咨询与建议

限定检索结果

文献类型

  • 1,882 篇 期刊文献
  • 707 篇 会议
  • 9 册 图书

馆藏范围

  • 2,598 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,513 篇 工学
    • 897 篇 计算机科学与技术...
    • 757 篇 软件工程
    • 261 篇 生物工程
    • 259 篇 信息与通信工程
    • 251 篇 生物医学工程(可授...
    • 192 篇 电气工程
    • 174 篇 光学工程
    • 157 篇 控制科学与工程
    • 144 篇 核科学与技术
    • 134 篇 电子科学与技术(可...
    • 125 篇 化学工程与技术
    • 67 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 动力工程及工程热...
    • 48 篇 交通运输工程
    • 46 篇 安全科学与工程
  • 1,394 篇 理学
    • 769 篇 物理学
    • 368 篇 数学
    • 338 篇 生物学
    • 178 篇 统计学(可授理学、...
    • 154 篇 化学
    • 68 篇 系统科学
    • 47 篇 地球物理学
  • 341 篇 管理学
    • 186 篇 管理科学与工程(可...
    • 148 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 248 篇 医学
    • 208 篇 临床医学
    • 155 篇 基础医学(可授医学...
    • 99 篇 药学(可授医学、理...
    • 79 篇 公共卫生与预防医...
  • 62 篇 法学
  • 60 篇 农学
  • 30 篇 经济学
  • 26 篇 教育学
  • 5 篇 文学
  • 5 篇 艺术学
  • 2 篇 军事学

主题

  • 150 篇 hadron colliders
  • 85 篇 deep learning
  • 78 篇 hadrons
  • 57 篇 machine learning
  • 47 篇 hadronic decays
  • 42 篇 bottom mesons
  • 39 篇 accuracy
  • 38 篇 branching fracti...
  • 36 篇 particle decays
  • 34 篇 training
  • 32 篇 w & z bosons
  • 31 篇 feature extracti...
  • 29 篇 artificial intel...
  • 28 篇 higgs bosons
  • 28 篇 flavor changing ...
  • 27 篇 leptonic, semile...
  • 24 篇 computational mo...
  • 24 篇 predictive model...
  • 24 篇 charmed mesons
  • 23 篇 magnetic resonan...

机构

  • 452 篇 department of ph...
  • 387 篇 iccub universita...
  • 386 篇 cavendish labora...
  • 380 篇 university of ch...
  • 368 篇 horia hulubei na...
  • 359 篇 h.h. wills physi...
  • 357 篇 van swinderen in...
  • 355 篇 school of physic...
  • 339 篇 department of ph...
  • 338 篇 imperial college...
  • 334 篇 center for high ...
  • 331 篇 yandex school of...
  • 331 篇 oliver lodge lab...
  • 329 篇 stfc rutherford ...
  • 326 篇 institute of par...
  • 319 篇 infn sezione di ...
  • 319 篇 physikalisches i...
  • 315 篇 henryk niewodnic...
  • 311 篇 nikhef national ...
  • 308 篇 infn sezione di ...

作者

  • 231 篇 beiter a.
  • 215 篇 barter w.
  • 211 篇 bellee v.
  • 195 篇 casse g.
  • 193 篇 bowcock t.j.v.
  • 187 篇 blake t.
  • 185 篇 borsato m.
  • 185 篇 betancourt c.
  • 185 篇 bediaga i.
  • 185 篇 amato s.
  • 183 篇 boettcher t.
  • 183 篇 braun s.
  • 182 篇 borisyak m.
  • 182 篇 bizzeti a.
  • 181 篇 baryshnikov f.
  • 178 篇 bencivenni g.
  • 174 篇 brundu d.
  • 171 篇 back j.j.
  • 171 篇 bay a.
  • 169 篇 bursche a.

语言

  • 2,091 篇 英文
  • 487 篇 其他
  • 22 篇 中文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Computer Engineering and AI and Data Science Application and Research Center"
2598 条 记 录,以下是371-380 订阅
排序:
An Interactive Annotation Method Based on Incremental Learning  2
An Interactive Annotation Method Based on Incremental Learni...
收藏 引用
2nd International Conference on Image Processing, computer Vision and Machine Learning, ICICML 2023
作者: Duan, Xiusheng Sun, Guohua Cao, Jingya Zhang, Yuyang Yang, Jingchao Han, Duyu Hebei Polytechnic Institute Department of Artificial Intelligence and Big Data Shijiazhuang China Hebei Provincial University Road Traffic Perception Intelligent Application Technology Research and Development Center Shijiazhuang China Shijiazhuang Tiedao University School of Mechanical Engineering Shijiazhuang China Northeastern University Faculty of Robot Science and Engineering Shenyang China Hebei Jiaotong Vocational and Technical College Shijiazhuang China
In recent years, military science and technology has been developed rapidly, and new equipments has been equipped in the army. Augmented Reality (AR) technology provides the possibility to solve the problem of equipme... 详细信息
来源: 评论
Convolutional Neural Network and Deep One-Class Support Vector Machine with Imbalanced dataset for Anomaly Network Traffic Detection
Convolutional Neural Network and Deep One-Class Support Vect...
收藏 引用
International Conference on Cyber Security, Privacy and Networking, ICSPN 2022
作者: Chui, Kwok Tai Gupta, Brij B. Chi, Hao Ran Zhao, Mingbo Hong Kong International Center for AI and Cyber Security Research and Innovations & Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Lebanese American University Beirut1102 Lebanon Instituto de Telecomunicações Aveiro3810-193 Portugal School of Information Science & Technology Donghua University Shanghai200051 China
Anomaly detection of network traffic is important for real-time network monitoring and management. The research challenges for anomaly network traffic detection (ANTD) are attributable to the nature of highly imbalanc... 详细信息
来源: 评论
Flickr30K-CFQ: A Compact and Fragmented Query dataset for Text-image Retrieval
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Haoyu Song, Yaoxian Wang, Xuwu Zhu, Xiangru Li, Zhixu Song, Wei Li, Tiefeng Research Center for Intelligent Robotics Zhejiang Lab China Department of Engineering Mechanics Center for X-Mechanics Zhejiang University China Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China
With the explosive growth of multi-modal information on the Internet, unimodal search cannot satisfy the requirement of Internet applications. Text-image retrieval research is needed to realize high-quality and effici... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Evaluation of Chest CT-Scan Anomaly Detection Models Using Principal Component Analysis
Evaluation of Chest CT-Scan Anomaly Detection Models Using P...
收藏 引用
Information Technology (ACIT)
作者: Ala’ Alyabrodi Shrouq Al-Daja MohammadNoor Injadat Abdallah Moubayed Ali Elrashidi Cyber Security Department Zarqa University Zarqa Jordan Data Science & AI Department Zarqa University Zarqa Jordan Computer Engineering Department and Interdisciplinary Research Center for Intelligent Secure Systems King Fahd University of Petroleum & Minerals Dhahran Saudi Arabia Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia
Machine learning-based improvements in anomaly detection, visualization, and segmentation are made possible by the growing digitization of medical imaging, which reduces the workload for medical specialists. Neverthel... 详细信息
来源: 评论
Enhancing Encrypted Internet Traffic Classification Through Advanced data Augmentation Techniques
arXiv
收藏 引用
arXiv 2024年
作者: Zion, Yehonatan Aharon, Porat Dubin, Ran Dvir, Amit Hajaj, Chen Department of Computer Science Ariel Cyber Innovation Center Ariel University Israel Dept. of Computer and Software Eng. Ariel Cyber Innovation Center Ariel University Israel Department of Industrial Engineering and Management Data Science Artificial Intelligence Research Center Ariel University Israel
The increasing popularity of online services has made Internet Traffic Classification a critical field of study. However, the rapid development of internet protocols and encryption limits usable data availability. Thi... 详细信息
来源: 评论
Criteria-based Unsupervised Feature Selection Techniques: A Comparative Study Over Chest CT Scan
Criteria-based Unsupervised Feature Selection Techniques: A ...
收藏 引用
Information Technology (ACIT)
作者: Shrouq Al-Daja Ala’ Alyabrodi Abdallah Moubayed MohammadNoor Injadat Ali Elrashidi Data Science & AI Department Zarqa University Zarqa Jordan Cyber Security Department Zarqa University Zarqa Jordan Computer Engineering Department Interdisciplinary Research Center for Intelligent Secure Systems King Fahd University of Petroleum & Minerals Dhahran Saudi Arabia Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia
research on classifying chest CT scans as normal or abnormal using machine learning and deep learning has garnered significant attention. To address this, various feature selection (FS) methods are employed to reduce ... 详细信息
来源: 评论
Mobile edge fog, Blockchain Networking and Computing-A survey
Mobile edge fog, Blockchain Networking and Computing-A surve...
收藏 引用
Computational Intelligence, Communication Technology and Networking (CICTN), International Conference on
作者: Ramiz Salama Fadi Al-Turjman Shruti Bhatla Divya Mishra Department of Computer Engineering AI and Robotics Institute Research Center for AI and IoT Near East University Nicosia Mersin Turkey Artificial Intelligence Engineering Dept. AI and Robotics Institute Near East University Nicosia Mersin Turkey Research Center for AI and IoT Faculty of Engineering University of Kyrenia Kyrenia Mersin Turkey Department of Computer Science and Engineering Graphic Era Hill University Dehradun ABES Engineering College Ghaziabad
Mobile edge computing (MEC) and blockchain technology are two rapidly evolving areas in computer science that have the potential to significantly impact the design and operation of distributed systems. MEC involves th...
来源: 评论
Correction of Read Biases Induced by Complex Reference Genome Regions for Improving Copy Number Variation Detection Using a Gaussian Mixture Model
Correction of Read Biases Induced by Complex Reference Genom...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Xuwen Chang, Zhili Wang, Shenjie Liu, Ruoyu Liu, Yuqian Zhu, Xiaoyan Shao, Yang Lai, Xin Yang, Shuanying Wang, Jiayin Second Affiliated Hospital Xi'an Jiaotong University Department of Respiratory Medicine Xi'an710003 China Xi'an Jiaotong University School of Computer Science and Technology Xi'an710049 China Xi'an Jiaotong University Shaanxi Engineering Research Center of Medical and Health Big Data Xi'an710049 China Nanjing Geneseeq Technology INC. China
Copy number variations are crucial in cancer research, but their detection through next-generation sequencing is often hindered by read biases, particularly in complex genomic regions. Existing bias-correction methods... 详细信息
来源: 评论
Compact Visual data Representation for Green Multimedia - A Human Visual System Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Peilin Fang, Xiaohan Wang, Meng Wang, Shiqi Ma, Siwei Department of Computer Science City University of Hong Kong Hong Kong The School of Data Science Lingnan University Hong Kong National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing100871 China
The Human Visual System (HVS), with its intricate sophistication, is capable of achieving ultra-compact information compression for visual signals. This remarkable ability is coupled with high generalization capabilit... 详细信息
来源: 评论