咨询与建议

限定检索结果

文献类型

  • 7,420 篇 会议
  • 6,286 篇 期刊文献
  • 49 册 图书

馆藏范围

  • 13,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,126 篇 工学
    • 4,665 篇 计算机科学与技术...
    • 3,750 篇 软件工程
    • 2,003 篇 信息与通信工程
    • 1,658 篇 电子科学与技术(可...
    • 1,357 篇 控制科学与工程
    • 1,305 篇 电气工程
    • 963 篇 光学工程
    • 886 篇 生物工程
    • 862 篇 机械工程
    • 798 篇 化学工程与技术
    • 740 篇 仪器科学与技术
    • 704 篇 材料科学与工程(可...
    • 629 篇 生物医学工程(可授...
    • 497 篇 动力工程及工程热...
    • 298 篇 交通运输工程
    • 273 篇 力学(可授工学、理...
    • 270 篇 土木工程
    • 249 篇 建筑学
  • 5,332 篇 理学
    • 2,198 篇 数学
    • 2,067 篇 物理学
    • 992 篇 生物学
    • 789 篇 化学
    • 699 篇 统计学(可授理学、...
    • 484 篇 系统科学
  • 1,919 篇 管理学
    • 1,224 篇 管理科学与工程(可...
    • 736 篇 图书情报与档案管...
    • 451 篇 工商管理
  • 586 篇 医学
    • 483 篇 临床医学
    • 397 篇 基础医学(可授医学...
    • 273 篇 药学(可授医学、理...
  • 286 篇 法学
  • 194 篇 经济学
  • 169 篇 农学
  • 91 篇 教育学
  • 62 篇 军事学
  • 30 篇 文学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 217 篇 deep learning
  • 184 篇 feature extracti...
  • 149 篇 computational mo...
  • 143 篇 optimization
  • 141 篇 machine learning
  • 125 篇 semantics
  • 117 篇 data mining
  • 100 篇 neural networks
  • 95 篇 simulation
  • 91 篇 object detection
  • 91 篇 predictive model...
  • 88 篇 visualization
  • 87 篇 support vector m...
  • 87 篇 bandwidth
  • 87 篇 convolution
  • 83 篇 image segmentati...
  • 83 篇 accuracy
  • 82 篇 wireless communi...
  • 82 篇 training
  • 80 篇 wireless sensor ...

机构

  • 101 篇 national enginee...
  • 78 篇 center of materi...
  • 72 篇 school of optica...
  • 62 篇 university of ch...
  • 54 篇 college of infor...
  • 44 篇 school of comput...
  • 43 篇 faculty of infor...
  • 43 篇 school of inform...
  • 41 篇 university of sc...
  • 41 篇 school of gradua...
  • 39 篇 school of comput...
  • 38 篇 huazhong univers...
  • 38 篇 school of inform...
  • 38 篇 shanghai key lab...
  • 38 篇 school of inform...
  • 37 篇 state key lab of...
  • 37 篇 tianqiao and chr...
  • 37 篇 school of electr...
  • 37 篇 college of infor...
  • 36 篇 school of inform...

作者

  • 57 篇 sun qizhen
  • 55 篇 qizhen sun
  • 49 篇 hai jin
  • 47 篇 shuxiang guo
  • 40 篇 jin hai
  • 39 篇 yang yang
  • 37 篇 wang jian
  • 35 篇 jian wang
  • 35 篇 liu yang
  • 35 篇 ming tang
  • 34 篇 zhang wenqiang
  • 32 篇 wei li
  • 31 篇 wang lei
  • 30 篇 hao li
  • 27 篇 chen chen
  • 26 篇 bin wang
  • 23 篇 zhang lei
  • 22 篇 xiaoling wei
  • 22 篇 li li
  • 22 篇 tiger h. tao

语言

  • 12,007 篇 英文
  • 1,281 篇 其他
  • 438 篇 中文
  • 32 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Science and Technology in Information System Engineering Lab"
13755 条 记 录,以下是711-720 订阅
排序:
Intelligent wearable vision systems for the visually impaired in Saudi Arabia
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8571-8591页
作者: Talaat, Fatma M. El-Shafai, Walid Soliman, Naglaa F. Algarni, Abeer D. El-Samie, Fathi E. Abd Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Faculty of Computer Science and Engineering New Mansoura University Gamasa35712 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Navigating the world with visual impairments presents unique challenges, often limiting independence and safety. This research introduces SafeStride, a novel algorithm designed to empower visually impaired individuals... 详细信息
来源: 评论
Image Reconstruction on Electromagnetic Simulation by Using a Recurrent Neural Network
Image Reconstruction on Electromagnetic Simulation by Using ...
收藏 引用
Pacific Rim Conference on Lasers and Electro-Optics (CLEO/Pacific Rim)
作者: Hiroshi Fukuda Department of Information System Engineering Chitose Institute of Science and Technology Chitose Hokkaido Japan
This study demonstrates that images can be inferred using a recurrent neural network trained on a large number of electromagnetic field images as time-series data and that the simulation results can be repeatedly and ... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Performance Realization for Gas Turbine system: Adaptive Constraint Regulation Framework  6
Performance Realization for Gas Turbine System: Adaptive Con...
收藏 引用
6th International Conference on Electronic engineering and Informatics, EEI 2024
作者: Du, Peihao Zhong, Weimin Li, Hongyi Li, Linlin Peng, Xin He, Kaixun School of Electronic and Information Engineering Chongqing Key Laboratory of Generic Technology and System of Service Robots Southwest University Chongqing400715 China School of Automation and Electrical Engineering University of Science and Technology Beijing Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education Beijing100083 China East China University of Science and Technology Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education Shanghai200237 China Engineering Research Center of Process System Engineering Ministry of Education East China University of Science and Technology Shanghai200237 China College of Electrical Engineering and Automation Shandong University of Science and Technology Qingdao266590 China
With the excessive consumption of fossil energy and the growing environmental pollution caused by its combustion, the gas turbine system (GTS) plays a key role in distributed renewable energy fields due to its versati... 详细信息
来源: 评论
Evaluating the A3RSRP Handover to Determine Optimal Performance in HetNet using Stochastic Petri Net  6
Evaluating the A3RSRP Handover to Determine Optimal Performa...
收藏 引用
6th International Conference on system Reliability and Safety engineering, SRSE 2024
作者: Zhu, Zhiyi Zheng, Junjun Takimoto, Eiji Finnerty, Patrick Ohta, Chikara Kobe University Graduate School of System Informatics Kobe Japan Hiroshima University Graduate School of Advanced Science and Engineering Hiroshima Japan Nara Women's University Information Technology Center Nara Japan
Handover is necessary for improving user equipment (UE) communication quality among different cells in mobile communication networks. However, the handover decision algorithm (HDA) parameters are often difficult to ch... 详细信息
来源: 评论
A Software-Defined Reconfigurable Battery system Prototype  29
A Software-Defined Reconfigurable Battery System Prototype
收藏 引用
29th IEEE Asia Pacific Conference on Communications, APCC 2024
作者: Jin, Siyu Liu, Baochang Zhou, Yanglin Liang, Junrui Ci, Song Tsinghua University Department of Electrical Engineering Beijing China ShanghaiTech University School of Information Science and Technology Shanghai China Tsinghua University State Key Laboratory of Power System Operation and Control Beijing China
In the energy internet era, distributed energy storage systems will be widely used in various industrial, commercial, and residential scenarios. However, the modeling of energy flow and the digital flow of information... 详细信息
来源: 评论
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs: Precision in Vulnerability Detection: Advanced Slicing Techniques for Binary Program Analysis  7
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability ...
收藏 引用
7th International Conference on Computer science and Artificial Intelligence, CSAI 2023
作者: Chukkol, Abdulrahman Hamman Adama Luo, Senlin Yunusa, Haruna Yusuf, Abdulganiyu Abdu Mohammed, Abulfatahi School of Information and Electronics Beijing Institute of Technology Beijing China Information System and Security and Countermeasures Experimental Center Beijing Institute of Technology Beijing China School of Automation Science and Electrical Engineering Beihang University Beijing China School of Computer Science Beijing Institute of Technology Beijing China School of Management and Information Technology Modibbo Adama University Yola Nigeria
Identifying vulnerabilities in binary code with precision is a critical area of study in the field of software security. Most existing techniques fail to pinpoint the vulnerability's exact location, due to the ext... 详细信息
来源: 评论
Mean-Square Exponential Consensus of Nonlinear Multi-Agent systems via Distributed Random Impulsive Control  49
Mean-Square Exponential Consensus of Nonlinear Multi-Agent S...
收藏 引用
49th Annual Conference of the IEEE Industrial Electronics Society, IECON 2023
作者: Yu, Yi He, Wangli Yang, Yanping East China University of Science and Technology Key Laboratory of Smart Manufacturing in Energy Chemical Processes Ministry of Education Shanghai China Engineering Research Center of Process System Engineering Ministry of Education East China University of Science and Technology Shanghai China College of Information Science and Technology and Engineering Research Center of Digitized Donghua University Shanghai China
This paper aims to study mean-square exponential consensus of nonlinear leader-following multi-agent systems (MASs) in the presence of noise via distributed random impulsive control. The noise is driven by a second-or... 详细信息
来源: 评论
Synergizing the low-phase noise characteristics of a dielectric resonator oscillator and a bichromatic Brillouin laser oscillator
收藏 引用
Optics Letters 2025年 第3期50卷 988-991页
作者: Hu, Jiahao Xue, Siyi Xiao, Yanlan Wu, Chenlin Wen, Huashun Zhou, Heng Key Lab of Optical Fiber Sensing and Communication Networks School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China Chengdu Simon Electronic Technology Co. Ltd Chengdu China Institute of Intelligent Photonics Nankai University Tianjin300071 China
We introduce a method that synergistically combines the distinct phase noise profiles of a dielectric resonator oscillator (DRO) and bichromatic Brillouin laser oscillator (BBLO), for high spectral purity microwave ge... 详细信息
来源: 评论