咨询与建议

限定检索结果

文献类型

  • 129,340 篇 会议
  • 67,280 篇 期刊文献
  • 2,133 册 图书

馆藏范围

  • 198,752 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 117,162 篇 工学
    • 79,385 篇 计算机科学与技术...
    • 63,626 篇 软件工程
    • 27,478 篇 信息与通信工程
    • 18,062 篇 控制科学与工程
    • 14,574 篇 电气工程
    • 14,432 篇 电子科学与技术(可...
    • 12,711 篇 生物工程
    • 9,641 篇 生物医学工程(可授...
    • 8,733 篇 光学工程
    • 8,136 篇 机械工程
    • 6,593 篇 化学工程与技术
    • 6,044 篇 仪器科学与技术
    • 5,892 篇 动力工程及工程热...
    • 5,014 篇 材料科学与工程(可...
    • 4,304 篇 网络空间安全
    • 4,039 篇 安全科学与工程
  • 67,360 篇 理学
    • 35,063 篇 数学
    • 21,074 篇 物理学
    • 14,524 篇 生物学
    • 10,910 篇 统计学(可授理学、...
    • 7,393 篇 系统科学
    • 7,092 篇 化学
  • 31,440 篇 管理学
    • 19,255 篇 管理科学与工程(可...
    • 13,354 篇 图书情报与档案管...
    • 8,712 篇 工商管理
  • 9,470 篇 医学
    • 7,878 篇 临床医学
    • 6,920 篇 基础医学(可授医学...
    • 4,270 篇 药学(可授医学、理...
    • 3,845 篇 公共卫生与预防医...
  • 5,503 篇 法学
    • 4,563 篇 社会学
  • 3,332 篇 经济学
  • 2,410 篇 农学
  • 2,267 篇 教育学
  • 1,093 篇 文学
  • 408 篇 军事学
  • 355 篇 艺术学
  • 58 篇 哲学
  • 35 篇 历史学

主题

  • 8,990 篇 computer science
  • 4,491 篇 accuracy
  • 4,059 篇 feature extracti...
  • 3,998 篇 computational mo...
  • 3,750 篇 machine learning
  • 3,702 篇 deep learning
  • 3,296 篇 training
  • 2,756 篇 data mining
  • 2,561 篇 artificial intel...
  • 2,356 篇 support vector m...
  • 2,319 篇 optimization
  • 2,179 篇 predictive model...
  • 2,099 篇 internet of thin...
  • 2,068 篇 wireless sensor ...
  • 2,066 篇 computer archite...
  • 2,048 篇 algorithm design...
  • 1,956 篇 protocols
  • 1,841 篇 application soft...
  • 1,783 篇 neural networks
  • 1,762 篇 semantics

机构

  • 4,985 篇 department of co...
  • 1,084 篇 cavendish labora...
  • 985 篇 department of ph...
  • 929 篇 university of ch...
  • 921 篇 oliver lodge lab...
  • 915 篇 physikalisches i...
  • 831 篇 department of el...
  • 659 篇 department of el...
  • 658 篇 department of co...
  • 586 篇 infn sezione di ...
  • 560 篇 infn sezione di ...
  • 554 篇 infn laboratori ...
  • 542 篇 chitkara univers...
  • 540 篇 department of co...
  • 529 篇 infn sezione di ...
  • 528 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 512 篇 school of physic...
  • 511 篇 school of physic...
  • 509 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 237 篇 s. chen
  • 236 篇 a. gomes
  • 230 篇 j. wang
  • 227 篇 c. alexa
  • 227 篇 blake t.
  • 223 篇 j. m. izen
  • 221 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 217 篇 betancourt c.
  • 215 篇 beiter a.
  • 215 篇 borsato m.
  • 214 篇 g. bella
  • 213 篇 j. strandberg
  • 213 篇 brundu d.
  • 212 篇 d. calvet
  • 211 篇 c. amelung
  • 206 篇 bencivenni g.

语言

  • 189,814 篇 英文
  • 6,337 篇 其他
  • 2,594 篇 中文
  • 99 篇 日文
  • 32 篇 德文
  • 19 篇 法文
  • 18 篇 朝鲜文
  • 14 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 3 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and EngineeringSouthern University of Science and Technology"
198753 条 记 录,以下是161-170 订阅
排序:
COVID-19 Fake News Detection using Deep Learning Model
收藏 引用
Annals of Data science 2024年 第6期11卷 2167-2198页
作者: Akhter, Mahabuba Hossain, Syed Md. Minhaz Nigar, Rizma Sijana Paul, Srabanti Kamal, Khaleque Md. Aashiq Sen, Anik Sarker, Iqbal H. Department of Computer Science and Engineering Premier University Chattogram4000 Bangladesh Department of Computer Science and Engineering Chittagong University of Engineering and Technology Chattogram4349 Bangladesh
People may now receive and share information more quickly and easily than ever due to the widespread use of mobile networked devices. However, this can occasionally lead to the spread of false information. Such inform... 详细信息
来源: 评论
Biometric-Based Secure Encryption Key Generation Using Convolutional Neural Networks and Particle Swarm Optimization
收藏 引用
Informatica (Slovenia) 2025年 第16期49卷 213-234页
作者: Almola, Sahera A.S. Khudeyer, Raidah S. Younis, Hameed Abdulkareem Department of Computer Information Systems College of Computer Science and Information Technology University of Basrah Basrah Iraq
With the rapid expansion of computer networks and information technology, ensuring secure data transmission is increasingly vital—especially for image data, which often contains sensitive information. This research p... 详细信息
来源: 评论
Integrating blockchain and machine learning for enhanced anti-money laundering system
收藏 引用
International Journal of Information technology (Singapore) 2025年 第4期17卷 2439-2447页
作者: Shafin, Khandakar Md Reno, Saha Department of Computer Science and Engineering CCN University of Science and Technology Cumilla 3503 Bangladesh Department of Computer Science and Engineering Ahsanullah University of Science and Technology (AUST) Dhaka 1208 Bangladesh
Money laundering is a serious threat to global financial systems, causing instability and inflation, and especially hurting middle-class savings. This paper suggests a new way to tackle these problems by using blockch... 详细信息
来源: 评论
Performance optimization in ddos prediction with ensemble based approach
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10631-10644页
作者: Dogra, Amit Taqdir Department of Computer Science and Engineering SoET BGSB University Rajouri India Department of Computer Science Engineering and Technology Guru Nanak Dev University Regional Campus Gurdaspur India
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo... 详细信息
来源: 评论
Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts
收藏 引用
computer Modeling in Engineering & sciences 2024年 第2期138卷 2005-2021页
作者: Abdulatif Alabdulatif Mada Alharbi Abir Mchergui Tarek Moulahi Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Computer Science Higher Institute of Management of GabesGabes UniversityGabes6029Tunisia Information Technology College of ComputerQassim UniversityBuraydahSaudi Arabia Faculty of Science and Technology of Sidi Bouzid Kairouan UniversityKairouan3131Tunisia
The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management *** advanced technology,such as Intellig... 详细信息
来源: 评论
Domain Knowledge Used in Meta-Heuristic Algorithms for the Job-Shop Scheduling Problem:Review and Analysis
收藏 引用
Tsinghua science and technology 2024年 第5期29卷 1368-1389页
作者: Lin Gui Xinyu Li Qingfu Zhang Liang Gao State Key Laboratory of Digital Manufacturing Equipment and Technology Huazhong University of Science and TechnologyWuhan 430074China Department of Computer Science City University of Hong KongHong KongChina
Meta-heuristic algorithms search the problem solution space to obtain a satisfactory solution within a reasonable *** combining domain knowledge of the specific optimization problem,the search efficiency and quality o... 详细信息
来源: 评论
SMILES2DTA: a CNN-based approach for identifying drug candidates and predicting drug-target binding affinity
收藏 引用
Neural Computing and Applications 2024年 第4期37卷 2891-2910页
作者: Mukit, Hasanul Hossain, Sayeed Farabi, Mirza Milan Chowdhury, Mehrab Zaman Pritom, Ahmed Iqbal Rana, Humayan Kabir Department of Computer Science and Engineering Green University of Bangladesh Narayanganj-1461 Dhaka Bangladesh Department of Computer Science The University of Alabama at Birmingham BirminghamAL United States Department of Computer Science and Engineering Islamic University of Technology Gazipur Bangladesh
Computational approaches can speed up the drug discovery process by predicting drug-target affinity, otherwise it is time-consuming. In this study, we developed a convolutional neural network (CNN)-based model named S... 详细信息
来源: 评论
An improved decision tree algorithm based on hierarchical neighborhood dependence
收藏 引用
Soft Computing 2024年 第17-18期28卷 9179-9189页
作者: Lai, Jianying Liu, Caihui Lin, Bowen Miao, Duoqian Department of Mathematics and Computer Science Gannan Normal University Jiangxi Ganzhou341000 China Department of Computer Science and Technology Tongji University Shanghai201804 China
Neighborhood rough sets (NRS) is widely used in various fields with good adaptability, and its related information measurement plays an important role in uncertainty analysis. In the existing research, although the th... 详细信息
来源: 评论
Fake News Detection on Social Media Using Ensemble Methods
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4525-4549页
作者: Muhammad Ali Ilyas Abdul Rehman Assad Abbas Dongsun Kim Muhammad Tahir Naseem Nasro Min Allah Department of Computer Science COMSATS UniversityIslamabad45550Pakistan School of Computer Science and Engineering Kyungpook National UniversityDaegu41566Republic of Korea Department of Computer Science and Engineering Korea UniversitySeoul02841Republic of Korea Department of Electronic Engineering Yeungnam UniversityGyeongsan-si38541Republic of Korea Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityDammam34223Saudi Arabia
In an era dominated by information dissemination through various channels like newspapers,social media,radio,and television,the surge in content production,especially on social platforms,has amplified the challenge of... 详细信息
来源: 评论
A Survey of Edge Caching:Key Issues and Challenges
收藏 引用
Tsinghua science and technology 2024年 第3期29卷 818-842页
作者: Hanwen Li Mingtao Sun Fan Xia Xiaolong Xu Muhammad Bilal School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 262700China Reading Academy Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Department of Computer Engineering Hankuk University of Foreign StudiesYongin-si 17035Republic of Korea
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw... 详细信息
来源: 评论