咨询与建议

限定检索结果

文献类型

  • 2,306 篇 期刊文献
  • 2,007 篇 会议
  • 56 册 图书

馆藏范围

  • 4,369 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,528 篇 工学
    • 1,507 篇 计算机科学与技术...
    • 1,134 篇 软件工程
    • 429 篇 信息与通信工程
    • 357 篇 电气工程
    • 351 篇 控制科学与工程
    • 338 篇 电子科学与技术(可...
    • 249 篇 光学工程
    • 231 篇 生物工程
    • 225 篇 材料科学与工程(可...
    • 204 篇 化学工程与技术
    • 200 篇 生物医学工程(可授...
    • 175 篇 机械工程
    • 164 篇 力学(可授工学、理...
    • 158 篇 动力工程及工程热...
    • 154 篇 仪器科学与技术
  • 2,128 篇 理学
    • 1,029 篇 物理学
    • 969 篇 数学
    • 321 篇 统计学(可授理学、...
    • 280 篇 化学
    • 279 篇 生物学
    • 193 篇 系统科学
    • 107 篇 地球物理学
  • 557 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 232 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 267 篇 医学
    • 209 篇 临床医学
    • 178 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
    • 93 篇 药学(可授医学、理...
  • 99 篇 法学
  • 66 篇 农学
  • 61 篇 教育学
  • 56 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 7 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 123 篇 deep learning
  • 110 篇 machine learning
  • 102 篇 accuracy
  • 84 篇 artificial intel...
  • 80 篇 computational mo...
  • 71 篇 feature extracti...
  • 61 篇 training
  • 55 篇 convolutional ne...
  • 53 篇 predictive model...
  • 53 篇 data models
  • 51 篇 internet of thin...
  • 49 篇 semantics
  • 44 篇 support vector m...
  • 40 篇 neural networks
  • 40 篇 real-time system...
  • 40 篇 forecasting
  • 34 篇 educational inst...
  • 33 篇 covid-19
  • 33 篇 data mining
  • 33 篇 security

机构

  • 52 篇 infn sezione di ...
  • 52 篇 north-west unive...
  • 52 篇 shandong enginee...
  • 51 篇 shandong provinc...
  • 51 篇 institut univers...
  • 50 篇 université de st...
  • 47 篇 tno technical sc...
  • 44 篇 national centre ...
  • 43 篇 nikhef national ...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 università di ca...
  • 40 篇 infn sezione di ...
  • 40 篇 in2p3 lpc campus...
  • 40 篇 ncsr demokritos ...
  • 39 篇 dipartimento di ...

作者

  • 53 篇 chen a.
  • 52 篇 ferrara g.
  • 52 篇 ardid m.
  • 52 篇 calvo d.
  • 50 篇 benoit d.m.
  • 50 篇 eddymaoui a.
  • 45 篇 gagliardini s.
  • 45 篇 gal t.
  • 45 篇 bozza c.
  • 45 篇 díaz a.f.
  • 44 篇 boumaaza j.
  • 43 篇 coleiro a.
  • 43 篇 gozzini s.r.
  • 43 篇 dallier r.
  • 43 篇 boettcher m.
  • 42 篇 benhassi m.
  • 42 篇 enzenhöfer a.
  • 42 篇 celli s.
  • 42 篇 carretero v.
  • 42 篇 ardid s.

语言

  • 3,432 篇 英文
  • 917 篇 其他
  • 28 篇 中文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 俄文
  • 2 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Applied Technology"
4369 条 记 录,以下是1131-1140 订阅
排序:
Long-Distance Transmon Coupler with cz-Gate Fidelity above 99.8%
收藏 引用
PRX Quantum 2023年 第1期4卷 010314-010314页
作者: Fabian Marxer Antti Vepsäläinen Shan W. Jolin Jani Tuorila Alessandro Landra Caspar Ockeloen-Korppi Wei Liu Olli Ahonen Adrian Auer Lucien Belzane Ville Bergholm Chun Fai Chan Kok Wai Chan Tuukka Hiltunen Juho Hotari Eric Hyyppä Joni Ikonen David Janzso Miikka Koistinen Janne Kotilahti Tianyi Li Jyrgen Luus Miha Papic Matti Partanen Jukka Räbinä Jari Rosti Mykhailo Savytskyi Marko Seppälä Vasilii Sevriuk Eelis Takala Brian Tarasinski Manish J. Thapa Francesca Tosto Natalia Vorobeva Liuqi Yu Kuan Yen Tan Juha Hassel Mikko Möttönen Johannes Heinsoo IQM Quantum Computers Espoo 02150 Finland IQM Quantum Computers Munich 80636 Germany Quantum Computing and Devices (QCD) Laboratories Quantum Technology Finland (QTF) Centre of Excellence Department of Applied Physics Aalto University Aalto 00076 Finland VTT Technical Research Centre of Finland Quantum Technology Finland (QTF) Center of Excellence VTT 02044 Finland
Tunable coupling of superconducting qubits has been widely studied due to its importance for isolated gate operations in scalable quantum processor architectures. Here, we demonstrate a tunable qubit-qubit coupler bas... 详细信息
来源: 评论
A Novel Explainable CNN Model for Screening COVID-19 on X-ray Images
收藏 引用
Computer Systems Science & Engineering 2023年 第8期46卷 1789-1809页
作者: Hicham Moujahid Bouchaib Cherradi Oussama El Gannour Wamda Nagmeldin Abdelzahir Abdelmaboud Mohammed Al-Sarem Lhoussain Bahatti Faisal Saeed Mohammed Hadwan EEIS Laboratory ENSET of MohammediaHassan II University of CasablancaMohammedia28820Morocco STIE Team CRMEF Casablanca-SettatThe Provincial Section of El JadidaEl Jadida24000Morocco Department of Information Systems College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Information Systems King Khalid UniversityMuhayel Aseer61913Saudi Arabia College of Computer Science and Engineering Taibah UniversityMedina42353Saudi Arabia Department of Computer Science University of Sheba RegionMarib14400Yemen DAAI Research Group Department of Computing and Data ScienceSchool of Computing and Digital TechnologyBirmingham City UniversityBirminghamB47XGUK Department of Information Technology College of ComputerQassim UniversityBuraydah 51452Saudi Arabia Department of Computer Science College of Applied SciencesTaiz UniversityTaiz6803Yemen
Due to the rapid propagation characteristic of the Coronavirus(COVID-19)disease,manual diagnostic methods cannot handle the large number of infected individuals to prevent the spread of ***,new automated diagnostic me... 详细信息
来源: 评论
An Overview of Tools and Techniques in Network Forensics
An Overview of Tools and Techniques in Network Forensics
收藏 引用
Information technology (ACIT)
作者: Mahmoud Asassfeh Mohammad Rasmi Al-Mousa Hasan Al-Dweikat Malak Hamad Al-Mashagbeh Suha Afaneh Ghassan Samara Ali Abu Zaid Mohammed Khouj Essam Al Daoud Department of Cybersecurity Zarqa University Zarqa Jordan Cybersecurity and Cloud Computing Department Applied Science Private University Amman Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia Faculty of Information Technology Zarqa University Zarqa Jordan
Network forensics pertains to a subfield of digital forensics that deals with network security. It is utilized in conjunction with computer network traffic monitoring and analysis, which acts as an intrusion detection... 详细信息
来源: 评论
Recent Advancements in Manipulator-Equipped Unmanned Aerial Vehicles (UAVs)
Recent Advancements in Manipulator-Equipped Unmanned Aerial ...
收藏 引用
Innovative Engineering Sciences and Technological Research (ICIESTR), International Conference on
作者: Faizan Zahid Ghulam E Mustafa Abro Zainab Alansari Department of Electrical Electronics and Computer Engineering University of Catania Italy Interdisciplinary Research Centre for Aviation and Space Exploration King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia College of Computing and Information Sciences University of Technology and Applied Sciences Muscat Oman
This brief review paper aims to discuss and show a technical analysis of latest progress in manipulator equipped Unmanned Aerial Vehicles (UAVs). A manipulator can increase the robustness and adaptability of UAV, but ... 详细信息
来源: 评论
A consistent and conservative diffuse-domain lattice Boltzmann method for multiphase flows in complex geometries
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Xi Zhan, Chengjie Chen, Ying Chai, Zhenhua Shi, Baochang School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan430074 China Institute of Interdisciplinary Research for Mathematics and Applied Science Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan430074 China
Modeling and simulation of multiphase flows in complex geomerties are challenging due to the complexity in describing the interface topology changes among different phases and the difficulty in implementing the bounda... 详细信息
来源: 评论
A General Fourth-Order Mesoscopic Multiple-Relaxation-Time Lattice Boltzmann Model and Equivalent Macroscopic Finite-Difference Scheme for Two-Dimensional Diffusion Equations
SSRN
收藏 引用
SSRN 2023年
作者: Chen, Ying Chai, Zhenhua Shi, Baochang School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan430074 China Institute of Interdisciplinary Research for Mathematics and Applied Science Huazhong University of Science and Technology Wuhan430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan430074 China
In this work, we first develop a general mesoscopic multiple-relaxation-time lattice Boltzmann (MRT-LB) model for the two-dimensional diffusion equation with the constant diffusion coefficient and source term, where t... 详细信息
来源: 评论
Estimating the transfer factor of natural radionuclides from soil to food chain pathways at a farmland in the southwestern Nigeria
Research Square
收藏 引用
Research Square 2024年
作者: Oladapo, O.O. Lawal, M.K. Ajiboye, O. Aremu, A.A. Oni, E.A. Ayanlola, P.S. Department of Science Laboratory Technology Ladoke Akintola University Oyo State Ogbomoso Nigeria Department of Mathematical and Computing Sciences KolaDaisi University Oyo State Ibadan Nigeria Department of Pure and Applied Physics Ladoke Akintola University Oyo State Ogbomoso Nigeria
The transfer factors of naturally existing radionuclides (NRs) from soil to food chain pathways on a farmland in southwestern Nigeria were estimated by measuring the activity concentrations of NRs in 20 soil samples t... 详细信息
来源: 评论
Multiclass skin lesion classification using deep learning networks optimal information fusion
收藏 引用
Discover applied Sciences 2024年 第6期6卷 1-13页
作者: Khan, Muhammad Attique Hamza, Ameer Shabaz, Mohammad Kadry, Seifeine Rubab, Saddaf Bilal, Muhammad Abdullah Akbar, Muhammad Naeem Kesavan, Suresh Manic Department of Computer Science HITEC University Taxila Pakistan Model Institute of Engineering and Technology Jammu India Department of Applied Data Science Noroff University College Oslo Norway Department of Computer Engineering College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Department of CS SEECS NUST Islamabad Pakistan National University of Sciences and Technology (NUST) Islamabad Pakistan Department of Electrical and Communication Engineering National University of Science and Technology Muscat Sultanate of Oman
A serious, all-encompassing, and deadly cancer that affects every part of the body is skin cancer. The most prevalent causes of skin lesions are UV radiation, which can damage human skin, and moles. If skin cancer is ...
来源: 评论
Optimizing Phishing URL Detection: A Comparative Analysis of Feature Counts and Training Times
Optimizing Phishing URL Detection: A Comparative Analysis of...
收藏 引用
Intelligent computing, Communication, Networking and Services (ICCNS), International Conference on
作者: Moayyad Alajlouni Yahya Tashtoush Saud Alhajaj Al. Dossari Omar Darwish Department of Computer Science Jordan University of Science and Technology Irbid Jordan Department of Electrical Engineering Prince Sattam bin Abdulaziz University Wadi Addwasir Saudi Arabia Information Security and Applied Computing Department Eastern Michigan University Ypsilanti MI USA
Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic web sites to obtain sensitive information such as passwords and bank statements. On... 详细信息
来源: 评论
From Monopoly to Competition: When Do Optimal Contests Prevail?
SSRN
收藏 引用
SSRN 2024年
作者: Deng, Xiaotie Gafni, Yotam Lavi, Ron Lin, Tao Ling, Hongyi Peking University Center on Frontiers of Computing Studies China Technion - Israel Institute of Technology University of Bath and Technion Harvard University School of Engineering and Applied Sciences 150 Western Ave AllstonMA02134 United States ETH Zürich Switzerland
We study competition among multiple contest designers in a general model. The goal of each contest designer is to maximize the sum of efforts of the contestants participating in their contest. Assuming symmetric conte... 详细信息
来源: 评论