咨询与建议

限定检索结果

文献类型

  • 86,610 篇 会议
  • 52,876 篇 期刊文献
  • 1,463 册 图书

馆藏范围

  • 140,948 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 84,345 篇 工学
    • 51,272 篇 计算机科学与技术...
    • 41,121 篇 软件工程
    • 20,081 篇 信息与通信工程
    • 13,504 篇 控制科学与工程
    • 13,090 篇 电气工程
    • 12,886 篇 电子科学与技术(可...
    • 9,394 篇 生物工程
    • 7,436 篇 生物医学工程(可授...
    • 7,425 篇 光学工程
    • 6,535 篇 化学工程与技术
    • 6,157 篇 机械工程
    • 5,550 篇 材料科学与工程(可...
    • 5,338 篇 动力工程及工程热...
    • 4,985 篇 仪器科学与技术
    • 3,315 篇 网络空间安全
    • 3,136 篇 安全科学与工程
  • 51,288 篇 理学
    • 23,224 篇 数学
    • 19,533 篇 物理学
    • 10,857 篇 生物学
    • 7,629 篇 统计学(可授理学、...
    • 6,762 篇 化学
    • 5,165 篇 系统科学
  • 20,658 篇 管理学
    • 13,340 篇 管理科学与工程(可...
    • 8,016 篇 图书情报与档案管...
    • 6,026 篇 工商管理
  • 7,539 篇 医学
    • 6,166 篇 临床医学
    • 5,422 篇 基础医学(可授医学...
    • 3,358 篇 药学(可授医学、理...
    • 3,044 篇 公共卫生与预防医...
  • 3,770 篇 法学
    • 3,128 篇 社会学
  • 2,444 篇 经济学
  • 1,805 篇 农学
  • 1,335 篇 教育学
  • 748 篇 文学
  • 293 篇 军事学
  • 196 篇 艺术学
  • 14 篇 哲学
  • 12 篇 历史学

主题

  • 4,130 篇 computer science
  • 3,447 篇 accuracy
  • 2,953 篇 deep learning
  • 2,774 篇 feature extracti...
  • 2,766 篇 machine learning
  • 2,579 篇 computational mo...
  • 2,299 篇 training
  • 1,749 篇 optimization
  • 1,718 篇 internet of thin...
  • 1,718 篇 artificial intel...
  • 1,658 篇 support vector m...
  • 1,563 篇 predictive model...
  • 1,469 篇 wireless sensor ...
  • 1,462 篇 convolutional ne...
  • 1,416 篇 real-time system...
  • 1,384 篇 data mining
  • 1,182 篇 neural networks
  • 1,144 篇 security
  • 1,124 篇 data models
  • 1,115 篇 computer archite...

机构

  • 1,751 篇 cavendish labora...
  • 1,013 篇 department for p...
  • 1,001 篇 institute of phy...
  • 932 篇 department of ph...
  • 916 篇 institute of phy...
  • 874 篇 institute of hig...
  • 863 篇 school of physic...
  • 854 篇 fakultät physik ...
  • 852 篇 physics departme...
  • 842 篇 department of ph...
  • 824 篇 department of ph...
  • 818 篇 department of co...
  • 813 篇 oliver lodge lab...
  • 812 篇 cern geneva
  • 804 篇 physikalisches i...
  • 764 篇 dipartimento di ...
  • 762 篇 department of el...
  • 756 篇 department of ph...
  • 728 篇 university of ch...
  • 721 篇 west university ...

作者

  • 550 篇 bachacou h.
  • 529 篇 annovi a.
  • 500 篇 aad g.
  • 498 篇 alonso f.
  • 496 篇 akimov a.v.
  • 495 篇 amidei d.
  • 493 篇 argyropoulos s.
  • 491 篇 alimonti g.
  • 490 篇 arnaez o.
  • 490 篇 alexa c.
  • 483 篇 alexopoulos t.
  • 481 篇 anastopoulos c.
  • 481 篇 adelman j.
  • 479 篇 amelung c.
  • 478 篇 azuelos g.
  • 476 篇 abulaiti y.
  • 475 篇 augsten k.
  • 473 篇 asai s.
  • 472 篇 arnold h.
  • 469 篇 aloisio a.

语言

  • 134,342 篇 英文
  • 4,868 篇 其他
  • 1,780 篇 中文
  • 76 篇 法文
  • 72 篇 德文
  • 67 篇 日文
  • 20 篇 朝鲜文
  • 9 篇 荷兰文
  • 6 篇 斯洛文尼亚文
  • 5 篇 俄文
  • 2 篇 西班牙文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Science and Engineering Southern University of Science and Technology"
140949 条 记 录,以下是31-40 订阅
排序:
A Hierarchical Progressive Perception System for Autonomous Luggage Trolley Collection
收藏 引用
IEEE Transactions on Automation science and engineering 2025年 22卷 14484-14497页
作者: Sun, Zhirui Zhang, Zhe Zhao, Jieting Ye, Hanjing Wang, Jiankun Southern University of Science and Technology Shenzhen Key Laboratory of Robotics Perception and Intelligence Department of Electronic and Electrical Engineering Shenzhen518055 China Southern University of Science and Technology Jiaxing Research Institute Jiaxing314000 China Southern University of Science and Technology Shenzhen Key Laboratory of Robotics and Computer Vision Department of Electronic and Electrical Engineering Shenzhen518055 China
Advancements in intelligent vehicle technologies and autonomous driving are now used for tasks like collecting luggage trolleys at airports. The robotic autonomous luggage trolley collection system employs robots to g... 详细信息
来源: 评论
Informative task classification with concatenated embeddings using deep learning on crisisMMD
收藏 引用
International Journal of computers and Applications 2025年 第2期47卷 123-140页
作者: Jain, Tarun Gopalani, Dinesh Kumar Meena, Yogesh Department of Computer Science and Engineering Manipal University Jaipur Jaipur India Department of Computer Science and Engineering Malaviya National Institute of Technology Jaipur India
Disastrous situations pose a formidable challenge, testing our resilience against nature's fury and the race against time to prevent the loss of human life. It is noted that in such situations that Microblogging p... 详细信息
来源: 评论
Genetic algorithm based data controlling method using IoT enabled WSNs
收藏 引用
Soft Computing 2025年 第5期29卷 2465-2482页
作者: Singh, Samayveer Nandan, Aridaman Singh Sikka, Geeta Malik, Aruna Singh, Pradeep Kumar Department of Computer Science and Engineering National Institute of Technology Punjab Jalandhar India Department of Computer Science and Engineering National Institute of Technology Delhi India Department of Computer Science and Engineering Central University of Jammu J&K Jammu India
Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) is not only constitute an encouraging research domain but also represent a promising industrial trend that permits the development of various IoT-based ... 详细信息
来源: 评论
AmplitudeArrow: On-the-Go AR Menu Selection Using Consecutive Simple Head Gestures and Amplitude Visualization
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第05期31卷 3408-3417页
作者: Tian, Yang Zhang, Youpeng Yan, Yukang Zhao, Shengdong Ma, Xiaojuan Shi, Yuanchun Guangxi University Department of Computer Science Guangxi Key Laboratory of Multimedia Communications and Network Technology China University of Rochester Department of Computer Science United States City University of Hong Kong School of Creative Media and the Department of Computer Science Hong Kong Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong Tsinghua University Department of Computer Science and Technology China
Heads-up computing aims to provide synergistic digital assistance that minimally interferes with users' on-the-go daily activities. Currently, the input modalities of heads-up computing are mainly voice and finger... 详细信息
来源: 评论
Privacy-preserving recommendation with coarse-grained spatiotemporal contexts
收藏 引用
science China(Information sciences) 2025年 第4期68卷 66-81页
作者: Lei CHEN Chen GAO Jiahuan LEI Xiaoyi DU Xinlei SHI Hengliang LUO Depeng JIN Yong LI Meng WANG Department of Electronic Engineering BNRist Tsinghua University Meituan Inc. School of Computer Science and Information Engineering Hefei University of Technology
The behavior of users on online life service platforms like Meituan and Yelp often occurs within specific finegrained spatiotemporal contexts(i.e., when and where). Recommender systems, designed to serve millions of u... 详细信息
来源: 评论
A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3467-3497页
作者: Mariam A.Alotaibi Sami S.Alwakeel Aasem N.Alyahya Department of Computer Engineering College of Computer ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science and Information Technology Shaqra UniversityShaqra11961Saudi Arabia
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the... 详细信息
来源: 评论
Identification of Human Activity from Video Streaming Smartphone Data Using Intensified VGG16
收藏 引用
International Journal of engineering, Transactions B: Applications 2025年 第6期38卷 1340-1352页
作者: Yadav, R.K. Daniel, A. Semwal, V.B. Department of Computer Science and Engineering Amity University Gwalior India Data Science and Engineering Manipal University Jaipur India Department of Computer Science and Engineering Maulana Azad National Institute Technology Bhopal India
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie... 详细信息
来源: 评论
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-19页
作者: Yang, Yuxin Li, Qiang Ji, Yuede Wang, Binghui College of Computer Science and Technology Jilin University Changchun China Department of Computer Science Illinois Institute of Technology Chicago United States Department of Computer Science and Engineering The University of Texas at Arlington Arlington United States Department of Computer Science Illinois Institute of Technology Chicago United States
Federated Learning (FL) is vulnerable to backdoor attacks - especially distributed backdoor attacks (DBA) that are more persistent and stealthy than centralized backdoor attacks. However, we observe that the attack ef... 详细信息
来源: 评论
Unpacking the determinants of social media-based lifelong learning from the need hierarchy theory
收藏 引用
Behaviour and Information technology 2025年 第3期44卷 477-490页
作者: Huang, Yueh-Min Wang, Ding-Chau Lin, Gu-Hao Huang, Yong-Ming Department of Engineering Science National Cheng Kung University Tainan City Taiwan Department of Information Management Southern Taiwan University of Science and Technology Tainan City Taiwan Department of Multimedia and Entertainment Science Southern Taiwan University of Science and Technology Tainan City Taiwan
Social-Media-based Lifelong Learning (SMLL) have come under the spotlight nowadays because they allow people to realise lifelong learning in their quotidian existence. However, the factors that determine SMLL have rec... 详细信息
来源: 评论
Constrained Networked Predictive Control for Nonlinear Systems Using a High-Order Fully Actuated System Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第2期12卷 478-480页
作者: Yi Huang Guo-Ping Liu Yi Yu Wenshan Hu the School of Electrical Engineering and Automation Wuhan University IEEE the Center for Control Science and Technology Southern University of Science and Technology the Department of Electrical and Electronic Engineering The Hong Kong Polytechnic University
Dear Editor,In this letter, a constrained networked predictive control strategy is proposed for the optimal control problem of complex nonlinear highorder fully actuated (HOFA) systems with noises. The method can effe...
来源: 评论