咨询与建议

限定检索结果

文献类型

  • 131,295 篇 会议
  • 68,240 篇 期刊文献
  • 2,140 册 图书

馆藏范围

  • 201,674 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 119,176 篇 工学
    • 80,835 篇 计算机科学与技术...
    • 64,378 篇 软件工程
    • 28,249 篇 信息与通信工程
    • 18,872 篇 控制科学与工程
    • 15,066 篇 电气工程
    • 14,697 篇 电子科学与技术(可...
    • 12,791 篇 生物工程
    • 9,768 篇 生物医学工程(可授...
    • 8,854 篇 光学工程
    • 8,387 篇 机械工程
    • 6,715 篇 化学工程与技术
    • 6,168 篇 仪器科学与技术
    • 6,070 篇 动力工程及工程热...
    • 5,178 篇 材料科学与工程(可...
    • 4,674 篇 网络空间安全
    • 4,194 篇 安全科学与工程
  • 68,112 篇 理学
    • 35,342 篇 数学
    • 21,359 篇 物理学
    • 14,645 篇 生物学
    • 11,039 篇 统计学(可授理学、...
    • 7,404 篇 系统科学
    • 7,286 篇 化学
  • 32,056 篇 管理学
    • 19,702 篇 管理科学与工程(可...
    • 13,574 篇 图书情报与档案管...
    • 8,834 篇 工商管理
  • 9,803 篇 医学
    • 8,041 篇 临床医学
    • 7,043 篇 基础医学(可授医学...
    • 4,278 篇 药学(可授医学、理...
    • 4,087 篇 公共卫生与预防医...
  • 5,659 篇 法学
    • 4,703 篇 社会学
  • 3,406 篇 经济学
  • 2,443 篇 农学
  • 2,348 篇 教育学
  • 1,129 篇 文学
  • 414 篇 军事学
  • 358 篇 艺术学
  • 58 篇 哲学
  • 37 篇 历史学

主题

  • 8,991 篇 computer science
  • 4,758 篇 accuracy
  • 4,167 篇 feature extracti...
  • 4,106 篇 computational mo...
  • 3,977 篇 deep learning
  • 3,902 篇 machine learning
  • 3,357 篇 training
  • 2,779 篇 data mining
  • 2,643 篇 artificial intel...
  • 2,432 篇 optimization
  • 2,406 篇 support vector m...
  • 2,262 篇 predictive model...
  • 2,153 篇 internet of thin...
  • 2,095 篇 computer archite...
  • 2,089 篇 wireless sensor ...
  • 2,045 篇 algorithm design...
  • 1,977 篇 protocols
  • 1,832 篇 application soft...
  • 1,830 篇 real-time system...
  • 1,821 篇 convolutional ne...

机构

  • 4,983 篇 department of co...
  • 1,087 篇 cavendish labora...
  • 988 篇 department of ph...
  • 939 篇 university of ch...
  • 926 篇 physikalisches i...
  • 924 篇 oliver lodge lab...
  • 828 篇 department of el...
  • 678 篇 department of el...
  • 660 篇 department of co...
  • 591 篇 chitkara univers...
  • 585 篇 infn sezione di ...
  • 563 篇 infn laboratori ...
  • 561 篇 infn sezione di ...
  • 560 篇 department of co...
  • 538 篇 infn sezione di ...
  • 526 篇 horia hulubei na...
  • 524 篇 department of ph...
  • 520 篇 fakultät physik ...
  • 515 篇 school of physic...
  • 506 篇 h.h. wills physi...

作者

  • 260 篇 barter w.
  • 236 篇 a. gomes
  • 235 篇 s. chen
  • 233 篇 blake t.
  • 228 篇 c. alexa
  • 228 篇 j. wang
  • 225 篇 j. m. izen
  • 224 篇 bellee v.
  • 224 篇 amato s.
  • 222 篇 betancourt c.
  • 222 篇 boettcher t.
  • 220 篇 bowcock t.j.v.
  • 220 篇 borsato m.
  • 218 篇 brundu d.
  • 214 篇 g. bella
  • 214 篇 j. strandberg
  • 212 篇 d. calvet
  • 212 篇 c. amelung
  • 211 篇 beiter a.
  • 211 篇 bencivenni g.

语言

  • 169,745 篇 英文
  • 29,531 篇 其他
  • 2,642 篇 中文
  • 101 篇 日文
  • 53 篇 德文
  • 50 篇 斯洛文尼亚文
  • 35 篇 法文
  • 18 篇 朝鲜文
  • 15 篇 俄文
  • 6 篇 阿拉伯文
  • 6 篇 西班牙文
  • 3 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 荷兰文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and EngineeringSouthern University of Science and Technology"
201675 条 记 录,以下是1061-1070 订阅
排序:
MediServe:An IoT-Enhanced Deep Learning Framework for Personalized Medication Management for Elderly Care
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 935-976页
作者: Smita Kapse Ganesh Yenurkar Vincent Omollo Nyangaresi Gunjan Balpande Shravani Kale Manthan Jadhav Sahil Lawankar Vikrant Jaunjale Department of Computer Technology Yeshwantrao Chavan College of EngineeringWanadongariNagpur441110MaharashtraIndia Computer Science&Engineering Jaramogi Oginga Odinga University of Science&TechnologyBondo40601Kenya Department of Applied Electronics Saveetha School of EngineeringSIMATSChennai602105TamilnaduIndia
In today’s fast-paced world,many elderly individuals struggle to adhere to their medication schedules,especially those with memory-related conditions like Alzheimer’s disease,leading to serious health risks,hospital... 详细信息
来源: 评论
NEMESIS: NORMALIZING THE SOFT-PROMPT VECTORS OF VISION-LANGUAGE MODELS  12
NEMESIS: NORMALIZING THE SOFT-PROMPT VECTORS OF VISION-LANGU...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Fu, Shuai Wang, Xiequn Huang, Qiushi Zhang, Yu Department of Computer Science and Engineering Southern University of Science and Technology China Computer Science Research Centre University of Surrey United Kingdom
With the prevalence of large-scale pretrained vision-language models (VLMs), such as CLIP, soft-prompt tuning has become a popular method for adapting these models to various downstream tasks. However, few works delve... 详细信息
来源: 评论
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection
收藏 引用
IEEE Transactions on Multimedia 2024年 26卷 6090-6101页
作者: Xiong, Lizhi Xu, Jianhua Yang, Ching-Nung Zhang, Xinpeng Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Nanjing University of Information Science and Technology Software Engineering Nanjing210044 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien974301 Taiwan Fudan University School of Computer Science Shanghai200433 China
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip... 详细信息
来源: 评论
An Interactive Collaborative Creation System for Shadow Puppets Based on Smooth Generative Adversarial Networks
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4107-4126页
作者: Cheng Yang Miaojia Lou Xiaoyu Chen Zixuan Ren Department of Industrial Design Hangzhou City UniversityHangzhou310000China College of Computer Science and Technology Zhejiang UniversityHangzhou310000China
Chinese shadow puppetry has been recognized as a world intangible cultural ***,it faces substantial challenges in its preservation and advancement due to the intricate and labor-intensive nature of crafting shadow ***... 详细信息
来源: 评论
Task Offloading and Resource Management for IIoT With Satellite–Terrestrial Integrated Computing Power Network Based on D3QN
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21770-21783页
作者: Li, Meng Li, Meihui Wang, Kan Yu, F. Richard Wang, Zhuwei Si, Pengbo Beijing University of Technology School of Information Science and Technology Beijing100124 China Xi’an University of Technology School of Computer Science and Engineering Xi’an710048 China Carleton University Department of Systems and Computer Engineering OttawaONK1S 5B6 Canada
The management of computing resources through the computing power network (CPN) has gradually become a focal point of research. With the development of the 6th generation (6G) mobile networks, some promising technolog... 详细信息
来源: 评论
Securing the Internet of Things Through Device Identification via Network Traffic Analysis  10
Securing the Internet of Things Through Device Identificatio...
收藏 引用
10th International Conference on Signal Processing and Intelligent Systems, ICSPIS 2024
作者: Ahmadian, Rouhollah Ghatee, Mehdi Wahlstrom, Johan Amirkabir University of Technology Department of Computer Science Tehran Iran University of Exeter Department of Computer Science Exeter United Kingdom
The widespread adoption of the Internet of Things (IoT) has led to considerable security concerns, particularly in device identification. To tackle this challenge, we have devised a method that scrutinizes the data tr... 详细信息
来源: 评论
A Hybrid Security Algorithm in Container-based Virtualization Environments Using Residue Number Systems  8
A Hybrid Security Algorithm in Container-based Virtualizatio...
收藏 引用
8th Conference on Information Communication technology and Society, ICTAS 2024
作者: Modey, Prince Freeman, Emmanuel Opoku-Yeboah, Stanley Avulekpor, Ebenezer Ghana Communication Technology University Department of Computer Science Accra Ghana University of Ghana Department of Computer Science Accra Ghana
The need for vigorous security methods becomes a great concern as container-based virtualization continues to gain close attention in modern edge computing environments. This study proposed a novel hybrid security alg... 详细信息
来源: 评论
Sufficient learning: mining denser high-quality pixel-level labels for edge detection
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8245-8260页
作者: Chen, Xiaodiao Yang, Wenya Wu, Wen Tao, Xiuting Mao, Xiaoyang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China School of Media and Design Hangzhou Dianzi University Hangzhou310018 China Department of Computer Science and Engineering University of Yamanashi Kofu400-8511 Japan
The success of deep neural networks can largely be attributed to large-scale datasets with accurate annotations. In many practical applications, labels are annotated by multiple annotators, resulting in ambiguous labe... 详细信息
来源: 评论
Unleashing the Potential of Deep Learning for Precise Nuclei Segmentation and Classification in H &E-Stained Whole Slide Images  12th
Unleashing the Potential of Deep Learning for Precise Nuc...
收藏 引用
12th International Conference on Soft Computing for Problem Solving, SocProS 2023
作者: Majeed, Tabasum Aalam, Syed Wajid Ahanger, Abdul Basit Dar, Rayees Ahmad Masoodi, Tariq Ahmad Macha, Muzafar Ahmad Bhat, Ajaz A. Bhat, Muzafar Rasool Assad, Assif Department of Computer Science and Engineering Islamic University of Science and Technology Kashmir India Department of Computer Science Islamic University of Science and Technology Kashmir India Department of Computer Science and Engineering Islamic University of Science and Technology Jammu And Kashmir India Watson-Crick Centre for Molecular Medicine Islamic University of Science and Technology Kashmir India Department of Cancer Research Sidra Medicine Doha Qatar
Accurately identifying diverse cell types within and in the vicinity of the tumor matrix plays a crucial role in understanding the tumor microenvironment for cancer prognosis and scientific investigation. By automatin... 详细信息
来源: 评论
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET security
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 1-18页
作者: M.Sahaya Sheela A.Gnana Soundari Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram Yousef Farhaoui Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600069India Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennai 602105India JNIAS School of Planning and Architecture Hyderabad 500034India Department of Computer Science and Engineering NPR College of Engineering and TechnologyNatham Dindigul 624401India Department of Computer Science and Engineering PSNA College of Engineering and TechnologyPoolangulathupatti 620009India Department of Computer Science and Engineering Sri Muthukumaran Institute of TechnologyChennai 600069India Department of Computer Science Moulay Ismail UniversityMeknes 5003Morocco
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i... 详细信息
来源: 评论