咨询与建议

限定检索结果

文献类型

  • 87,237 篇 会议
  • 53,570 篇 期刊文献
  • 1,422 册 图书

馆藏范围

  • 142,228 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 85,214 篇 工学
    • 51,709 篇 计算机科学与技术...
    • 41,352 篇 软件工程
    • 20,346 篇 信息与通信工程
    • 13,770 篇 控制科学与工程
    • 13,307 篇 电气工程
    • 13,064 篇 电子科学与技术(可...
    • 9,400 篇 生物工程
    • 7,510 篇 光学工程
    • 7,483 篇 生物医学工程(可授...
    • 6,601 篇 化学工程与技术
    • 6,275 篇 机械工程
    • 5,682 篇 材料科学与工程(可...
    • 5,381 篇 动力工程及工程热...
    • 5,027 篇 仪器科学与技术
    • 3,437 篇 网络空间安全
    • 3,187 篇 安全科学与工程
  • 51,760 篇 理学
    • 23,411 篇 数学
    • 19,735 篇 物理学
    • 10,927 篇 生物学
    • 7,679 篇 统计学(可授理学、...
    • 6,860 篇 化学
    • 5,169 篇 系统科学
  • 20,833 篇 管理学
    • 13,422 篇 管理科学与工程(可...
    • 8,105 篇 图书情报与档案管...
    • 6,066 篇 工商管理
  • 7,665 篇 医学
    • 6,238 篇 临床医学
    • 5,482 篇 基础医学(可授医学...
    • 3,353 篇 药学(可授医学、理...
    • 3,134 篇 公共卫生与预防医...
  • 3,789 篇 法学
    • 3,140 篇 社会学
  • 2,443 篇 经济学
  • 1,825 篇 农学
  • 1,362 篇 教育学
  • 755 篇 文学
  • 294 篇 军事学
  • 200 篇 艺术学
  • 14 篇 哲学
  • 13 篇 历史学

主题

  • 4,130 篇 computer science
  • 3,586 篇 accuracy
  • 3,064 篇 deep learning
  • 2,831 篇 feature extracti...
  • 2,823 篇 machine learning
  • 2,640 篇 computational mo...
  • 2,351 篇 training
  • 1,790 篇 optimization
  • 1,735 篇 artificial intel...
  • 1,733 篇 internet of thin...
  • 1,683 篇 support vector m...
  • 1,622 篇 predictive model...
  • 1,517 篇 convolutional ne...
  • 1,488 篇 real-time system...
  • 1,477 篇 wireless sensor ...
  • 1,378 篇 data mining
  • 1,206 篇 neural networks
  • 1,174 篇 security
  • 1,160 篇 data models
  • 1,136 篇 computer archite...

机构

  • 1,751 篇 cavendish labora...
  • 1,015 篇 department for p...
  • 1,003 篇 institute of phy...
  • 930 篇 department of ph...
  • 918 篇 institute of phy...
  • 869 篇 institute of hig...
  • 861 篇 school of physic...
  • 852 篇 fakultät physik ...
  • 850 篇 physics departme...
  • 841 篇 department of ph...
  • 830 篇 department of co...
  • 822 篇 department of ph...
  • 811 篇 oliver lodge lab...
  • 808 篇 cern geneva
  • 805 篇 physikalisches i...
  • 764 篇 dipartimento di ...
  • 762 篇 department of el...
  • 758 篇 department of ph...
  • 725 篇 university of ch...
  • 720 篇 west university ...

作者

  • 556 篇 bachacou h.
  • 535 篇 annovi a.
  • 503 篇 aad g.
  • 501 篇 alonso f.
  • 498 篇 akimov a.v.
  • 495 篇 amidei d.
  • 493 篇 arnaez o.
  • 493 篇 argyropoulos s.
  • 491 篇 alimonti g.
  • 490 篇 alexa c.
  • 486 篇 alexopoulos t.
  • 481 篇 azuelos g.
  • 481 篇 anastopoulos c.
  • 481 篇 adelman j.
  • 479 篇 amelung c.
  • 476 篇 abulaiti y.
  • 475 篇 augsten k.
  • 473 篇 asai s.
  • 472 篇 arnold h.
  • 469 篇 aloisio a.

语言

  • 135,037 篇 英文
  • 5,370 篇 其他
  • 1,774 篇 中文
  • 67 篇 日文
  • 20 篇 法文
  • 20 篇 朝鲜文
  • 19 篇 德文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Science and Engineering Southern University of Science and Technology"
142229 条 记 录,以下是41-50 订阅
排序:
QoS-Aware Application Assignment and Resource Utilisation Maximization Using AHP in Edge Computing
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17717-17728页
作者: Koganti, Yasasvitha Sridhar, Vidhyuth Yadav, Ram Narayan Pratap, Ajay Iitram Department of Electrical and Computer Science Engineering Ahmedabad380026 India Indiana University Department of Computer Science and Engineering Bloomington United States Banaras Hindu University Indian Institute of Technology Department of Computer Science and Engineering Varanasi India
Edge computing has emerged as a promising technology to satisfy the demand for data computational resources in Internet of Things (IoT) networks. With edge computing, processing of the massive data-intensive tasks can... 详细信息
来源: 评论
Task offloading delay minimization in vehicular edge computing based on vehicle trajectory prediction
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 537-546页
作者: Feng Zeng Zheng Zhang Jinsong Wu School of Computer Science and Engineering Central South University School of Artificial Intelligence Guilin University of Electronic Technology The Department of Computer Science Universidad de Chile
In task offloading, the movement of vehicles causes the switching of connected RSUs and servers, which may lead to task offloading failure or high service delay. In this paper, we analyze the impact of vehicle movemen... 详细信息
来源: 评论
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning
收藏 引用
ACM Transactions on Privacy and Security 2025年 第2期28卷 1-19页
作者: Yang, Yuxin Li, Qiang Ji, Yuede Wang, Binghui College of Computer Science and Technology Jilin University Changchun China Department of Computer Science Illinois Institute of Technology Chicago United States Department of Computer Science and Engineering The University of Texas at Arlington Arlington United States Department of Computer Science Illinois Institute of Technology Chicago United States
Federated Learning (FL) is vulnerable to backdoor attacks - especially distributed backdoor attacks (DBA) that are more persistent and stealthy than centralized backdoor attacks. However, we observe that the attack ef... 详细信息
来源: 评论
Unpacking the determinants of social media-based lifelong learning from the need hierarchy theory
收藏 引用
Behaviour and Information technology 2025年 第3期44卷 477-490页
作者: Huang, Yueh-Min Wang, Ding-Chau Lin, Gu-Hao Huang, Yong-Ming Department of Engineering Science National Cheng Kung University Tainan City Taiwan Department of Information Management Southern Taiwan University of Science and Technology Tainan City Taiwan Department of Multimedia and Entertainment Science Southern Taiwan University of Science and Technology Tainan City Taiwan
Social-Media-based Lifelong Learning (SMLL) have come under the spotlight nowadays because they allow people to realise lifelong learning in their quotidian existence. However, the factors that determine SMLL have rec... 详细信息
来源: 评论
Constrained Networked Predictive Control for Nonlinear Systems Using a High-Order Fully Actuated System Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第2期12卷 478-480页
作者: Yi Huang Guo-Ping Liu Yi Yu Wenshan Hu the School of Electrical Engineering and Automation Wuhan University IEEE the Center for Control Science and Technology Southern University of Science and Technology the Department of Electrical and Electronic Engineering The Hong Kong Polytechnic University
Dear Editor,In this letter, a constrained networked predictive control strategy is proposed for the optimal control problem of complex nonlinear highorder fully actuated (HOFA) systems with noises. The method can effe...
来源: 评论
Enhancing cyber threat detection with an improved artificial neural network model
收藏 引用
Data science and Management 2025年 第1期8卷 107-115页
作者: Oyinloye, Toluwase Sunday Arowolo, Micheal Olaolu Prasad, Rajesh Department of Computer Science African University of Science and Technology Abuja900107 Nigeria Department of Electrical Engineering and Computer Science University of Missouri ColumbiaMO65201 United States
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i... 详细信息
来源: 评论
Cognitive Transformation in Personal IoT: Pioneering Intelligent Automation
收藏 引用
Cyber-Physical Systems 2025年 第2期11卷 183-240页
作者: Gulzar, Bisma Ahmad Sofi, Shabir Sholla, Sahil Department of Information Technology National Institute of Technology Srinagar India Department of Computer Science Engineering Islamic University of Science & Technology Srinagar India
In recent years, IoT has transformed personal environments by integrating diverse smart devices. This paper presents an advanced IoT architecture that optimizes network infrastructure, focusing on the adoption of MQTT... 详细信息
来源: 评论
FIAC: fine-grained access control mechanism for cloud based IoT framework
收藏 引用
International Journal of Grid and Utility Computing 2025年 第3期16卷 269-278页
作者: Chaudhury, Bhagwat Prasad Dhal, Kasturi Pattnaik, Srikanta Nayak, Ajit Kumar Department of Computer Science and Engineering Silicon Institute of Technology Odisha Bhubaneswar India Department of Computer Science and Engineering S‘O’A University Odisha Bhubaneswar India
Cloud computing technology provides various computing resources on demand to users on pay per use basis. The technology fails in terms of its usage due to confidentiality and privacy issues. Access control mechanisms ... 详细信息
来源: 评论
Impact of machine learning-based imputation techniques on medical datasets- a comparative analysis
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5905-5925页
作者: Tiwaskar, Shweta Rashid, Mamoon Gokhale, Prasad Department of Computer Engineering Faculty of Science and Technology Vishwakarma University Pune India
In the realm of medical datasets, particularly when considering diabetes, the occurrence of data incompleteness is a prevalent issue. Unveiling valuable patterns through medical data analysis is crucial for early and ... 详细信息
来源: 评论
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论