咨询与建议

限定检索结果

文献类型

  • 7,420 篇 会议
  • 6,253 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 13,721 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,133 篇 工学
    • 4,669 篇 计算机科学与技术...
    • 3,750 篇 软件工程
    • 2,004 篇 信息与通信工程
    • 1,667 篇 电子科学与技术(可...
    • 1,355 篇 控制科学与工程
    • 1,313 篇 电气工程
    • 961 篇 光学工程
    • 886 篇 生物工程
    • 863 篇 机械工程
    • 800 篇 化学工程与技术
    • 739 篇 仪器科学与技术
    • 713 篇 材料科学与工程(可...
    • 629 篇 生物医学工程(可授...
    • 497 篇 动力工程及工程热...
    • 297 篇 交通运输工程
    • 275 篇 力学(可授工学、理...
    • 270 篇 土木工程
    • 253 篇 建筑学
  • 5,332 篇 理学
    • 2,199 篇 数学
    • 2,068 篇 物理学
    • 991 篇 生物学
    • 791 篇 化学
    • 700 篇 统计学(可授理学、...
    • 484 篇 系统科学
  • 1,915 篇 管理学
    • 1,220 篇 管理科学与工程(可...
    • 736 篇 图书情报与档案管...
    • 451 篇 工商管理
  • 582 篇 医学
    • 480 篇 临床医学
    • 395 篇 基础医学(可授医学...
    • 273 篇 药学(可授医学、理...
  • 289 篇 法学
  • 192 篇 经济学
  • 168 篇 农学
  • 91 篇 教育学
  • 62 篇 军事学
  • 30 篇 文学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 217 篇 deep learning
  • 182 篇 feature extracti...
  • 149 篇 computational mo...
  • 143 篇 optimization
  • 142 篇 machine learning
  • 126 篇 semantics
  • 117 篇 data mining
  • 100 篇 neural networks
  • 95 篇 simulation
  • 91 篇 object detection
  • 90 篇 predictive model...
  • 87 篇 support vector m...
  • 87 篇 bandwidth
  • 87 篇 convolution
  • 86 篇 visualization
  • 83 篇 image segmentati...
  • 82 篇 wireless communi...
  • 81 篇 accuracy
  • 80 篇 training
  • 78 篇 reinforcement le...

机构

  • 101 篇 national enginee...
  • 78 篇 center of materi...
  • 71 篇 school of optica...
  • 62 篇 university of ch...
  • 54 篇 college of infor...
  • 45 篇 school of inform...
  • 42 篇 faculty of infor...
  • 41 篇 university of sc...
  • 41 篇 school of gradua...
  • 39 篇 school of comput...
  • 39 篇 school of inform...
  • 38 篇 huazhong univers...
  • 38 篇 shanghai key lab...
  • 37 篇 state key lab of...
  • 37 篇 school of inform...
  • 37 篇 tianqiao and chr...
  • 36 篇 school of inform...
  • 36 篇 school of comput...
  • 35 篇 school of electr...
  • 35 篇 college of infor...

作者

  • 57 篇 sun qizhen
  • 56 篇 qizhen sun
  • 47 篇 hai jin
  • 45 篇 yang yang
  • 42 篇 shuxiang guo
  • 36 篇 wang jian
  • 36 篇 jin hai
  • 35 篇 jian wang
  • 35 篇 liu yang
  • 35 篇 ming tang
  • 34 篇 zhang wenqiang
  • 32 篇 wei li
  • 31 篇 hao li
  • 30 篇 wang lei
  • 27 篇 chen chen
  • 26 篇 bin wang
  • 24 篇 zhang lei
  • 23 篇 tiger h. tao
  • 22 篇 xiaoling wei
  • 22 篇 li li

语言

  • 11,977 篇 英文
  • 1,279 篇 其他
  • 436 篇 中文
  • 32 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Science and Technology in Information System Engineering Lab"
13721 条 记 录,以下是4651-4660 订阅
排序:
An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS
An Efficient Authentication Technique using Convolution Cheb...
收藏 引用
2022 IEEE International Conference on Communications, Computing, Cybersecurity and Informatics, CCCI 2022
作者: Meshram, Chandrashekhar Obaidat, Mohammad S. Imoize, Agbotiname Lucky Bahkali, Ismail Tambare, Parkash Hsiao, Kuei-Fang Jayawanti Haksar Government Post Graduation College Department of Post Graduation Studies and Research in Mathematics M.P. Betul460001 India Computer Science Department Cybersecurity Center University of Texas-Permian Basin OdessaTX79762 United States KASIT The University of Jordan Amman Jordan University of Science and Technology Beijing Beijing China University of Lagos Faculty of Engineering Department of Electrical and Electronics Engineering Akoka Lagos100213 Nigeria Ruhr University Institute of Digital Communication Department of Electrical Engineering and Information Technology Bochum44801 Germany King Abdulaziz University Department of Information Science Jeddah21589 Saudi Arabia WRAM Research Lab Pvt. Ltd. Nagpur440027 India University of Texas-Permian Basin Computer Science Department OdessaTX79762 United States
Authentication mechanisms for Telecare Medicine information systems (TMIS) have been extensively researched to safeguard the privacy and integrity of sensitive user data, such as telephone numbers, health information,... 详细信息
来源: 评论
Uncovering the Iceberg in the Sea: Fundamentals of Pulse Shaping and Modulation Design for Random ISAC Signals
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Fan Xiong, Yifeng Lu, Shihang Li, Shuangyang Yuan, Weijie Masouros, Christos Jin, Shi Caire, Giuseppe The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China The School of System Design and Intelligent Manufacturing Southern University of Science and Technology Shenzhen518055 China The School of Information and Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China The Chair of Communications and Information Theory Technical University of Berlin Berlin10623 Germany The Department of Electrical and Electronic Engineering University College London LondonWC1E 7JE United Kingdom
Integrated Sensing and Communications (ISAC) is expected to play a pivotal role in future 6G networks. To maximize time-frequency resource utilization, 6G ISAC systems must exploit data payload signals, that are inher... 详细信息
来源: 评论
Manufacturing A Low-Cost Telegram and Optical Character Recognition-Based Indoor Air Quality Monitoring Data Logger
Manufacturing A Low-Cost Telegram and Optical Character Reco...
收藏 引用
International Conference on information Management and technology (ICIMTech)
作者: Andi Pramono Satrio Arif Budiman Muchammad Farchan Andi Baso Mappaturi Interior Design Department School of Design Bina Nusantara University Jakarta Indonesia Information System Computer Science Faculty Brawijaya University Malang Indonesia Department of Electrical Engineering Faculty of Intelligent Electrical and Informatics Technology Institut Teknologi Sepuluh Nopember Surabaya Indonesia Architecture Department Faculty of Science and Technology Islamic State University of Maulana Malik Ibrahim Malang Indonesia
Urban air is frequently contaminated with CO, CO2, VOC, HCHO, PM 2.5, and PM 10. Rural regions are at a lower risk than those near roads and industrial areas that produce emissions. Air pollutants negatively affect it...
来源: 评论
Accelerating Surrogate Assisted Evolutionary Algorithms Via Explainable Machine Learning
SSRN
收藏 引用
SSRN 2024年
作者: Li, Bingdong Yang, Yanting Liu, Dacheng Zhang, Yan Zhou, Aimin Yao, Xin Shanghai Institute of AI for Education East China Normal University Shanghai200062 China School of Computer Science and Technology East China Normal University Shanghai200062 China Department of Space Microwave Remote Sensing System Aerospace Information Research Institute Chinese Academy of Sciences Beijing100090 China School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing100039 China Department of Statistics and Data Science Southern University of Science and Technology Shenzhen518055 China
A series of surrogate-assisted evolutionary algorithms (SAEAs) have been proposed to handle expensive multi-objective optimization problems (EMOPs). However, the surrogate of these SAEAs is underutilized to a large ex... 详细信息
来源: 评论
Tea Wing Bug Inspired Flexible Deep Brain Probe Minimally Invasive Implantation
Tea Wing Bug Inspired Flexible Deep Brain Probe Minimally In...
收藏 引用
IEEE International Conference on Micro Electro Mechanical systems
作者: Dujuan Zou Xueying Wang Huiran Yang Wanqi Jiang Ziyi Zhu Chen Tao Zhitao Zhou Liuyang Sun Tiger H. Tao Xiaoling Wei 2020 X-Lab Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai China University of Chinese Academy of Sciences Beijing China State Key Laboratory of Transducer Technology Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai China School of Physical Science and Technology Shanghai Tech University Shanghai China Center of Materials Science and Optoelectronics Engineering University of Chinese Academy of Sciences Beijing China Center for Excellence in Brain Science and Intelligence Technology Chinese Academy of Sciences Shanghai China Neuroxess Co. Ltd. (Jiangxi) Nanchang China Guangdong Institute of Intelligence Science and Technology Hengqin Zhuhai China Tianqiao and Chrissy Chen Institute for Translational Research Shanghai China
This paper reports a bionic silk-based neural probe implantation method which inspired by the anatomy of the mouth parts of the tea wing bug. Remarkably, compared to the latest polymer-coated reinforcement, the implan...
来源: 评论
Towards End-to-End Unsupervised Saliency Detection with Self-Supervised Top-Down Context
arXiv
收藏 引用
arXiv 2023年
作者: Song, Yicheng Gao, Shuyong Xing, Haozhe Cheng, Yiting Wang, Yan Zhang, Wenqiang Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University Shanghai China Keenon Robotics Co. Ltd. Shanghai China Academy for Engineering & Technology Fudan University Shanghai China
Unsupervised salient object detection aims to detect salient objects without using supervision signals eliminating the tedious task of manually labeling salient objects. To improve training efficiency, end-to-end meth... 详细信息
来源: 评论
When is the estimated propensity score better? High-dimensional analysis and bias correction
arXiv
收藏 引用
arXiv 2023年
作者: Su, Fangzhou Mou, Wenlong Ding, Peng Wainwright, Martin J. Department of Electrical Engineering and Computer Sciences United States Department of Statistics UC Berkeley United States Department of Mathematics Lab for Information and Decision Systems and Statistics and Data Science Center Massachusetts Institute of Technology United States
Anecdotally, using an estimated propensity score is superior to the true propensity score in estimating the average treatment effect based on observational data. However, this claim comes with several qualifications: ...
来源: 评论
Impact of Black Swan Events on Ethereum Blockchain ERC20 Token Transaction Networks
arXiv
收藏 引用
arXiv 2023年
作者: Pradeep, Moturi Dyapa, Uday Kumar Reddy Jalan, Sarika Pradhan, Priodyuti Department of Physics & Astrophysics University of Delhi India Department of Computer Science & Engineering Indian Institute of Information Technology Karnataka Raichur584135 India Complex Systems Lab Department of Physics Indian Institute of Technology Indore Khandwa Road Simrol Indore453552 India
The Ethereum blockchain and its ERC20 token standard have revolutionized the landscape of digital assets and decentralized applications. ERC20 tokens developed on the Ethereum blockchain have gained significant attent... 详细信息
来源: 评论
Attention in Attention: Modeling Context Correlation for Efficient Video Classification
arXiv
收藏 引用
arXiv 2022年
作者: Hao, Yanbin Wang, Shuo Cao, Pei Gao, Xinjian Xu, Tong Wu, Jinmeng He, Xiangnan The CCCD Key Lab of Ministry of Culture and Tourism School of Data Science School of Information Science and Technology University of Science and Technology of China Anhui 230026 China The Wuhan Research Institute of Posts and Telecommunications Hubei Wuhan430205 China The School of Computer Science and Information Engineering School of Artificial Intelligence Hefei University of Technology Anhui 230009 China The School of Data Science School of Computer Science and Technology University of Science and Technology of China Anhui 230026 China The Hubei Key Laboratory of Optical Information and Pattern Recognition Wuhan Institute of Technology Hubei Wuhan430070 China
Attention mechanisms have significantly boosted the performance of video classification neural networks thanks to the utilization of perspective contexts. However, the current research on video attention generally foc... 详细信息
来源: 评论
Why Do Developers Remove Lambda Expressions in Java?  21
Why Do Developers Remove Lambda Expressions in Java?
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Mingwei Zheng Jun Yang Ming Wen Hengcheng Zhu Yepang Liu Hai Jin Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Huazhong University of Science and Technology Wuhan China School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China The Hong Kong University of Science and Technology Hong Kong China Southern University of Science and Technology Shenzhen China Cluster and Grid Computing Lab School of Computer Science and Technology HUST Wuhan China
Java 8 has introduced lambda expressions, a core feature of functional programming. Since its introduction, there is an increasing trend of lambda adoptions in Java projects. Developers often adopt lambda expressions ... 详细信息
来源: 评论