咨询与建议

限定检索结果

文献类型

  • 32,450 篇 期刊文献
  • 3,528 篇 会议
  • 4 册 图书

馆藏范围

  • 35,982 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29,973 篇 工学
    • 12,842 篇 计算机科学与技术...
    • 9,090 篇 材料科学与工程(可...
    • 8,477 篇 电气工程
    • 6,903 篇 机械工程
    • 6,165 篇 电子科学与技术(可...
    • 6,160 篇 信息与通信工程
    • 5,942 篇 控制科学与工程
    • 2,854 篇 仪器科学与技术
    • 2,376 篇 力学(可授工学、理...
    • 1,958 篇 动力工程及工程热...
    • 1,917 篇 网络空间安全
    • 1,768 篇 化学工程与技术
    • 1,765 篇 软件工程
    • 1,380 篇 生物医学工程(可授...
    • 1,143 篇 建筑学
    • 1,121 篇 冶金工程
    • 1,094 篇 环境科学与工程(可...
    • 1,059 篇 土木工程
    • 1,035 篇 光学工程
    • 1,024 篇 水利工程
  • 18,463 篇 理学
    • 6,976 篇 物理学
    • 5,556 篇 数学
    • 3,441 篇 化学
    • 2,366 篇 天文学
    • 2,236 篇 生物学
    • 1,527 篇 系统科学
    • 1,271 篇 地球物理学
  • 2,649 篇 医学
    • 2,133 篇 临床医学
  • 2,171 篇 管理学
    • 1,219 篇 图书情报与档案管...
  • 882 篇 经济学
  • 807 篇 农学
  • 643 篇 法学
  • 599 篇 教育学
  • 344 篇 文学
  • 166 篇 艺术学
  • 87 篇 军事学
  • 37 篇 历史学
  • 25 篇 哲学

主题

  • 617 篇 deep learning
  • 283 篇 machine learning
  • 232 篇 simulation
  • 213 篇 analysis
  • 188 篇 network
  • 185 篇 system
  • 149 篇 model
  • 130 篇 optimization
  • 128 篇 clustering
  • 118 篇 internet of thin...
  • 114 篇 of
  • 97 篇 software
  • 96 篇 polarization
  • 89 篇 reinforcement le...
  • 86 篇 algorithm
  • 85 篇 data
  • 79 篇 基础
  • 76 篇 reliability
  • 74 篇 image
  • 74 篇 stability

机构

  • 177 篇 ieee
  • 161 篇 university of ch...
  • 146 篇 school of inform...
  • 142 篇 school of inform...
  • 94 篇 school of electr...
  • 67 篇 college of infor...
  • 66 篇 school of comput...
  • 64 篇 school of electr...
  • 59 篇 school of electr...
  • 50 篇 school of inform...
  • 43 篇 school of inform...
  • 42 篇 school of automa...
  • 40 篇 school of comput...
  • 38 篇 school of electr...
  • 38 篇 school of electr...
  • 38 篇 school of electr...
  • 37 篇 school of inform...
  • 35 篇 school of electr...
  • 30 篇 beijing academy ...
  • 30 篇 school of electr...

作者

  • 67 篇 jun wang
  • 54 篇 jian wang
  • 54 篇 jing zhang
  • 49 篇 jun zhang
  • 46 篇 wei liu
  • 41 篇 rui wang
  • 37 篇 chen chen
  • 36 篇 li zhang
  • 34 篇 xin liu
  • 34 篇 ming li
  • 32 篇 qing wang
  • 30 篇 gang liu
  • 29 篇 mehedi masud
  • 27 篇 wang lei
  • 27 篇 wei li
  • 26 篇 wenxiang zhao
  • 25 篇 wei wang
  • 24 篇 cheng-wei qiu
  • 23 篇 wei he
  • 23 篇 weihua gui

语言

  • 31,351 篇 英文
  • 4,631 篇 中文
检索条件"机构=School of Information and Software Engineering"
35982 条 记 录,以下是11-20 订阅
排序:
Automatic Construction of Floor Plan with Smartphone Sensors
收藏 引用
Journal of Electronic Science and Technology 2019年 第1期17卷 13-25页
作者: Rui Zhou Xiang Lu Hao-Sen Zhao Yang Fu Ming-Jie Tang the School of Information and Software Engineering University of Electronic Science and Technology of China
Indoor floor plans are of vital importance for a wide range of indoor social applications, however, they are often unavailable due to various reasons. This paper proposes a method to automatically construct the indoor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Query Acceleration of Graph Databases by ID Caching Technology
收藏 引用
Journal of Electronic Science and Technology 2019年 第1期17卷 41-50页
作者: Wei Jiang Hai-Bo Hu Liu-Gen Xu the School of Information and Software Engineering University of Electronic Science and Technology of China
In this paper, we approach the design of ID caching technology(IDCT) for graph databases, with the purpose of accelerating the queries on graph database data and avoiding redundant graph database query operations whic... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel Robust Online Extreme Learning Machine for the Non-Gaussian Noise
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 130-139页
作者: GU Jun ZOU Quanyi DENG Changhui WANG Xiaojun College of information engineering Dalian Ocean University school of software engineering South China University of Technology school of Management Science and engineering Dongbei University of Finance and Economics
Samples collected from most industrial processes have two challenges: one is contaminated by the non-Gaussian noise, and the other is gradually obsolesced.This feature can obviously reduce the accuracy and generalizat... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Hand Vein Recognition Algorithm Based on NMF with Sparsity and Clustering Property Constraints in Feature Mapping Space
收藏 引用
Chinese Journal of Electronics 2019年 第6期28卷 1184-1190页
作者: JIA Xu SUN Fuming LI Haojie CAO Yudong school of Electronics and information engineering Liaoning University of Technology school of software Technology Dalian University of Technology
Most of the existed vein features are lack of robustness to light intensity variation, and some algorithms rely on the specified vein data sets, which leads to the limitation of real applications. To solve the problem... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Causality fields in nonlinear causal effect analysis
收藏 引用
Frontiers of information Technology & Electronic engineering 2022年 第8期23卷 1277-1286页
作者: Aiguo WANG Li LIU Jiaoyun YANG Lian LI school of Electronic information engineering Foshan UniversityFoshan 528225China school of Big Data&software engineering Chongqing UniversityChongqing 400044China school of Computer Science and information engineering Hefei University of TechnologyHefei 230009China
Compared with linear causality,nonlinear causality has more complex characteristics and content.In this paper,we discuss certain issues related to nonlinear causality with an emphasis on the concept of causality field... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Physical-Layer Authentication via a Dynamic Scaling
收藏 引用
Chinese Journal of Electronics 2020年 第4期29卷 651-659页
作者: LI Min JIANG Shaoquan LIAO Yongjian Institute of information Security Mianyang Normal University School of Information and Software Engineering University of Electronic Science and Technology of China
Message authentication is a process that allows sender Alice to transmit a source state to receiver Bob such that the latter is assured of the authenticity.We study this problem in the physical-layer where the channel... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Repeated Inter-Session Network Coding Games with an Average Cost Share Pricing Mechanism in Congested Networks
收藏 引用
Chinese Journal of Electronics 2015年 第2期24卷 398-401页
作者: WANG Gang LENG Jie YUAN Cangzhou school of Electronic and information engineering Beihang University school of software Beihang University
It is important to analyze the efficiency of resource allocation with game theory in congested networks in which the users are selfish. The results are often obtained from a one-shot game, while in reality, the transm... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A multi-point collaborative DDoS defense mechanism for IIoT environment
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 590-601页
作者: Hongcheng Huang Peixin Ye Min Hu Jun Wu school of Communication and information engineering Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing engineering Research Center of Communication software Chongqing400065China
Nowadays,a large number of intelligent devices involved in the Industrial Internet of Things(IIoT)environment are posing unprecedented cybersecurity challenges.Due to the limited budget for security protection,the IIo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Discriminative fine-grained network for vehicle re-identification using two-stage re-ranking
收藏 引用
Science China(information Sciences) 2020年 第11期63卷 147-158页
作者: Qi WANG Weidong MIN Daojing HE Song ZOU Tiemei HUANG Yu ZHANG Ruikang LIU school of information engineering Nanchang University school of software Nanchang University Jiangxi Key Laboratory of Smart City Nanchang University school of Computer Science and software engineering East China Normal University
Research on the application of vehicle re-identification to video surveillance has attracted increasingly growing attention. Existing methods are associated with the difficulties of distinguishing different instances ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Efficient and Secure Authentication Scheme with Conditional Privacy-Preserving for VANETs
收藏 引用
Chinese Journal of Electronics 2016年 第5期25卷 950-956页
作者: XIE Yong WU Libing ZHANG Yubo SHEN Jian school of Computer Science Wuhan University school of information and engineering Jingdezhen Ceramic Institute State Key Laboratory of software engineering Wuhan University school of Computer and software Nanjing University of Information Science and Technology
The goal of authentication scheme for Vehicular ad hoc networks(VANETs) is to ensure reliability and integrity of message. Due to the timeliness of traffic-related messages and the highly dynamic nature of VANETs, it ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论