咨询与建议

限定检索结果

文献类型

  • 7,403 篇 会议
  • 6,266 篇 期刊文献
  • 49 册 图书

馆藏范围

  • 13,718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,128 篇 工学
    • 4,673 篇 计算机科学与技术...
    • 3,758 篇 软件工程
    • 2,004 篇 信息与通信工程
    • 1,649 篇 电子科学与技术(可...
    • 1,361 篇 控制科学与工程
    • 1,306 篇 电气工程
    • 963 篇 光学工程
    • 887 篇 生物工程
    • 862 篇 机械工程
    • 803 篇 化学工程与技术
    • 748 篇 仪器科学与技术
    • 693 篇 材料科学与工程(可...
    • 630 篇 生物医学工程(可授...
    • 499 篇 动力工程及工程热...
    • 299 篇 交通运输工程
    • 275 篇 力学(可授工学、理...
    • 273 篇 土木工程
    • 251 篇 建筑学
  • 5,347 篇 理学
    • 2,196 篇 数学
    • 2,069 篇 物理学
    • 997 篇 生物学
    • 791 篇 化学
    • 697 篇 统计学(可授理学、...
    • 484 篇 系统科学
  • 1,930 篇 管理学
    • 1,229 篇 管理科学与工程(可...
    • 742 篇 图书情报与档案管...
    • 455 篇 工商管理
  • 596 篇 医学
    • 491 篇 临床医学
    • 401 篇 基础医学(可授医学...
    • 273 篇 药学(可授医学、理...
  • 288 篇 法学
  • 196 篇 经济学
  • 175 篇 农学
  • 92 篇 教育学
  • 62 篇 军事学
  • 30 篇 文学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 216 篇 deep learning
  • 179 篇 feature extracti...
  • 145 篇 computational mo...
  • 142 篇 optimization
  • 138 篇 machine learning
  • 124 篇 semantics
  • 116 篇 data mining
  • 100 篇 neural networks
  • 95 篇 simulation
  • 93 篇 predictive model...
  • 91 篇 object detection
  • 87 篇 visualization
  • 86 篇 support vector m...
  • 86 篇 bandwidth
  • 86 篇 convolution
  • 83 篇 image segmentati...
  • 82 篇 wireless communi...
  • 82 篇 training
  • 80 篇 wireless sensor ...
  • 79 篇 educational inst...

机构

  • 101 篇 national enginee...
  • 79 篇 center of materi...
  • 70 篇 school of optica...
  • 69 篇 university of ch...
  • 53 篇 college of infor...
  • 44 篇 faculty of infor...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 42 篇 university of sc...
  • 41 篇 school of gradua...
  • 38 篇 school of inform...
  • 38 篇 shanghai key lab...
  • 37 篇 huazhong univers...
  • 37 篇 state key lab of...
  • 37 篇 school of inform...
  • 37 篇 college of infor...
  • 36 篇 school of comput...
  • 36 篇 tianqiao and chr...
  • 36 篇 school of electr...
  • 35 篇 school of inform...

作者

  • 57 篇 sun qizhen
  • 55 篇 qizhen sun
  • 49 篇 hai jin
  • 44 篇 shuxiang guo
  • 40 篇 jin hai
  • 38 篇 yang yang
  • 37 篇 wang jian
  • 36 篇 liu yang
  • 35 篇 jian wang
  • 34 篇 zhang wenqiang
  • 34 篇 ming tang
  • 32 篇 wei li
  • 29 篇 wang lei
  • 29 篇 hao li
  • 27 篇 chen chen
  • 26 篇 bin wang
  • 24 篇 zhang lei
  • 22 篇 xiaoling wei
  • 22 篇 tiger h. tao
  • 22 篇 lin lanfen

语言

  • 12,689 篇 英文
  • 581 篇 其他
  • 406 篇 中文
  • 32 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 朝鲜文
检索条件"机构=Science and Technology in Information System Engineering Lab"
13718 条 记 录,以下是471-480 订阅
排序:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Psychological Counseling with Integration of Knowledge Graph and Multi-Agent Collaboration
收藏 引用
Journal of Shanghai Jiaotong University (science) 2025年 1-13页
作者: Liu, Xi Zheng, Xiaohu Cui, Weiwei College of Information Science and Technology Donghua University Shanghai201620 China Institute of artificial Intelligence Donghua University Shanghai201620 China Shanghai Engineering Center of Industrial Big Data and Intelligent System Shanghai201620 China Management College Wuzhou University Guangxi Wuzhou543003 China
Applying large language models (LLMs) to psychological counseling can reduce costs and lower barriers to access. However, issues inherent to LLMs, such as output hallucinations, knowledge lags, and response biases, li... 详细信息
来源: 评论
Augmented Genetic Algorithm for Decoupling Capacitor Optimization in Power Distribution Network Design Through Improved Population Generation
IEEE Transactions on Signal and Power Integrity
收藏 引用
IEEE Transactions on Signal and Power Integrity 2024年 3卷 186-198页
作者: Juang, Jack Zhang, Ling Manoharan, Haran De Paulis, Francesco Hwang, Chulsoon Missouri University of Science and Technology Electromagnetic Compatibility Lab RollaMO65401 United States Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China University of L'Aquila UAq Electromagnetic Compatibility Lab L'Aquila67100 Italy
In power distribution network designs, a large number of decoupling capacitors (decaps) may be needed to satisfy target impedance limits. Many algorithms have been proposed and implemented for finding the optimal deca... 详细信息
来源: 评论
Geographical information Visualization on a Panoramic Sphere in an Immersive Environment
收藏 引用
Journal of Ocean University of China 2023年 第4期22卷 961-974页
作者: MA Ying TIAN Fenglin LIU Wen TANG Moran LI Jinyu CHEN Ge Frontiers Science Center for Deep Ocean Multispheres and Earth System School of Marine TechnologyOcean University of ChinaQingdao 266100China Laboratory for Regional Oceanography and Numerical Modeling Laoshan LaboratoryQingdao 266100China Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China
In this paper,we propose a novel approach to visualizing global geographical information:a panoramic sphere in an immersive *** whole geographical surface can be observed through the rotating of heads as the viewpoint... 详细信息
来源: 评论
Optimized Evaluation of Mobile Base Station by Modern Topological Invariants
收藏 引用
Computers, Materials & Continua 2023年 第1期74卷 363-378页
作者: Khalid Hamid Muhammad Waseem Iqbal Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their *** directions will lead to fundamental changes in the design of future Fifthgeneration(5G)ce... 详细信息
来源: 评论
Automated heart disease prediction using improved explainable learning-based technique
收藏 引用
Neural Computing and Applications 2024年 第26期36卷 16289-16318页
作者: Bizimana, Pierre Claver Zhang, Zuping Hounye, Alphonse Houssou Asim, Muhammad Hammad, Mohamed El-Latif, Ahmed A. Abd School of Computer Science and Engineering Central South University Changsha410083 China School of Mathematics and Statistics Central South University Changsha410008 China EIAS Data Science Lab College of Computer and Information Sciences and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom Egypt Information Technology Department Faculty of Computers and Information Menoufia University Shebin El-Koom Egypt
Heart disease (HD) stands as a major global health challenge, being a predominant cause of death and demanding intricate and costly detection methods. The widespread impact of heart failure, contributing to increased ... 详细信息
来源: 评论
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection systems
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2695-2709页
作者: Reem Alkanhel Doaa Sami Khafaga El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science University of Engineering and TechnologyTaxilaPakistan Department of System Programming South Ural State UniversityChelyabinsk454080Russia
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw... 详细信息
来源: 评论
An end-to-end instance segmentation method based on improved ConvNeXt V2
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第4期26卷 384-392页
作者: Wang, Wenlu Sun, Ying Xu, Manman Bai, Dongxu Huang, Li Zou, Chunlong Chen, Baojia Tang, Dalai Key Laboratory of Metallurgical Equipment and Control Technology of Ministry of Education Wuhan University of Science and Technology Hubei Wuhan China Research Centre for Biomimetic Robot and Intelligent Measurement and Control Wuhan University of Science and Technology Hubei Wuhan China Hubei Key Laboratory of Mechanical Transmission and Manufacturing Engineering Wuhan University of Science and Technology Hubei Wuhan China College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Hubei Wuhan China College of Mechanical Engineering Hubei University of Automotive Technology Hubei Shiyan China Hubei Key Laboratory of Hydroelectric Machinery Design and Maintenance China Three Gorges University Hubei Yichang China School of Computer Information Management Inner Mongolia University of Finance and Economics Hohhot China
In order to improve the efficiency of indoor mobile robots in locating and segmenting environmental instances, an instance segmentation method based on RTMDet is proposed. Firstly, the more powerful ConvNeXt V2 is use... 详细信息
来源: 评论
Natural Sit-to-Stand Control of a Musculoskeletal Model with Deep Reinforcement Learning-Based Reward Shaping
Natural Sit-to-Stand Control of a Musculoskeletal Model with...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Dong, Borui Chen, Yaru Chen, Wenqian Wang, Yongxuan Wang, Xiaohong Liu, Rong Liaoning Key Lab of IC BME System School of Biomedical Engineering Dalian University of Technology Dalian China School of Information Engineering Dalian University Dalian China Department of Neuroelectrophysiology Central Hospital of Dalian University of Technology Dalian China
Understanding the neuromuscular control mechanisms underlying the human sit-to-stand (STS) movement, a fundamental daily activity, is crucial for enhancing the physical capabilities of older adults and advancing appli... 详细信息
来源: 评论
Efficient Modeling Attack on Multiplexer PUFs via Kronecker Matrix Multiplication
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年
作者: Wang, Hongfei Wan, Caixue Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
The Physical Unclonable Function (PUF) is valued for its lightweight nature and unique functionality, making it a common choice for securing hardware products requiring authentication and key generation mechanisms. In... 详细信息
来源: 评论