咨询与建议

限定检索结果

文献类型

  • 36,862 篇 期刊文献
  • 32,225 篇 会议
  • 285 册 图书

馆藏范围

  • 69,372 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 45,252 篇 工学
    • 18,758 篇 计算机科学与技术...
    • 14,842 篇 软件工程
    • 8,751 篇 信息与通信工程
    • 8,742 篇 电子科学与技术(可...
    • 7,521 篇 电气工程
    • 6,207 篇 控制科学与工程
    • 5,696 篇 化学工程与技术
    • 5,196 篇 材料科学与工程(可...
    • 5,103 篇 光学工程
    • 4,235 篇 机械工程
    • 3,758 篇 仪器科学与技术
    • 3,419 篇 生物工程
    • 2,845 篇 动力工程及工程热...
    • 2,551 篇 生物医学工程(可授...
    • 1,819 篇 冶金工程
    • 1,724 篇 力学(可授工学、理...
    • 1,376 篇 航空宇航科学与技...
    • 1,335 篇 交通运输工程
    • 1,328 篇 土木工程
  • 29,896 篇 理学
    • 14,480 篇 物理学
    • 10,646 篇 数学
    • 5,247 篇 化学
    • 4,167 篇 生物学
    • 3,523 篇 统计学(可授理学、...
    • 2,494 篇 系统科学
  • 7,904 篇 管理学
    • 5,373 篇 管理科学与工程(可...
    • 2,709 篇 图书情报与档案管...
    • 2,061 篇 工商管理
  • 2,636 篇 医学
    • 2,106 篇 临床医学
    • 1,640 篇 基础医学(可授医学...
  • 1,086 篇 法学
  • 971 篇 农学
  • 895 篇 经济学
  • 422 篇 教育学
  • 274 篇 军事学
  • 168 篇 文学
  • 102 篇 艺术学
  • 9 篇 哲学
  • 5 篇 历史学

主题

  • 949 篇 feature extracti...
  • 791 篇 deep learning
  • 760 篇 training
  • 651 篇 accuracy
  • 649 篇 laboratories
  • 567 篇 optimization
  • 552 篇 computational mo...
  • 550 篇 machine learning
  • 540 篇 simulation
  • 500 篇 semantics
  • 404 篇 computer science
  • 370 篇 neural networks
  • 353 篇 wireless communi...
  • 345 篇 robustness
  • 320 篇 predictive model...
  • 302 篇 internet of thin...
  • 302 篇 data mining
  • 300 篇 conferences
  • 300 篇 data models
  • 298 篇 bandwidth

机构

  • 699 篇 university of ch...
  • 493 篇 university of sc...
  • 427 篇 institute of hig...
  • 340 篇 department of ph...
  • 277 篇 budker institute...
  • 272 篇 center of materi...
  • 268 篇 dipartimento di ...
  • 260 篇 peng cheng labor...
  • 235 篇 department of ph...
  • 223 篇 faculté des scie...
  • 222 篇 indian institute...
  • 218 篇 institute for th...
  • 204 篇 department of ph...
  • 203 篇 physikalisches i...
  • 201 篇 indian institute...
  • 199 篇 infn laboratori ...
  • 198 篇 national mobile ...
  • 195 篇 novosibirsk stat...
  • 192 篇 kto karatay univ...
  • 190 篇 nagasaki institu...

作者

  • 239 篇 j. m. izen
  • 233 篇 c. alexa
  • 230 篇 g. bella
  • 227 篇 j. strandberg
  • 226 篇 d. calvet
  • 226 篇 c. amelung
  • 211 篇 s. h. kim
  • 204 篇 g. spigo
  • 203 篇 h. a. gordon
  • 199 篇 f. siegert
  • 190 篇 a. c. könig
  • 188 篇 y. tayalati
  • 175 篇 a. ishikawa
  • 173 篇 m. klein
  • 165 篇 f. pastore
  • 165 篇 r. ströhmer
  • 161 篇 m. starič
  • 160 篇 n. orlando
  • 159 篇 niyato dusit
  • 158 篇 h. sakamoto

语言

  • 58,572 篇 英文
  • 8,324 篇 其他
  • 2,451 篇 中文
  • 112 篇 日文
  • 47 篇 法文
  • 42 篇 德文
  • 5 篇 斯洛文尼亚文
  • 2 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
检索条件"机构=Science and Technology On Information Systems Engineering Laboratory"
69372 条 记 录,以下是1251-1260 订阅
排序:
Dynamic motion of quadrupedal robots on challenging terrain:a kinodynamic optimization approach
收藏 引用
Frontiers of Mechanical engineering 2024年 第3期19卷 23-40页
作者: Qi LI Lei DING Xin LUO Engineering Research Center of Hubei Province for Clothing Information Wuhan 430200China School of Computer Science and Artificial Intelligence Wuhan Textile UniversityWuhan 430200China State Key Laboratory of Digital Manufacturing Equipment and Technology Huazhong University of Science and TechnologyWuhan 430074China
The dynamic motion of quadrupedal robots on challenging terrain generally requires elaborate spatial–temporal kinodynamic motion planning and accurate control at higher refresh rate in comparison with regular ***,con... 详细信息
来源: 评论
A security control scheme based on quantum keys for IoT terminals
收藏 引用
International Journal of Security and Networks 2023年 第3期18卷 189-198页
作者: Zhu, Dexin Du, Xiaogang Mao, Jigui Song, Lijun College of Computer Science and Technology Changchun University Changchun130022 China College of Science Changchun University Changchun130022 China Jilin Engineering Laboratory for Quantum Information Technology Changchun130062 China
With the development of computer technology and the continuous improvement of computing power, the security control of internet of things terminals has received great attention. This paper proposes a security control ... 详细信息
来源: 评论
On convergence of covariance matrix of empirical Bayes hyper-parameter estimator
收藏 引用
Control Theory and technology 2024年 第2期22卷 149-162页
作者: Yue Ju Biqiang Mu Tianshi Chen School of Data Science and Shenzhen Research Institute of Big Data The Chinese University of Hong KongShenzhenShenzhen518172GuangdongChina Division of Decision and Control Systems School of Electrical Engineering and Computer ScienceKTH Royal Institute of Technology10044StockholmSweden Key Laboratory of Systems and Control Institute of Systems ScienceAcademy of Mathematics and System ScienceChinese Academy of SciencesBeijing100190China
Regularized system identification has become the research frontier of system identification in the past *** related core subject is to study the convergence properties of various hyper-parameter estimators as the samp... 详细信息
来源: 评论
Wavelet-Based Hybrid Ensemble Forecasting for Accurate Web Traffic Prediction  1
Wavelet-Based Hybrid Ensemble Forecasting for Accurate Web T...
收藏 引用
1st International Conference on Innovations in Communications, Electrical and Computer engineering, ICICEC 2024
作者: Manoj Kumar, M.V. Puneetha, B.H. Prashanth, B.S. Sneha, H.R. Patil, N.S. Ranjana, B.J. Nitte Meenakshi Institute of Technology Department of Information Science & Engineering Karnataka Bangalore560064 India Bapuji Institute of Engineering and Technology Department of Computer Science and Business Systems Karnataka Davanagere577004 India Bapuji Institute of Engineering and Technology Department of Information Science and Engineering Karnataka Davanagere577004 India Karnataka Davanagere577004 India
This paper presents a novel approach for accurate web traffic prediction on the websites using a Wavelet-Based Hybrid Ensemble Forecasting method. The proposed method decomposes the web traffic time series into time-s... 详细信息
来源: 评论
Worst-Case Integrity Attacks and Resilient State Estimation With Partially Secured Measurements
收藏 引用
IEEE Transactions on Control of Network systems 2025年 第2期12卷 1769-1779页
作者: Zhou, Jing Shang, Jun Chen, Tongwen University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada Tongji University Department of Control Science and Engineering Shanghai Institute of Intelligent Science and Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Shanghai200092 China
This paper examines the problem of optimal deception attacks against state estimation with partially secured measurements, where smart sensors transmit innovation sequences to the remote end for information fusion. Du... 详细信息
来源: 评论
The Seamless Connection Between Underwater and Terrestrial Communication for 6G  26
The Seamless Connection Between Underwater and Terrestrial C...
收藏 引用
26th International Conference on Advanced Communications technology, ICACT 2024
作者: Wu, Tin-Yu Chen, Yi-Kai Tey, Fu-Jie National Pingtung University of Science and Technology Department of Management Information Systems Pingtung Taiwan National Taiwan University of Science and Technology Department of Electrical Engineering Taipei Taiwan
Underwater communication was chiefly employed in military affairs and underwater exploration in the early days. In recent years, thanks to the progressive advancement of communication networks, many protocols have alr... 详细信息
来源: 评论
Enhancing Image Security with Rossler Attractor-Based Encryption  2
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia University Of Petra Faculty Of Information Technology Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
Enhancing undulation of soft robots in granular media:A numerical and experimental study on the effect of anisotropic scales
收藏 引用
Biomimetic Intelligence & Robotics 2024年 第2期4卷 63-70页
作者: Longchuan Li Chaoyue Zhao Shuqian He Qiukai Qi Shuai Kang Shugen Ma College of Information Science and Technology Bejing University of Chemical TechnologyBejing 100029China School of Engineering Mathematics and Technology University of BristolBristol BS81THUK College of Mechanical and Electrical Engineering Beijing University of Chemical TechnologyBeijing 100029China Thrust of Robotics and Autonomous Systems The Hong Kong University of Science and Technology(Guangzhou)Guangzhou 511453China
Generating efficient locomotion in granular media is important,although it is difficult for *** by the fact that sand vipers usually have saw-like scales,in this study,we design a soft undulation robot with tangential... 详细信息
来源: 评论
Aero-Thermal Radiation Effects Simulation Technique for Star Sensor Imaging under Hypersonic Conditions
收藏 引用
IEEE Sensors Journal 2025年 第12期25卷 21803-21813页
作者: Liu, Haonan Sun, Ting Yang, Kang Xing, Fei Wang, Xi Wu, Siyao Peng, Yicheng Tian, Ye Beijing Information Science and Technology University College of Instrument Science and Opto-electronics Engineering Laboratory of Intelligent Microsystems Beijing100192 China Tsinghua University Department of Precision Instrument Beijing100084 China Beijing Institute of Control and Electronic Technology Beijing100038 China
In order to investigate the effect of aero-thermal radiation on star sensor detection capability in near-space hypersonic flight platforms, this paper proposes a star sensor simulation imaging technique that couples a... 详细信息
来源: 评论
SUMI-IFL: An information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints  39
SUMI-IFL: An Information-Theoretic Framework for Image Forge...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao Cao, Xiaochun School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University China State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University China
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse and protecting social safety. However, due to the rapid development of image tampering technologies, extracting more compreh... 详细信息
来源: 评论