咨询与建议

限定检索结果

文献类型

  • 5,606 篇 期刊文献
  • 347 篇 会议

馆藏范围

  • 5,953 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,389 篇 工学
    • 2,742 篇 计算机科学与技术...
    • 1,148 篇 控制科学与工程
    • 1,092 篇 材料科学与工程(可...
    • 1,052 篇 软件工程
    • 1,040 篇 电气工程
    • 980 篇 电子科学与技术(可...
    • 892 篇 信息与通信工程
    • 773 篇 机械工程
    • 441 篇 力学(可授工学、理...
    • 441 篇 生物医学工程(可授...
    • 391 篇 仪器科学与技术
    • 381 篇 网络空间安全
    • 178 篇 动力工程及工程热...
    • 173 篇 化学工程与技术
    • 137 篇 环境科学与工程(可...
  • 3,706 篇 理学
    • 2,283 篇 数学
    • 684 篇 生物学
    • 673 篇 物理学
    • 365 篇 天文学
    • 355 篇 统计学(可授理学、...
    • 322 篇 系统科学
    • 240 篇 化学
  • 995 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 181 篇 图书情报与档案管...
  • 803 篇 医学
    • 650 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 128 篇 公共卫生与预防医...
  • 305 篇 经济学
    • 299 篇 应用经济学
  • 224 篇 农学
    • 119 篇 作物学
  • 211 篇 教育学
    • 119 篇 教育学
  • 158 篇 法学
  • 98 篇 文学
  • 71 篇 艺术学
  • 62 篇 军事学
  • 7 篇 历史学
  • 6 篇 哲学

主题

  • 209 篇 deep learning
  • 104 篇 machine learning
  • 62 篇 covid-19
  • 48 篇 internet of thin...
  • 48 篇 artificial intel...
  • 46 篇 blockchain
  • 44 篇 network
  • 44 篇 convolutional ne...
  • 40 篇 model
  • 38 篇 optimization
  • 33 篇 analysis
  • 31 篇 clustering
  • 30 篇 method
  • 28 篇 image
  • 23 篇 transfer learnin...
  • 22 篇 genetic algorith...
  • 21 篇 support vector m...
  • 21 篇 convergence
  • 21 篇 privacy
  • 20 篇 computer

机构

  • 43 篇 ieee
  • 38 篇 college of compu...
  • 31 篇 department of co...
  • 29 篇 school of mathem...
  • 25 篇 college of compu...
  • 22 篇 university of ch...
  • 22 篇 college of mathe...
  • 19 篇 college of compu...
  • 18 篇 department of co...
  • 18 篇 college of compu...
  • 17 篇 school of comput...
  • 17 篇 college of infor...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 16 篇 school of mathem...
  • 15 篇 school of mathem...
  • 15 篇 riphah school of...
  • 15 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 college of mathe...

作者

  • 33 篇 muhammad adnan k...
  • 28 篇 mehedi masud
  • 24 篇 sagheer abbas
  • 18 篇 n.z.jhanjhi
  • 16 篇 ali raza
  • 14 篇 jian wang
  • 14 篇 weili zhang
  • 14 篇 jin wang
  • 14 篇 osama alfarraj
  • 13 篇 amr tolba
  • 12 篇 jun wang
  • 12 篇 wei liu
  • 12 篇 yunyoung nam
  • 12 篇 ali wagdy mohame...
  • 12 篇 quan xu
  • 12 篇 lei zhang
  • 12 篇 wei wang
  • 11 篇 li zhang
  • 11 篇 yu zhang
  • 11 篇 yi liu

语言

  • 5,856 篇 英文
  • 97 篇 中文
检索条件"机构=School of Computer Science and Statistics Trinity College"
5953 条 记 录,以下是1-10 订阅
排序:
Relaxed Inertial Method for Solving Split Monotone Variational Inclusion Problem with Multiple Output Sets Without Co-coerciveness and Lipschitz Continuity
收藏 引用
Acta Mathematica Sinica,English Series 2024年 第7期40卷 1697-1726页
作者: Timilehin Opeyemi Alakoya Oluwatosin Temitope Mewomo school of Mathematics Statistics and Computer ScienceUniversity of KwaZulu-NatalDurbanSouth Africa
In this paper,we study the concept of split monotone variational inclusion problem with multiple output *** propose a new relaxed inertial iterative method with self-adaptive step sizes for approximating the solution ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
What can we learn from quality assurance badges in open-source software?
收藏 引用
science China(Information sciences) 2024年 第4期67卷 146-163页
作者: Feng LI Yiling LOU Xin TAN Zhenpeng CHEN Jinhao DONG Yang LI Xuanzhi WANG Dan HAO Lu ZHANG MoE Key Lab of HCST School of Computer SciencePeking University Department of computer science Purdue University school of computer science & Engineering Beihang University(BUAA) Department of computer science University College London(UCL)
In the development of open-source software(OSS), many developers use badges to give an overview of the software and share some key features/metrics conveniently. Among various badges, quality assurance(QA) badges make... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
APF-GAN:Exploring asymmetric pre-training and fine-tuning strategy for conditional generative adversarial network
收藏 引用
Computational Visual Media 2024年 第1期10卷 187-192页
作者: Yuxuan Li Lingfeng Yang Xiang Li college of computer science Nankai UniversityTianjinChina school of computer science and Engineering Nanjing University of Science and TechnologyNanjingChina
The use of generative adversarial network(GAN)-based models for the conditional generation of image semantic segmentation has shown promising results in recent ***,there are still some limitations,including limited di... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Granger causal representation learning for groups of time series
收藏 引用
science China(Information sciences) 2024年 第5期67卷 56-68页
作者: Ruichu CAI Yunjin WU Xiaokai HUANG Wei CHEN Tom Z.J.FU Zhifeng HAO school of computer science Guangdong University of Technology Peng Cheng Laboratory college of science Shantou University
Discovering causality from multivariate time series is an important but challenging *** existing methods focus on estimating the Granger causal structures among multivariate time series,while ignoring the prior knowle... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
SwiftTheft: A Time-Efficient Model Extraction Attack Framework Against Cloud-Based Deep Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 90-100页
作者: Wenbin YANG Xueluan GONG Yanjiao CHEN Qian WANG Jianshuo DONG school of Cyber science and Engineering Wuhan University school of computer science Wuhan University college of Electrical Engineering Zhejiang University
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These propriet... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
MSADCN:Multi-Scale Attentional Densely Connected Network for Automated Bone Age Assessment
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2225-2243页
作者: Yanjun Yu Lei Yu Huiqi Wang Haodong Zheng Yi Deng college of computer and Information science Chongqing Normal UniversityChongqing401331China college of Mathematics and statistics Chongqing UniversityChongqing401331China
Bone age assessment(BAA)helps doctors determine how a child’s bones grow and develop in clinical *** BAA methods rely on clinician expertise,leading to time-consuming predictions and inaccurate *** deep learning-base... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
CONSERVATIVE CONFORMING AND NONCONFORMING VEMS FOR FOURTH ORDER NONLINEAR SCHRODINGER EQUATIONS WITH TRAPPED TERM
收藏 引用
Journal of Computational Mathematics 2024年 第2期42卷 454-499页
作者: Meng Li Jikun Zhao Zhongchi Wang Shaochun Chen school of Mathematics and statistics Zhengzhou UniversityZhengzhou 450001China school of computer science and Engineering Beihang universityBeijing 100083China
This paper aims to construct and analyze the conforming and nonconforming virtual element methods for a class of fourth order nonlinear Schrodinger equations with trapped *** mainly consider three types of virtual ele... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG college of Information science and Engineering Hunan Normal University school of computer science Shaanxi Normal University Faculty of computer science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences computer science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
BSTFNet:An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3929-3951页
作者: Hong Huang Xingxing Zhang Ye Lu Ze Li Shaohua Zhou school of computer science and Engineering Sichuan University of Science&EngineeringYibin644002China school of Mathematics and statistics Sichuan University of Science&EngineeringYibin644002China
While encryption technology safeguards the security of network communications,malicious traffic also uses encryption protocols to obscure its malicious *** address the issues of traditional machine learning methods re... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System
收藏 引用
computer Modeling in Engineering & sciences 2024年 第6期139卷 3287-3310页
作者: Yanzhong Sun Xiaoni Du Shufen Niu Xiaodong Yang college of Mathematics and statistics Northwest Normal UniversityLanzhou730070China college of computer science and Engineering Northwest Normal UniversityLanzhou730070China
Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email *** this paper,we propose a blockchain-based certificateless bidirectional au... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论