咨询与建议

限定检索结果

文献类型

  • 1,891 篇 期刊文献
  • 1,862 篇 会议
  • 82 册 图书

馆藏范围

  • 3,835 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,111 篇 工学
    • 1,319 篇 计算机科学与技术...
    • 1,066 篇 软件工程
    • 473 篇 信息与通信工程
    • 296 篇 生物医学工程(可授...
    • 263 篇 控制科学与工程
    • 261 篇 生物工程
    • 234 篇 电气工程
    • 229 篇 光学工程
    • 216 篇 电子科学与技术(可...
    • 177 篇 核科学与技术
    • 137 篇 仪器科学与技术
    • 124 篇 机械工程
    • 97 篇 化学工程与技术
    • 89 篇 动力工程及工程热...
    • 82 篇 材料科学与工程(可...
    • 75 篇 安全科学与工程
  • 1,649 篇 理学
    • 868 篇 物理学
    • 485 篇 数学
    • 354 篇 生物学
    • 180 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 111 篇 化学
  • 577 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 373 篇 医学
    • 297 篇 临床医学
    • 265 篇 基础医学(可授医学...
    • 151 篇 药学(可授医学、理...
    • 134 篇 公共卫生与预防医...
  • 91 篇 法学
    • 78 篇 社会学
  • 70 篇 教育学
  • 68 篇 经济学
  • 62 篇 农学
  • 12 篇 文学
  • 5 篇 军事学
  • 5 篇 艺术学

主题

  • 115 篇 informatics
  • 96 篇 hadron colliders
  • 93 篇 artificial intel...
  • 85 篇 machine learning
  • 68 篇 deep learning
  • 64 篇 higgs bosons
  • 57 篇 computer network...
  • 50 篇 accuracy
  • 48 篇 training
  • 47 篇 proton-proton in...
  • 41 篇 computational mo...
  • 40 篇 internet of thin...
  • 40 篇 computer archite...
  • 37 篇 quality of servi...
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 35 篇 costs
  • 35 篇 protocols
  • 35 篇 forecasting
  • 34 篇 semantics

机构

  • 409 篇 department for p...
  • 402 篇 faculty of scien...
  • 396 篇 department of ph...
  • 395 篇 kirchhoff-instit...
  • 383 篇 department of ph...
  • 381 篇 department of ph...
  • 370 篇 institute of phy...
  • 362 篇 fakultät für phy...
  • 360 篇 institute of phy...
  • 328 篇 instituto de fís...
  • 305 篇 department of ph...
  • 281 篇 department of ph...
  • 278 篇 department of ph...
  • 277 篇 nikhef national ...
  • 276 篇 graduate school ...
  • 275 篇 yerevan physics ...
  • 275 篇 dipartimento di ...
  • 273 篇 universidade fed...
  • 270 篇 department of ph...
  • 264 篇 ictp trieste

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 323 篇 g. spigo
  • 322 篇 f. siegert
  • 315 篇 r. ströhmer
  • 315 篇 m. rijssenbeek
  • 315 篇 s. jin
  • 315 篇 g. gaudio
  • 314 篇 s. mohapatra
  • 306 篇 s. guindon
  • 302 篇 a. kaczmarska
  • 297 篇 y. tayalati
  • 296 篇 j. schaarschmidt
  • 287 篇 a. d. pilkington
  • 281 篇 m. klein
  • 281 篇 l. chevalier

语言

  • 3,603 篇 英文
  • 196 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Computer Engineering and Informatics Department & Research Academic Computer Technology Institute"
3835 条 记 录,以下是341-350 订阅
排序:
Nature-Inspired Level Set Segmentation Model for 3D-MRI Brain Tumor Detection
收藏 引用
computers, Materials & Continua 2021年 第7期68卷 961-981页
作者: Oday Ali Hassen Sarmad Omar Abter Ansam A.Abdulhussein Saad M.Darwish Yasmine M.Ibrahim Walaa Sheta Department of Computer Techniques Engineering Imam Al-Kadhum College(IKC)WasitIraq University of Information Technology and Communications Media Technology Engineering DepartmentIraq University of Information Technology and Communications Baghdad10081Iraq Department of Information Technology Institute of Graduate Studies and ResearchAlexandria University63 Horreya AvenueEl–ShatbyAlexandria21526Egypt Informatics Research Institute City of Scientific Research and Technology ApplicationsBorg EL Arab21934Egypt
Medical image segmentation has consistently been a significant topic of research and a prominent goal,particularly in computer *** tumor research plays a major role in medical imaging applications by providing a treme... 详细信息
来源: 评论
SKIN_ML: An Efficient Approach for Skin Cancer Detection Using Soft Computing Methods  3
SKIN_ML: An Efficient Approach for Skin Cancer Detection Usi...
收藏 引用
3rd International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2023
作者: Abdelminaam, Diaa Salama Madbouly, Magda M. Farag, Mohamed S Gomaa, Ibrahim A Abd-Elghany Zeid, Magdy Abualigah, Laith Misr International University Faculty of Computer Science Cairo Egypt Benha University Faculty of Computers and Artificial Intelligence Benha Egypt Alexandria University Faculty of Computer and Data Science Alexandria Egypt Alobour High Institute for Computer and Informatics Computer Science Department Cairo Egypt Lebanese American University Department of Electrical and Computer Engineering Byblos13-5053 Lebanon Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19328 Jordan Middle East University Meu Research Unit Amman11831 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang 11800 Malaysia
In today's environment, cancer is a fatal disease. Skin cancer has become a fairly common malignancy due to the spread of several forms of cancer. Skin cancer is divided into two types: melanoma and non-melanoma. ... 详细信息
来源: 评论
Imitation Game for Adversarial Disillusion with Multimodal Generative Chain-of-Thought Role-Play
arXiv
收藏 引用
arXiv 2025年
作者: Chang, Ching-Chun Chen, Fan-Yun Gu, Shih-Hong Gao, Kai Wang, Hanrui Echizen, Isao Information and Society Research Division National Institute of Informatics Tokyo Japan Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
As the cornerstone of artificial intelligence, machine perception confronts a fundamental threat posed by adversarial illusions. These adversarial attacks manifest in two primary forms: deductive illusion, where speci... 详细信息
来源: 评论
Metric Dimension and Geodetic Set Parameterized by Vertex Cover  42
Metric Dimension and Geodetic Set Parameterized by Vertex Co...
收藏 引用
42nd International Symposium on Theoretical Aspects of computer Science, STACS 2025
作者: Foucaud, Florent Galby, Esther Khazaliya, Liana Li, Shaohua Mc Inerney, Fionn Sharma, Roohani Tale, Prafullkumar Université Clermont Auvergne CNRS Mines Saint-Étienne Clermont Auvergne INP LIMOS Clermont-Ferrand63000 France Department of Computer Science and Engineering Chalmers University of Technology University of Gothenburg Sweden Technische Universität Wien Austria School of Computer Science and Engineering Central South University Changsha China Telefónica Scientific Research Barcelona Spain University of Bergen Norway Indian Institute of Science Education and Research Pune India
For a graph G, a subset S ⊆ V (G) is called a resolving set of G if, for any two vertices u, v ∈ V (G), there exists a vertex w ∈ S such that d(w, u) ≠ d(w, v). The Metric Dimension problem takes as input a graph G... 详细信息
来源: 评论
ML_Alzheimer: Alzheimer Disease Prediction Using Machine Learning  3
ML_Alzheimer: Alzheimer Disease Prediction Using Machine Lea...
收藏 引用
3rd International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2023
作者: Abdelminaam, Diaa Salama Madbouly, Magda M. Farag, Mohamed S Gomaa, Ibrahim A Abd-Elghany Zeid, Magdy Abualigah, Laith Misr International University Faculty of Computer Science Cairo Egypt Benha University Faculty of Computers and Artificial Intelligence Benha Egypt Alexandria University Faculty of Computer and Data Science Alexandria Egypt Alobour High Institute for Computer and Informatics Computer Science Department Cairo Egypt Lebanese American University Department of Electrical and Computer Engineering Byblos13-5053 Lebanon Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19328 Jordan Middle East University Meu Research Unit Amman11831 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang 11800 Malaysia
Alzheimer's disease is a fatal brain disorder that impacts predominantly the elderly. The early identification of Alzheimer's illness requires the use of efficient automated methods. For the categorization of ... 详细信息
来源: 评论
Application of Neural Network in the Prediction Models of Machine Learning Based Design
Application of Neural Network in the Prediction Models of Ma...
收藏 引用
2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2022
作者: Gehlot, Anita Ansari, Bushra Khatoon Arora, Deepika Anandaram, Harishchander Singh, Bhagwant Arias-Gonzáles, José Luis Uttaranchal University Uttaranchal Institute of Technology India Institute of Engineering and Technology AKTU Department of Civil Engineering Lucknow India Lloyd Institute of Engineering & Technology Computer Science & Engineering Centre for Excellence in Computational Engineering and Networking Amrita Vishwa Vidyapeetham Tamil Nadu Coimbatore India SS Informatics Cluster School of Computer Science Uttarakhand Dehradun248007 India Pontificia Universidad Católica Del Peru Peru
This research examines way to pass, among the most dynamic and quickly-evolving technology fields in the telecommunication sector. Data may be sent between two locations wirelessly without the usage of digital downloa... 详细信息
来源: 评论
Pose Estimation of Spacecraft Using Dual Transformers and Efficient Bayesian Hyperparameter Optimization
收藏 引用
International Journal of Advanced computer Science and Applications 2025年 第4期16卷 629-644页
作者: Raja, N. Kannaiya Ramesh, Janjhyam Venkata Naga El-Ebiary, Yousef A. Baker Muniyandy, Elangovan Reddy, N. Konda Kumar, Vanipenta Ravi Devarasetty, Prasad School of Computing Science and Engineering VIT Bhopal University Madhya Pradesh Bhopal466114 India Department of CSE Graphic Era Hill University Dehradun248002 India Department of CSE Graphic Era Deemed To Be University Uttarakhand Dehradun248002 India Faculty of Informatics and Computing UniSZA University Malaysia Department of Biosciences Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai602 105 India Applied Science Research Center Applied Science Private University Amman Jordan Department of Engineering Mathematics K L University Greenfields Guntur Dist Andhra Pradesh Vaddeswaram522302 India Department of Mathematics Annamacharya University New Boyanapalli Rajampet India Department of Computer Science and Engineering DVR & Dr HS MIC College of Technology Andhra Pradesh Kanchikacherla India
Spacecraft pose estimation is an essential contribution to facilitating central space mission activities like autonomous navigation, rendezvous, docking, and on-orbit servicing. Nonetheless, methods like Convolutional... 详细信息
来源: 评论
Bounded Indistinguishability for Simple Sources  13
Bounded Indistinguishability for Simple Sources
收藏 引用
13th Innovations in Theoretical computer Science Conference, ITCS 2022
作者: Bogdanov, Andrej Dinesh, Krishnamoorthy Filmus, Yuval Ishai, Yuval Kaplan, Avi Srinivasan, Akshayaram Department of Computer Science and Engineering Institute of Theoretical Computer Science and Communications The Chinese University of Hong Kong Hong Kong Institute of Theoretical Computer Science and Communications The Chinese University of Hong Kong Hong Kong The Henry and Marylin Taub Faculty of Computer Science Technion Haifa Israel School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai India
A pair of sources X, Y over {0, 1}n are k-indistinguishable if their projections to any k coordinates are identically distributed. Can some AC0 function distinguish between two such sources when k is big, say k = n0.1... 详细信息
来源: 评论
An Exploratory Investigation into Sustaining Cybersecurity Protection Through the Implementation of SETA  4
An Exploratory Investigation into Sustaining Cybersecurity P...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Abdullah Huda, Mahfuzul Brayyich, Mohammed Haroon, Noor Hanoon Khan, Abdul Azeem Verma, Rajan University Institute of Computing Chandigarh University Punjab India College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia College of Technical Engineering National University of Science & Technology Dhi Qar Iraq Technical Engineering College Al-Ayen University Department of Computer Technical Engineering Thi-Qar Iraq Negara Brunei Darussalam Faculty of Islamic Technology Brunei Lovely Professional University Division of Research and Development Phagwara144411 India KKR & KSR Institute of Technology & Sciences Andhra Pradesh Guntur India
Most modern businesses run their competitive operations online. Cybersecurity is crucial to commercial operations. No cybersecurity defensive solution is universal. Standard security strategy involves using hardware a... 详细信息
来源: 评论
Critical Factors of Immersive Learning in Higher Education: A Systematic Literature Review  10
Critical Factors of Immersive Learning in Higher Education: ...
收藏 引用
10th International Conference on ICT for Smart Society, ICISS 2023
作者: Sunardi Meyliana Ramadhan, Arief Rosmansyah, Yusep Bina Nusantara University BINUS Graduate Program Doctor of Computer Science Computer Science Department Jakarta Indonesia School of Information System Bina Nusantara University Information System Departement Jakarta Indonesia School of Computing Telkom University Bandung Indonesia School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung Indonesia
Immersive learning has gained significant attention with the rising trend of spatial computing, particularly in the after-pandemic era. Numerous research has explored the potential of immersive learning in higher educ... 详细信息
来源: 评论