咨询与建议

限定检索结果

文献类型

  • 1,908 篇 期刊文献
  • 710 篇 会议
  • 9 册 图书

馆藏范围

  • 2,627 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,538 篇 工学
    • 911 篇 计算机科学与技术...
    • 765 篇 软件工程
    • 266 篇 信息与通信工程
    • 261 篇 生物工程
    • 252 篇 生物医学工程(可授...
    • 202 篇 电气工程
    • 175 篇 光学工程
    • 163 篇 控制科学与工程
    • 145 篇 核科学与技术
    • 136 篇 电子科学与技术(可...
    • 126 篇 化学工程与技术
    • 71 篇 机械工程
    • 59 篇 仪器科学与技术
    • 58 篇 动力工程及工程热...
    • 49 篇 交通运输工程
    • 49 篇 安全科学与工程
  • 1,405 篇 理学
    • 774 篇 物理学
    • 368 篇 数学
    • 339 篇 生物学
    • 179 篇 统计学(可授理学、...
    • 159 篇 化学
    • 69 篇 系统科学
    • 48 篇 地球物理学
  • 348 篇 管理学
    • 193 篇 管理科学与工程(可...
    • 147 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 250 篇 医学
    • 212 篇 临床医学
    • 155 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 80 篇 公共卫生与预防医...
  • 61 篇 法学
  • 58 篇 农学
  • 31 篇 经济学
  • 27 篇 教育学
  • 6 篇 文学
  • 5 篇 艺术学
  • 2 篇 军事学

主题

  • 150 篇 hadron colliders
  • 88 篇 deep learning
  • 76 篇 hadrons
  • 59 篇 machine learning
  • 47 篇 hadronic decays
  • 42 篇 bottom mesons
  • 39 篇 accuracy
  • 38 篇 branching fracti...
  • 36 篇 particle decays
  • 35 篇 training
  • 32 篇 w & z bosons
  • 31 篇 feature extracti...
  • 31 篇 artificial intel...
  • 28 篇 higgs bosons
  • 28 篇 flavor changing ...
  • 27 篇 leptonic, semile...
  • 25 篇 predictive model...
  • 24 篇 computational mo...
  • 24 篇 charmed mesons
  • 23 篇 magnetic resonan...

机构

  • 455 篇 department of ph...
  • 389 篇 cavendish labora...
  • 387 篇 iccub universita...
  • 380 篇 university of ch...
  • 373 篇 horia hulubei na...
  • 362 篇 h.h. wills physi...
  • 361 篇 van swinderen in...
  • 358 篇 school of physic...
  • 342 篇 department of ph...
  • 339 篇 imperial college...
  • 337 篇 center for high ...
  • 335 篇 yandex school of...
  • 332 篇 stfc rutherford ...
  • 332 篇 oliver lodge lab...
  • 329 篇 institute of par...
  • 322 篇 physikalisches i...
  • 320 篇 infn sezione di ...
  • 318 篇 henryk niewodnic...
  • 313 篇 nikhef national ...
  • 309 篇 infn sezione di ...

作者

  • 231 篇 beiter a.
  • 215 篇 barter w.
  • 211 篇 bellee v.
  • 195 篇 casse g.
  • 193 篇 bowcock t.j.v.
  • 187 篇 blake t.
  • 185 篇 borsato m.
  • 185 篇 betancourt c.
  • 185 篇 bediaga i.
  • 185 篇 amato s.
  • 183 篇 boettcher t.
  • 183 篇 braun s.
  • 182 篇 borisyak m.
  • 182 篇 bizzeti a.
  • 181 篇 baryshnikov f.
  • 179 篇 bencivenni g.
  • 174 篇 brundu d.
  • 171 篇 back j.j.
  • 171 篇 bay a.
  • 167 篇 bursche a.

语言

  • 2,112 篇 英文
  • 495 篇 其他
  • 22 篇 中文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Computer Engineering and AI and Data Science Application and Research Center"
2627 条 记 录,以下是11-20 订阅
排序:
MOCBOA:Multi-Objective Chef-Based Optimization Algorithm Using Hybrid Dominance Relations for Solving engineering Design Problems
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 967-1008页
作者: Nour Elhouda Chalabi Abdelouahab Attia Abdulaziz S.Almazyad Ali Wagdy Mohamed Frank Werner Pradeep Jangir Mohammad Shokouhifar Computer Science Department University of M’silaIchebiliaM’sila28000Algeria Computer ScienceDepartment Mohamed El Bachir El IbrahimiUniversity of Bordj BouArreridjBordj BouArreridj34000Algeria Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11931Jordan Faculty of Mathematics Otto-von-Guericke UniversityMagdeburg39016Germany University Centre for Research and Development Chandigarh UniversityMohali140413India Department of Electrical and Computer Engineering Shahid Beheshti UniversityTehran14399Iran DTU AI and Data Science Hub(DAIDASH) Duy Tan UniversityDa Nang550000Vietnam
Multi-objective optimization is critical for problem-solving in engineering,economics,and *** study introduces the Multi-Objective Chef-Based Optimization Algorithm(MOCBOA),an upgraded version of the Chef-Based Optimi... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论
Using Lock-Free Design for Throughput-Optimized Cache Eviction
收藏 引用
Proceedings of the ACM on Measurement and Analysis of Computing Systems 2025年 第2期9卷 1-28页
作者: Dong, Chao Wang, Fang Jiang, Hong Feng, Dan Huazhong University of Science and Technology Key Laboratory of Information Storage System Wuhan National Laboratory for Optoelectronics Engineering Research Center of data storage systems and Technology School of Computer Science and Technology Ministry of Education of China Hubei Wuhan China University of Texas at Arlington Department of Computer Science and Engineering ArlingtonTX United States
In large-scale information systems, storage device performance continues to improve while workloads expand in size and access characteristics. This growth puts tremendous pressure on caches and storage hierarchy in te... 详细信息
来源: 评论
A Reduced State-Space Generation Method for Concurrent Systems Based on CPN-PR Model
收藏 引用
IEEE Transactions on computer-aided Design of Integrated Circuits and Systems 2025年 第6期44卷 2328-2342页
作者: Zhong, Wenjie Sun, Tao Zhou, Jian-Tao Wang, Zhuowei Song, Xiaoyu Inner Mongolia University College of Computer Science the Engineering Research Center of Ecological Big Data Ministry of Education the Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software the Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot010000 China Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Portland State University Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design... 详细信息
来源: 评论
Decentralized and Network-Aware UAV Service Deployment for Dependency-Driven applications
Decentralized and Network-Aware UAV Service Deployment for D...
收藏 引用
2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
作者: Sari, Talip Tolga Quadri, Christian Seçinti, Gökhan Trotta, Angelo University of Bologna Department of Computer Science and Engineering Italy Istanbul Technical University Department of Computer Engineering Turkey Università degli Studi di Milano Department of Computer Science Italy Bts - Digital Twin Application and Research Center Istanbul Technical University Turkey
Unmanned Aerial Vehicle (UAV) swarms enable the rapid deployment of IoT services in dynamic and challenging environments. While these swarms offer flexibility and close proximity to sensing and actuation points, effic... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Intelligent Control of an Integrated Energy System: Low Carbon Modeling and Intelligent Optimization  6
Intelligent Control of an Integrated Energy System: Low Carb...
收藏 引用
6th International Conference on Electronic engineering and Informatics, EEI 2024
作者: Fu, Zezheng Lin, Wenting Yang, Degang College of Computer and Information Science Chongqing Normal University Chongqing401331 China Chongqing Engineering Research Center of Educational Big Data Intelligent Perception and Application Chongqing401331 China
An integrated energy system is a complex system that requires intelligent control to optimize its operation. This paper proposes an intelligent control method for integrated energy systems based on a low carbon model.... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J. F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh12311 Saudi Arabia International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Key Laboratory of Computing Power Network and Information Security Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Ministry of Education Shandong Computer Science Center Jinan250353 China
Intelligent supply line surveillance is critical for modern smart grids (SGs). Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data conti... 详细信息
来源: 评论
research on a quantification model of online learning cognitive load based on eye-tracking technology
收藏 引用
Multimedia Tools and applications 2025年 第18期84卷 18993-19007页
作者: Xue, Yaofeng Zhu, Fangqing Li, Jiaxuan Department of Educational Information Technology and Shanghai Engineering Research Center of Digital Educational Equipment East China Normal University Shanghai200062 China Key Laboratory of Advanced Theory and Application in Statistics and Data Science-MOE East China Normal University Shanghai China
Online learning is characterized by a high degree of complexity and a wealth of information when compared to traditional classroom learning. This can have an adverse influence on the learning outcomes of online learne... 详细信息
来源: 评论
Multi-trial Vector-based Whale Optimization Algorithm
收藏 引用
Journal of Bionic engineering 2024年 第3期21卷 1465-1495页
作者: Mohammad H.Nadimi-Shahraki Hajar Farhanginasab Shokooh Taghian Ali Safaa Sadiq Seyedali Mirjalili Faculty of Computer Engineering Najafabad BranchIslamic Azad UniversityNajafabad***Iran Big Data Research Center Najafabad BranchIslamic Azad UniversityNajafabad***Iran Department of Computer Science Nottingham Trent UniversityNottinghamNG118NSUK Centre for Artificial Intelligence Research and Optimisation Torrens UniversityBrisbane4006Australia
The Whale Optimization Algorithm(WOA)is a swarm intelligence metaheuristic inspired by the bubble-net hunting tactic of humpback *** spite of its popularity due to simplicity,ease of implementation,and a limited numbe... 详细信息
来源: 评论