咨询与建议

限定检索结果

文献类型

  • 1,578 篇 期刊文献
  • 703 篇 会议
  • 36 册 图书

馆藏范围

  • 2,317 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,416 篇 理学
    • 1,050 篇 物理学
    • 280 篇 数学
    • 193 篇 化学
    • 118 篇 生物学
    • 108 篇 统计学(可授理学、...
    • 77 篇 地球物理学
  • 1,090 篇 工学
    • 561 篇 计算机科学与技术...
    • 458 篇 软件工程
    • 155 篇 信息与通信工程
    • 154 篇 核科学与技术
    • 131 篇 化学工程与技术
    • 127 篇 控制科学与工程
    • 120 篇 电气工程
    • 105 篇 电子科学与技术(可...
    • 90 篇 生物工程
    • 80 篇 仪器科学与技术
    • 75 篇 生物医学工程(可授...
    • 63 篇 光学工程
    • 55 篇 机械工程
    • 41 篇 力学(可授工学、理...
    • 39 篇 动力工程及工程热...
    • 39 篇 航空宇航科学与技...
    • 37 篇 冶金工程
    • 33 篇 材料科学与工程(可...
  • 212 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 96 篇 医学
    • 83 篇 临床医学
    • 68 篇 基础医学(可授医学...
    • 45 篇 药学(可授医学、理...
  • 29 篇 法学
  • 28 篇 经济学
  • 17 篇 教育学
  • 13 篇 农学
  • 6 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 106 篇 hadron colliders
  • 94 篇 hadrons
  • 56 篇 particle decays
  • 55 篇 hadronic decays
  • 51 篇 higgs bosons
  • 50 篇 bosons
  • 49 篇 bottom mesons
  • 47 篇 proton-proton in...
  • 39 篇 deep learning
  • 39 篇 quantum chromody...
  • 39 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 standard model (...
  • 37 篇 branching fracti...
  • 36 篇 leptonic, semile...
  • 35 篇 large hadron col...
  • 34 篇 flavor changing ...
  • 33 篇 supersymmetry
  • 32 篇 particle product...
  • 31 篇 collisions (nucl...

机构

  • 881 篇 department of ph...
  • 880 篇 cavendish labora...
  • 839 篇 physikalisches i...
  • 826 篇 oliver lodge lab...
  • 574 篇 iccub universita...
  • 553 篇 university of ch...
  • 541 篇 infn laboratori ...
  • 527 篇 horia hulubei na...
  • 521 篇 school of physic...
  • 520 篇 h.h. wills physi...
  • 520 篇 infn sezione di ...
  • 518 篇 department of ph...
  • 517 篇 infn sezione di ...
  • 508 篇 van swinderen in...
  • 500 篇 imperial college...
  • 499 篇 fakultät physik ...
  • 495 篇 stfc rutherford ...
  • 494 篇 institute of par...
  • 489 篇 infn sezione di ...
  • 489 篇 nikhef national ...

作者

  • 306 篇 barter w.
  • 290 篇 beiter a.
  • 279 篇 bellee v.
  • 271 篇 betancourt c.
  • 267 篇 brundu d.
  • 267 篇 blake t.
  • 264 篇 bowcock t.j.v.
  • 264 篇 borsato m.
  • 263 篇 amato s.
  • 263 篇 boettcher t.
  • 259 篇 bencivenni g.
  • 252 篇 bay a.
  • 251 篇 artuso m.
  • 250 篇 berezhnoy a.
  • 249 篇 calabrese r.
  • 247 篇 campana p.
  • 246 篇 burr c.
  • 246 篇 albrecht j.
  • 245 篇 amhis y.
  • 243 篇 akar s.

语言

  • 2,188 篇 英文
  • 125 篇 其他
  • 4 篇 中文
检索条件"机构=Applied Computer Science I-Software Engineering"
2317 条 记 录,以下是31-40 订阅
排序:
internet of Things (ioT) in Smart Cities: A Statistical Survey  2
Internet of Things (IoT) in Smart Cities: A Statistical Surv...
收藏 引用
2nd international Conference on Business Analytics for Technology and Security, iCBATS 2023
作者: iqbal, Muhammad Waseem Khaliq, Khowla Al-Dmour, Nidal A. Aqeel, Muhammad Ali, Nasir Hamid, K. Superior University Department of Software Engineering Lahore54000 Pakistan Superior University Department of Computer Sciecnce Lahore54000 Pakistan Mutah University College of Engineering Department of Computer Engineering Jordan NCBA&E School of Computer Science Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan
internet of things is progressing very rapidly and involving multiple domains of everyday life including environment, governance, healthcare system, transportation system, energy management system, etc. smart city is ... 详细信息
来源: 评论
Application of Machine Learning for Online Reputation Systems
收藏 引用
international Journal of Automation and computing 2021年 第3期18卷 492-502页
作者: Ahmad Alqwadri Mohammad Azzeh Fadi Almasalha Department of Computer Science Applied Science Private UniversityAmman 11931Jordan Department of Software Engineering Applied Science Private UniversityAmman 11931Jordan
Users on the internet usually require venues to provide better purchasing *** can be provided by a reputation system that processes ratings to provide *** rating aggregation process is a main part of reputation system... 详细信息
来源: 评论
Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4791-4812页
作者: Ahmad Yahiya Ahmad Bani Ahmad Jafar Alzubi Sophers James Vincent Omollo Nyangaresi Chanthirasekaran Kutralakani Anguraju Krishnan Department of Accounting and Finance Faculty of BusinessMiddle East UniversityAmman11831Jordan Faculty of Engineering Al-Balqa Applied UniversitySalt19117Jordan Department of Mathematics Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo210-40601Kenya Department of Electronics and Communication Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India Department of Electronics and Communication Engineering Saveetha Engineering College(Autonomous)Chennai602105India Department of Computer Science and Engineering Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India
in recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basi... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management  25
A Proposed Approach for Risk Planning and Management
收藏 引用
25th international Arab Conference on information Technology, ACiT 2024
作者: Al Refai, Mohammed N. Al-Smadi, Yazan Al-Momani, Adai Jamhawi, Zeyad M. Otoom, Ahmed Ali Atoum, issa Yaseen, Ahid Ababneh, Jafar Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Applied Science Private University Department of Computer Science Amman Jordan Applied Science Private University Department of Cyber Security Amman Jordan Philadelphia University Faculty of Information Technology Software Engineering Department Jordan Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
3D Gaze Estimation via Binocular Disparity and Feature Refinement  10
3D Gaze Estimation via Binocular Disparity and Feature Refin...
收藏 引用
10th international Conference on Big Data Computing and Communications, BiGCOM 2024
作者: Wang, Chengxin Chen, Qiuxia Tian, Ying Yang, Jinfeng School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China Institute of Applied Artificial Intelligence of the Guangdong-Hong Kong-Macao Greater Bay Area Shenzhen Polytechnic Shenzhen China
The eyes are the windows to the soul and are crucial for studying human behavior. Therefore, gaze estimation has attracted much attention in the field of computer vision. in recent years, convolutional neural networks... 详细信息
来源: 评论
iT/OT Convergence Protocols: DNP3, Ethernet/iP, and Modbus
IT/OT Convergence Protocols: DNP3, Ethernet/IP, and Modbus
收藏 引用
2023 Congress in computer science, computer engineering, and applied Computing, CSCE 2023
作者: Zahran, Bassam Abu Zahra, Fuad University of Wisconsin Platteville Dept of Computer Science and Software Engineering WI United States University of Wisconsin Milwaukee Dept of Engineering and Applied Sciences WI United States
The convergence of information Technology (iT) and Operational Technology (OT) systems is becoming a ne-cessity. in the context of iT/OT convergence, various protocols are widely employed to enable smooth communicatio... 详细信息
来源: 评论
iT/OT Convergence Protocols: MQTT, OPC, and REST
IT/OT Convergence Protocols: MQTT, OPC, and REST
收藏 引用
2023 Congress in computer science, computer engineering, and applied Computing, CSCE 2023
作者: Zahran, Bassam Abu Zahra, Fuad University of Wisconsin Dept of Computer Science and Software Engineering PlattevilleWI United States University of Wisconsin Dept of Engineering and Applied Sciences MilwaukeeWI United States
information Technology and Operational Technology convergence refers to the integration and merge of iT and OT systems within an organization. Several protocols are commonly used in iT/OT convergence to facilitate com... 详细信息
来源: 评论
injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3605-3622页
作者: Abdulgbar A.R.Farea Gehad Abdullah Amran Ebraheem Farea Amerah Alabrah Ahmed A.Abdulraheem Muhammad Mursil Mohammed A.A.Al-qaness School of Big Data&Software Engineering Chongqing UniversityChongqing401331China Department of Management Science Engineering Dalian University of TechnologyDalian116024China Software College Northeastern UniversityShenyang110169China Department of Information Systems College of Computer and Information ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Management Science and Engineering South China University of TechnologyGuangzhou510641China Department of Computer Engineering and Mathematics University of Rovira i VirgiliTarragonaSpain College of Physics and Electronic Information Engineering Zhejiang Normal UniversityJinhua321004China
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying lev... 详细信息
来源: 评论
Cyber Security Threats on Multifunctional Devices and Mitigation Techniques  2
Cyber Security Threats on Multifunctional Devices and Mitiga...
收藏 引用
2nd international Conference on Business Analytics for Technology and Security, iCBATS 2023
作者: Al-Dmour, Nidal A. Farooq, Umer Sarwar, irfan iqbal, Muhammad Waseem Aqeel, Muhammad Khan, Wasim Ahmad Al Hamadi, Hussam Mutah University College of Engineering Department of Computer Engineering Jordan LGU Department of Computer Science Lahore Pakistan Superior University Department of Computer Science Lahore54000 Pakistan Superior University Department of Software Engineering Lahore54000 Pakistan NCBA&E Lahore School of Computer Science Pakistan Applied Science Research Center Applied Science Private University Amman11937 Jordan University of Dubai College of Engineering and IT PO Box 14143 United Arab Emirates
The risks discussed in this document are related to smart printers/ fax/ photocopiers/ or e-mail-enabled smart devices, also known as "document centers,". These devices can be purchased outright or rented ev... 详细信息
来源: 评论
Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two Nodes  25
Maximize Leader Election Algorithm Performance in Bi-Directi...
收藏 引用
25th international Arab Conference on information Technology, ACiT 2024
作者: Al Refai, Mohammed N. Fawareh, Hamed Aljawawdeh, Hamzeh Alshraiedeh, Fuad Sameh Al-Quraan, Mohammad Al-Odat, Hisham Ali Otoom, Ahmed Jamhawi, Zeyad M. Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Zarqa Jordan Applied Science Private University Department of Cyber Security Amman Jordan Applied Science Private University Department of Computer Science Amman Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
The process of selecting a leader to avoid instability in distributed system network after leader failure is called Leader Election Algorithm (LEA). This process becomes more complicated when it faces intermittent or ... 详细信息
来源: 评论