咨询与建议

限定检索结果

文献类型

  • 3,597 篇 会议
  • 2,327 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 5,942 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,603 篇 工学
    • 2,059 篇 计算机科学与技术...
    • 1,658 篇 软件工程
    • 720 篇 信息与通信工程
    • 595 篇 控制科学与工程
    • 582 篇 电气工程
    • 557 篇 电子科学与技术(可...
    • 406 篇 生物工程
    • 365 篇 光学工程
    • 332 篇 机械工程
    • 287 篇 生物医学工程(可授...
    • 262 篇 动力工程及工程热...
    • 252 篇 仪器科学与技术
    • 193 篇 化学工程与技术
    • 149 篇 材料科学与工程(可...
    • 149 篇 交通运输工程
    • 114 篇 土木工程
    • 103 篇 建筑学
  • 1,957 篇 理学
    • 938 篇 数学
    • 607 篇 物理学
    • 452 篇 生物学
    • 298 篇 统计学(可授理学、...
    • 218 篇 系统科学
    • 207 篇 化学
  • 881 篇 管理学
    • 587 篇 管理科学与工程(可...
    • 309 篇 图书情报与档案管...
    • 234 篇 工商管理
  • 284 篇 医学
    • 238 篇 临床医学
    • 177 篇 基础医学(可授医学...
    • 112 篇 药学(可授医学、理...
  • 126 篇 法学
    • 105 篇 社会学
  • 103 篇 经济学
  • 68 篇 农学
  • 46 篇 教育学
  • 18 篇 文学
  • 17 篇 军事学
  • 9 篇 艺术学

主题

  • 124 篇 feature extracti...
  • 95 篇 deep learning
  • 94 篇 computational mo...
  • 86 篇 accuracy
  • 85 篇 optimization
  • 84 篇 training
  • 83 篇 data mining
  • 80 篇 semantics
  • 76 篇 machine learning
  • 71 篇 computer science
  • 63 篇 mathematical mod...
  • 55 篇 neural networks
  • 53 篇 analytical model...
  • 52 篇 object detection
  • 51 篇 wireless sensor ...
  • 50 篇 bandwidth
  • 50 篇 predictive model...
  • 49 篇 protocols
  • 47 篇 reliability
  • 47 篇 computer archite...

机构

  • 100 篇 national enginee...
  • 77 篇 school of comput...
  • 77 篇 school of contro...
  • 52 篇 purdue universit...
  • 46 篇 school of comput...
  • 44 篇 school of comput...
  • 40 篇 state key labora...
  • 39 篇 national enginee...
  • 38 篇 school of inform...
  • 38 篇 school of optica...
  • 37 篇 school of comput...
  • 35 篇 school of cyber ...
  • 30 篇 department of el...
  • 29 篇 school of electr...
  • 28 篇 huazhong univers...
  • 28 篇 national enginee...
  • 28 篇 school of comput...
  • 25 篇 key laboratory o...
  • 25 篇 school of comput...
  • 25 篇 hubei province k...

作者

  • 101 篇 hai jin
  • 69 篇 jin hai
  • 31 篇 yang yang
  • 31 篇 mei-ling shyu
  • 31 篇 xiaofei liao
  • 30 篇 hamid soltanian-...
  • 30 篇 shu-ching chen
  • 26 篇 chen shu-ching
  • 26 篇 soltanian-zadeh ...
  • 26 篇 shen linlin
  • 22 篇 robbi rahim
  • 22 篇 f. malek
  • 21 篇 liao xiaofei
  • 19 篇 wang xingjun
  • 19 篇 hu shengshan
  • 19 篇 shyu mei-ling
  • 17 篇 deqing zou
  • 17 篇 ai bo
  • 16 篇 xiao feng
  • 16 篇 wang wei

语言

  • 5,609 篇 英文
  • 173 篇 其他
  • 146 篇 中文
  • 11 篇 日文
  • 5 篇 朝鲜文
检索条件"机构=School of System and Computer Engineering"
5942 条 记 录,以下是41-50 订阅
排序:
Functionalised B-Cu@F-Ag@Au trimetallic nanomaterials with long term stability for rapid and highly sensitive in situ SERS detection of furfural in transformer oil
收藏 引用
High Voltage 2023年 第2期8卷 293-304页
作者: Yu Lei Changding Wang Weiping Kong Mingliang Wang Xinyuan Zhang Abdolmaleki Nima Caisheng Wang Weigen Chen Fu Wan School of Electrical Engineering Chongqing UniversityChongqingChina State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing UniversityChongqingChina Electrical and Computer Engineering Wayne State UniversityWayneNebraskaUSA
The surface-enhanced Raman scattering(SERS)substrates enable a highly sensitive detection of furfural in the transformer ***,detection substrates with long-term stability are still extremely *** this work,we anchored ... 详细信息
来源: 评论
Fast Parallel Recovery for Transactional Stream Processing on Multicores  40
Fast Parallel Recovery for Transactional Stream Processing o...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Zhao, Jianjun Liu, Haikun Zhang, Shuhao Duan, Zhuohui Liao, Xiaofei Jin, Hai Zhang, Yu School of Computer Science and Technology Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore
Transactional stream processing engines (TSPEs) have gained increasing attention due to their capability of processing real-time stream applications with transactional semantics. However, TSPEs remain susceptible to s... 详细信息
来源: 评论
GCA-Net: Global Cross Aware Network for salient object detection  23
GCA-Net: Global Cross Aware Network for salient object detec...
收藏 引用
8th International Conference on Multimedia and Image Processing, ICMIP 2023
作者: Zhang, Zixuan Shi, Fan Geng, Xinbo Tao, Yi He, Jing Key Laboratory of Computer Vision and System Ministry of Education School of Computer Science and Engineering Tianjin University of Technology China
In recent years, significant progress has been made in salient object detection. Nevertheless, there remains a need for further improvements in the effective combination of local and global perspectives. Combining glo... 详细信息
来源: 评论
Multiobjective Optimization for Traveling Salesman Problem: A Deep Reinforcement Learning Algorithm via Transfer Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第4期6卷 896-908页
作者: Gao, Le-Yang Wang, Rui Jia, Zhao-Hong Liu, Chuang Anhui University School of Computer Science and Technology Hefei230039 China National University of Defense Technology College of System Engineering Changsha410073 China Xiangjiang Laboratory Changsha410205 China Anhui University School of Internet Hefei230039 China
A wide range of real applications can be modelled as the multiobjective traveling salesman problem (MOTSP), one of typical combinatorial optimization problems. Meta-heuristics can be used to address MOTSP. However, du... 详细信息
来源: 评论
Neighborhood Combination Search for Single-Machine Scheduling with Sequence-Dependent Setup Time
收藏 引用
Journal of computer Science & Technology 2024年 第3期39卷 737-752页
作者: 刘晓路 徐宏云 陈嘉铭 苏宙行 吕志鹏 丁俊文 College of System Engineering National University of Defense TechnologyChangsha 410015China School of Artificial Intelligence Jianghan UniversityWuhan 430056China Xi’an Satellite Control Center Xi’an 710043China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China CCF
In a local search algorithm,one of its most important features is the definition of its neighborhood which is crucial to the algorithm's *** this paper,we present an analysis of neighborhood combination search for... 详细信息
来源: 评论
Combinatorial Kinetic Dualistic Auction Model for Metaverse Service Allocation  1
Combinatorial Kinetic Dualistic Auction Model for Metaverse ...
收藏 引用
IEEE AITU: 1st International Student Conference: "Digital Generation", AITU 2024
作者: Singh, Raj Sarkar, Pritam Bandyopadhyay, Anjan Swain, Sujata Sardar, Tanvir Habib Pandey, Bishwajeet School of Computer Engineering KIIT 751024 India Department of Computer Science GITAM University Bengaluru India Department of Intelligent System and Cybersecurity Astana IT University Kazakhstan
The focus of this research work revolves around the utilization of a specialized"Combinatorial Kinetic Dualistic Auction Model" designed specifically for"metaverse Services." The main goal is to im... 详细信息
来源: 评论
Malware Detection system Based on Static-Dynamic Preprocessing Techniques Combined in an Ensemble Model  15th
Malware Detection System Based on Static-Dynamic Preprocessi...
收藏 引用
15th International Conference on computer Science and its Applications, CSA 2023 and 17th KIPS International Conference on Ubiquitous Information Technologies and Applications, CUTE 2023
作者: Kim, Hae-Soo Kim, Mi-Hui School of Computer Engineering and Applied Mathematics Computer System Institute Hankyong National University 327 Jungang-ro Gyeonggi-do Anseong-si Korea Republic of
Malware distributors use persistence mechanisms in their malware to keep a PC infected for a long time. Techniques such as packing and obfuscation are often used so that the presence of malware cannot be determined by... 详细信息
来源: 评论
Unlocking Security: A Comprehensive Exploration of Biometric Authentication Techniques  14
Unlocking Security: A Comprehensive Exploration of Biometric...
收藏 引用
14th International Conference on Cloud Computing, Data Science and engineering, Confluence 2024
作者: Sriman, Jindam Thapar, Puneet Alyas, Arsalan Ahmed Singh, Urvashi School of Computer Science Engineering Lovely Professional University Phagwara India Wilmington University Information System Technologies United States
Biometric authentication is a rapidly evolving field in information security, providing a personalized and reliable approach to identity verification. This paper explores various biometric methods, including fingerpri... 详细信息
来源: 评论
A Study on Improvement of EV Charging Occupancy Prediction Efficiency  15th
A Study on Improvement of EV Charging Occupancy Prediction E...
收藏 引用
15th International Conference on computer Science and its Applications, CSA 2023 and 17th KIPS International Conference on Ubiquitous Information Technologies and Applications, CUTE 2023
作者: Kang, Myung-Joe Kim, Mi-Hui School of Computer Engineering and Applied Mathematics Computer System Institute Hankyong National University 327 Jungang-ro Gyeonggi-do Anseong-si Korea Republic of
In this paper, we propose a hybrid model structure combining CNN-LSTM and Fully Connected to improve the prediction of electric vehicle charging station occupancy efficiently. We conducted experiments on UK and Korean... 详细信息
来源: 评论
Color Image Encryption Using Genetic Recombination With Tent Mapping Based Time-Delay Chaotic  4
Color Image Encryption Using Genetic Recombination With Tent...
收藏 引用
4th International Conference on computer Graphics, Image, and Virtualization, ICCGIV 2024
作者: Xu, Yaoqun Liu, Jiaoyang Institute of System Engineering Harbin University of Commerce Harbin150028 China School of Computer and Information Engineering Harbin University of Commerce Harbin150028 China
As the form of information transmission has shifted from text to images in recent years, the in-crease in information dimension has led to a growing interest in secure and efficient encryption algorithms. This paper p... 详细信息
来源: 评论