咨询与建议

限定检索结果

文献类型

  • 1,231 篇 期刊文献
  • 1,184 篇 会议
  • 35 册 图书

馆藏范围

  • 2,450 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,345 篇 工学
    • 759 篇 计算机科学与技术...
    • 589 篇 软件工程
    • 335 篇 信息与通信工程
    • 246 篇 电子科学与技术(可...
    • 221 篇 电气工程
    • 153 篇 控制科学与工程
    • 141 篇 生物工程
    • 138 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 86 篇 仪器科学与技术
    • 86 篇 化学工程与技术
    • 85 篇 机械工程
    • 68 篇 材料科学与工程(可...
    • 59 篇 动力工程及工程热...
    • 47 篇 安全科学与工程
    • 46 篇 核科学与技术
  • 1,072 篇 理学
    • 594 篇 物理学
    • 363 篇 数学
    • 173 篇 生物学
    • 128 篇 统计学(可授理学、...
    • 99 篇 化学
    • 85 篇 系统科学
  • 288 篇 管理学
    • 179 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 88 篇 工商管理
  • 178 篇 医学
    • 145 篇 临床医学
    • 117 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
    • 52 篇 公共卫生与预防医...
  • 56 篇 法学
    • 50 篇 社会学
  • 35 篇 经济学
  • 28 篇 教育学
  • 27 篇 农学
  • 12 篇 文学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 47 篇 proton-proton in...
  • 44 篇 higgs bosons
  • 43 篇 information tech...
  • 40 篇 hadron colliders
  • 40 篇 machine learning
  • 39 篇 deep learning
  • 37 篇 educational inst...
  • 35 篇 computer science
  • 35 篇 large hadron col...
  • 35 篇 data mining
  • 35 篇 standard model (...
  • 34 篇 feature extracti...
  • 33 篇 accuracy
  • 32 篇 interference
  • 32 篇 computational mo...
  • 32 篇 wireless network...
  • 31 篇 throughput
  • 29 篇 collisions (nucl...
  • 29 篇 protocols
  • 29 篇 nuclear counters

机构

  • 286 篇 department for p...
  • 285 篇 faculty of scien...
  • 283 篇 department of ph...
  • 280 篇 departamento de ...
  • 275 篇 department of ph...
  • 275 篇 institute of phy...
  • 274 篇 kirchhoff-instit...
  • 273 篇 institute of phy...
  • 268 篇 department of ph...
  • 266 篇 department of ph...
  • 259 篇 faculté des scie...
  • 257 篇 instituto de fís...
  • 256 篇 fakultät für phy...
  • 249 篇 physics departme...
  • 243 篇 institut für ast...
  • 234 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 218 篇 nikhef national ...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 264 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 s. guindon
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 260 篇 a. kaczmarska

语言

  • 2,353 篇 英文
  • 56 篇 其他
  • 35 篇 中文
  • 8 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Division of Computer Engineering and Information Technology"
2450 条 记 录,以下是31-40 订阅
排序:
A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 2959-2978页
作者: Muhammad Firdaus Harashta Tatimma Larasati Kyung-Hyune Rhee Department of Artificial Intelligence Convergence Pukyong National UniversityBusan48513Korea School of Electrical Engineering and Informatics Institut Teknologi BandungBandung40132Indonesia College of Information Technology and Convergence Division of Computer Engineering and AIPukyong National UniversityBusan48513Korea
The enormous volume of heterogeneous data fromvarious smart device-based applications has growingly increased a deeply interlaced cyber-physical *** order to deliver smart cloud services that require low latency with ... 详细信息
来源: 评论
An Improved Deadlock Recovery Policy of Flexible Manufacturing Systems Based on Resource Flow Graphs
收藏 引用
IEEE Access 2024年 12卷 65202-65212页
作者: Tseng, Ching-Yun Chen, Ju-Chin Pan, Yen-Liang National Kaohsiung University of Science and Technology Department of Electronic Engineering Kaohsiung807618 Taiwan R.O.C. Air Force Academy Mathematics and Physics Division General Education Center Gangshan Kaohsiung820009 Taiwan National Kaohsiung University of Science and Technology Department of Computer Science and Information Engineering Kaohsiung807618 Taiwan Chaoyang University of Technology Department of Aeronautical Engineering Taichung413310 Taiwan
The system deadlock problem of the flexible manufacturing system (FMS) needs to be solved urgently. Deadlocks may occur when resources are repeatedly requested by multiple working processes, where such competition cau... 详细信息
来源: 评论
DDoS Attack Detection Using Deep-Learning Tool with Fused Features and Random Forest Classifier
DDoS Attack Detection Using Deep-Learning Tool with Fused Fe...
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Aslam, Shabnam Mohamed Almutairi, Laila Fathima, Ruhi Prabha, S. Majmaah University Department of Information Technology Al Majmaah11952 Saudi Arabia Division of Research and Innovation Department of Computer Science and Engineering TN Chennai602105 India
Recently, a number of attempts and methodologies are created by the attacker to interrupt industry, disturb the significant infrastructures, and online services in order to create financial losses, and reputational da... 详细信息
来源: 评论
Smart Diaper Embedded with Fully Printed Sensors for Wireless Healthcare and Monitoring  5
Smart Diaper Embedded with Fully Printed Sensors for Wireles...
收藏 引用
5th IEEE International Conference on Flexible and Printable Sensors and Systems, FLEPS 2023
作者: Ali, Shawkat Khan, Arshad Bermak, Amine College of Science and Engineering Hamad Bin Khalifa University Division of Information and Computing Technology Doha Qatar Computer Electrical and Mathematical Science and Engineering Division Thuwal23955-6900 Saudi Arabia
In this research, a real-time healthcare and monitoring wireless system is developed to monitor vital signs of a wearer i.e., temperature, respiration rate, and wetting volume on a smartphone. The smart diaper consist... 详细信息
来源: 评论
A Design Study on Integrated Complex Coefficient Filters with Peripheral Circuits for Accurate Frequency Response Measurement
IEEJ Transactions on Electronics, Information and Systems
收藏 引用
IEEJ Transactions on Electronics, information and Systems 2025年 第1期145卷 16-24页
作者: Shouno, Kazuhiro Sato, Lina Fukagawa, Kanta Tanimoto, Hiroshi Muto, Cosy Division of Information Engineering University of Tsukuba 1-1-1 Tennoudai Ibaraki Tsukuba305-8573 Japan Graduate School of Science and Technology Degree Programs in Systems and Information Engineering Master’s Program in Computer Science University of Tsukuba Japan Kitami Institute of Technology 165 Koen-cho Hokkaido Kitami090-8507 Japan Faculty of Education Nagasaki University 1-14 Bunkyo-machi Nagasaki852-8521 Japan
This paper proposes a measurement technique for an integrated complex filter. The proposed method is based on two measurement methods with integrated circuitry for calibration. It is accomplished by applying square wa... 详细信息
来源: 评论
Adversarial Machine Learning for Social Good: Reframing the Adversary as an Ally
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4322-4343页
作者: Al-Maliki, Shawqi Qayyum, Adnan Ali, Hassan Abdallah, Mohamed Qadir, Junaid Hoang, Dinh Thai Niyato, Dusit Al-Fuqaha, Ala Division College of Science and Engineering Doha34110 Qatar Information Technology University Lahore54000 Pakistan University of New South Wales Sydney Sydney2052 Australia Qatar University Department of Computer Science and Engineering College of Engineering Doha34110 Qatar University of Technology Sydney School of Electrical and Data Engineering Sydney2052 Australia Nanyang Technological University College of Computing and Data Science 639798 Singapore
Deep neural networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples - input samples that have be... 详细信息
来源: 评论
Algebraic Adversarial Attacks on Integrated Gradients  23
Algebraic Adversarial Attacks on Integrated Gradients
收藏 引用
23rd International Conference on Machine Learning and Cybernetics, ICMLC 2024
作者: Simpson, Lachlan Costanza, Federico Millar, Kyle Cheng, Adriel Lim, Cheng-Chew Chew, Hong Gunn School of Computer and Mathematical Sciences The University of Adelaide Australia School of Electrical and Mechanical Engineering The University of Adelaide Australia Defence Science & Technology Group Information Sciences Division Australia
Adversarial attacks on explainability models have drastic consequences when explanations are used to understand the reasoning of neural networks in safety critical systems. Path methods are one such class of attributi... 详细信息
来源: 评论
Tangentially Aligned Integrated Gradients for User-Friendly Explanations  32
Tangentially Aligned Integrated Gradients for User-Friendly ...
收藏 引用
32nd Irish Conference on Artificial Intelligence and Cognitive Science, AICS 2024
作者: Simpson, Lachlan Costanza, Federico Millar, Kyle Cheng, Adriel Lim, Cheng-Chew Chew, Hong Gunn School of Electrical and Mechanical Engineering The University of Adelaide Australia School of Computer and Mathematical Sciences The University of Adelaide Australia Information Sciences Division Defence Science and Technology Group Australia
Integrated gradients is prevalent within machine learning to address the black-box problem of neural networks. The explanations given by integrated gradients depend on a choice of base-point. The choice of base-point ... 详细信息
来源: 评论
Automatic classification of normal/AD brain MRI slices using whale-algorithm optimized hybrid image features
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 14237-14248页
作者: Kadry, Seifedine Jessy, V. Elizabeth Rajinikanth, Venkatesan Crespo, Rubén González Department of Applied Data Science Noroff University College Kristiansand4612 Norway College of Engineering and Information Technology Ajman University Ajman United Arab Emirates Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon Division of Research and Innovation Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Tamil Nadu Chennai602105 India Department of Computer Science and Technology Universidad Internacional de La Rioja La Rioja Logroño Spain
In recent years, the prevalence of Age-Related Illnesses (ARL) has been increasing among older individuals, and early recognition and treatment will result in better living conditions. It is well known that Alzheimer&... 详细信息
来源: 评论
Cancer Cytoplasm Segmentation from Cell Image Based on Transfer Learning  24
Cancer Cytoplasm Segmentation from Cell Image Based on Trans...
收藏 引用
6th International Conference on Image, Video and Signal Processing, IVSP 2024
作者: Sultana, Rebeka Horibe, Hibiki Murakami, Tomoaki Shimizu, Ikuko Institute Of Global Innovation Research Tokyo University Of Agriculture And Technology Tokyo Japan Institute Of Agriculture Division Of Animal Life Science Tokyo University Of Agriculture And Technology Tokyo Japan Institute Of Engineering Division Of Advanced Information Technology & Computer Science Tokyo University Of Agriculture And Technology Tokyo Japan
Image segmentation is one of the most popular approaches used in digital pathology. Most existing deep learning-based image segmentation models extract nuclear from the background in cell images. The nuclear of cancer... 详细信息
来源: 评论