咨询与建议

限定检索结果

文献类型

  • 1,585 篇 期刊文献
  • 704 篇 会议
  • 37 册 图书

馆藏范围

  • 2,326 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,414 篇 理学
    • 1,048 篇 物理学
    • 280 篇 数学
    • 194 篇 化学
    • 117 篇 生物学
    • 110 篇 统计学(可授理学、...
    • 88 篇 天文学
    • 77 篇 地球物理学
  • 1,246 篇 工学
    • 559 篇 计算机科学与技术...
    • 457 篇 软件工程
    • 306 篇 核科学与技术
    • 155 篇 信息与通信工程
    • 131 篇 化学工程与技术
    • 128 篇 控制科学与工程
    • 122 篇 电气工程
    • 108 篇 电子科学与技术(可...
    • 89 篇 生物工程
    • 80 篇 仪器科学与技术
    • 75 篇 生物医学工程(可授...
    • 63 篇 光学工程
    • 56 篇 机械工程
    • 41 篇 力学(可授工学、理...
    • 39 篇 动力工程及工程热...
    • 39 篇 航空宇航科学与技...
    • 38 篇 材料科学与工程(可...
  • 212 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 95 篇 医学
    • 82 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 45 篇 药学(可授医学、理...
  • 29 篇 法学
  • 28 篇 经济学
  • 17 篇 教育学
  • 13 篇 农学
  • 6 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 98 篇 hadron colliders
  • 92 篇 hadrons
  • 59 篇 bosons
  • 55 篇 hadronic decays
  • 51 篇 particle decays
  • 49 篇 bottom mesons
  • 39 篇 deep learning
  • 39 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 branching fracti...
  • 36 篇 leptonic, semile...
  • 35 篇 supersymmetry
  • 34 篇 higgs bosons
  • 34 篇 flavor changing ...
  • 32 篇 particle product...
  • 32 篇 artificial intel...
  • 31 篇 quantum chromody...
  • 31 篇 hadron-hadron sc...
  • 31 篇 electroweak inte...
  • 29 篇 tellurium compou...

机构

  • 886 篇 department of ph...
  • 883 篇 cavendish labora...
  • 847 篇 physikalisches i...
  • 830 篇 oliver lodge lab...
  • 576 篇 iccub universita...
  • 554 篇 university of ch...
  • 545 篇 infn laboratori ...
  • 527 篇 infn sezione di ...
  • 526 篇 horia hulubei na...
  • 523 篇 school of physic...
  • 520 篇 infn sezione di ...
  • 518 篇 h.h. wills physi...
  • 518 篇 department of ph...
  • 509 篇 van swinderen in...
  • 506 篇 fakultät physik ...
  • 500 篇 imperial college...
  • 497 篇 institute of par...
  • 496 篇 stfc rutherford ...
  • 492 篇 infn sezione di ...
  • 491 篇 infn sezione di ...

作者

  • 311 篇 barter w.
  • 289 篇 beiter a.
  • 284 篇 bellee v.
  • 278 篇 betancourt c.
  • 274 篇 brundu d.
  • 274 篇 blake t.
  • 271 篇 borsato m.
  • 270 篇 amato s.
  • 270 篇 boettcher t.
  • 266 篇 bencivenni g.
  • 264 篇 bowcock t.j.v.
  • 261 篇 bay a.
  • 260 篇 artuso m.
  • 259 篇 berezhnoy a.
  • 258 篇 calabrese r.
  • 256 篇 campana p.
  • 255 篇 burr c.
  • 254 篇 amhis y.
  • 253 篇 albrecht j.
  • 250 篇 akar s.

语言

  • 2,045 篇 英文
  • 277 篇 其他
  • 6 篇 中文
检索条件"机构=Applied Computer Science I-Software Engineering"
2326 条 记 录,以下是311-320 订阅
排序:
Particle swarm optimization with local search for height-map surface reconstruction from point clouds in reverse engineering
收藏 引用
Neural Computing and Applications 2024年 1-20页
作者: Gálvez, Akemi Fister, iztok Deb, Suash Fister, iztok iglesias, Andrés Dept. of Applied Mathematics and Computational Sciences E.T.S.I. Caminos Canales y Puertos University of Cantabria Avda. de los Castros s/n Santander39005 Spain Faculty of Pharmaceutical Sciences Toho University 2-2-1 Miyama Funabashi274-8510 Japan Faculty of Electrical Engineering and Computer Science University of Maribor Koroska cesta 34 Maribor2000 Slovenia IT & Educational Consultant Ranchi India Distinguished Professorial Associate Decision Sciences and Modeling Program Victoria University Melbourne Australia
Surface reconstruction is a classical process in industrial engineering and manufacturing, particularly in reverse engineering, where the goal is to obtain a digital model from a physical object. For that purpose, the... 详细信息
来源: 评论
Classification of Real and Deepfakes Visual Samples with Pre-trained Deep Learning Models  7th
Classification of Real and Deepfakes Visual Samples with Pre...
收藏 引用
Proceedings of the 7th international Conference on Advances in Computing and Data sciences, iCACDS 2023
作者: Nawaz, Marriam Javed, Ali Nazir, Tahira Khan, Muhammad Attique Rajinikanth, Venkatesan Kadry, Seifedine Department of Software Engineering UET Taxila Taxila47050 Pakistan Department of Computing Riphah International University Islamabad Pakistan Department of Computer Science HITEC University Taxila Pakistan Department of Computer Science and Engineering Division of Research and Innovation Saveetha School of Engineering SIMATS Chennai602105 India Department of Applied Data Science Noroff University College Kristiansand4612 Norway Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
Serious security and privacy problems have arisen as a result of significant advancements in the creation of deepfakes. Attackers can easily replace a person’s face with the target person’s face in an image using so... 详细信息
来源: 评论
RELiABiLiTY ANALYSiS OF MONiTORiNG SYSTEM FOR EXTRATERRESTRiAL HABiTAT USiNG CTMC AND EMPiRiCAL EVALUATiON
arXiv
收藏 引用
arXiv 2023年
作者: Band, Saurabh Stechmann, Florian Unnikrishnan, Malavika Attarha, Shadi Heinicke, Christiane Willig, Andreas Förster, Anna Dept. Sustainable Communication Networks University of Bremen Germany Center of Applied Space Technology and Microgravity University of Bremen Germany Dept. Computer Science and Software Engineering University of Canterbury New Zealand
Much research has been done to settle a civilization on Mars in recent years. Among the various required resources for this civilization, the habitat is one of the crucial resources to live on Mars. Such an extraterre... 详细信息
来源: 评论
Can persistent homology whiten Transformer-based black-box models? A case study on BERT compression
arXiv
收藏 引用
arXiv 2023年
作者: Balderas, Luis Lastra, Miguel Benítez, Jose M. Department of Computer Science and Artificial Intelligence DiCITS iMUDS DaSCI E.T.S.I.I.T. University of Granada Spain Department of Software Engineering DiCITS iMUDS DaSCI E.T.S.I.I.T. University of Granada Spain
Large Language Models (LLMs) like BERT have gained significant prominence due to their remarkable performance in various natural language processing tasks. However, they come with substantial computational and memory ... 详细信息
来源: 评论
Optimizing Dense Feed-Forward Neural Networks
arXiv
收藏 引用
arXiv 2023年
作者: Balderas, Luis Lastra, Miguel Benítez, Jose M. Department of Computer Science and Artificial Intelligence DiCITS iMUDS DaSCI E.T.S.I.I.T. University of Granada Spain Department of Software Engineering DiCITS iMUDS DaSCI E.T.S.I.I.T. University of Granada Spain
Deep learning models have been widely used during the last decade due to their outstanding learning and abstraction capacities. However, one of the main challenges any scientist has to face using deep learning models ... 详细信息
来源: 评论
Optimizing Convolutional Neural Network Architecture
arXiv
收藏 引用
arXiv 2023年
作者: Balderas, Luis Lastra, Miguel Benítez, Jose M. Department of Computer Science and Artificial Intelligence DiCITS iMUDS DaSCI E.T.S.I.I.T. University of Granada Spain Department of Software Engineering DiCITS iMUDS DaSCI E.T.S.I.I.T. University of Granada Spain
Convolutional Neural Networks (CNN) are widely used to face challenging tasks like speech recognition, natural language processing or computer vision. As CNN architectures get larger and more complex, their computatio... 详细信息
来源: 评论
Cybersecurity Threats in the Era of Ai: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd international engineering Conference on Electrical, Energy, and Artificial intelligence, EiCEEAi 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
An explainable deep learning approach for stock market trend prediction
收藏 引用
Heliyon 2024年 第21期10卷 e40095页
作者: Muhammad, Dost Ahmed, iftikhar Naveed, Khwaja Bendechache, Malika CRT-AI and ADAPT Research Centres School of Computer Science University of Galway Ireland Department of Software Engineering University of Europe for Applied Sciences Potsdam Germany Swedish Center for Digital Innovation University of Gothenburg Sweden ADAPT Research Centre School of Computer Science University of Galway Ireland
Given the intricate nature of stock forecasting as well as the inherent risks and uncertainties, analysis of market trends is necessary to capitalize on optimal investment opportunities for profit maximization and tim... 详细信息
来源: 评论
Robust and Reliable Liveness Detection Models for Facial Recognition Systems
Robust and Reliable Liveness Detection Models for Facial Rec...
收藏 引用
Frontiers of information Technology (FiT)
作者: Haris Anjum Usama Arshad Raja Hashim Ali Zain Ul Abideen Muhammad Huzaifa Shah Talha Ali Khan Ali Zeeshan ijaz Abu Bakar Siddique Muhammad imad Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain
Facial Liveness Detection is instrumental in combating fraudulent practices and identity theft by differentiating genuine faces from forgeries. Given that facial recognition is now an integral part of many sectors lik...
来源: 评论
Enhancing Password Security: Analyzing Password Management Practices Among iT Students
Enhancing Password Security: Analyzing Password Management P...
收藏 引用
international iEEE Conference and Workshop: Óbuda on Electrical and Power engineering (CANDO-EPE)
作者: Anita Mihalovicsne Kollar Jozsef Katona Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary Institute of Electronics and Communication Systems Kando Kalman Faculty of Electrical Engineering Obuda University Budapest Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha... 详细信息
来源: 评论