咨询与建议

限定检索结果

文献类型

  • 98,564 篇 会议
  • 59,837 篇 期刊文献
  • 1,603 册 图书

馆藏范围

  • 160,004 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 93,246 篇 工学
    • 55,501 篇 计算机科学与技术...
    • 44,291 篇 软件工程
    • 21,369 篇 信息与通信工程
    • 14,740 篇 控制科学与工程
    • 13,577 篇 电气工程
    • 13,520 篇 电子科学与技术(可...
    • 10,024 篇 生物工程
    • 7,993 篇 生物医学工程(可授...
    • 7,809 篇 化学工程与技术
    • 7,721 篇 光学工程
    • 6,840 篇 机械工程
    • 6,675 篇 材料科学与工程(可...
    • 5,716 篇 动力工程及工程热...
    • 5,490 篇 仪器科学与技术
    • 3,511 篇 网络空间安全
    • 3,327 篇 安全科学与工程
  • 56,079 篇 理学
    • 24,740 篇 数学
    • 21,222 篇 物理学
    • 11,738 篇 生物学
    • 8,098 篇 统计学(可授理学、...
    • 7,976 篇 化学
    • 5,456 篇 系统科学
  • 22,675 篇 管理学
    • 14,579 篇 管理科学与工程(可...
    • 8,774 篇 图书情报与档案管...
    • 6,464 篇 工商管理
  • 8,413 篇 医学
    • 6,715 篇 临床医学
    • 5,861 篇 基础医学(可授医学...
    • 3,561 篇 药学(可授医学、理...
    • 3,432 篇 公共卫生与预防医...
  • 4,001 篇 法学
    • 3,310 篇 社会学
  • 2,650 篇 经济学
  • 2,186 篇 农学
  • 1,510 篇 教育学
  • 832 篇 文学
  • 309 篇 军事学
  • 251 篇 艺术学
  • 22 篇 哲学
  • 16 篇 历史学

主题

  • 5,561 篇 computer science
  • 3,918 篇 accuracy
  • 3,254 篇 deep learning
  • 3,253 篇 feature extracti...
  • 3,075 篇 computational mo...
  • 3,038 篇 machine learning
  • 2,691 篇 training
  • 1,955 篇 optimization
  • 1,877 篇 artificial intel...
  • 1,871 篇 predictive model...
  • 1,848 篇 support vector m...
  • 1,723 篇 internet of thin...
  • 1,719 篇 wireless sensor ...
  • 1,710 篇 data mining
  • 1,577 篇 real-time system...
  • 1,524 篇 convolutional ne...
  • 1,452 篇 neural networks
  • 1,433 篇 computer archite...
  • 1,387 篇 bandwidth
  • 1,361 篇 costs

机构

  • 1,723 篇 cavendish labora...
  • 1,452 篇 school of comput...
  • 1,098 篇 infn laboratori ...
  • 1,083 篇 horia hulubei na...
  • 1,046 篇 institute of hig...
  • 1,035 篇 infn sezione di ...
  • 1,026 篇 school of physic...
  • 989 篇 department for p...
  • 968 篇 physikalisches i...
  • 955 篇 institute of phy...
  • 900 篇 department of ph...
  • 876 篇 institute of phy...
  • 811 篇 department of ph...
  • 810 篇 department of co...
  • 809 篇 physics departme...
  • 795 篇 fakultät physik ...
  • 769 篇 department of ph...
  • 759 篇 cern geneva
  • 755 篇 oliver lodge lab...
  • 754 篇 niels bohr insti...

作者

  • 624 篇 ali b.
  • 521 篇 bachacou h.
  • 515 篇 annovi a.
  • 484 篇 aad g.
  • 479 篇 akimov a.v.
  • 478 篇 alonso f.
  • 475 篇 arnaez o.
  • 475 篇 amidei d.
  • 471 篇 argyropoulos s.
  • 466 篇 alexopoulos t.
  • 466 篇 azuelos g.
  • 465 篇 alimonti g.
  • 463 篇 alexa c.
  • 458 篇 augsten k.
  • 458 篇 adelman j.
  • 456 篇 asai s.
  • 453 篇 anastopoulos c.
  • 451 篇 amelung c.
  • 445 篇 arce a.t.h.
  • 445 篇 abulaiti y.

语言

  • 149,046 篇 英文
  • 8,810 篇 其他
  • 2,084 篇 中文
  • 71 篇 日文
  • 42 篇 德文
  • 42 篇 法文
  • 19 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 阿拉伯文
  • 4 篇 俄文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Science and Engineering South University of Science and Technology"
160004 条 记 录,以下是491-500 订阅
排序:
Strain-dependent charge trapping and its impact on the operational stability of polymer field-effect transistors
收藏 引用
npj Flexible Electronics 2024年 第1期8卷 168-179页
作者: Sangsik Park Seung Hyun Kim Hansol Lee Kilwon Cho Department of Chemical Engineering Pohang University of Science and Technology(POSTECH)PohangSouth Korea Department of Chemical and Biological Engineering Gachon UniversitySeongnamSouth Korea
Despite recent dramatic improvements in the electronic characteristics of stretchable organic fieldeffect transistors(FETs),their low operational stability remains a bottleneck for their use in practical ***,the opera... 详细信息
来源: 评论
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3397-3416页
作者: Umi Salma Basha Shashi Kant Gupta Wedad Alawad SeongKi Kim Salil Bharany Computer Science and Information Technology Jazan UniversityJazanSaudi Arabia CSE Eudoxia Research UniversityNew CastleUSA Department of Information Technology College of Computer ScienceQassim UniversityBuraydahSaudi Arabia National Center of Excellence in Software Sangmyung UniversitySeoulKorea Department of Computer Science and Engineering Lovely Professional UniversityPhagwaraPunjabIndia
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc... 详细信息
来源: 评论
Multiclass Classification for Cyber Threats Detection on Twitter
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3853-3866页
作者: Adnan Hussein Abdulwahab Ali Almazroi College of Computer Science and Engineering Department of Computer ScienceAL-Ahgaff UniversityMukallaYemen College of Computing and Information Technology at Khulais Department of Information TechnologyUniversity of JeddahJeddahSaudi Arabia
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ... 详细信息
来源: 评论
Identification of DNA N4-methylcytosine Sites via Multiview Kernel Sparse Representation Model
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第5期4卷 1236-1245页
作者: Ai, Chengwei Tiwari, Prayag Yang, Hongpeng Ding, Yijie Tang, Jijun Guo, Fei Tianjin University School of Computer Science and Technology College of Intelligence and Computing Tianjin300072 China Aalto University Department of Computer Science Espoo02150 Finland Quzhou610056 China University of South Carolina Department of Computational Science and Engineering CO29208 United States Central South University School of Computer Science and Engineering Changsha410017 China
Identifying DNA N4-methylcytosine (4mC) sites is of great significance in biological research, such as chromatin structure, DNA stability, DNA-protein interaction, and controlling gene expression. However, the traditi... 详细信息
来源: 评论
Gender-Based Analysis of User Reactions to Facebook Posts
收藏 引用
Big Data Mining and Analytics 2024年 第1期7卷 75-86页
作者: Yassine El Moudene Jaafar Idrais Rida El Abassi Abderrahim Sabour Mathematical Engineering and Computer Science Laboratory Faculty of SciencesIbn Zohr UniversityAgadir 8706Morocco Department of Computer Science Mathematical−High School of Technology Ibn Zohr UniversityAgadir 8706Morocco
Online Social Networks(OSNs)are based on the sharing of different types of information and on various interactions(comments,reactions,and sharing).One of these important actions is the emotional reaction to the *** di... 详细信息
来源: 评论
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3867-3889页
作者: Dahyeon Kim Namgi Kim Junho Ahn Computer Information Technology Korea National University of TransportationChungju27469Korea Department of AI Computer Science and Engineering Kyonggi UniversitySuwon16227Korea
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***... 详细信息
来源: 评论
A Linear-Time Optimal Broadcasting Algorithm in Stars of Cliques
收藏 引用
Journal of Graph Algorithms and Applications 2024年 第1期28卷 385-388页
作者: Damaschke, Peter Department of Computer Science and Engineering Chalmers University of Technology and University of Gothenburg GothenburgSE-41296 Sweden
For the telephone broadcast model, an O(n log n)-time algorithm for constructing an optimal broadcasting scheme in a star of cliques with a total of n vertices was recently presented by Ambashankar and Harutyunyan at ... 详细信息
来源: 评论
MEC-IoT-Healthcare: Analysis and Prospects
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 6219-6250页
作者: Hongyuan Wang Mohammed Dauwed Imran Khan Nor Samsiah Sani Hasmila Amirah Omar Hirofumi Amano Samih M.Mostafa College of Computer Science Guangdong University of Science and TechnologyDongGuan523083China Department of Medical Instrumentation Techniques Engineering Dijlah University CollegeBaghdadIraq Department of Electrical Engineering University of Engineering&TechnologyPeshawar814Pakistan Center for Artificial Intelligence Technology Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia43600BangiSelangorMalaysia Research Institute for Information Technology Kyushu UniversityFukuoka819-0395Japan Computer Science-Mathematics Department Faculty of ScienceSouth Valley UniversityQena83523Egypt
Physical sensors,intelligent sensors,and output recommenda-tions are all examples of smart health technology that can be used to monitor patients’health and change their *** health is an Internet-of-Things(IoT)-aware... 详细信息
来源: 评论
FedRec:Trusted rank-based recommender scheme for service provisioning in federated cloud environment
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 33-46页
作者: Ashwin Verma Pronaya Bhattacharya Umesh Bodkhe Deepti Saraswat Sudeep Tanwar Kapal Dev Department of Computer Science and Engineering Institute of TechnologyNirma UniversityAhmedabadGujarat382481India Department of Institute of Intelligent Systems University of JohannesburgPO Box 524South Africa
The emergence of on-demand service provisioning by Federated Cloud Providers(FCPs)to Cloud Users(CU)has fuelled significant innovations in cloud provisioning *** to the massive traffic,massive CU resource requests are... 详细信息
来源: 评论
Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 4713-4733页
作者: Muhammad Bilal Sandile C.Showngwe Abid Bashir Yazeed Y.Ghadi College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Department of Mathematical Statistics and Actuarial Science Faculty of Natural and Agricultural SciencesUniversity of the Free StateBloemfontein9301South Africa Department of Computer Science National Textile UniversityFaisalabad38000Pakistan Department of Computer Science/Software Engineering Al Ain UniversityAbu DhabiUAE
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from on... 详细信息
来源: 评论