China School Of Computer And Information Engineering Xiamen University Of Technology Xiamen China
Traffic sign recognition is crucial in enabling intelligent driving. This paper proposes a robust hierarchical traffic sign image recognition algorithm that maintains local topology. The algorithm is divided into two ... 详细信息
来源: 评论
A Novel Single Shot Multibox Detector based Face Mask Detection  2
A Novel Single Shot Multibox Detector based Face Mask Detect...
收藏 引用
2nd International Conference on Augmented Intelligence and Sustainable systems, ICAISS 2023
作者: Bhargava, Neeraj Rathore, Pramod Singh Vaishnav, Parul Goswami, Ankur Mds University School of Engineering & System Sciences Ajmer India Manipal University Department of Computer and Communication Engineering Jaipur India Mds University Ajmer India Govt. Engineering College Department of Computer Applications Bikaner India
Face mask detection has gained significant importance in recent times due to the COVID-19 pandemic. This research work proposes a face mask detection method using the Single Shot MultiBox Detector (SSD) framework. The... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Design of Digital Twin Circuit Principle Experiment system Based on NCSLab  42
Design of Digital Twin Circuit Principle Experiment System B...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Li, Yu-Zhong Liu, Guo-Ping Yu, Yi School of Computer Science and Engineering Huizhou University Huizhou516007 China School of System Design and Intelligence Manufacture Southern University of Science and Technology Shenzhen518055 China
This paper is concerned with the requirements of current distance learning of circuit principle experiment of automation specialty, automatic fault detection of experimental equipment, automatic fault isolation, unint... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Development of China's spaceborne SAR satellite,processing strategy,and application:take Gaofen-3 series as an example
收藏 引用
地球空间信息科学学报(英文版) 2024年 第1期27卷 221-236页
作者: Guo Zhang Shunyao Wang Zhenwei Chen Yuzhi Zheng Ruishan Zhao Taoyang Wang Yu Zhu Xinzhe Yuan Wei Wu Weitao Chen State Key Laboratory of Information Engineering in Surveying Mapping and Remote SensingWuhan UniversityWuhanChina School of Law Wuhan UniversityWuhanChina School of Geomatics Liaoning Technical UniversityFuxinChina School of Remote Sensing and Information Engineering Wuhan UniversityWuhanChina Institute of Spacecraft System Engineering China Academy of Space TechnologyBeijingChina National Disaster Reduction Center of China Ministry of Emergency ManagementBeijingChina School of Computer Science China University of GeosciencesWuhanChina Key Laboratory of Space Ocean Remote Sensing and Application Ministry of Natural Resources of the People's Republic of ChinaBeijingChina
After mastering the key technologies of manufacturing spaceborne Synthetic Aperture Radar(SAR),China's SAR satellites have been successfully launched into *** the only civil microwave satellite listed in the"... 详细信息
来源: 评论
A lightweight point cloud analysis network based on graph walking  8
A lightweight point cloud analysis network based on graph wa...
收藏 引用
8th International Conference on Intelligent Informatics and Biomedical Sciences, ICIIBMS 2023
作者: Li, Wenju Ji, Qianqian Sha, Liye Cui, Liu Shanghai Institute of Technology School of Computer Science and Information Engineering Shanghai China Shanghai Precision Dosing & Weighing System Co Shanghai China
Based on the irregularity and permutation invariance of point clouds, graph neural networks have been widely used in 3D point cloud analysis tasks in recent years. However, these works suffer from insufficient feature... 详细信息
来源: 评论
Design and implementation of a standardized review system for gas station safety production based on SpringBoot  2
Design and implementation of a standardized review system fo...
收藏 引用
2nd International Symposium on computer Applications and Information systems, ISCAIS 2023
作者: Li, Heng Liu, Yuxing School of Software and Artificial Intelligence Chongqing Institute of Engineering Chongqing China Shanghai Tansi Computer System Co. Ltd Shanghai China
Gas stations are flammable and explosive hazardous places, and safety is the first priority. At present, when gas stations are reviewed for production safety standardization, they mainly rely on reviewers to score on ... 详细信息
来源: 评论
Coverage Hole Aware Data Routing for Mobile Sink Wireless Sensor Networks  14
Coverage Hole Aware Data Routing for Mobile Sink Wireless Se...
收藏 引用
14th IEEE International Conference on Electronics Information and Emergency Communication, ICEIEC 2024
作者: Wedaj, Fisseha Teju Hawbani, Ammar Wang, Xingfu Al-Gunid, Haithm M. Yilma, Getinet Farooq Qaisar, Muhammad Umar University of Science and Technology of China School of Computer Science and Technology Hefei China Shenyang Aerospace University School of Computer Science Shenyang China Adama Science and Technology University School of Electrical Engineering and Computing Adama Ethiopia Southern University of Science and Technology School of System Design and Intelligent Manufacturing Shenzhen China
In wireless sensor networks (WSNs), the coverage hole problem is one of the challenging problems that needs an effective solution. Data routing protocols in WSNs aim to disseminate the sensors' data to the central... 详细信息
来源: 评论
Real-Time Road Damage Detection and Infrastructure Evaluation Leveraging Unmanned Aerial Vehicles and Tiny Machine Learning
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 21347-21358页
作者: Khan, Muhammad Waseem Obaidat, Mohammad S. Mahmood, Khalid Batool, Dania Badar, Hafiz Muhammad Sanaullah Aamir, Muhammad Gao, Wu Comsats University Islamabad Sahiwal Campus Department Of Computer Science Sahiwal57000 Pakistan Superior University Department Of Computer Science Lahore54000 Pakistan The University Of Jordan King Abdullah Ii School Of Information Technology Amman11942 Jordan University Of Science And Technology Beijing School Of Communication And Computing Engineering Beijing100083 China Amity University Amity School Of Engineering And Technology Uttar Pradesh Noida201301 India National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan University Of Palermo Department Of Engineering Palermo90133 Italy Emerson University Department Of Emerging Computing Technologies Multan60000 Pakistan Northwestern Polytechnical University Center For Bio-Inspired System-on-Chip School Of Computer Science Xi'an710060 China
Road damage detection (RDD) through computer vision and deep learning techniques can ensure the safety of vehicles and humans on the roads. Integrating unmanned aerial vehicles (UAVs) in RDD and infrastructure evaluat... 详细信息
来源: 评论