咨询与建议

限定检索结果

文献类型

  • 1,858 篇 期刊文献
  • 1,854 篇 会议
  • 82 册 图书

馆藏范围

  • 3,794 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,079 篇 工学
    • 1,299 篇 计算机科学与技术...
    • 1,052 篇 软件工程
    • 466 篇 信息与通信工程
    • 294 篇 生物医学工程(可授...
    • 261 篇 生物工程
    • 255 篇 控制科学与工程
    • 229 篇 电气工程
    • 227 篇 光学工程
    • 212 篇 电子科学与技术(可...
    • 182 篇 核科学与技术
    • 136 篇 仪器科学与技术
    • 121 篇 机械工程
    • 96 篇 化学工程与技术
    • 88 篇 动力工程及工程热...
    • 75 篇 材料科学与工程(可...
    • 73 篇 安全科学与工程
  • 1,622 篇 理学
    • 860 篇 物理学
    • 479 篇 数学
    • 343 篇 生物学
    • 178 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 108 篇 化学
  • 573 篇 管理学
    • 330 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 183 篇 工商管理
  • 367 篇 医学
    • 291 篇 临床医学
    • 259 篇 基础医学(可授医学...
    • 151 篇 药学(可授医学、理...
    • 131 篇 公共卫生与预防医...
  • 89 篇 法学
    • 76 篇 社会学
  • 68 篇 经济学
  • 68 篇 教育学
  • 62 篇 农学
  • 12 篇 文学
  • 5 篇 军事学
  • 5 篇 艺术学

主题

  • 115 篇 informatics
  • 96 篇 hadron colliders
  • 93 篇 artificial intel...
  • 85 篇 machine learning
  • 66 篇 deep learning
  • 64 篇 higgs bosons
  • 57 篇 computer network...
  • 50 篇 accuracy
  • 47 篇 proton-proton in...
  • 47 篇 training
  • 41 篇 computational mo...
  • 40 篇 internet of thin...
  • 39 篇 computer archite...
  • 37 篇 quality of servi...
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 35 篇 costs
  • 35 篇 protocols
  • 35 篇 forecasting
  • 33 篇 hadron-hadron sc...

机构

  • 407 篇 department for p...
  • 403 篇 faculty of scien...
  • 394 篇 department of ph...
  • 394 篇 kirchhoff-instit...
  • 382 篇 department of ph...
  • 381 篇 department of ph...
  • 369 篇 institute of phy...
  • 361 篇 fakultät für phy...
  • 361 篇 institute of phy...
  • 329 篇 instituto de fís...
  • 303 篇 department of ph...
  • 282 篇 department of ph...
  • 279 篇 nikhef national ...
  • 278 篇 graduate school ...
  • 276 篇 department of ph...
  • 276 篇 yerevan physics ...
  • 274 篇 dipartimento di ...
  • 269 篇 universidade fed...
  • 268 篇 department of ph...
  • 260 篇 ictp trieste

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 323 篇 g. spigo
  • 322 篇 f. siegert
  • 315 篇 r. ströhmer
  • 315 篇 m. rijssenbeek
  • 315 篇 s. jin
  • 315 篇 g. gaudio
  • 314 篇 s. mohapatra
  • 306 篇 s. guindon
  • 303 篇 a. kaczmarska
  • 297 篇 y. tayalati
  • 297 篇 j. schaarschmidt
  • 288 篇 a. d. pilkington
  • 282 篇 l. chevalier
  • 281 篇 m. klein

语言

  • 3,639 篇 英文
  • 120 篇 其他
  • 38 篇 中文
  • 2 篇 日文
  • 1 篇 法文
检索条件"机构=Computer Engineering and Informatics Department & Research Academic Computer Technology Institute"
3794 条 记 录,以下是61-70 订阅
排序:
Optical Skyrmionic Hopfion Induced Surface Structures in Azopolymers via Photo-Induced Mass Transport  16
Optical Skyrmionic Hopfion Induced Surface Structures in Azo...
收藏 引用
16th Pacific Rim Conference on Lasers and Electro-Optics, CLEO-PR 2024
作者: Tamura, Rihito Kumar, Praveen Rao, A. Srinivasa Litchinitser, Natalia M. Omatsu, Takashige Indian Institute of Technology Department of Physics Bhilai India Graduate School of Engineering Chiba University Japan Molecular Chirality Research Center Chiba University Japan Institute for Advanced Academic Research Chiba University Japan Duke University Department of Electrical and Computer Engineering United States
We report on the formation of surface relief structures of azopolymers by irradiation of optical skyrmionic hopfion. The reliefs reflect exotic polarization textures of hopfion and will pave the way for advanced rewri... 详细信息
来源: 评论
Closest Celestial Body Search Using KD Trees
Closest Celestial Body Search Using KD Trees
收藏 引用
2023 International Conference on computer Communication and informatics, ICCCI 2023
作者: Priya Ponnusamy, P. Shabariram, C.P. Umayal, V.R. Susmeta, A. PSG Institute of Technology and Applied Research Neelambur Department of Computer Science and Engineering Coimbatore India
A Binary Search Tree is expanded into a KD Tree to handle the multi-dimensional key searches. A discriminator makes the KD tree different from the BST. This discriminator will take branching decisions at every level b... 详细信息
来源: 评论
Efficient Cloud Resource Scheduling with an Optimized Throttled Load Balancing Approach
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2179-2188页
作者: V.Dhilip Kumar J.Praveenchandar Muhammad Arif Adrian Brezulianu Oana Geman Atif Ikram Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai600062India Department of Computer Science and Engineering Karunya Institute of Technology and SciencesCoimbatoreTamil Nadu641114India Department of Computer Science Superior UniversityLahorePakistan Faculty of Electronics Telecommunications and Information Technology Gheorghe Asachi Technical University of IasiIa¸si700050Romania Department of Health and Human Development Stefan cel Mare University of SuceavaSuceava720229Romania Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia
Cloud technology is a new platform that offers on-demand computing Peripheral such as storage,processing power,and other computer system *** is also referred to as a system that will let the consumers utilize computat... 详细信息
来源: 评论
Systematic Review of GAN for Enhancing Efficiency in AI in Gaming
Systematic Review of GAN for Enhancing Efficiency in AI in G...
收藏 引用
2024 International Conference on Advances in Computing research on Science engineering and technology, ACROSET 2024
作者: Singh, Jasdeep Islam, Sardar M. N. Tewatia, Manav Garg, Deepanshu Fatima, Neda School of Computer Applications Manav Rachna International Institute of Research and Studies Faridabad India Victoria University Department of Computer Science and Engineering Melbourne Australia School of Engineering and Technology Manav Rachna International Institute of Research and Studies Faridabad India
A thorough analysis of Generative Adversarial Networks (GANs) and how they might be used to improve AI gaming efficiency is presented in this research. Game developers now have never-before-seen possibilities for inno... 详细信息
来源: 评论
Adversarial learning for Mirai botnet detection based on long short-term memory and XGBoost
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 153-160页
作者: Vajrobol, Vajratiya Gupta, Brij B. Gaurav, Akshat Chuang, Huan-Ming Institute of Informatics and Communication University of Delhi India International Center for AI and Cyber Security Research and Innovations. Asia University Taiwan Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Ronin Institute MontclairNJ United States Department of Information Management National Yunlin University of Science and Technology Yunlin Taiwan Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Dehradun India
In today's world, where digital threats are on the rise, one particularly concerning threat is the Mirai botnet. This malware is designed to infect and command a collection of Internet of Things (IoT) devices. The... 详细信息
来源: 评论
An Explainable Artificial Intelligence model in the assessment of Brain MRI Lesions in Multiple Sclerosis using Amplitude Modulation - Frequency Modulation multi-scale feature sets  24
An Explainable Artificial Intelligence model in the assessme...
收藏 引用
24th International Conference on Digital Signal Processing, DSP 2023
作者: Nicolaou, Andria Kakas, Antonis Pattichis, Constantinos S. Pattichis, Marios S. Fotso, Kevin Loizou, Christos P. Pantzaris, Marios Department of Computer Science University of Cyprus Nicosia Cyprus Department of Electrical Engineering and Computer Engineering University of New Mexico United States Department of Electrical Engineering and Computer Engineering and Informatics Cyprus University of Technology Limassol Cyprus Cyprus Institute of Neurology and Genetics Nicosia Cyprus
The objective of this study was to implement an explainable artificial intelligence (AI) model with embedded rules to assess Multiple Sclerosis (MS) disease evolution based on brain Magnetic Resonance Imaging (MRI) mu... 详细信息
来源: 评论
Secure Sentinel Leveraging Machine Learning for Fraud Detection in Blockchain Transactions  5
Secure Sentinel Leveraging Machine Learning for Fraud Detect...
收藏 引用
5th International Conference on Data Intelligence and Cognitive informatics, ICDICI 2024
作者: Shirley, C.P. Thanga Helina, S. Berin Jeba Jingle, I. Saran, P. Absin, S.J. Karunya Institute of Technology and Sciences Dept. of Computer Science and Engineering Coimbatore India Kpr College of Arts Science and Research Department of Commerce with Computer Application Coimbatore India
Blockchain technology's decentralized and transparent transaction platforms have changed a number of sectors. However, harmful activities like fraud and money laundering are also drawn to blockchain due to its dis... 详细信息
来源: 评论
A Machine Learning-Based Privacy-Preserving Approach to Incorporate Distributed Generators in AC Optimal Power Flow
A Machine Learning-Based Privacy-Preserving Approach to Inco...
收藏 引用
2024 IEEE PES Innovative Smart Grid Technologies Europe Conference, ISGT EUROPE 2024
作者: Dindar, Burak Saner, Can Berk Polat, Dogukan Yigit Çakmak, Huseyin Kemâl Hagenmeyer, Veit Institute for Automation and Applied Informatics Karlsruhe Institute of Technology Germany National University of Singapore Department of Electrical and Computer Engineering Singapore National University of Singapore School of Computing Singapore
In order to achieve the goal of a carbon-neutral power system, significant changes to the power grid are underway, necessitating enhanced interoperability between Transmission System Operators (TSOs) and Distribution ... 详细信息
来源: 评论
Modified Integrated Regulator Strategy for High Density Interleaved DC-DC Converter with Enhancement Conversion Ratio and Losses Mitigation  50
Modified Integrated Regulator Strategy for High Density Inte...
收藏 引用
50th Annual Conference of the IEEE Industrial Electronics Society, IECON 2024
作者: Karimi, Mohsen Farsijani, Mohammad Jamil, Mohsin Iranian Research Institute for Electrical Engineering Academic Center for Education Culture and Research Tehran Iran Department of Electrical and Computer Engineering and Applied Science Memorial University of Newfoundland Newfoundland St John’sNL Canada Department of Electrical and Computer Engineering University of Illinois Chicago ChicagoIL United States
The high power DC-DC converters are widely used in industrial and renewable application due to variable dc source. For this purpose, the interleaved dual cascade DCDC converter (IDCC) is the most advantageous due to i... 详细信息
来源: 评论
Performance and Security Analysis of the Diffie-Hellman Key Exchange Protocol  19
Performance and Security Analysis of the Diffie-Hellman Key ...
收藏 引用
19th International Workshop on Semantic and Social Media Adaptation and Personalization, SMAP 2024
作者: Dritsas, Elias Trigka, Maria Mylonas, Phivos Athena Research and Innovation Center Industrial Systems Institute Patras26504 Greece University of West Attica Department of Informatics and Computer Engineering Egaleo12243 Greece
The Diffie-Hellman Key Exchange Protocol (DHKE) is a fundamental element of modern cryptographic systems, enabling secure key exchange over unsecured channels. The present research work aims to provide a comprehensive... 详细信息
来源: 评论