咨询与建议

限定检索结果

文献类型

  • 97,812 篇 会议
  • 59,072 篇 期刊文献
  • 1,603 册 图书

馆藏范围

  • 158,487 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92,024 篇 工学
    • 54,794 篇 计算机科学与技术...
    • 43,910 篇 软件工程
    • 21,108 篇 信息与通信工程
    • 14,377 篇 控制科学与工程
    • 13,377 篇 电子科学与技术(可...
    • 13,370 篇 电气工程
    • 9,964 篇 生物工程
    • 7,903 篇 生物医学工程(可授...
    • 7,717 篇 化学工程与技术
    • 7,643 篇 光学工程
    • 6,773 篇 机械工程
    • 6,531 篇 材料科学与工程(可...
    • 5,655 篇 动力工程及工程热...
    • 5,450 篇 仪器科学与技术
    • 3,444 篇 网络空间安全
    • 3,292 篇 安全科学与工程
  • 55,543 篇 理学
    • 24,579 篇 数学
    • 21,004 篇 物理学
    • 11,646 篇 生物学
    • 8,031 篇 统计学(可授理学、...
    • 7,842 篇 化学
    • 5,443 篇 系统科学
  • 22,486 篇 管理学
    • 14,464 篇 管理科学与工程(可...
    • 8,708 篇 图书情报与档案管...
    • 6,394 篇 工商管理
  • 8,264 篇 医学
    • 6,601 篇 临床医学
    • 5,772 篇 基础医学(可授医学...
    • 3,558 篇 药学(可授医学、理...
    • 3,353 篇 公共卫生与预防医...
  • 3,972 篇 法学
    • 3,287 篇 社会学
  • 2,629 篇 经济学
  • 2,151 篇 农学
  • 1,482 篇 教育学
  • 832 篇 文学
  • 308 篇 军事学
  • 250 篇 艺术学
  • 22 篇 哲学
  • 16 篇 历史学

主题

  • 5,559 篇 computer science
  • 3,795 篇 accuracy
  • 3,206 篇 feature extracti...
  • 3,140 篇 deep learning
  • 3,013 篇 computational mo...
  • 3,009 篇 machine learning
  • 2,651 篇 training
  • 1,929 篇 optimization
  • 1,862 篇 artificial intel...
  • 1,825 篇 support vector m...
  • 1,822 篇 predictive model...
  • 1,720 篇 wireless sensor ...
  • 1,715 篇 internet of thin...
  • 1,705 篇 data mining
  • 1,530 篇 real-time system...
  • 1,440 篇 convolutional ne...
  • 1,438 篇 neural networks
  • 1,409 篇 computer archite...
  • 1,386 篇 bandwidth
  • 1,351 篇 costs

机构

  • 1,718 篇 cavendish labora...
  • 1,431 篇 school of comput...
  • 1,094 篇 infn laboratori ...
  • 1,078 篇 horia hulubei na...
  • 1,042 篇 institute of hig...
  • 1,030 篇 infn sezione di ...
  • 1,023 篇 school of physic...
  • 983 篇 department for p...
  • 971 篇 physikalisches i...
  • 949 篇 institute of phy...
  • 900 篇 department of ph...
  • 873 篇 institute of phy...
  • 809 篇 department of co...
  • 807 篇 department of ph...
  • 803 篇 physics departme...
  • 792 篇 fakultät physik ...
  • 769 篇 department of ph...
  • 756 篇 cern geneva
  • 755 篇 infn sezione di ...
  • 754 篇 niels bohr insti...

作者

  • 619 篇 ali b.
  • 518 篇 bachacou h.
  • 513 篇 annovi a.
  • 478 篇 aad g.
  • 477 篇 akimov a.v.
  • 472 篇 alonso f.
  • 469 篇 arnaez o.
  • 469 篇 amidei d.
  • 465 篇 argyropoulos s.
  • 464 篇 azuelos g.
  • 463 篇 alimonti g.
  • 461 篇 alexa c.
  • 460 篇 alexopoulos t.
  • 452 篇 augsten k.
  • 452 篇 adelman j.
  • 450 篇 asai s.
  • 447 篇 anastopoulos c.
  • 445 篇 amelung c.
  • 443 篇 arce a.t.h.
  • 443 篇 abulaiti y.

语言

  • 150,972 篇 英文
  • 5,417 篇 其他
  • 2,048 篇 中文
  • 71 篇 日文
  • 32 篇 法文
  • 31 篇 德文
  • 18 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering South University of Science and Technology"
158487 条 记 录,以下是251-260 订阅
排序:
REGAC: Multi-Class Offensive Content Identification Using Graphical Approach
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第4期52卷 931-952页
作者: Chinivar, Sneha Roopa, M.S. Arunalatha, J.S. Venugopal, K.R. Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Karnataka Bengaluru India Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Karnataka Bengaluru India
Online offensive behaviour continues to rise with the increasing popularity and use of social media. Various techniques have been used to address this issue. However, most existing studies consider offensive content i... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of Systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
A location-based fog computing optimization of energy management in smart buildings:DEVS modeling and design of connected objects
收藏 引用
Frontiers of computer science 2023年 第2期17卷 179-195页
作者: Abdelfettah MAATOUG Ghalem BELALEM Saïd MAHMOUDI Computer Science Department Faculty of Exact and Applied SciencesUniversity of Oran 1 Ahmed Ben BellaOran 31000Algeria Science and Technology Department Faculty of Science and TechnologyUniversity of TIARETTiaret 14000Algeria Computer Science Department Faculty of EngineeringUniversity of MonsMons 7000Belgium
Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider sp... 详细信息
来源: 评论
Energy Efficient Unequal Fault Tolerance Clustering Approach
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1971-1983页
作者: Sowjanya Ramisetty Divya Anand Kavita Sahil Verma NZ Jhanjhi Mehedi Masud Mohammed Baz Department of Computer Science and Engineering KG Reddy College of Engineering and TechnologyHyderabadIndia School of Computer Science and Engineering Lovely Professional UniversityPhagwaraIndia Department of Computer Science and Engineering Chandigarh UniversityMohaliIndia Department of Computer Science and Engineering Tailor’s UniversityMalaysia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Engineering College of Computer and Information TechnologyTaif UniversityTaif21994Saudi Arabia
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul... 详细信息
来源: 评论
Research on facial expression recognition based on multimodal data fusion and neural network
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第1期27卷 47-55页
作者: Han, Yi Wang, Xubin Lu, Zhengyu School of Mechanical Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China Anyang Institute of Technology Department of Computer Science and Information Engineering Henan Province Anyang China School of Computer Science and Information Engineering Shanghai Institute of Technology FengXian District Shanghai China
Facial expression recognition is a challenging task when neural network is applied to pattern recognition. Most of the current recognition research is based on single source facial data, which generally has the disadv... 详细信息
来源: 评论
Cyber-attack detection based on a deep chaotic invasive weed kernel optimized machine learning classifier in cloud computing
收藏 引用
Soft Computing 2025年 第4期29卷 2015-2030页
作者: Indrasena Reddy, M. Siva Kumar, A.P. Subba Reddy, K. Department of Computer Science and Engineering BVRIT Hyderabad College of Engineering for Women Hyderabad500090 India Department of Computer Science and Engineering Jawaharlal Nehru Technological University Ananthapuramu Andhra Pradesh Ananthapuramu India Department of Computer Science and Engineering Rajeev Gandhi Memorial College of Engineering and Technology Andhra Pradesh Nandyala India
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv... 详细信息
来源: 评论
CVTD: A Robust Car-Mounted Video Text Detector
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1821-1842页
作者: Di Zhou Jianxun Zhang Chao Li Yifan Guo Bowen Li Department of Computer Science and Engineering Chongqing University of TechnologyChongqingChina College of Information and Engineering Jingdezhen Ceramic UniversityJingdezhenChina
Text perception is crucial for understanding the semantics of outdoor scenes,making it a key requirement for building intelligent systems for driver assistance or autonomous *** information in car-mounted videos can a... 详细信息
来源: 评论
Introducing MagBERT:A language model for magnesium textual data mining and analysis
收藏 引用
Journal of Magnesium and Alloys 2024年 第8期12卷 3216-3228页
作者: Surjeet Kumar Russlan Jaafreh Nirpendra Singh Kotiba Hamad Dae Ho Yoon School of Advanced Materials Science&Engineering Sungkyunkwan University Suwon 16419South Korea Department of Physics Khalifa University of Science and TechnologyAbu Dhabi 127788UAE
Magnesium(Mg)based materials hold immense potential for various applications due to their lightweight and high strength-to-weight ***,to fully harness the potential of Mg alloys,structured analytics are essential to g... 详细信息
来源: 评论
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1311-1328页
作者: Arslan Akram Imran Khan Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni Faculty of Computer Science and Information Technology Department of Computer ScienceSuperior UniversityLahore54000Pakistan Machine Learning Code(MLC)Lab Meharban HouseHouse Number 209Zafar ColonyOkara56300Pakistan Information Technology Services University of OkaraOkara56310Pakistan Department of Computer Science&Engineering University of Engineering&Technology LahoreNarowal CampusNarowal51601Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain11671Abu Dhabi Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information... 详细信息
来源: 评论
Appearance and motion-based unusual crowd events detection using multiple moving objects
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90177-90189页
作者: Babu, K. Atlas, L. Godlin Sreeji, S. Arjun, K.P. Rasmi, A. Senthilvel, P. Gururama Computational Intelligence SRM Institute of Science & Technology Chengalpet Kattankulathur603203 India Department of Computer Science and Engineering Bharath Institute of Higher Education and Research Chennai India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Department of Computer Science and Engineering Gitam University Karnataka Bengaluru India Information Science and Engineering RRIT Bangalore India Saveetha University Chennai602 105 India
Unusual crowd analysis is an important problem in surveillance video due to their features cannot be extracted efficiently on the crowd scenes. To overcome this challenge, this paper introduced the appearance and moti... 详细信息
来源: 评论