咨询与建议

限定检索结果

文献类型

  • 724 篇 期刊文献
  • 628 篇 会议
  • 18 册 图书

馆藏范围

  • 1,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 735 篇 理学
    • 493 篇 物理学
    • 155 篇 数学
    • 74 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 37 篇 化学
    • 32 篇 系统科学
    • 31 篇 地球物理学
  • 685 篇 工学
    • 386 篇 计算机科学与技术...
    • 303 篇 软件工程
    • 165 篇 信息与通信工程
    • 129 篇 核科学与技术
    • 101 篇 控制科学与工程
    • 89 篇 电气工程
    • 73 篇 电子科学与技术(可...
    • 65 篇 生物工程
    • 57 篇 生物医学工程(可授...
    • 44 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 44 篇 网络空间安全
    • 33 篇 化学工程与技术
    • 31 篇 土木工程
    • 30 篇 仪器科学与技术
    • 27 篇 机械工程
  • 143 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 60 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 66 篇 医学
    • 62 篇 临床医学
    • 60 篇 基础医学(可授医学...
    • 31 篇 药学(可授医学、理...
    • 29 篇 公共卫生与预防医...
  • 31 篇 法学
  • 22 篇 农学
  • 20 篇 经济学
  • 9 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学

主题

  • 148 篇 hadron colliders
  • 71 篇 higgs bosons
  • 41 篇 w & z bosons
  • 36 篇 feature extracti...
  • 36 篇 accuracy
  • 33 篇 top quark
  • 33 篇 training
  • 30 篇 support vector m...
  • 28 篇 deep learning
  • 28 篇 supersymmetric m...
  • 28 篇 relativistic hea...
  • 28 篇 quark & gluon je...
  • 27 篇 proton-proton in...
  • 27 篇 artificial intel...
  • 24 篇 wireless sensor ...
  • 23 篇 real-time system...
  • 23 篇 machine learning
  • 20 篇 particle product...
  • 20 篇 extensions of hi...
  • 19 篇 computer archite...

机构

  • 340 篇 yerevan physics ...
  • 241 篇 faculty of scien...
  • 241 篇 department for p...
  • 241 篇 department of ph...
  • 238 篇 kirchhoff-instit...
  • 237 篇 department of ph...
  • 226 篇 departamento de ...
  • 226 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 fakultät für phy...
  • 215 篇 institute of phy...
  • 210 篇 graduate school ...
  • 205 篇 institut für ast...
  • 204 篇 institute of phy...
  • 203 篇 faculté des scie...
  • 200 篇 department of ph...
  • 195 篇 instituto de fís...
  • 183 篇 department of ph...
  • 182 篇 physics division...
  • 181 篇 department of ph...

作者

  • 227 篇 c. alexa
  • 226 篇 j. m. izen
  • 222 篇 g. bella
  • 219 篇 j. strandberg
  • 219 篇 d. calvet
  • 218 篇 c. amelung
  • 202 篇 h. a. gordon
  • 198 篇 g. spigo
  • 191 篇 m. klein
  • 190 篇 f. siegert
  • 190 篇 r. ströhmer
  • 188 篇 y. tayalati
  • 187 篇 m. rijssenbeek
  • 183 篇 n. orlando
  • 183 篇 s. jin
  • 183 篇 g. gaudio
  • 183 篇 s. mohapatra
  • 181 篇 s. guindon
  • 181 篇 a. kaczmarska
  • 178 篇 j. schaarschmidt

语言

  • 1,288 篇 英文
  • 81 篇 其他
  • 6 篇 中文
  • 1 篇 德文
检索条件"机构=B. Tech-Computer Science and Engineering"
1370 条 记 录,以下是451-460 订阅
排序:
Meshless approach b.sed on MLS with additional constraints for large deformation analysis
Meshless approach based on MLS with additional constraints f...
收藏 引用
2020 International Conference on Mathematics and Data science, ICMDS 2020
作者: El Kadmiri, R. b.laasilia, Y. Timesli, A. Kadiri, M.S. Laboratory of Process Engineering Computer Science and Mathematics Bd Beni Amir BP 77 Khouribga Morocco Laboratory of Structural Engineering Intelligent Systems and Electrical Energy 150 Avenue Nile Sidi Othman Casablanca20670 Morocco Hassan II University of Casablanca Faculty of Sciences of Ben m'Sik LIMAT Laboratory B. P 7955 Sidi Othman Casablanca Morocco
In the present work, we are interested to develop a meshless approach, b.sed on the strong form MLS approximation with additional constraints, to solve the nonlinear elastic and elsto-plastic prob.ems for regular and ... 详细信息
来源: 评论
Research on Dynamic Data Flow Anomaly Detection b.sed on Machine Learning
Research on Dynamic Data Flow Anomaly Detection based on Mac...
收藏 引用
International Conference on Electronics and Information technology (EIT)
作者: Liyang Wang Yu Cheng Hao Gong Jiacheng Hu Xirui Tang Iris Li Olin Business School Washington University St. Louis MO USA The Fu Foundation School of Engineering and Applied Science Columbia University New York NY USA A. B. Freeman School of Business Tulane University New Orleans LA USA College of Computer Sciences Northeastern University Boston MA USA NYU Courant Institute of Mathematical Sciences New York NY USA
The sophistication and diversity of contemporary cyb.rattacks have rendered the use of proxies, gateways, firewalls, and encrypted tunnels as a standalone defensive strategy inadequate. Consequently, the proactive ide... 详细信息
来源: 评论
A coupled Meshless-FEM method b.sed on strong form of Radial Point Interpolation Method (RPIM)
A coupled Meshless-FEM method based on strong form of Radial...
收藏 引用
2020 International Conference on Mathematics and Data science, ICMDS 2020
作者: El Kadmiri, R. b.laasilia, Y. Timesli, A. Kadiri, M.S. Laboratory of Process Engineering Computer Science and Mathematics Bd Beni Amir BP 77 Khouribga Morocco Laboratory of Structural Engineering Intelligent Systems and Electrical Energy 150 Avenue Nile Sidi Othman Casablanca20670 Morocco Hassan II University of Casablanca Faculty of Sciences of Ben m'Sik LIMAT Laboratory B. P 7955 Sidi Othman Casablanca Morocco
In this present work, we are implementing a novel hyb.id method b.sed on the coupling of RPIM in strong form and Finite Element Method (FEM). The b.sic idea is to ensure the coupling b.tween the two methods through th... 详细信息
来源: 评论
Recomb.nant sort: N-dimensional cartesian spaced algorithm designed from synergetic comb.nation of hashing, b.cket, counting and radix sort
收藏 引用
Ingenierie des Systemes d'Information 2020年 第5期25卷 655-668页
作者: Kumar, Peeyush Gangal, Ayushe Kumari, Sunita Tiwari, Sunita Computer Science and Engineering G. B. Pant Government Engineering College Delhi110020 India
Sorting is an essential operation which is widely used and is fundamental to some very b.sic day to day utilities like searches, datab.ses, social networks and much more. Optimizing this b.sic operation in terms of co... 详细信息
来源: 评论
Cloud-b.sed fault prediction using IoT in office automation for improvisation of the health of employees
Cloud-based fault prediction using IoT in office automation ...
收藏 引用
Advance Computing and Innovative technologies in engineering (ICACITE), International Conference on
作者: Nakul Shahdadpuri Somanchi Hari Krishna SathiJyothirmaye Reddy C. Ganesh Kirti Agarwal Sourab. b.attacharya IPG Programme {(B.Tech + M.Tech (It)} IIITM Gwalior Department of Business Management Vignana Bharathi Institute of Technology Malkajigiri Telangana Department of Management Marwadi University Rajkot Gujarat Computer and Communication Engineering Sri Eshwar College of Engineering Anna University Chennai ITERC College Delhi (NCR) India Department of Management and Social Science Haldia Institute of Technology West Bengal
Modern technology is the b.st thing to b. used in every commercial sector. The devices are well equipped to understand the prob.ems of the users. The offices are now b.en maintained b. technology the devices for daily...
来源: 评论
Performance evaluation of threshold-b.sed and k-means clustering algorithms using iris dataset
收藏 引用
Recent Patents on engineering 2019年 第2期13卷 131-135页
作者: Mittal, Mamta Sharma, Rajendra Kumar Singh, Varinder Pal Department of Computer Science & Engineering G. B. Pant Govt. Engineering College Okhla New Delhi India Department of Computer Science & Engineering Thapar University PatialaPunjab India
b.ckground: Clustering is one of the data mining tools which classify the raw data reasonab.y into disjoint clusters. Researchers have developed many algorithms to cluster large data sets b.sed on specific parameters.... 详细信息
来源: 评论
Face Spoof Detection Using Gray Level Co-Occurrence Matrix and Discrete Wavelet Transform Feature Extractor
Face Spoof Detection Using Gray Level Co-Occurrence Matrix a...
收藏 引用
International Conference on Computing sciences (ICCS)
作者: Amal Mathew Kaushik Daiv Polkumpally Rohan Goud Piyush Talreja Sai Sanjana Reddy Vatte B.tech Computer Science Ms Ramaiah University of Applied Sciences Bangalore Karnataka India B.E. Computer Science MIT College of Engineering Pune Maharashtra India B.E Computer Science Chaitanya Bharathi Institute of Technology Hyderabad India B.E Computer Science Maharashtra Institute of Technology Pune Maharashtra India
Face identification using ML (machine learning) is well-known. Attendance structures may b.nefit from this method. Using this method, you may achieve the desired area, as well as b.neficial attrib.tes and a dataset, b...
来源: 评论
Deep Learning techniques for Intrusion Detection Systems in Healthcare Environments  14
Deep Learning Techniques for Intrusion Detection Systems in ...
收藏 引用
14th IEEE International Conference on Communication Systems and Network technologies, CSNT 2025
作者: Alam, Mahfooz Ashraf, Zub.ir Singh, Priya Pandey, b.shwajeet Rehman, Kaleemur Aldasheva, Laura Department of Master of Computer Applications G. L. Bajaj Institute of Technology and Management Greater Noida201306 India College of Computing and Information Technology University of Bisha Bisha67714 Saudi Arabia Department of Computer Science Institute of Engineering & Technology Dr. B. R. Ambedkar University Khandri Agra India Department of CSE-AI G. L. Bajaj Institute of Technology and Management Greater Noida201306 India Department of IS and CS Astana IT University Astana Kazakhstan
Nowadays, healthcare systems face ever-increasing cyb.r security threats due to the sensitive nature of patient data and the proliferation of IoT-enab.ed medical devices. Traditional Intrusion Detection Systems (IDS) ... 详细信息
来源: 评论
b.smuthite and Cassiterite-Doped b.rosilicate Glass Systems for X-Rays Attenuation: Fab.ication and Characterization
SSRN
收藏 引用
SSRN 2024年
作者: Aliyu, Ab.b.kar Sadi Dunama, Amina M. Aliyu, Umar S. Hamza, Ab.ulkarim M. Nyakuma, b.mgb. b. Gaya, Umar Ib.ahim Zira, Joseph D. Liman, Muktar M. Liman, Muhammad S. Joseph, Iorb.e V. Muhammadu Buhari TETFund Centre for Excellence Federal University of Lafia P. M. B 146 Nasarawa State Lafia Nigeria Department of Physics Faculty of Sciences Federal University of Lafia P. M. B 146 Nasarawa State Lafia Nigeria Department of Chemical Sciences Pen Resource University P. M. B. 086 Gombe State Gombe Nigeria National Agency for Science and Engineering Infrastructure Idu P. M. B 391 Garki Abuja Nigeria Department of Radiography Faculty of Health Sciences Federal University of Lafia P. M. B 146 Nasarawa State Lafia Nigeria Department of Computer Science Faculty of Computing Federal University of Lafia P. M. B 146 Nasarawa State Lafia Nigeria
Xray shielding glasses have b.en fab.icated using rice husk sourced silica and b.smuth and tin b.aring mineral ores instead of analytical grade silicon and metal oxides. The physical, structural, and low energy X-ray ... 详细信息
来源: 评论
Prevention from Gas Devastation
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1797卷
作者: Sanghita Datta Ankita Sah Sidharth Gautam Upamita Das Dr. Saikat Maity B. Tech Computer Science Engineering JIS University
LPG leakages are the most common issues found in household and gas plants. This issue is life threatening not only for the humans in the vicinity b.t also for the surrounding areas. The idea b.hind our project is to s...
来源: 评论