咨询与建议

限定检索结果

文献类型

  • 1,042 篇 期刊文献
  • 643 篇 会议
  • 41 册 图书

馆藏范围

  • 1,726 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 928 篇 理学
    • 572 篇 物理学
    • 255 篇 数学
    • 126 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 64 篇 系统科学
    • 46 篇 化学
  • 871 篇 工学
    • 493 篇 计算机科学与技术...
    • 392 篇 软件工程
    • 163 篇 信息与通信工程
    • 142 篇 控制科学与工程
    • 129 篇 核科学与技术
    • 107 篇 生物医学工程(可授...
    • 104 篇 电气工程
    • 101 篇 生物工程
    • 84 篇 电子科学与技术(可...
    • 77 篇 光学工程
    • 53 篇 机械工程
    • 38 篇 仪器科学与技术
    • 38 篇 化学工程与技术
    • 27 篇 材料科学与工程(可...
    • 24 篇 动力工程及工程热...
    • 23 篇 网络空间安全
    • 22 篇 安全科学与工程
  • 198 篇 管理学
    • 115 篇 管理科学与工程(可...
    • 82 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 112 篇 医学
    • 96 篇 临床医学
    • 88 篇 基础医学(可授医学...
    • 55 篇 药学(可授医学、理...
    • 42 篇 公共卫生与预防医...
  • 24 篇 法学
  • 22 篇 教育学
  • 21 篇 经济学
  • 13 篇 农学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 军事学

主题

  • 69 篇 hadron colliders
  • 61 篇 higgs bosons
  • 47 篇 proton-proton in...
  • 46 篇 machine learning
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 33 篇 hadron-hadron sc...
  • 30 篇 deep learning
  • 29 篇 collisions (nucl...
  • 29 篇 nuclear counters
  • 27 篇 relativistic hea...
  • 26 篇 supersymmetric m...
  • 25 篇 artificial intel...
  • 24 篇 optimization
  • 24 篇 top quark
  • 24 篇 quarks
  • 22 篇 w & z bosons
  • 22 篇 particle product...
  • 22 篇 computational mo...
  • 22 篇 extensions of hi...

机构

  • 412 篇 department for p...
  • 407 篇 kirchhoff-instit...
  • 405 篇 faculty of scien...
  • 402 篇 department of ph...
  • 397 篇 institute of phy...
  • 386 篇 department of ph...
  • 386 篇 department of ph...
  • 375 篇 instituto de fís...
  • 374 篇 institute of phy...
  • 373 篇 fakultät für phy...
  • 324 篇 dipartimento di ...
  • 322 篇 department of ph...
  • 319 篇 nikhef national ...
  • 317 篇 department of ph...
  • 309 篇 department of ph...
  • 293 篇 department of ph...
  • 287 篇 graduate school ...
  • 281 篇 department of ph...
  • 275 篇 universidade fed...
  • 273 篇 school of physic...

作者

  • 336 篇 c. alexa
  • 336 篇 g. bella
  • 336 篇 d. calvet
  • 336 篇 c. amelung
  • 334 篇 j. m. izen
  • 334 篇 j. strandberg
  • 334 篇 g. spigo
  • 333 篇 f. siegert
  • 324 篇 r. ströhmer
  • 324 篇 m. rijssenbeek
  • 324 篇 s. jin
  • 324 篇 g. gaudio
  • 323 篇 s. mohapatra
  • 319 篇 s. guindon
  • 316 篇 a. kaczmarska
  • 314 篇 j. schaarschmidt
  • 308 篇 a. d. pilkington
  • 306 篇 y. tayalati
  • 302 篇 l. chevalier
  • 295 篇 m. kocian

语言

  • 1,647 篇 英文
  • 73 篇 其他
  • 7 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Applied Informatics and Computer Engineering"
1726 条 记 录,以下是111-120 订阅
排序:
Integrated Energy-Efficient Distributed Link Stability Algorithm for UAV Networks
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2357-2394页
作者: Altaf Hussain Shuaiyong Li Tariq Hussain Razaz Waheeb Attar Farman Ali Ahmed Alhomoud Babar Shah School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Industrial Internet of Things and Networked Control Ministry of EducationChongqing University of Posts and TelecommunicationsChongqing400065China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Management Department College of Business AdministrationPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Applied AI School of ConvergenceCollege of Computing and InformaticsSungkyunkwan UniversitySeoul03063Republic of Korea Department of Computer Science College of ScienceNorthern Border UniversityArar91431Saudi Arabia College of Technological Innovation Zayed UniversityDubai19282United Arab Emirates
Ad hoc networks offer promising applications due to their ease of use,installation,and deployment,as they do not require a centralized control *** these networks,nodes function as senders,receivers,and *** such networ... 详细信息
来源: 评论
SEMU5G: an Emulator for Improving Model Accuracy and Performance Evaluation of 5G Network Core Architectures based on SDN  10
SEMU5G: an Emulator for Improving Model Accuracy and Perform...
收藏 引用
10th International Conference on Wireless and Telematics, ICWT 2024
作者: Zaki Hamidi, Eki Ahmad Lazuardi, Arga Valen Rahmansyah, Muhammad Litfan Novel Bajri, Salman Alfarizi Tulloh, Rohmat Negara, Ridha Muldina Ahdan, Syaiful Jupriyadi UIN Sunan Gunung Djati Bandung Electrical Engineering Department Bandung Indonesia Telkom University Telecommunication Technology School of Applied Science Bandung Indonesia The University Center of Excellence Intelligent Sensing-IoT Telkom University Indonesia Telkom University School of Electrical Engineering Bandung Indonesia Universitas Teknokrat Indonesia Faculty of Engineering & Computer Science Indonesia Institut Teknologi Bandung School of Electrical Engineering and Informatics Bandung Indonesia Universitas Teknokrat Indonesia Faculty of Engineering and Computer Science Bandarlampung Indonesia
The rapid advancement of 5G Radio Access Network (RAN) architecture is facilitating the construction of 5G networks, marking a significant milestone in telecommunications evolution. Given the complexity of the 5G core... 详细信息
来源: 评论
A Pragmatical Approach to Anomaly Detection Evaluation in Edge Cloud Systems
A Pragmatical Approach to Anomaly Detection Evaluation in Ed...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Sotiris Skaperas Georgios Koukis Ioanna Angeliki Kapetanidou Vassilis Tsaoussidis Lefteris Mamatas Department of Applied Informatics University of Macedonia Thessaloniki Greece Athena Research and Innovation Center Greece Department of Electrical and Computer Engineering Democritus University of Thrace Greece
Anomaly detection (AD) has been recently employed in the context of edge cloud computing, e.g., for intrusion detection and identification of performance issues. However, state-of-the-art anomaly detection procedures ... 详细信息
来源: 评论
Analyzing darknet traffic through machine learning and neucube spiking neural networks
收藏 引用
Intelligent and Converged Networks 2024年 第4期5卷 265-283页
作者: Iman Akour Mohammad Alauthman Khalid M.O.Nahar Ammar Almomani Brij B.Gupta Information Systems Department College of Computing&InformaticsUniversity of SharjahSharjahUnited Arab Emirates Department of Information Security Faculty of Information TechnologyUniversity of PetraAmman 11196Jordan the Faculty of Computer Studies Arab Open UniversityRiyadh 11681Saudi Arabia Department of Information Technology Al-Huson University CollegeAl-Balqa Applied UniversityIrbid 19117Jordan the Department of Computer Information Science Higher Colleges of TechnologySharjahUnited Arab Emirates the Department of Computer Science and Information Engineering Asia UniversityTaichung 413ChinaSymbiosis Centre for Information TechnologySymbiosis International(Deemed University)Pune 412115India Centre of Inter-disciplinary Research&Innovation University of Petroleum and Energy StudiesDehradun 248007India
The rapidly evolving darknet enables a wide range of cybercrimes through anonymous and untraceable communication *** detection of clandestine darknet traffic is therefore critical yet immensely *** research demonstrat... 详细信息
来源: 评论
Novel Noise Filter Techniques and Dynamic Ensemble Selection for Classification
收藏 引用
Recent Advances in computer Science and Communications 2022年 第1期15卷 48-59页
作者: Nguyen, Thi Ngoc A. Nhu, Quynh P. Solanki, Vijender K. School of Applied Mathematics and Informatics Hanoi University of Science and Technology Hanoi Viet Nam CMC Institute of Science and Technology 11 Duy Tan Cau Giay Hanoi Viet Nam Department of Computer Science and Engineering CMR Institute of Technology TS Hyderabad India
Background: Ensemble selection is one of the most researched topics for ensemble learning. Researchers have been attracted to selecting a subset of base classifiers that may perform more helpful than the whole ensembl... 详细信息
来源: 评论
A Pragmatical Approach to Anomaly Detection Evaluation in Edge Cloud Systems
arXiv
收藏 引用
arXiv 2024年
作者: Skaperas, Sotiris Koukis, Georgios Kapetanidou, Ioanna Angeliki Tsaoussidis, Vassilis Mamatas, Lefteris Department of Applied Informatics University of Macedonia Thessaloniki Greece Athena Research and Innovation Center Greece Department of Electrical and Computer Engineering Democritus University of Thrace Greece
Anomaly detection (AD) has been recently employed in the context of edge cloud computing, e.g., for intrusion detection and identification of performance issues. However, state-of-the-art anomaly detection procedures ... 详细信息
来源: 评论
Improving Norwegian Power Transmission Flexibility Using a New Matheuristic Optimization Framework
Improving Norwegian Power Transmission Flexibility Using a N...
收藏 引用
Clean and Green Energy engineering (CGEE), International Conference on
作者: Sander Meland Mojtaba Yousefi Ahmad Hemmati Troels Bojesen Department of Informatics University of Bergen & Equinor Stavanger Norway Department of Computer Science Electrical Engineering & Mathematical Sciences Western Norway University of Applied Sciences Bergen Norway Department of Informatics University of Bergen Bergen Norway
There is an increasing demand for transmission system operators to expand their participation in the electricity reserve markets, encompassing smaller businesses and house-holds that are currently excluded due to mark... 详细信息
来源: 评论
Hybrid Models for Recognizing Indonesian Textual Entailment  7
Hybrid Models for Recognizing Indonesian Textual Entailment
收藏 引用
7th International Conference on informatics and Computational Sciences, ICICoS 2024
作者: Ahmadian, Hendri Abidin, Taufik Fuadi Riza, Hammam Muchtar, Kahlil Universitas Syiah Kuala Graduate School of Mathematics and Applied Sciences Banda Aceh Indonesia Universitas Syiah Kuala Faculty of Mathematics and Natural Sciences Department of Informatics Banda Aceh Indonesia National Research and Innovation Agency Research Center for Artificial Intelligence and Cyber Security Jakarta Indonesia Universitas Syiah Kuala Faculty of Engineering Department of Electrical and Computer Engineering Banda Aceh Indonesia
A paragraph raises pertinent issues about linguistic disparities in understanding the semantic relationships between sentences within the natural language processing domain (NLP) Addressing this challenge necessitates... 详细信息
来源: 评论
Weapons Detection for Security and Video Surveillance Using CNN and YOLO-V5s
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2761-2775页
作者: Abdul Hanan Ashraf Muhammad Imran Abdulrahman M.Qahtani Abdulmajeed Alsufyani Omar Almutiry Awais Mahmood Muhammad Attique Mohamed Habib Department of Computer Science Shaheed Zulfikar Ali Bhutto Institute of Science and TechnologyIslamabad44000Pakistan Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia College of Applied Computer Science King Saud University(Almuzahmiyah Campus)Riyadh11543Saudi Arabia Department of Computer Science HITEC UniversityTaxila47080Pakistan College of Computing and Informatics Saudi Electronic UniversityRiyadhSaudi Arabia Faculty of Engineering Port Said UniversityPort Fuad CityEgypt
In recent years,the number of Gun-related incidents has crossed over 250,000 per year and over 85%of the existing 1 billion firearms are in civilian hands,manual monitoring has not proven effective in detecting *** is... 详细信息
来源: 评论
Privacy-Preserving Utilization of Distribution System Flexibility for Enhanced TSO-DSO Interoperability: A Novel Machine Learning-Based Optimal Power Flow Approach
arXiv
收藏 引用
arXiv 2025年
作者: Dindar, Burak Saner, Can Berk Çakmak, Hüseyin K. Hagenmeyer, Veit Institute for Automation and Applied Informatics Karlsruhe Institute of Technology Karlsruhe76131 Germany Department of Electrical and Computer Engineering National University of Singapore Singapore117581 Singapore
Due to the transformation of the power system, the effective use of flexibility from the distribution system (DS) is becoming crucial for efficient network management. Leveraging this flexibility requires interoperabi... 详细信息
来源: 评论