咨询与建议

限定检索结果

文献类型

  • 1,330 篇 期刊文献
  • 1,036 篇 会议
  • 31 册 图书

馆藏范围

  • 2,397 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,539 篇 工学
    • 776 篇 计算机科学与技术...
    • 587 篇 软件工程
    • 223 篇 信息与通信工程
    • 203 篇 核科学与技术
    • 173 篇 电气工程
    • 170 篇 控制科学与工程
    • 159 篇 电子科学与技术(可...
    • 151 篇 仪器科学与技术
    • 148 篇 生物工程
    • 112 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 100 篇 光学工程
    • 98 篇 化学工程与技术
    • 94 篇 机械工程
    • 90 篇 土木工程
    • 73 篇 材料科学与工程(可...
    • 66 篇 建筑学
  • 1,190 篇 理学
    • 604 篇 物理学
    • 374 篇 数学
    • 189 篇 生物学
    • 131 篇 地球物理学
    • 127 篇 统计学(可授理学、...
    • 119 篇 化学
    • 96 篇 天文学
    • 81 篇 系统科学
  • 316 篇 管理学
    • 220 篇 管理科学与工程(可...
    • 128 篇 工商管理
    • 97 篇 图书情报与档案管...
  • 127 篇 医学
    • 105 篇 临床医学
    • 83 篇 基础医学(可授医学...
  • 50 篇 法学
  • 47 篇 经济学
  • 39 篇 农学
  • 21 篇 教育学
  • 7 篇 文学
  • 4 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 116 篇 hadron colliders
  • 70 篇 computer science
  • 70 篇 computer archite...
  • 36 篇 artificial intel...
  • 33 篇 deep learning
  • 32 篇 neutrons
  • 31 篇 w & z bosons
  • 31 篇 hardware
  • 30 篇 machine learning
  • 27 篇 higgs bosons
  • 27 篇 computational mo...
  • 26 篇 optimization
  • 24 篇 wireless sensor ...
  • 23 篇 application soft...
  • 23 篇 educational inst...
  • 21 篇 genetic algorith...
  • 21 篇 training
  • 20 篇 top quark
  • 19 篇 electronic mail
  • 19 篇 neural networks

机构

  • 311 篇 yerevan physics ...
  • 164 篇 department for p...
  • 163 篇 faculty of scien...
  • 162 篇 department of ph...
  • 162 篇 departamento de ...
  • 162 篇 department of ph...
  • 157 篇 faculté des scie...
  • 155 篇 kirchhoff-instit...
  • 152 篇 department of ph...
  • 150 篇 department of ph...
  • 148 篇 department of ph...
  • 146 篇 institute of phy...
  • 143 篇 fakultät für phy...
  • 141 篇 national and kap...
  • 141 篇 centro brasileir...
  • 141 篇 national scienti...
  • 140 篇 istanbul technic...
  • 139 篇 universidad iber...
  • 137 篇 university of sp...
  • 136 篇 brunel universit...

作者

  • 203 篇 c. hensel
  • 157 篇 c. alexa
  • 156 篇 j. m. izen
  • 149 篇 k. bos
  • 147 篇 g. bella
  • 145 篇 j. strandberg
  • 144 篇 d. calvet
  • 142 篇 c. amelung
  • 133 篇 ardid m.
  • 131 篇 g. spigo
  • 130 篇 h. a. gordon
  • 130 篇 f. siegert
  • 130 篇 e. hines
  • 128 篇 a. c. könig
  • 128 篇 m. klein
  • 128 篇 r. ströhmer
  • 127 篇 h. sakamoto
  • 124 篇 f. pastore
  • 124 篇 a. antonov
  • 124 篇 m. rijssenbeek

语言

  • 2,164 篇 英文
  • 207 篇 其他
  • 22 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Architecture and Technology Section Computer Science Department"
2397 条 记 录,以下是121-130 订阅
排序:
Exploring 2D representation and transfer learning techniques for indoor localization
收藏 引用
Multimedia Tools and Applications 2025年 1-13页
作者: Kerdjidj, O. Himeur, Y. Atalla, S. Copiaco, A. Sohail, S.S. Amira, A. Fadli, F. Mansoor, W. Gawanmeh, A. Centre of Development of Advanced Techniques Algiers Algeria College of Engineering and Information Technology University of Dubai Dubai United Arab Emirates Department of Computer Science University of Sharjah Sharjah United Arab Emirates Institute of Artificial Intelligence De Montfort University Leicester United Kingdom School of Computing Science and Engineering VIT Bhopal University Kothri Kalan India Department of Architecture & Urban Planning Qatar University Doha2713 Qatar
Indoor localization (IL) plays a critical role in various applications, including asset tracking, emergency response, and indoor navigation. Traditional methods relying on one-dimensional (1D) representations of recei... 详细信息
来源: 评论
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论
Towards Automated BIM and BEM Model Generation using a B-Rep-based Method with Topological Map
Towards Automated BIM and BEM Model Generation using a B-Rep...
收藏 引用
2024 Mid-term Symposium on Spatial Information to Empower the Metaverse
作者: Roman, Oscar Mazzacca, Gabriele Farella, Elisa Mariarosaria Remondino, Fabio Bassier, Maarten Agugiaro, Giorgio Trento Italy University of Trento Trento Italy Department of Mathematics Computer Science and Physics University of Udine Italy Department of Civil Engineering TC Construction - Geomatics KU Leuven Faculty of Engineering Technology Ghent Belgium School of Architecture and Built Environment Delft University of Technology Netherlands
In many countries, recent boosts in the construction and renovation sectors and energy efficiency directives are driving a growing interest in the built environment among designers and maintainers. In this context, cu... 详细信息
来源: 评论
AN ACTIVE LEARNING PROCEDURE FOR THE INTERAURAL TIME DIFFERENCE DISCRIMINATION THRESHOLD  26
AN ACTIVE LEARNING PROCEDURE FOR THE INTERAURAL TIME DIFFERE...
收藏 引用
26th International Conference on Digital Audio Effects, DAFx 2023
作者: Gulli, Andrea Fontana, Federico Serafin, Stefania Geronazzo, Michele Department of Mathematics Computer Science and Physics Università di Udine Udine Italy Department of Architecture Design and Media Technology Aalborg University Copenhagen Denmark Department of Engineering and Management Università di Padova Padua Italy
Measuring the auditory lateralization elicited by interaural time difference (ITD) cues involves the estimation of a psychometric function (PF). The shape of this function usually follows from the analysis of the subj... 详细信息
来源: 评论
SiamCircle: Trajectory Representation Learning in Free Settings  23rd
SiamCircle: Trajectory Representation Learning in Free Sett...
收藏 引用
23rd International Symposium on Intelligent Data Analysis, IDA 2025
作者: Nasri, Maedeh Baratchi, Mitra Koutamanis, Alexander Rieffe, Carolien Department of Developmental Psychology Leiden University Leiden Netherlands Leiden Institute of Advanced Computer Science Leiden University Leiden Netherlands Faculty of Architecture and the Built Environment Delft University of Technology Delft Netherlands Faculty of Electrical Engineering Mathematics and Computer Science University of Twente Enschede Netherlands Department of Psychology and Human Development Institute of Education UCL London United Kingdom
Trajectory representation learning (TRL) is an intermediate step in handling trajectory data to realize various downstream machine-learning tasks. While most previous TRL research focuses on modeling structured moveme... 详细信息
来源: 评论
Landscape of sign language research based on smartphone apps: coherent literature analysis, motivations, open challenges, recommendations and future directions for app assessment
收藏 引用
Universal Access in the Information Society 2024年 第2期23卷 687-702页
作者: David, Dianes Alamoodi, A.H. Albahri, O.S. Zaidan, B.B. Zaidan, A.A. Garfan, Salem Ismail, Amelia Ritahani Albahri, A.S. Alsinglawi, Belal Malik, R.Q. Perak Malaysia Future Technology Research Center National Yunlin University of Science and Technology 123 University Road Section 3 Yunlin Douliou64002 Taiwan Faculty of Engineering and IT The British University in Dubai Dubai United Arab Emirates International Islamic University Malaysia Kuala Lumpur Malaysia Baghdad Iraq School of Computer Data and Mathematical Sciences Western Sydney University Sydney Australia Medical Intrumentation Techniques Engineering Department Al-Mustaqbal University College Babylon Iraq Computer Techniques Engineering Department Mazaya University College Thi-Qar Nassiriya Iraq
Numerous nations have prioritised the inclusion of citizens with disabilities, such as hearing loss, in all aspects of social life. Sign language is used by this population, yet they still have trouble communicating w... 详细信息
来源: 评论
Exploiting autoencoder’s weakness to generate pseudo anomalies
收藏 引用
Neural Computing and Applications 2024年 第23期36卷 14075-14091页
作者: Astrid, Marcella Zaheer, Muhammad Zaigham Aouada, Djamila Lee, Seung-Ik Department of Artificial Intelligence University of Science and Technology Daejeon34113 Korea Republic of Field Robotics Research Section Electronics and Telecommunications Research Institute Daejeon34129 Korea Republic of Interdisciplinary Centre for Security Reliability and Trust University of Luxembourg Luxembourg1855 Luxembourg Department of Computer Vision Mohamed Bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates
Due to the rare occurrence of anomalous events, a typical approach to anomaly detection is to train an autoencoder (AE) with normal data only so that it learns the patterns or representations of the normal training da... 详细信息
来源: 评论
An Efficient Intrusion Detection System using Advanced Machine Learning Techniques in SDN for Healthcare System
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Asif, Muhammad Waseem Aqdus, Aqsa Amin, Rashid Chaudhry, Shehzad Ashraf Alsubaei, Faisal S. Iqbal, Sajid Department of Computer Science and IT The University of Lahore Lahore54000 Pakistan Department of Computer Science University of Chakwal Chakwal48800 Pakistan Department of Computer Science and Information Technology College of Engineering Abu Dhabi University Abu Dhabi United Arab Emirates Department of Software Engineering Faculty of Engineering and Architecture Nisantasi University Istanbul Turkey The Department of Cybersecurity College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
The quick advancement of healthcare systems necessitates robust and efficient network security keys to defend sensitive patient records and guarantee uninterrupted service delivery. The current IDS has many challenges... 详细信息
来源: 评论
A novel Cross-Layer Protocols for Resource Allocation in Mobile Networks  15
A novel Cross-Layer Protocols for Resource Allocation in Mob...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Giri, Rakesh Kumar Vittapu, Mani Sarma Dev, Anoop Shewale, Chaitali R. Majid, Mohd Aliff Abdul Kulkarni, Nandini Sunrise University Alwar Department of Computer Science and Engineering India Mallareddy Engineering College and Management Sciences Department of Computer Science and Engineering Kistapur Village Medchal Telangana Hyderabad India Chitkara University Centre of Research Impact and Outcome Punjab Rajpura India Vishwakarma Institute of Technology Department of Information Technology Pune India University Teknology MARA Faculty of Hotel and Tourism Management Department of Foodservice Management Malaysia Symbiosis International University Department of Symbiosis School of Planning Architecture and Design Nagpur Nagpur India
Cross-layer Protocols for proper resource Allocation in Mobile Networks are a singular technique to enhance the efficiency of wireless networks. The method utilizes multiple layers of the radio protocol stack better t... 详细信息
来源: 评论
A New Belief-Based Incomplete Pattern Unsupervised Classification Method : Extended Abstract  39
A New Belief-Based Incomplete Pattern Unsupervised Classific...
收藏 引用
39th IEEE International Conference on Data Engineering, ICDE 2023
作者: Zhang, Zuowei Liu, Zhe Ma, Zongfang Zhang, Yiru Wang, Hao University of Rennes 1 Institut de Recherche en Informatique et Systèmes Aléatoires France Xi'an University of Architecture and Technology School of Information and Control Engineering China Norwegian University of Science and Technology Department of Computer Science Norway
Imputing the incomplete patterns in clustering tasks is a common but risky procedure, because the estimated values may affect the real distribution of the data and deteriorate the results. To address this problem, a n... 详细信息
来源: 评论