咨询与建议

限定检索结果

文献类型

  • 1,572 篇 期刊文献
  • 704 篇 会议
  • 36 册 图书

馆藏范围

  • 2,312 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,413 篇 理学
    • 1,047 篇 物理学
    • 280 篇 数学
    • 194 篇 化学
    • 117 篇 生物学
    • 110 篇 统计学(可授理学、...
    • 92 篇 天文学
    • 77 篇 地球物理学
  • 1,270 篇 工学
    • 558 篇 计算机科学与技术...
    • 456 篇 软件工程
    • 331 篇 核科学与技术
    • 155 篇 信息与通信工程
    • 131 篇 化学工程与技术
    • 127 篇 控制科学与工程
    • 122 篇 电气工程
    • 108 篇 电子科学与技术(可...
    • 89 篇 生物工程
    • 80 篇 仪器科学与技术
    • 75 篇 生物医学工程(可授...
    • 63 篇 光学工程
    • 56 篇 机械工程
    • 41 篇 力学(可授工学、理...
    • 39 篇 动力工程及工程热...
    • 39 篇 航空宇航科学与技...
    • 38 篇 材料科学与工程(可...
  • 211 篇 管理学
    • 137 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 93 篇 医学
    • 80 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 45 篇 药学(可授医学、理...
  • 29 篇 法学
  • 28 篇 经济学
  • 17 篇 教育学
  • 13 篇 农学
  • 6 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 98 篇 hadron colliders
  • 91 篇 hadrons
  • 58 篇 bosons
  • 55 篇 hadronic decays
  • 50 篇 particle decays
  • 49 篇 bottom mesons
  • 39 篇 software enginee...
  • 38 篇 deep learning
  • 38 篇 machine learning
  • 37 篇 branching fracti...
  • 36 篇 leptonic, semile...
  • 35 篇 supersymmetry
  • 34 篇 flavor changing ...
  • 32 篇 higgs bosons
  • 32 篇 particle product...
  • 31 篇 hadron-hadron sc...
  • 31 篇 electroweak inte...
  • 30 篇 quantum chromody...
  • 30 篇 artificial intel...
  • 29 篇 tellurium compou...

机构

  • 882 篇 department of ph...
  • 879 篇 cavendish labora...
  • 844 篇 physikalisches i...
  • 826 篇 oliver lodge lab...
  • 572 篇 iccub universita...
  • 549 篇 university of ch...
  • 536 篇 infn laboratori ...
  • 521 篇 horia hulubei na...
  • 521 篇 infn sezione di ...
  • 517 篇 h.h. wills physi...
  • 516 篇 infn sezione di ...
  • 516 篇 school of physic...
  • 514 篇 department of ph...
  • 503 篇 van swinderen in...
  • 501 篇 fakultät physik ...
  • 496 篇 imperial college...
  • 491 篇 stfc rutherford ...
  • 490 篇 institute of par...
  • 486 篇 nikhef national ...
  • 484 篇 infn sezione di ...

作者

  • 306 篇 barter w.
  • 290 篇 beiter a.
  • 279 篇 bellee v.
  • 274 篇 betancourt c.
  • 270 篇 blake t.
  • 267 篇 brundu d.
  • 267 篇 borsato m.
  • 265 篇 bowcock t.j.v.
  • 264 篇 amato s.
  • 263 篇 boettcher t.
  • 259 篇 bencivenni g.
  • 254 篇 bay a.
  • 253 篇 artuso m.
  • 253 篇 berezhnoy a.
  • 251 篇 calabrese r.
  • 249 篇 campana p.
  • 249 篇 burr c.
  • 249 篇 amhis y.
  • 247 篇 albrecht j.
  • 244 篇 akar s.

语言

  • 2,032 篇 英文
  • 277 篇 其他
  • 5 篇 中文
检索条件"机构=Applied Computer Science I-Software Engineering"
2312 条 记 录,以下是51-60 订阅
排序:
Custom Hidden Markov Models for Effective Part-of-Speech Tagging  18
Custom Hidden Markov Models for Effective Part-of-Speech Tag...
收藏 引用
18th iEEE international Conference on Emerging Technologies, iCET 2023
作者: Khalid, Hassan Bin Siddique, Abu Bakar Ali, Raja Hashim Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany
Hidden Markov Models have proved to be a very significant tool for various time-series related problems, especially where context is important. One such problem is Part-of-speech tagging. The work uses a customized HM... 详细信息
来源: 评论
A Nature-inspired Ai Framework for Accurate Glaucoma Diagnosis
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 539-567页
作者: Jahanzaib Latif Ahsan Wajahat Alishba Tahir Anas Bilal Mohammed Zakariah Abeer Alnuaim School of Software Northwestern Polytechnical UniversityXi’an710072China Shifa College of Medicine Shifa Tameer-e-millat UniversityIslamabad44000Pakistan College of Information Science and Technology Hainan Normal UniversityHaikou571158China Department of Computer Science and Engineering College of Applied Studies and Community ServiceKing Saud UniversityRiyadh11495Saudi Arabia
Glaucoma,a leading cause of blindness,demands early detection for effective *** Ai-based diagnostic systems are gaining traction,their performance is often limited by challenges such as varying image backgrounds,pixel... 详细信息
来源: 评论
Light field super-resolution using complementary-view feature attention
收藏 引用
Computational Visual Media 2023年 第4期9卷 843-858页
作者: Wei Zhang Wei Ke Da Yang Hao Sheng Zhang Xiong Faculty of Applied Sciences Macao Polytechnic UniversityMacao SAR 999078China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191Chinaand Beihang Hangzhou Innovation Institute YuhangXixi Octagon CityYuhang DistrictHangzhou 310023China
Light field(LF)cameras record multiple perspectives by a sparse sampling of real scenes,and these perspectives provide complementary *** information is beneficial to LF super-resolution(LFSR).Compared with traditional... 详细信息
来源: 评论
Diabetes Prediction Using Machine Learning Techniques: A Case Study from Jordan  25
Diabetes Prediction Using Machine Learning Techniques: A Cas...
收藏 引用
25th international Arab Conference on information Technology, ACiT 2024
作者: Alazaidah, Raed Batyha, Radwan Samara, Ghassan Al Henawi, Esraa Al-Safarini, Maram Y. Samhan, Ahmad A. Elrashidi, Ali Alluwaici, Mo'Ath Al-Omari, Deana It Zarqa University Department of Data Science Ai Faculty Zarqa Jordan Private University Department of Computer Science Faculty of It Applied Science Amman Jordan Zarqa University Department of Computer Science Faculty of It Zarqa Jordan Zarqa University Department of Software Engineering Faculty of It Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Diabetes is one of the most common diseases in Jordan. it is the main reason of death among Jordanian adult citizens. Worldwide, 48% of all deaths are due to Diabetes occurred before the age of 70 years. Hence, this r... 详细信息
来源: 评论
Enhancing Password Security: Analyzing Password Management Practices Among iT Students  7
Enhancing Password Security: Analyzing Password Management P...
收藏 引用
7th iEEE international Conference and Workshop Obuda on Electrical and Power engineering, CANDO-EPE 2024
作者: Kollar, Anita Mihalovicsne Katona, Jozsef Institute of Computer Engineering University of Dunaujvaros Department of Software Development and Application Dunaujvaros Hungary John Von Neumann University GAMF Faculty of Engineering and Computer Science Kecskemet Hungary Budapest Business University Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Hungary
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha... 详细信息
来源: 评论
A Secure and Reliable Supply chain management approach integrated with ioT and Blockchain  2
A Secure and Reliable Supply chain management approach integ...
收藏 引用
2nd international Conference on Business Analytics for Technology and Security, iCBATS 2023
作者: Ashraf, Humaira Hanif, Maria ihsan, Uswa Al-Quayed, Fatima Humayun, Mamoona Jhanjhi, N.Z. International Islamic University Islamabad Department of Computer Science and Software Engineering Islamabad Pakistan Jouf University College of Computer and Information Sciences Department of Computer Science Sakakah Saudi Arabia Jouf University College of Computer and Information Sciences Department of Information Systems Sakakah Saudi Arabia Malaysia Applied Science Research Center Applied Science Private University Amman11937 Jordan
Nowadays, secure and reliable management of logistics is highly needed. Logistics is the delivery of goods from producers to legitimate consumers in accurate amounts and good conditions. The use of low-capable sensor ... 详细信息
来源: 评论
MABPD: Mobile Agent-Based Prevention and Black Hole Attack Detection in Wireless Sensor Networks  2
MABPD: Mobile Agent-Based Prevention and Black Hole Attack D...
收藏 引用
2nd international Conference on Business Analytics for Technology and Security, iCBATS 2023
作者: Ashraf, Humaira Khan, Fizza ihsan, Uswa Al-Quayed, Fatima Jhanjhi, N.Z. Humayun, Mamoona International Islamic University Islamabad Department of Computer Science and Software Engineering Islamabad Pakistan Jouf University College of Computer and Information Sciences Department of Computer Science Sakakah Saudi Arabia Malaysia Applied Science Private University Applied Science Research Center Amman11937 Jordan Jouf University College of Computer and Information Sciences Department of Information Systems Sakakah Saudi Arabia
With the advancement and availability of the internet in the present age, everything is being wireless. Be it our home appliances or high defined monitoring systems, Wireless sensor networks play an important role. Bu... 详细信息
来源: 评论
Harris Hawks Optimizer with Graph Convolutional Network Based Weed Detection in Precision Agriculture
收藏 引用
computer Systems science & engineering 2023年 第8期46卷 1533-1547页
作者: Saud Yonbawi Sultan Alahmari T.Satyanarayana Murthy Padmakar Maddala E.Laxmi Lydia Seifedine Kadry Jungeun Kim Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia King Abdul Aziz City for Science and Technology RiyadhKingdom of Saudi Arabia Chaitanya Bharathi Institute of Technology HyderabadTelanganaIndia Department of Civil Engineering Vignan’s Institute of Information and Technology(A)DuvvadaVisakhapatnamAP530049India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Applied Data Science Noroff University CollegeKristiansandNorway Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjmanUnited Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityByblosLebanon Department of Software Kongju National UniversityCheonan31080Korea
Precision agriculture includes the optimum and adequate use of resources depending on several variables that govern crop *** agriculture offers a novel solution utilizing a systematic technique for current agricultura... 详细信息
来源: 评论
iT-Security Risk Based Approach for Secure Operation of Distributed Data Platforms in Supply Chains
IT-Security Risk Based Approach for Secure Operation of Dist...
收藏 引用
2024 iEEE international Conference on industrial engineering and engineering Management, iEEM 2024
作者: Voß, Marvin Kallisch, Jonas Runge, Maxim Theus, Tobias Niemann, Karl-Heinz Wunck, Christoph Faculty I - Electrical Engineering and Information Technology University of Applied Sciences and Arts Hannover Germany Department of Engineering Section Electrical Engineering and Computer Science University of Applied Sciences Leer Emden Germany Faculty of Mathematics Informatics and Statistics Ludwig Maximilian University Munich Germany
This paper presents the development of a secure data platform designed to enhance operational efficiency and to facilitate cross-company collaboration within the manufacturing supply chain. The platform is designed to... 详细信息
来源: 评论
A Comparative Study of the Performance of Real time databases and Big data Analytics Frameworks  7
A Comparative Study of the Performance of Real time database...
收藏 引用
7th international Multi-Topic iCT Conference: iMTiC 2023
作者: Mustafa, Syed Muhammd Nabeel Farooq, Muhammad Umer Zehra, Syeda Sundus Noronha, Jospeh Peter Terenece Ned University of Engineering and Technology Dept. of Computer Science & I.T Karachi Pakistan Sir Syed University of Engineering and Technology Dept. of Software Engineering Karachi Pakistan
The amelioration of information technology and the infiltration of it almost all the sectors of world have resulted in massive efflux of data. The rampant increase in the generation of data has introduced to a new ter... 详细信息
来源: 评论