咨询与建议

限定检索结果

文献类型

  • 97,618 篇 会议
  • 58,930 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 156,606 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92,015 篇 工学
    • 54,803 篇 计算机科学与技术...
    • 43,971 篇 软件工程
    • 21,142 篇 信息与通信工程
    • 14,392 篇 控制科学与工程
    • 13,368 篇 电气工程
    • 13,340 篇 电子科学与技术(可...
    • 9,972 篇 生物工程
    • 7,916 篇 生物医学工程(可授...
    • 7,729 篇 化学工程与技术
    • 7,670 篇 光学工程
    • 6,787 篇 机械工程
    • 6,534 篇 材料科学与工程(可...
    • 5,658 篇 动力工程及工程热...
    • 5,455 篇 仪器科学与技术
    • 3,445 篇 网络空间安全
    • 3,308 篇 安全科学与工程
  • 55,584 篇 理学
    • 24,600 篇 数学
    • 20,998 篇 物理学
    • 11,666 篇 生物学
    • 8,048 篇 统计学(可授理学、...
    • 7,864 篇 化学
    • 5,443 篇 系统科学
  • 22,528 篇 管理学
    • 14,498 篇 管理科学与工程(可...
    • 8,718 篇 图书情报与档案管...
    • 6,411 篇 工商管理
  • 8,281 篇 医学
    • 6,618 篇 临床医学
    • 5,809 篇 基础医学(可授医学...
    • 3,560 篇 药学(可授医学、理...
    • 3,376 篇 公共卫生与预防医...
  • 3,991 篇 法学
    • 3,301 篇 社会学
  • 2,633 篇 经济学
  • 2,143 篇 农学
  • 1,495 篇 教育学
  • 833 篇 文学
  • 310 篇 军事学
  • 250 篇 艺术学
  • 22 篇 哲学
  • 17 篇 历史学

主题

  • 5,556 篇 computer science
  • 3,763 篇 accuracy
  • 3,185 篇 feature extracti...
  • 3,120 篇 deep learning
  • 3,001 篇 computational mo...
  • 2,888 篇 machine learning
  • 2,623 篇 training
  • 1,895 篇 optimization
  • 1,823 篇 support vector m...
  • 1,810 篇 predictive model...
  • 1,720 篇 wireless sensor ...
  • 1,717 篇 internet of thin...
  • 1,700 篇 data mining
  • 1,513 篇 real-time system...
  • 1,440 篇 convolutional ne...
  • 1,432 篇 neural networks
  • 1,404 篇 computer archite...
  • 1,380 篇 bandwidth
  • 1,356 篇 costs
  • 1,342 篇 protocols

机构

  • 1,720 篇 cavendish labora...
  • 1,425 篇 school of comput...
  • 1,097 篇 infn laboratori ...
  • 1,077 篇 horia hulubei na...
  • 1,043 篇 institute of hig...
  • 1,033 篇 infn sezione di ...
  • 1,020 篇 school of physic...
  • 984 篇 department for p...
  • 973 篇 physikalisches i...
  • 950 篇 institute of phy...
  • 901 篇 department of ph...
  • 874 篇 institute of phy...
  • 808 篇 department of ph...
  • 804 篇 physics departme...
  • 792 篇 fakultät physik ...
  • 789 篇 department of co...
  • 770 篇 department of ph...
  • 758 篇 infn sezione di ...
  • 757 篇 cern geneva
  • 754 篇 niels bohr insti...

作者

  • 616 篇 ali b.
  • 521 篇 bachacou h.
  • 516 篇 annovi a.
  • 478 篇 aad g.
  • 477 篇 akimov a.v.
  • 472 篇 alonso f.
  • 469 篇 arnaez o.
  • 469 篇 amidei d.
  • 465 篇 argyropoulos s.
  • 464 篇 azuelos g.
  • 463 篇 alimonti g.
  • 461 篇 alexa c.
  • 460 篇 alexopoulos t.
  • 454 篇 augsten k.
  • 452 篇 adelman j.
  • 450 篇 asai s.
  • 447 篇 anastopoulos c.
  • 445 篇 amelung c.
  • 443 篇 arce a.t.h.
  • 443 篇 abulaiti y.

语言

  • 149,041 篇 英文
  • 5,470 篇 其他
  • 2,041 篇 中文
  • 71 篇 日文
  • 32 篇 法文
  • 31 篇 德文
  • 18 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering South University of Science and Technology"
156606 条 记 录,以下是61-70 订阅
排序:
Identification of Human Activity from Video Streaming Smartphone Data Using Intensified VGG16
收藏 引用
International Journal of engineering, Transactions B: Applications 2025年 第6期38卷 1340-1352页
作者: Yadav, R.K. Daniel, A. Semwal, V.B. Department of Computer Science and Engineering Amity University Gwalior India Data Science and Engineering Manipal University Jaipur India Department of Computer Science and Engineering Maulana Azad National Institute Technology Bhopal India
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie... 详细信息
来源: 评论
QoS-Aware Application Assignment and Resource Utilisation Maximization Using AHP in Edge Computing
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17717-17728页
作者: Koganti, Yasasvitha Sridhar, Vidhyuth Yadav, Ram Narayan Pratap, Ajay Iitram Department of Electrical and Computer Science Engineering Ahmedabad380026 India Indiana University Department of Computer Science and Engineering Bloomington United States Banaras Hindu University Indian Institute of Technology Department of Computer Science and Engineering Varanasi India
Edge computing has emerged as a promising technology to satisfy the demand for data computational resources in Internet of Things (IoT) networks. With edge computing, processing of the massive data-intensive tasks can... 详细信息
来源: 评论
Nonlinear Filtering With Sample-Based Approximation Under Constrained Communication:Progress, Insights and Trends
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第7期11卷 1539-1556页
作者: Weihao Song Zidong Wang Zhongkui Li Jianan Wang Qing-Long Han IEEE the State Key Laboratory for Turbulence and Complex Systems Department of Mechanics and Engineering ScienceCollege of Engineering Peking University the Department of Computer Science Brunel University London the School of Aerospace Engineering Beijing Institute of Technology the School of Science Computing and Engineering Technologies Swinburne University of Technology
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i... 详细信息
来源: 评论
Highly transparent anti-reflection coating enhances the underwater efficiency and stability of perovskite solar modules
收藏 引用
Nano Research 2024年 第9期17卷 8126-8133页
作者: Feng Qian Shihao Yuan Ting Zhang Lei Wang Xiaobo Li Hualin Zheng Qien Xu Zhi David Chen Shibin Li School of Optoelectronic Science and Engineering University of Electronic Science and Technology of ChinaChengdu 610054China Department of Electrical and Computer Engineering and Center for Nanoscale Science and Engineering University of KentuckyLexingtonKentucky 40506USA
Perovskite solar cells have shown great potential in the field of underwater solar cells due to their excellent optoelectronic properties;however,their underwater performance and stability still hinder their practical... 详细信息
来源: 评论
Enhancing cyber threat detection with an improved artificial neural network model
收藏 引用
Data science and Management 2025年 第1期8卷 107-115页
作者: Oyinloye, Toluwase Sunday Arowolo, Micheal Olaolu Prasad, Rajesh Department of Computer Science African University of Science and Technology Abuja900107 Nigeria Department of Electrical Engineering and Computer Science University of Missouri ColumbiaMO65201 United States
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i... 详细信息
来源: 评论
Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study
收藏 引用
Tsinghua science and technology 2024年 第1期29卷 127-142页
作者: Yan Xu Deqiang Li Qianmu Li Shouhuai Xu School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Science University of Colorado Colorado SpringsColorado SpringsCO 80918USA
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***... 详细信息
来源: 评论
Patient Questionnaires Based Parkinson’s Disease Classification Using Artificial Neural Network
收藏 引用
Annals of Data science 2024年 第5期11卷 1821-1864页
作者: Das, Tarakashar Mobassirin, Sabrina Hossain, Syed Md. Minhaz Das, Aka Sen, Anik Kamal, Khaleque Md. Aashiq Deb, Kaushik Department of Computer Science and Engineering Premier University Chattogram Chattogram4000 Bangladesh Department of Computer Science and Engineering Chittagong University of Engineering and Technology Chattogram4349 Bangladesh
Parkinson’s disease is one of the most prevalent and harmful neurodegenerative conditions (PD). Even today, PD diagnosis and monitoring remain pricy and inconvenient processes. With the unprecedented progress of arti... 详细信息
来源: 评论
Cognitive Transformation in Personal IoT: Pioneering Intelligent Automation
收藏 引用
Cyber-Physical Systems 2025年 第2期11卷 183-240页
作者: Gulzar, Bisma Ahmad Sofi, Shabir Sholla, Sahil Department of Information Technology National Institute of Technology Srinagar India Department of Computer Science Engineering Islamic University of Science & Technology Srinagar India
In recent years, IoT has transformed personal environments by integrating diverse smart devices. This paper presents an advanced IoT architecture that optimizes network infrastructure, focusing on the adoption of MQTT... 详细信息
来源: 评论
MFR-CNN: A modified faster R-CNN approach based on bounding box and reliable score for cloth image retrieval
收藏 引用
Multimedia Tools and Applications 2024年 1-29页
作者: Kaur, Navneet Pandey, Shreelekha Kalra, Nidhi Department of Computer Science and Engineering Thapar Institute of Engineering & ampTechnology Punjab Patiala147004 India School of Computer Science and Engineering RV University South Karnataka Bangalore560059 India
Today, machine learning is used in a broad variety of applications. Convolution neural networks (CNN), in particular, are widely used to analyze visual data. The fashion industry is catching up to the growing usage of... 详细信息
来源: 评论
FIAC: fine-grained access control mechanism for cloud based IoT framework
收藏 引用
International Journal of Grid and Utility Computing 2025年 第3期16卷 269-278页
作者: Chaudhury, Bhagwat Prasad Dhal, Kasturi Pattnaik, Srikanta Nayak, Ajit Kumar Department of Computer Science and Engineering Silicon Institute of Technology Odisha Bhubaneswar India Department of Computer Science and Engineering S‘O’A University Odisha Bhubaneswar India
Cloud computing technology provides various computing resources on demand to users on pay per use basis. The technology fails in terms of its usage due to confidentiality and privacy issues. Access control mechanisms ... 详细信息
来源: 评论