咨询与建议

限定检索结果

文献类型

  • 32,493 篇 期刊文献
  • 3,529 篇 会议
  • 1 册 图书

馆藏范围

  • 36,023 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30,130 篇 工学
    • 12,825 篇 计算机科学与技术...
    • 9,172 篇 材料科学与工程(可...
    • 8,558 篇 电气工程
    • 6,919 篇 机械工程
    • 6,175 篇 电子科学与技术(可...
    • 6,163 篇 信息与通信工程
    • 5,978 篇 控制科学与工程
    • 2,862 篇 仪器科学与技术
    • 2,381 篇 力学(可授工学、理...
    • 1,955 篇 动力工程及工程热...
    • 1,929 篇 网络空间安全
    • 1,782 篇 化学工程与技术
    • 1,770 篇 软件工程
    • 1,368 篇 生物医学工程(可授...
    • 1,141 篇 建筑学
    • 1,123 篇 冶金工程
    • 1,098 篇 环境科学与工程(可...
    • 1,062 篇 土木工程
    • 1,043 篇 光学工程
    • 1,023 篇 水利工程
  • 18,398 篇 理学
    • 6,988 篇 物理学
    • 5,490 篇 数学
    • 3,415 篇 化学
    • 2,367 篇 天文学
    • 2,187 篇 生物学
    • 1,508 篇 系统科学
    • 1,276 篇 地球物理学
  • 2,544 篇 医学
    • 2,014 篇 临床医学
  • 2,181 篇 管理学
    • 1,213 篇 图书情报与档案管...
  • 882 篇 经济学
  • 800 篇 农学
  • 633 篇 法学
  • 586 篇 教育学
  • 343 篇 文学
  • 165 篇 艺术学
  • 88 篇 军事学
  • 36 篇 历史学
  • 26 篇 哲学

主题

  • 629 篇 deep learning
  • 301 篇 machine learning
  • 225 篇 simulation
  • 198 篇 analysis
  • 182 篇 network
  • 159 篇 system
  • 128 篇 model
  • 124 篇 clustering
  • 124 篇 optimization
  • 120 篇 internet of thin...
  • 114 篇 of
  • 97 篇 polarization
  • 91 篇 data
  • 89 篇 reinforcement le...
  • 82 篇 blockchain
  • 82 篇 software
  • 79 篇 基础
  • 76 篇 algorithm
  • 75 篇 image
  • 72 篇 and

机构

  • 179 篇 ieee
  • 164 篇 university of ch...
  • 153 篇 school of inform...
  • 144 篇 school of inform...
  • 97 篇 school of electr...
  • 68 篇 college of infor...
  • 66 篇 school of comput...
  • 65 篇 school of electr...
  • 60 篇 school of electr...
  • 47 篇 school of inform...
  • 42 篇 school of automa...
  • 40 篇 school of comput...
  • 40 篇 school of electr...
  • 40 篇 school of inform...
  • 38 篇 school of electr...
  • 38 篇 school of electr...
  • 37 篇 school of inform...
  • 32 篇 school of electr...
  • 30 篇 beijing academy ...
  • 30 篇 school of electr...

作者

  • 68 篇 jun wang
  • 56 篇 jian wang
  • 54 篇 jing zhang
  • 48 篇 jun zhang
  • 47 篇 wei liu
  • 41 篇 chen chen
  • 40 篇 rui wang
  • 38 篇 li zhang
  • 34 篇 xin liu
  • 33 篇 ming li
  • 32 篇 qing wang
  • 32 篇 gang liu
  • 29 篇 mehedi masud
  • 27 篇 wang lei
  • 26 篇 wenxiang zhao
  • 25 篇 xiang li
  • 24 篇 cheng-wei qiu
  • 23 篇 wei he
  • 23 篇 weihua gui
  • 23 篇 wei wang

语言

  • 31,820 篇 英文
  • 4,203 篇 中文
检索条件"机构=School of Information and Software Engineering"
36023 条 记 录,以下是101-110 订阅
排序:
Robust zero-watermarking algorithm based on discrete wavelet transform and daisy descriptors for encrypted medical image
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 40-53页
作者: Yiyi Yuan Jingbing Li Jing Liu Uzair Aslam Bhatti Zilong Liu Yen-wei Chen school of information and Communication engineering Hainan UniversityHaikouChina Research Center for Healthcare Data Science Zhejiang LabHangzhouChina Graduate school of information Science and engineering Ritsumeikan University ShigaJapan
In the intricate network environment,the secure transmission of medical images faces challenges such as information leakage and malicious tampering,significantly impacting the accuracy of disease diagnoses by medical ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Approximate Synchronization of Multi-Agent Systems over Finite Fields
收藏 引用
Journal of Systems Science & Complexity 2024年 第4期37卷 1561-1580页
作者: YU Miao FENG Jun-e XIA Jianwei FU Shihua SHEN Hao school of Mathematical Sciences Liaocheng University school of Mathematics Shandong University school of Electrical and information engineering Anhui University of Technology
In this paper, the approximate synchronization of leader-follower multiagent systems(MASs) over finite fields is studied in regard to local and global synchronization. First, the approximately synchronous state set(AS... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A survey on intelligence-endogenous network:Architecture and technologies for future 6G
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 53-67页
作者: Lanlan Li the school of Communication and information engineering Shanghai Technical Institute of Electronics&InformationShanghai 201141China
With the maturity of 5G technology and global commercialization,scholars in institutions and industrial circles began to research 6G technology.An important innovation of 6G technology is to integrate artificial intel... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
UNIFORM SUPERCONVERGENCE ANALYSIS OF A TWO-GRID MIXED FINITE ELEMENT METHOD FOR THE TIME-DEPENDENT BI-WAVE PROBLEM MODELING D-WAVE SUPERCONDUCTORS
收藏 引用
Journal of Computational Mathematics 2024年 第2期42卷 415-431页
作者: Yanmi Wu Dongyang Shi PLA information engineering University Zhengzhou 450001China school of Mathematics and information Sciences Yantai UniversityYantai 264005China
In this paper,a two-grid mixed finite element method(MFEM)of implicit Backward Euler(BE)formula is presented for the fourth order time-dependent singularly perturbed Bi-wave problem for d-wave superconductors by the n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Fast Algorithm for Computing the Deficiency Number of a Mahjong Hand
收藏 引用
Chinese Journal of Electronics 2024年
作者: Xueqing YAN Yongming LI Sanjiang LI school of Computer Science Shaanxi Normal University school of Mathematics and Statistics Shaanxi Normal University Centre for Quantum software and information Faculty of Engineering and Information Technology University of Technology Sydney
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile...
来源: 同方期刊数据库 同方期刊数据库 评论
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
收藏 引用
China Communications 2024年 第6期21卷 163-175页
作者: Xia Enjun Hu Binjie Shen Qiaoqiao school of Electronic and information engineering South China University of TechnologyGuangzhou 510641China
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Track-before-detect for bistatic radar based on pseudo-spectrum
收藏 引用
Chinese Journal of Aeronautics 2024年 第1期37卷 236-246页
作者: Tao HAN Gongjian ZHOU school of Electronics and information engineering Harbin Institute of TechnologyHarbin 150001China Key Laboratory of Marine Environmental Monitoring and information Processing Ministry of Industry and Information TechnologyHarbin 150001China
Track-Before-Detect(TBD) is an efficient method to detect dim targets for radars. Conventional TBD usually follows an approximate motion model of the target, which may cause an inaccurate integration of the target ene... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Mutual information Maximization via Joint Power Allocation in Integrated Sensing and Communications System
收藏 引用
China Communications 2024年 第2期21卷 129-142页
作者: Jia Zhu Junsheng Mu Yuanhao Cui Xiaojun Jing school of information and Communication engineering Beijing University of Posts and TelecommunicationsBeijing 100876China
In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Actor-Critic-Based UAV-Assisted Data Collection in the Wireless Sensor Network
收藏 引用
China Communications 2024年 第4期21卷 163-177页
作者: Huang Xiaoge Wang Lingzhi He Yong Chen Qianbin school of Communications and information engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China
Wireless Sensor Network(WSN)is widely utilized in large-scale distributed unmanned detection scenarios due to its low cost and flexible installation.However,WSN data collection encounters challenges in scenarios lacki... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
Science China(information Sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA school of Cyber engineering Xidian University school of Computer Science and Technology Xidian University Department of Computer and information Science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论