咨询与建议

限定检索结果

文献类型

  • 1,600 篇 期刊文献
  • 707 篇 会议
  • 37 册 图书

馆藏范围

  • 2,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,431 篇 理学
    • 1,059 篇 物理学
    • 280 篇 数学
    • 195 篇 化学
    • 118 篇 生物学
    • 108 篇 统计学(可授理学、...
    • 80 篇 地球物理学
  • 1,112 篇 工学
    • 571 篇 计算机科学与技术...
    • 463 篇 软件工程
    • 158 篇 信息与通信工程
    • 157 篇 核科学与技术
    • 133 篇 控制科学与工程
    • 132 篇 化学工程与技术
    • 123 篇 电气工程
    • 106 篇 电子科学与技术(可...
    • 91 篇 生物工程
    • 82 篇 仪器科学与技术
    • 76 篇 生物医学工程(可授...
    • 64 篇 光学工程
    • 56 篇 机械工程
    • 42 篇 力学(可授工学、理...
    • 42 篇 航空宇航科学与技...
    • 41 篇 动力工程及工程热...
    • 38 篇 冶金工程
    • 34 篇 材料科学与工程(可...
  • 217 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 62 篇 工商管理
  • 99 篇 医学
    • 84 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 45 篇 药学(可授医学、理...
  • 31 篇 法学
  • 28 篇 经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 6 篇 军事学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 94 篇 hadrons
  • 56 篇 particle decays
  • 55 篇 hadronic decays
  • 52 篇 bosons
  • 51 篇 higgs bosons
  • 49 篇 bottom mesons
  • 47 篇 proton-proton in...
  • 42 篇 deep learning
  • 39 篇 quantum chromody...
  • 39 篇 software enginee...
  • 38 篇 machine learning
  • 38 篇 branching fracti...
  • 37 篇 standard model (...
  • 36 篇 leptonic, semile...
  • 35 篇 large hadron col...
  • 34 篇 flavor changing ...
  • 33 篇 supersymmetry
  • 33 篇 artificial intel...
  • 32 篇 hadron-hadron sc...

机构

  • 884 篇 department of ph...
  • 883 篇 cavendish labora...
  • 847 篇 physikalisches i...
  • 828 篇 oliver lodge lab...
  • 576 篇 iccub universita...
  • 554 篇 university of ch...
  • 542 篇 infn laboratori ...
  • 527 篇 infn sezione di ...
  • 526 篇 horia hulubei na...
  • 523 篇 school of physic...
  • 520 篇 infn sezione di ...
  • 518 篇 h.h. wills physi...
  • 518 篇 department of ph...
  • 509 篇 van swinderen in...
  • 506 篇 fakultät physik ...
  • 499 篇 imperial college...
  • 493 篇 stfc rutherford ...
  • 493 篇 institute of par...
  • 492 篇 infn sezione di ...
  • 491 篇 infn sezione di ...

作者

  • 311 篇 barter w.
  • 284 篇 beiter a.
  • 284 篇 bellee v.
  • 278 篇 betancourt c.
  • 274 篇 brundu d.
  • 274 篇 blake t.
  • 271 篇 borsato m.
  • 270 篇 amato s.
  • 270 篇 boettcher t.
  • 265 篇 bencivenni g.
  • 264 篇 bowcock t.j.v.
  • 259 篇 bay a.
  • 258 篇 artuso m.
  • 257 篇 berezhnoy a.
  • 256 篇 calabrese r.
  • 254 篇 campana p.
  • 252 篇 burr c.
  • 252 篇 amhis y.
  • 251 篇 albrecht j.
  • 248 篇 akar s.

语言

  • 1,962 篇 英文
  • 378 篇 其他
  • 6 篇 中文
检索条件"机构=Applied Computer Science I-Software Engineering"
2344 条 记 录,以下是181-190 订阅
排序:
An Abstractive Summarization Technique with Variable Length Keywords as per Document Diversity
收藏 引用
computers, Materials & Continua 2021年 第3期66卷 2409-2423页
作者: Muhammad Yahya Saeed Muhammad Awais Muhammad Younas Muhammad Arif Shah Atif Khan M.irfan Uddin Marwan Mahmoud Department of Software Engineering Government College UniversityFaisalabadFaisalabad38000Pakistan Department of IT and Computer Science Pak-Austria Fachhochschule Institute of Applied Sciences and TechnologyHaripurPakistan Department of Computer Science Islamia College PeshawarPeshawarPakistan Institute of Computing Kohat University of Science and TechnologyKohatPakistan Faculty of Applied Studies King Abdulaziz UniversityJeddahSaudi Arabia
Text Summarization is an essential area in text mining,which has procedures for text *** natural language processing,text summarization maps the documents to a representative set of descriptive ***,the objective of te... 详细信息
来源: 评论
Multimodal Attention-Enhanced Feature Fusion-based Weekly Supervised Anomaly Violence Detection
arXiv
收藏 引用
arXiv 2024年
作者: Kaneko, Yuta Musa Miah, Abu Saleh Hassan, Najmul Lee, Hyoun-Sup Jang, Si-Woong Shin, Jungpil School of Computer Science and Engineering The University of Aizu Aizuwakamatsu Japan Department of Applied Software Engineering Dongeui University Busanjin-Gu Busan47340 Korea Republic of Department of Computer Engineering Dongeui University Busan47340 Korea Republic of
Weakly supervised video anomaly detection (WS-VAD) is a crucial area in computer vision for developing intelligent surveillance systems. Researchers are actively working on WS-VAD systems by assessing anomaly scores, ... 详细信息
来源: 评论
Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two Nodes
Maximize Leader Election Algorithm Performance in Bi-Directi...
收藏 引用
information Technology (ACiT)
作者: Mohammed N. Al Refai Hamed Fawareh Hamzeh Aljawawdeh Fuad Sameh Alshraiedeh Mohammad Al-quraan Hisham Al-Odat Ahmed Ali Otoom Zeyad M. Jamhawi Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Computer Science Zarqa University Zarqa Jordan Department of Cyber Security Applied Science Private University Amman Jordan Department of Computer Science Applied Science Private University Amman Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
The process of selecting a leader to avoid instability in distributed system network after leader failure is called Leader Election Algorithm (LEA). This process becomes more complicated when it faces intermittent or ... 详细信息
来源: 评论
Cyberbullying Detection and Recognition with Type Determination Based on Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5307-5319页
作者: Khalid M.O.Nahar Mohammad Alauthman Saud Yonbawi Ammar Almomani Computer Science Department Yarmouk UniversityIrbidJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan Software Engineering Department University of JeddahJeddahKSA Research and Innovation Department Skyline University CollegeP.O.Box 1797SharjahUAE IT Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan
Social media networks are becoming essential to our daily activities,and many issues are due to this great involvement in our *** is a social media network issue,a global crisis affecting the victims and society as a ... 详细信息
来源: 评论
impact Assessment and Mitigation Strategies for Plug-in Electric Vehicles on Distribution Networks: A Probabilistic Approach
Impact Assessment and Mitigation Strategies for Plug-in Elec...
收藏 引用
international Conference on Contemporary Computing and informatics (iC3i)
作者: Vijilius Helena Raj M Siva Swetha Reddy H Pal Thethi G Ramesh Q. Mohammad Munugapati Bhavana Department of Applied Sciences New Horizon College of Engineering Bangalore Computer Science Software Engineering Institute of Aeronautical Engineering Hyderabad Telangana Lovely Professional University Phagwara India Department of Computer Science and Engineering GRIET Bachupally Hyderabad India Hilla University College Babylon Iraq Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Telangana India
The rapid depletion of fossil fuel reserves coupled with the ever-increasing demand for electrical power has prompted the search for new energy sources. Electric vehicles (EVs) are one potential answer because of the ... 详细信息
来源: 评论
An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata
收藏 引用
iEEE Transactions on Big Data 2024年
作者: Rizwan, Muhammad Hawbani, Ammar Xingfu, Wang Anjum, Adeel Angin, Pelin Sever, Yigit Chen, Sanchuan Zhao, Liang Al-Dubai, Ahmed University of Science and Technology of China School of Computer Science and Technology China Shenyang Aerospace University School of Computer Science China Quaid i Azam University Institute of Information Technology Islamabad Pakistan Middle East Technical University Department of Computer Engineering Turkey Auburn University Department of Computer Science and Software Engineering United States Computing School of Edinburgh Napier University United Kingdom
A data publishing deal conducted with anonymous microdata can preserve the privacy of people. However, anonymizing data with multiple records of an individual (1:M dataset) is still a challenging problem. After anonym... 详细信息
来源: 评论
Hybrid Evolutionary Algorithm Based Relevance Feedback Approach for image Retrieval
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 963-979页
作者: Awais Mahmood Muhammad imran Aun irtaza Qammar Abbas Habib Dhahri Esam Mohammed Asem Othman Arif Jamal Malik Aaqif Afzaal Abbasi College of Applied Computer Science King Saud University(Almuzahmiyah Campus)Riyadh11543Saudi Arabia Shaheed Zulfikar Ali Bhutto Institute of Science and Technology(Islamabad Campus) 44000Pakistan University of Engineering and Technology Taxila Pakistan International Islamic University Islamabad44000Pakistan Faculty of Sciences and Technology University of KairouanSidi Bouzid4352Tunisia Department of Software Engineering Foundation University IslamabadIslamabad44000Pakistan
Searching images fromthe large image databases is one of the potential research areas of multimedia *** most challenging task for nay CBiR system is to capture the high level semantic of *** researchers of multimedia ... 详细信息
来源: 评论
Towards Classifying File Segments in Memory Using Machine-Learning
Towards Classifying File Segments in Memory Using Machine-Le...
收藏 引用
HCT information Technology Trends (iTT)
作者: Mohammed i. Al-Saleh Akram Alkouz Abdulsalam Alarabeyyat Majed Bouchahma Computer Science Department Jordan University of Science and Technology Computer Information System Higher Colleges of Technology Jordan-Salt Software Engineering Department Al-Balqa’ Applied University
Digital media triage is a main challenge that faces a digital investigator. Knowing what might be useful during crime investigation could greatly save the investigator’s time and enhance outcomes. Memory investigatio...
来源: 评论
Convergence analysis of a Kantorovich approximation technique for solving fractional Volterra integral equations
收藏 引用
Revista de la Real Academia de Ciencias Exactas, Físicas y Naturales. Serie A. Matemáticas 2025年 第3期119卷 1-24页
作者: Özger, Faruk Deniz, Sinan Khennaoui, Cheima Özger, Zeynep Ödemiş Bellour, Azzeddine Department of Computer Engineering Iğdır University Iğdır Türkiye Department of Mathematics Faculty of Art and Sciences Manisa Celal Bayar University Manisa Türkiye Laboratory of Applied Mathematics and Didactics Ecole Normale Superieure de Constantine Constantine Algeria Department of Software Engineering Iğdır University Iğdır Türkiye
This paper employs Kantorovich operators to address the numerical approximation of both second and first kinds fractional Volterra integral equations. To demonstrate the viability and effectiveness of the proposed app...
来源: 评论
MuLE: A Multiparadigm Language for Education. the Object-Oriented Part of the Language  20
MuLE: A Multiparadigm Language for Education. the Object-Ori...
收藏 引用
4th European Conference on software engineering Education, ECSEE 2020
作者: Dümmel, Nikita Westfechtel, Bernhard Ehmann, Matthias Applied Computer Science I-Software Engineering Bayreuth Germany Computer Science Education Bayreuth Germany
Choosing the right tools for teaching programming, which is a difficult task by itself, is not easy. Which language can be effectively used depends on the language itself, the chosen approach at which paradigm to teac... 详细信息
来源: 评论