咨询与建议

限定检索结果

文献类型

  • 426 篇 期刊文献
  • 410 篇 会议

馆藏范围

  • 836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 515 篇 工学
    • 391 篇 计算机科学与技术...
    • 305 篇 软件工程
    • 103 篇 信息与通信工程
    • 82 篇 电气工程
    • 77 篇 生物工程
    • 66 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 36 篇 交通运输工程
    • 31 篇 机械工程
    • 29 篇 生物医学工程(可授...
    • 25 篇 光学工程
    • 24 篇 化学工程与技术
    • 22 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 13 篇 材料科学与工程(可...
  • 269 篇 理学
    • 137 篇 数学
    • 88 篇 生物学
    • 44 篇 物理学
    • 41 篇 统计学(可授理学、...
    • 28 篇 化学
    • 17 篇 系统科学
  • 148 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 34 篇 医学
    • 26 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
  • 20 篇 法学
    • 14 篇 社会学
  • 9 篇 经济学
  • 6 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 26 篇 training
  • 25 篇 computational mo...
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 18 篇 accuracy
  • 15 篇 data models
  • 14 篇 task analysis
  • 14 篇 memory managemen...
  • 14 篇 contrastive lear...
  • 14 篇 predictive model...
  • 14 篇 machine learning
  • 13 篇 costs
  • 13 篇 codes
  • 12 篇 graph neural net...
  • 11 篇 scalability
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...
  • 11 篇 convolution
  • 11 篇 optimization

机构

  • 132 篇 national enginee...
  • 102 篇 national enginee...
  • 75 篇 college of compu...
  • 61 篇 school of comput...
  • 51 篇 school of cyber ...
  • 37 篇 national enginee...
  • 31 篇 hubei engineerin...
  • 29 篇 huazhong univers...
  • 29 篇 services computi...
  • 28 篇 shenzhen univers...
  • 27 篇 cluster and grid...
  • 26 篇 hubei key labora...
  • 20 篇 national enginee...
  • 19 篇 zhejiang lab
  • 18 篇 school of comput...
  • 18 篇 shenzhen institu...
  • 18 篇 school of softwa...
  • 15 篇 guangdong provin...
  • 15 篇 school of inform...
  • 13 篇 huazhong univers...

作者

  • 130 篇 jin hai
  • 129 篇 hai jin
  • 43 篇 xiaofei liao
  • 39 篇 shen linlin
  • 28 篇 liao xiaofei
  • 25 篇 li jianqiang
  • 24 篇 long zheng
  • 23 篇 hu shengshan
  • 21 篇 haikun liu
  • 17 篇 yu zhang
  • 17 篇 linlin shen
  • 16 篇 zou deqing
  • 16 篇 zhang leo yu
  • 16 篇 yu huang
  • 15 篇 li tianrui
  • 15 篇 deqing zou
  • 15 篇 jianqiang li
  • 13 篇 jiang xiao
  • 13 篇 li minghui
  • 12 篇 zhou ziqi

语言

  • 757 篇 英文
  • 69 篇 其他
  • 13 篇 中文
检索条件"机构=The National Engineering Laboratory for Big Data System Computing Technology"
836 条 记 录,以下是331-340 订阅
排序:
Defect Screening on Nuclear Power Plant Concrete Structures: A Two-staged Method Based on Contrastive Representation Learning
Defect Screening on Nuclear Power Plant Concrete Structures:...
收藏 引用
International Conference on Advanced Robotics and Mechatronics (ICARM)
作者: Wenlian Huang Guanming Zhu Qiang Huang Zhuangzhuang Chen Jie Chen Jianqiang Li College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Intelligent defect detection methods are important for the surface of the containment of nuclear power plants and face many challenges in the field of computer vision. Due to the irregular shapes and large variation o...
来源: 评论
Intelligent Blocking and Prevention of SARS-CoV-2 Based on Evolutionary Reinforcement Learning
Intelligent Blocking and Prevention of SARS-CoV-2 Based on E...
收藏 引用
Congress on Evolutionary Computation
作者: Chengwei He Huaping Hong Lijia Ma Qingling Zhu Yuan Bai College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
In recent years, the global repercussions of SARS-CoV-2 and its variants have posed significant challenges to various areas, including the economic order, transportation, healthcare, and education, and the mitigation ... 详细信息
来源: 评论
VCformer: Variable Correlation Transformer with Inherent Lagged Correlation for Multivariate Time Series Forecasting
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yingnan Zhu, Qingling Chen, Jianyong College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Multivariate time series (MTS) forecasting has been extensively applied across diverse domains, such as weather prediction and energy consumption. However, current studies still rely on the vanilla point-wise self-att... 详细信息
来源: 评论
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning
Challenges and Approaches for Mitigating Byzantine Attacks i...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Junyu Shi Wei Wan Shengshan Hu Jianrong Lu Leo Yu Zhang School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Information Technology Deakin University
Recently emerged federated learning (FL) is an attractive distributed learning framework in which numerous wireless end-user devices can train a global model with the data remained autochthonous. Compared with the tra... 详细信息
来源: 评论
PAIR: protein-aptamer interaction prediction based on language models and contrastive learning framework
PAIR: protein-aptamer interaction prediction based on langua...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jun Zhang Zhiqiang Yan Hao Zeng Zexuan Zhu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Aptamers are single-stranded DNA or RNA oligonucleotides that selectively bind to specific targets, making them valuable for drug design and diagnostic applications. Identifying the interactions between aptamers and t... 详细信息
来源: 评论
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1029-1057页
作者: Vincent Omollo Nyangaresi Arkan A.Ghaib Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo40601Kenya Department of Applied Electronics Saveetha School of EngineeringSIMATSChennaiTamilnadu602105India Information Technology Department Management Technical CollegeSouthern Technical UniversityBasrah61004Iraq Department of Computer Science College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China Huazhong University of Science and Technology Shenzhen InstituteShenzhen518000China National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityShenzhen518060China Computer Technology Engineering Department Iraq University CollegeBasrah61004Iraq Department of Mathematics College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq Institute of Mathematics University of DebrecenDebrecenH-4002Hungary Department of Electrical Engineering and Mechatronics Faculty of EngineeringUniversity of DebrecenDebrecen4028Hungary
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c... 详细信息
来源: 评论
A zero-shot based fingerprint presentation attack detection system
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Haozhe Zhang, Wentian Liu, Guojie Liu, Feng National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of IntelligentInformation Processing College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
With the development of presentation attacks, Automated Fingerprint Recognition systems(AFRSs) are vulnerable to presentation attack. Thus, numerous methods of presentation attack detection(PAD) have been proposed to ... 详细信息
来源: 评论
Targeted Pareto Optimization for Subset Selection With Monotone Objective Function and Cardinality Constraint
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Shang, Ke Wu, Guotong Pang, Lie Meng Ishibuchi, Hisao National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Shenzhen China
Subset selection, a fundamental problem in various domains, is to choose a subset of elements from a large candidate set under a given objective or multiple objectives. Pareto optimization for subset selection (POSS) ... 详细信息
来源: 评论
A method for accelerating relations search over big data scenario  22
A method for accelerating relations search over big data sce...
收藏 引用
Proceedings of the 2022 5th International Conference on Algorithms, computing and Artificial Intelligence
作者: Lihua Liu Mao Wang Kaiming Xiao Haiwen Chen College of System Engineering National University of Defense Technology China and Laboratory for Big Data and Decision National University of Defense Technology China
We propose an acceleration method for relations search over big data scenario. The relations search is in essence an induced subgraph search of graph data model, which is to search all edges with all adjacent vertices... 详细信息
来源: 评论
Investigation of Traffic Radar Coverage Efficiency under Different Placement Strategies
Investigation of Traffic Radar Coverage Efficiency under Dif...
收藏 引用
International Conference on Internet of Things 2024, ICIoT 2024
作者: Yao, Shun Zhou, Jin Chieng, David Kwong, Chiew Foong Lee, Boon Giin Li, Jianqiang Chen, Yusen Next-Generation Internet of Everything Laboratory Department of Electrical and Electronic Engineering University of Nottingham Ningbo China Ningbo China School of Computer Science University of Nottingham Ningbo China Ningbo China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Zhejiang Communication Investment Group Co. Ltd. Zhejiang China
This paper presents a comprehensive investigation of traffic radar coverage efficiency under different placement strategies in collaboration with Zhejiang Communications Investment Group Company Limited (CICO). The ov... 详细信息
来源: 评论