咨询与建议

限定检索结果

文献类型

  • 4,472 篇 会议
  • 2,971 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,510 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,762 篇 工学
    • 3,667 篇 计算机科学与技术...
    • 3,018 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 598 篇 控制科学与工程
    • 581 篇 生物工程
    • 510 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 342 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 199 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,257 篇 理学
    • 1,322 篇 数学
    • 635 篇 生物学
    • 432 篇 物理学
    • 412 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,460 篇 管理学
    • 862 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 359 篇 医学
    • 302 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 208 篇 法学
    • 162 篇 社会学
  • 131 篇 经济学
  • 100 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 210 篇 training
  • 205 篇 deep learning
  • 202 篇 feature extracti...
  • 178 篇 computational mo...
  • 161 篇 semantics
  • 161 篇 machine learning
  • 154 篇 educational inst...
  • 148 篇 accuracy
  • 141 篇 computer science
  • 122 篇 software enginee...
  • 121 篇 optimization
  • 121 篇 predictive model...
  • 120 篇 data models
  • 105 篇 cloud computing
  • 103 篇 data mining
  • 101 篇 internet of thin...
  • 91 篇 security
  • 83 篇 neural networks
  • 83 篇 clustering algor...
  • 83 篇 artificial intel...

机构

  • 1,215 篇 college of compu...
  • 156 篇 college of compu...
  • 132 篇 shenzhen univers...
  • 114 篇 college of compu...
  • 106 篇 college of compu...
  • 102 篇 college of compu...
  • 95 篇 college of compu...
  • 94 篇 software college...
  • 91 篇 state key labora...
  • 82 篇 school of softwa...
  • 71 篇 school of comput...
  • 66 篇 national enginee...
  • 59 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 56 篇 college of softw...
  • 52 篇 school of inform...
  • 48 篇 college of softw...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 36 篇 he jingsha
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 33 篇 wang xingwei
  • 32 篇 zhen ji
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 25 篇 wu kaishun
  • 24 篇 yan li

语言

  • 7,070 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7510 条 记 录,以下是4931-4940 订阅
排序:
Nonlinear Prediction with Deep Recurrent Neural Networks for Non-Blind Audio Bandwidth Extension
收藏 引用
China Communications 2018年 第4期15卷 72-85页
作者: Lin Jiang Ruimin Hu Xiaochen Wang Weiping Tu Maosheng Zhang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan 430072 China Institute of Big Data and internet Innovation Hunan University of Commerce Changsha 410205 China Software College East China University of Technology Nanchang 330013 China Collaborative Innovation Center for Economics crime investigation and prevention technology Jiangxi Province Nanchang 330103China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan 430072 China Collaborative Innovation Center of Geospatial Technology Wuhan 430079 China
Non-blind audio bandwidth extension is a standard technique within contemporary audio codecs to efficiently code audio signals at low bitrates. In existing methods, in most cases high frequencies signal is usually gen... 详细信息
来源: 评论
Robust visual tracking via combinative deep learning
Robust visual tracking via combinative deep learning
收藏 引用
International Conference on Mechanical, Electric and Industrial engineering, MEIE 2018
作者: Wen, Jia Zhao, Jiwei Liu, Pengfei Wang, Hongjun Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China Information Science and Engineering College Yanshan University Qinhuangdao China State Key Laboratory of Software Engineering of Hebei Province Yanshan University Qinhuangdao China
Object tracking is a hot topic in computer vision. In recent years, a large number of trackers has been proposed, in which the deep learning tracker has achieved excellent performance. The real-time capability of the ... 详细信息
来源: 评论
A voxel-based filtering algorithm for mobile LiDAR data
A voxel-based filtering algorithm for mobile LiDAR data
收藏 引用
2018 ISPRS TC III Mid-Term Symposium on Developments, Technologies and Applications in Remote Sensing
作者: Qin, Hejuan Guan, Haiyan Yu, Yongtao Zhong, Liang College of Remote Sensing and Geometics Engineering Nanjing University of Information Science and Technology Nanjing210044 China Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huaian223003 China Changjiang Spatial Information Technology Engineering Co. Ltd. Wuhan410010 China
This paper presents a stepwise voxel-based filtering algorithm for mobile LiDAR data. In the first step, to improve computational efficiency, mobile LiDAR points, in xy-plane, are first partitioned into a set of two-d... 详细信息
来源: 评论
DS-GCNs: Connectome Classification Using Dynamic Spectral Graph Convolution Networks with Assistant Task Training
arXiv
收藏 引用
arXiv 2019年
作者: Xing, Xiaodan Li, Qingfeng Wei, Hao Zhang, Minqing Zhan, Yiqiang Zhou, Xiang Sean Xue, Zhong Shi, Feng United Imaging Intelligence Shanghai China Shanghai Advanced Research Institute Shanghai China School of Biomedical Engineering Southern Medical University Guangdong China School of Computer Science and Engineering Central South University Hunan China College of Software Engineering Southeast University Jiangsu China Shanghai Advanced Research Institute Shanghai China
Functional Connectivity (FC) matrices measure the regional interactions in the brain and have been widely used in neurological brain disease classification. However, a FC matrix is neither a natural image which contai... 详细信息
来源: 评论
Best bone of acetabulum for cup component placement in Crowe types Ⅰto Ⅲ dysplastic hips:a computer simulation study
收藏 引用
Chinese Medical Journal 2019年 第23期132卷 2820-2826页
作者: Lin-Li Zheng Yang-Yang Lin Xiao-Yan Zhang Qian-Hui Ling Wei-Ming Liao Pei-Hui Wu Department of Joint Surgery the First Affiliated HospitalSun Yat-sen UniversityGuangzhouGuangdong 510080China Department of Rehabilitation Medicine the Sixth Affiliated HospitalSun Yat-sen UniversityGuangzhouGuangdong 510655China College of Computer Science&Software Engineering Shenzhen UniversityShenzhenGuangdong 518060China Zhongshan Medical School Sun Yat-sen UniversityGuangzhouGuangdong 510080China
Background:During cup implantation,vertical height of the cup center(V-HCC)should be precisely controlled to achieve sufficient bone-cup coverage(BCC).Our study aimed to investigate the acetabular bone stock and the q... 详细信息
来源: 评论
An Emergency Scenario Reconstruction System Based on ESMM Event Situation Model
收藏 引用
Wuhan University Journal of Natural sciences 2017年 第6期22卷 482-488页
作者: LI Shuoming CHEN Lei LIU Yu CHEN Shihong National Engineering Research Center for Multimedia Software/School of Computer Wuhan University College of Computer Science and Technology Wuhan University of Science and Technology
In order to keep decision-makers better informed with emergencies, it is useful to retrieve the user-oriented disaster relevant event information in an aggregated results list through meta-search engine. However, emer... 详细信息
来源: 评论
MPMPA: A Mitigation and Prevention Model for Social engineering Based Phishing attacks on Facebook
MPMPA: A Mitigation and Prevention Model for Social Engineer...
收藏 引用
2018 IEEE International Conference on Big Data, Big Data 2018
作者: Jamil, Abid Asif, Kashif Ghulam, Zikra Nazir, Muhammad Kashif Mudassar Alam, Syed Ashraf, Rehan Department of Computer Science FAST - NUCES Chinnot Faisalabad Campus Pakistan Department of Software Engineering Foundation University Islamabad Pakistan Institute of Avionics and Aeronautics Air University Islamabad Pakistan Riphah College of Computing Riphah International University Faisalabad Pakistan Department of Computer Science National Textile University Faisalabad Pakistan
The exponential increase in usage of the Internet can be seen in the present era. The use of social media and cyber-physical systems is rapidly increasing. Social Media platforms like Facebook have become an indispens... 详细信息
来源: 评论
SD-Unet: A Structured Dropout U-Net for Retinal Vessel Segmentation
SD-Unet: A Structured Dropout U-Net for Retinal Vessel Segme...
收藏 引用
IEEE Symposium on Bioinformatics and Bioengineering (BIBE)
作者: Changlu Guo Márton Szemenyei Yang Pei Yugen Yi Wei Zhou Department of Control Engineering and Information Technology Budapest University of Technology and Economics Budapest Hungary Budapest University of Technology and Economics Budapest Hungary School of Software Jiangxi Normal University Nanchang China College of Computer Science Shenyang Aerospace University Shenyang China
At present, artificial visual diagnosis of fundus diseases has low manual reading efficiency and strong subjectivity, which easily causes false and missed detections. Automatic segmentation of retinal blood vessels in... 详细信息
来源: 评论
False Trajectory Privacy Protection Scheme Based on Location Service
收藏 引用
IOP Conference Series: Materials science and engineering 2020年 第7期768卷
作者: Chen Yang Wei Yan School of Software Dalian University of Foreign Languages Dalian China School of Computer Science and Technology Harbin Engineering University Harbin China Department of Information Liaoning Police College Dalian China School of Software Dalian University of Technology Dalian China
When the user applies for a location continuous query service, the user location privacy may be revealed due to different types of trajectory identification. A false trajectory privacy protection scheme is proposed, w...
来源: 评论
An efficient quantum blind digital signature scheme
收藏 引用
science China(Information sciences) 2017年 第8期60卷 226-239页
作者: Hong LAI Mingxing LUO Josef PIEPRZYK Zhiguo QU Shudong LI Mehmet A.ORGUN College of Computer and Information Science Southwest University Information Security and National Computing Grid Laboratory School of Information Science and TechnologySouthwest Jiaotong University School of Electrical Engineering and Computer Science Queensland University of Technology Institute of Computer Science Polish Academy of Sciences School of Computer and Software Nanjing University of Information Science and Technology College of Mathematics and Information Science Shandong Technology and Business University School of Computer Science National University of Defense Technology Department of Computing Macquarie University Faculty of Information Technology Macau University of Science and Technology
Recently, many quantum digital signature(QDS) schemes have been proposed to authenticate the integration of a message. However, these quantum signature schemes just consider the situation for bit messages,and the sign... 详细信息
来源: 评论