咨询与建议

限定检索结果

文献类型

  • 86,610 篇 会议
  • 52,876 篇 期刊文献
  • 1,463 册 图书

馆藏范围

  • 140,948 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 84,345 篇 工学
    • 51,272 篇 计算机科学与技术...
    • 41,121 篇 软件工程
    • 20,081 篇 信息与通信工程
    • 13,504 篇 控制科学与工程
    • 13,090 篇 电气工程
    • 12,886 篇 电子科学与技术(可...
    • 9,394 篇 生物工程
    • 7,436 篇 生物医学工程(可授...
    • 7,425 篇 光学工程
    • 6,535 篇 化学工程与技术
    • 6,157 篇 机械工程
    • 5,550 篇 材料科学与工程(可...
    • 5,338 篇 动力工程及工程热...
    • 4,985 篇 仪器科学与技术
    • 3,315 篇 网络空间安全
    • 3,136 篇 安全科学与工程
  • 51,288 篇 理学
    • 23,224 篇 数学
    • 19,533 篇 物理学
    • 10,857 篇 生物学
    • 7,629 篇 统计学(可授理学、...
    • 6,762 篇 化学
    • 5,165 篇 系统科学
  • 20,658 篇 管理学
    • 13,340 篇 管理科学与工程(可...
    • 8,016 篇 图书情报与档案管...
    • 6,026 篇 工商管理
  • 7,539 篇 医学
    • 6,166 篇 临床医学
    • 5,422 篇 基础医学(可授医学...
    • 3,358 篇 药学(可授医学、理...
    • 3,044 篇 公共卫生与预防医...
  • 3,770 篇 法学
    • 3,128 篇 社会学
  • 2,444 篇 经济学
  • 1,805 篇 农学
  • 1,335 篇 教育学
  • 748 篇 文学
  • 293 篇 军事学
  • 196 篇 艺术学
  • 14 篇 哲学
  • 12 篇 历史学

主题

  • 4,130 篇 computer science
  • 3,447 篇 accuracy
  • 2,953 篇 deep learning
  • 2,774 篇 feature extracti...
  • 2,766 篇 machine learning
  • 2,579 篇 computational mo...
  • 2,299 篇 training
  • 1,749 篇 optimization
  • 1,718 篇 internet of thin...
  • 1,718 篇 artificial intel...
  • 1,658 篇 support vector m...
  • 1,563 篇 predictive model...
  • 1,469 篇 wireless sensor ...
  • 1,462 篇 convolutional ne...
  • 1,416 篇 real-time system...
  • 1,384 篇 data mining
  • 1,182 篇 neural networks
  • 1,144 篇 security
  • 1,124 篇 data models
  • 1,115 篇 computer archite...

机构

  • 1,751 篇 cavendish labora...
  • 1,013 篇 department for p...
  • 1,001 篇 institute of phy...
  • 932 篇 department of ph...
  • 916 篇 institute of phy...
  • 874 篇 institute of hig...
  • 863 篇 school of physic...
  • 854 篇 fakultät physik ...
  • 852 篇 physics departme...
  • 842 篇 department of ph...
  • 824 篇 department of ph...
  • 818 篇 department of co...
  • 813 篇 oliver lodge lab...
  • 812 篇 cern geneva
  • 804 篇 physikalisches i...
  • 764 篇 dipartimento di ...
  • 762 篇 department of el...
  • 756 篇 department of ph...
  • 728 篇 university of ch...
  • 721 篇 west university ...

作者

  • 550 篇 bachacou h.
  • 529 篇 annovi a.
  • 500 篇 aad g.
  • 498 篇 alonso f.
  • 496 篇 akimov a.v.
  • 495 篇 amidei d.
  • 493 篇 argyropoulos s.
  • 491 篇 alimonti g.
  • 490 篇 arnaez o.
  • 490 篇 alexa c.
  • 483 篇 alexopoulos t.
  • 481 篇 anastopoulos c.
  • 481 篇 adelman j.
  • 479 篇 amelung c.
  • 478 篇 azuelos g.
  • 476 篇 abulaiti y.
  • 475 篇 augsten k.
  • 473 篇 asai s.
  • 472 篇 arnold h.
  • 469 篇 aloisio a.

语言

  • 134,342 篇 英文
  • 4,868 篇 其他
  • 1,780 篇 中文
  • 76 篇 法文
  • 72 篇 德文
  • 67 篇 日文
  • 20 篇 朝鲜文
  • 9 篇 荷兰文
  • 6 篇 斯洛文尼亚文
  • 5 篇 俄文
  • 2 篇 西班牙文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Science and Engineering Southern University of Science and Technology"
140949 条 记 录,以下是81-90 订阅
排序:
A two-stage method with twin autoencoders for the degradation trajectories prediction of lithium-ion batteries
收藏 引用
Journal of Energy Chemistry 2025年 第4期103卷 759-772页
作者: Lei Cai Jing Yan Haiyan Jin Jinhao Meng Jichang Peng Bin Wang Wei Liang Remus Teodorescu School of Computer Science and Engineering Xi'an University of Technology School of Electrical Engineering Xi'an Jiaotong University Smart Grid Research Institute Nanjing Institute of Technology Department of Energy Aalborg University
To predict the lithium-ion(Li-ion) battery degradation trajectory in the early phase,arranging the maintenance of battery energy storage systems is of great ***,under different operation conditions,Li-ion batteries pr... 详细信息
来源: 评论
Leveraging BERT, DistilBERT and TinyBERT for Rumor Detection
收藏 引用
IEEE Access 2025年 13卷 72918-72929页
作者: Qazi, Aijazahamed Goudar, R.H. Patil, Rudragoud Hukkeri, Geetabai S. Kulkarni, Dhanashree Angadi Institute of Technology and Management Department of Artificial Intelligence and Data science Belagavi591108 India Visvesvaraya Technological University Department of Computer Science and Engineering Belagavi590018 India KLS Gogte Institute of Technology Department of Computer Science and Engineering Belagavi590008 India Manipal Academy of Higher Education Manipal Institute of Technology Department of Computer Science and Engineering Bengaluru Karnataka Manipal576104 India Angadi Institute of Technology and Management Department of Computer Science and Engineering Belagavi591108 India
The rapid spread of false information on social media has become a major challenge in today's digital world. This has created a need for an effective rumor detection system that can identify and control the spread... 详细信息
来源: 评论
Multi-agent Path Planning Based on Conflict-Based Search (CBS) Variations for Heterogeneous Robots
收藏 引用
Journal of Intelligent and Robotic Systems: Theory and Applications 2025年 第1期111卷 1-12页
作者: Bai, Yifan Kotpalliwar, Shruti Kanellakis, Christoforos Nikolakopoulos, George Department of Computer Science Electrical and Space Engineering Luleå University of Technology Luleå797187 Sweden
This article introduces a novel Multi-agent path planning scheme based on Conflict Based Search (CBS) for heterogeneous holonomic and non-holonomic agents, designated as Heterogeneous CBS (HCBS). The proposed methodol... 详细信息
来源: 评论
CRT and PUF-based Self/Mutual-healing Key Distribution Protocol with Collusion Resistance and Revocation Capability
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4607-4622页
作者: Othman, Wajdy Hong, Zhong Fuyou, Miao Xue, Kaiping Hawbani, Ammar Amin, Ruhul Zhao, Liang Li, Tao Nankai University Haihe Lab of ITAI College of Cyber Science Tianjin China Anhui University School of Computer Science and Technology China University of Science and Technology of China School of Computer Science and Technology School of Information Science and Technology Anhui Hefei China Shenyang Aerospace University School of Computer Science Shenyang110136 China Department of Computer Science & Engineering IIIT-NR China Nankai University Haihe Lab of ITAI College of Cyber Science China
Self-healing group key distribution (SGKD) protocols guarantee the security of group communications by allowing authorized users to independently recover missed previous session keys from the current broadcast without... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Merging Context Clustering with Visual State Space Models for Medical Image Segmentation
收藏 引用
IEEE Transactions on Medical Imaging 2025年 第5期44卷 2131-2142页
作者: Zhu, Yun Zhang, Dong Lin, Yi Feng, Yifei Tang, Jinhui Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China The Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Hong Kong The Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong Hong Kong Nanjing Medical University First School of Clinical Medicine China First Affiliated Hospital of Nanjing Medical University Department of General Surgery Nanjing China
Medical image segmentation demands the aggregation of global and local feature representations, posing a challenge for current methodologies in handling both long-range and short-range feature interactions. Recently, ... 详细信息
来源: 评论
Average AoI Minimization with Directional Charging for Wireless-Powered Network Edge
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4889-4906页
作者: Chen, Quan Guo, Song Xu, Wenchao Li, Jing Shi, Tuo Gao, Hong Cai, Zhipeng Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering 999077 Hong Kong Hong Kong Polytechnic University Department of Computing Hong Kong999077 Hong Kong City University of Hong Kong Department of Computer Science Hong Kong Hong Kong Zhejiang Normal University School of Computer Science and Technology Jinhua China Georgia State University Department of Computer Science AtlantaGA30303 United States
Age of Information (AoI) has been proposed as a new performance metric to capture the freshness of data. At wireless-powered network edge, the source nodes first need to be charged ready for update transmissions, whic... 详细信息
来源: 评论
FLAG: frequency-based local and global network for face forgery detection
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 647-663页
作者: Zhou, Kai Sun, Guanglu Wang, Jun Wang, Jiahui Yu, Linsen School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China Department of Information Engineering and Mathematics University of Siena Siena53100 Italy
Deepfake detection aims to mitigate the threat of manipulated content by identifying and exposing forgeries. However, previous methods primarily tend to perform poorly when confronted with cross-dataset scenarios. To ... 详细信息
来源: 评论
Enhanced Neutrosophic Set and Machine Learning Approach for Kidney Disease Prediction
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 465-477页
作者: Al-Doori, Humam M. Alkellezli, Tareef S. Abdelhafeez, Ahmed Eassaa, Mohamed Sawah, Mohamed S. El-Douh, Ahmed A. Cybersecurity Sciences Department College of Science Ashur University Baghdad Iraq Cybersecurity Engineering Department College of Engineering Ashur University Baghdad Iraq Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan Cybersecurity Technology Engineering Department College of Engineering Technology Ashur University Baghdad Iraq
Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and... 详细信息
来源: 评论
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论