咨询与建议

限定检索结果

文献类型

  • 98,564 篇 会议
  • 59,837 篇 期刊文献
  • 1,603 册 图书

馆藏范围

  • 160,004 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 93,246 篇 工学
    • 55,501 篇 计算机科学与技术...
    • 44,291 篇 软件工程
    • 21,369 篇 信息与通信工程
    • 14,740 篇 控制科学与工程
    • 13,577 篇 电气工程
    • 13,520 篇 电子科学与技术(可...
    • 10,024 篇 生物工程
    • 7,993 篇 生物医学工程(可授...
    • 7,809 篇 化学工程与技术
    • 7,721 篇 光学工程
    • 6,840 篇 机械工程
    • 6,675 篇 材料科学与工程(可...
    • 5,716 篇 动力工程及工程热...
    • 5,490 篇 仪器科学与技术
    • 3,511 篇 网络空间安全
    • 3,327 篇 安全科学与工程
  • 56,079 篇 理学
    • 24,740 篇 数学
    • 21,222 篇 物理学
    • 11,738 篇 生物学
    • 8,098 篇 统计学(可授理学、...
    • 7,976 篇 化学
    • 5,456 篇 系统科学
  • 22,675 篇 管理学
    • 14,579 篇 管理科学与工程(可...
    • 8,774 篇 图书情报与档案管...
    • 6,464 篇 工商管理
  • 8,413 篇 医学
    • 6,715 篇 临床医学
    • 5,861 篇 基础医学(可授医学...
    • 3,561 篇 药学(可授医学、理...
    • 3,432 篇 公共卫生与预防医...
  • 4,001 篇 法学
    • 3,310 篇 社会学
  • 2,650 篇 经济学
  • 2,186 篇 农学
  • 1,510 篇 教育学
  • 832 篇 文学
  • 309 篇 军事学
  • 251 篇 艺术学
  • 22 篇 哲学
  • 16 篇 历史学

主题

  • 5,561 篇 computer science
  • 3,918 篇 accuracy
  • 3,254 篇 deep learning
  • 3,253 篇 feature extracti...
  • 3,075 篇 computational mo...
  • 3,038 篇 machine learning
  • 2,691 篇 training
  • 1,955 篇 optimization
  • 1,877 篇 artificial intel...
  • 1,871 篇 predictive model...
  • 1,848 篇 support vector m...
  • 1,723 篇 internet of thin...
  • 1,719 篇 wireless sensor ...
  • 1,710 篇 data mining
  • 1,577 篇 real-time system...
  • 1,524 篇 convolutional ne...
  • 1,452 篇 neural networks
  • 1,433 篇 computer archite...
  • 1,387 篇 bandwidth
  • 1,361 篇 costs

机构

  • 1,723 篇 cavendish labora...
  • 1,452 篇 school of comput...
  • 1,098 篇 infn laboratori ...
  • 1,083 篇 horia hulubei na...
  • 1,046 篇 institute of hig...
  • 1,035 篇 infn sezione di ...
  • 1,026 篇 school of physic...
  • 989 篇 department for p...
  • 968 篇 physikalisches i...
  • 955 篇 institute of phy...
  • 900 篇 department of ph...
  • 876 篇 institute of phy...
  • 811 篇 department of ph...
  • 810 篇 department of co...
  • 809 篇 physics departme...
  • 795 篇 fakultät physik ...
  • 769 篇 department of ph...
  • 759 篇 cern geneva
  • 755 篇 oliver lodge lab...
  • 754 篇 niels bohr insti...

作者

  • 624 篇 ali b.
  • 521 篇 bachacou h.
  • 515 篇 annovi a.
  • 484 篇 aad g.
  • 479 篇 akimov a.v.
  • 478 篇 alonso f.
  • 475 篇 arnaez o.
  • 475 篇 amidei d.
  • 471 篇 argyropoulos s.
  • 466 篇 alexopoulos t.
  • 466 篇 azuelos g.
  • 465 篇 alimonti g.
  • 463 篇 alexa c.
  • 458 篇 augsten k.
  • 458 篇 adelman j.
  • 456 篇 asai s.
  • 453 篇 anastopoulos c.
  • 451 篇 amelung c.
  • 445 篇 arce a.t.h.
  • 445 篇 abulaiti y.

语言

  • 149,046 篇 英文
  • 8,810 篇 其他
  • 2,084 篇 中文
  • 71 篇 日文
  • 42 篇 德文
  • 42 篇 法文
  • 19 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 阿拉伯文
  • 4 篇 俄文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Science and Engineering South University of Science and Technology"
160004 条 记 录,以下是411-420 订阅
排序:
Multi-criteria decision analysis: technique for order of preference by similarity to ideal solution for selecting greener analytical method in the determination of mifepristone in environmental water samples
收藏 引用
Environmental science and Pollution Research 2024年 第20期31卷 29460-29471页
作者: Makwakwa, Tlou A. Moema, Dineo E. Msagati, Titus A. M. Department of Chemistry College of Science Engineering and Technology University of South Africa Florida Johannesburg1709 South Africa Institute for Nanotechnology and Water Sustainability College of Science Engineering and Technology University of South Africa Florida Johannesburg1709 South Africa
This work proposes the use of multi-criteria decision analysis (MCDA) to select a more environmentally friendly analytical procedure. TOPSIS, which stands for Technique for Order of Preference by Similarity to Ideal S... 详细信息
来源: 评论
AI-Based Security Protocols for IoT Applications: A Critical Review
收藏 引用
Recent Advances in computer science and Communications 2023年 第5期16卷 2-18页
作者: Chadha, Harshita Gupta, Shruti Khanna, Ashish Kumar, Neeraj Department of Computer Science and Engineering Maharaja Agrasen Institute of Technology New Delhi India Department of Computer Science and Engineering Chitkara University Institute of Engineering & Technology Punjab Chandigarh India
The Internet Of Things (IoT) is a network of heterogeneous nodes that exchange data and critical information amongst themselves with minimum human intervention. The utility of this technology is large, thus it is used... 详细信息
来源: 评论
Autonomous embodied navigation task generation from natural language dialogues
收藏 引用
science China(Information sciences) 2025年 第5期68卷 119-132页
作者: Haifeng XU Yongchang LI Lumeng MA Chunwen LI Yanzhi DONG Xiaohu YUAN Huaping LIU Department of Automation Tsinghua University School of Physics and Electronic Information Yantai University School of Electrical and Electronic Engineering Shanghai Institute of Technology Department of Computer Science and Technology Tsinghua University
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks ofte... 详细信息
来源: 评论
Preventing 51% Attack by Using Consecutive Block Limits in Bitcoin
收藏 引用
IEEE Access 2024年 12卷 77852-77869页
作者: Mahmood Babur, Sohail Ur Rehman Khan, Shafiq Yang, Jing Chen, Yen-Lin Soon Ku, Chin Yee Por, Lip Government Murray College Department of Information Technology Sialkot51010 Pakistan Capital University of Science and Technology Department of Computer Science Islamabad44730 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ... 详细信息
来源: 评论
STPM: Spatial-Temporal Token Pruning and Merging for Complex Activity Recognition
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2024年 第6期35卷 5407-5418页
作者: Su, Yumeng Zhang, Jiachao Yan, Rui Li, Pengpeng Xie, Guosen Shu, Xiangbo Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Nanjing Institute of Technology Artificial Intelligence Industrial Technology Research Institute Nanjing211167 China Nanjing University Department of Computer Science and Technology Nanjing210023 China
Lightweight video representation techniques have advanced significantly for simple activity recognition, but they still encounter several issues when applied to complex activity recognition: (i) The presence of numero... 详细信息
来源: 评论
Adaptive Neighborhood Adjustment Strategy Based On MOHHO and NSGA-III Algorithms for Feature Selection
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第5期54卷 917-935页
作者: Papasani, Anusha Durgam, Revathi Devarakonda, Nagaraju Computer Science and Engineering Department Koneru Lakshmaiah Education Foundation AndhraPradesh Vaddeswaram522502 India Computer Science and Engineering Department AVN Institute of Engineering and Technology Telangana Hyderabad501510 India Science and Engineering Department VIT-AP University AP Amaravati522237 India
The efficiency of multi-objective evolutionary algorithms (MOEAs) in tackling issues with multiple objectives is examined. However, it is noted that current MOEA-based feature selection techniques often converge towar... 详细信息
来源: 评论
Recognition of American sign language using modified deep residual CNN with modified canny edge segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Hariharan, U. Devarajan, Devikanniga Kumar, P. Santhosh Rajkumar, K. Meena, M. Akilan, T. Department of Computer Science and Engineering Apex Institute of Technology Chandigarh University Punjab Mohali140413 India Department of Computer Science and Engineering GITAM University Karnataka Bengaluru561203 India Department of Information Technology Faculty of Engineering and technology SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai600089 India Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamil Nadu Chennai603203 India Department of Computer Science and Engineering Sri Sairam Engineering College Tamil Nadu Tambaram602109 India Research Coordinator Dept. of IQAC Amity University Kolkata West Bengal 700135 India
American Sign Language (ASL) recognition aims to recognize hand gestures, and it is a crucial solution to communicating between the deaf community and hearing people. However, existing sign language recognition algori... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients
收藏 引用
International Journal of Information technology (Singapore) 2024年 第8期16卷 5331-5349页
作者: Neog, Prabhakar Sharma Roy, Moumita Sangale, Tejas Jain, Nandita Dahal, Aditi Patgiri, Ripon Thounaojam, Dalton Meitei Department of Computer Science and Engineering National Institute of Technology Silchar Department of Computer Science and Information Technology Siksha ‘O’ Anusandhan University
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between... 详细信息
来源: 评论
Multi-view GCN for loan default risk prediction
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 12149-12162页
作者: Li, Zihao Chen, Yakun Wang, Xianzhi Yao, Lina Xu, Guandong School of Computer Science University of Technology Sydney Broadway SydneyNSW2007 Australia School of Computer Science and Engineering University of New South Wales Garden SydneyNSW2052 Australia
As a significant application of machine learning in financial scenarios, loan default risk prediction aims to evaluate the client’s default probability. However, most existing deep learning solutions treat each appli... 详细信息
来源: 评论