咨询与建议

限定检索结果

文献类型

  • 878 篇 期刊文献
  • 573 篇 会议
  • 5 册 图书

馆藏范围

  • 1,456 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 778 篇 理学
    • 562 篇 物理学
    • 132 篇 数学
    • 62 篇 生物学
    • 58 篇 化学
    • 41 篇 统计学(可授理学、...
    • 29 篇 系统科学
  • 681 篇 工学
    • 284 篇 计算机科学与技术...
    • 206 篇 软件工程
    • 116 篇 电气工程
    • 115 篇 控制科学与工程
    • 112 篇 电子科学与技术(可...
    • 108 篇 核科学与技术
    • 71 篇 信息与通信工程
    • 56 篇 材料科学与工程(可...
    • 51 篇 化学工程与技术
    • 50 篇 机械工程
    • 46 篇 光学工程
    • 41 篇 仪器科学与技术
    • 39 篇 生物医学工程(可授...
    • 38 篇 生物工程
    • 31 篇 力学(可授工学、理...
    • 28 篇 动力工程及工程热...
    • 23 篇 冶金工程
  • 127 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 68 篇 医学
    • 59 篇 临床医学
    • 40 篇 基础医学(可授医学...
    • 22 篇 药学(可授医学、理...
  • 18 篇 法学
    • 17 篇 社会学
  • 15 篇 农学
  • 14 篇 教育学
  • 12 篇 经济学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 军事学

主题

  • 66 篇 hadron colliders
  • 59 篇 computer science
  • 56 篇 higgs bosons
  • 53 篇 systems engineer...
  • 27 篇 relativistic hea...
  • 26 篇 supersymmetric m...
  • 26 篇 proton-proton in...
  • 25 篇 standard model (...
  • 24 篇 large hadron col...
  • 24 篇 collisions (nucl...
  • 24 篇 top quark
  • 23 篇 deep learning
  • 22 篇 particle product...
  • 22 篇 nuclear counters
  • 22 篇 extensions of hi...
  • 21 篇 w & z bosons
  • 21 篇 control systems
  • 21 篇 quark & gluon je...
  • 20 篇 hadron-hadron sc...
  • 20 篇 robot sensing sy...

机构

  • 365 篇 faculty of scien...
  • 365 篇 department for p...
  • 358 篇 kirchhoff-instit...
  • 354 篇 institute of phy...
  • 352 篇 department of ph...
  • 348 篇 department of ph...
  • 347 篇 instituto de fís...
  • 345 篇 dipartimento di ...
  • 336 篇 department of ph...
  • 333 篇 institute of phy...
  • 328 篇 department of ph...
  • 328 篇 fakultät für phy...
  • 319 篇 graduate school ...
  • 307 篇 nikhef national ...
  • 303 篇 department of ph...
  • 298 篇 department of ph...
  • 285 篇 department of ph...
  • 271 篇 high energy phys...
  • 255 篇 marian smoluchow...
  • 251 篇 department of ph...

作者

  • 293 篇 c. alexa
  • 293 篇 g. bella
  • 293 篇 d. calvet
  • 293 篇 c. amelung
  • 292 篇 n. orlando
  • 292 篇 y. tayalati
  • 292 篇 g. spigo
  • 292 篇 f. siegert
  • 291 篇 j. m. izen
  • 291 篇 j. strandberg
  • 282 篇 r. ströhmer
  • 282 篇 m. rijssenbeek
  • 282 篇 s. jin
  • 282 篇 g. gaudio
  • 282 篇 s. mohapatra
  • 278 篇 s. guindon
  • 277 篇 a. kaczmarska
  • 276 篇 j. schaarschmidt
  • 274 篇 i. van vulpen
  • 269 篇 a. d. pilkington

语言

  • 1,403 篇 英文
  • 27 篇 其他
  • 20 篇 日文
  • 6 篇 中文
  • 1 篇 荷兰文
检索条件"机构=Faculty of Computer Engineering and System Science Kyushu Institute of Technology"
1456 条 记 录,以下是1-10 订阅
排序:
Global-Local Consistency for Cost-Effective Anomaly Localization with Point Annotations  16
Global-Local Consistency for Cost-Effective Anomaly Localiza...
收藏 引用
16th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2024
作者: Nakanishi, Keiichi Katafuchi, Ryoya Tokunaga, Terumasa Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan Kyushu Institute of Technology Faculty of Computer Science and Systems Engineering Iizuka Japan
Creating pixel-level ground-truth (GT) masks is quite costly for deep learning-based image segmentation. Specialists in areas such as anomaly detection and medical diagnostics face difficulties in producing many GT ma... 详细信息
来源: 评论
A Study on DDoS Attacks Detection on IoT Devices Using Machine Learning for Microcontrollers
A Study on DDoS Attacks Detection on IoT Devices Using Machi...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Mwaura, Jedidah Araki, Shunsuke Kakizaki, Ken'Ichi Kyushu Institute of Technology Graduate School of Computer Science and Systems Engineering FuKuoka Japan Kyushu Institute of Technology Faculty of Computer Science and Systems Engineering Fukuoka Japan
In recent years, there has been a proliferation of Internet of Things (IoT) devices, and so has been the attacks on them. In this paper we will propose a methodology to detect Distributed Denial of Service (DDoS) atta... 详细信息
来源: 评论
Enhanced MADM Strategy with Heptapartitioned Neutrosophic Distance Metrics
收藏 引用
Neutrosophic Sets and systems 2025年 78卷 74-96页
作者: Eassa, Mohamed Myvizhi, M. Elkholy, Mohamed Abdelhafeez, Ahmed Elbehiery, Hussam Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Mathematics KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Faculty of Computer Science& Engineering Alamein International University Egypt
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
Observer-Structured PID Controller: Flight Controller Design Examples  4
Observer-Structured PID Controller: Flight Controller Design...
收藏 引用
4th International Conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2024
作者: Sato, Masayuki Sebe, Noboru Faculty of Advanced Science and Technology Kumamoto University Kumamoto Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan
This note shows two design examples of PID con-Trollers, whose state variables estimate the selected state vari-Ables of the controlled plant systems, for LTI Parametrically Dependent (LTIPD) systems. The authors have... 详细信息
来源: 评论
Layer-Wise External Attention by Well-Localized Attention Map for Efficient Deep Anomaly Detection
收藏 引用
SN computer science 2024年 第5期5卷 592页
作者: Nakanishi, Keiichi Shiroma, Ryo Hayakawa, Tokihisa Katafuchi, Ryoya Tokunaga, Terumasa Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Fukuoka-ken Iizuka-shi 820-8502 Japan Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Fukuoka-ken Iizuka-shi 820-8502 Japan
The external attention mechanism offers a promising approach to enhance image anomaly detection (Hayakawa et al., in: IMPROVE, pp. 100-–110, 2023). Nevertheless, the effectiveness of this method is contingent upon th... 详细信息
来源: 评论
Leveraging EfficientNetB3 in a Deep Learning Framework for High-Accuracy MRI Tumor Classification
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 867-883页
作者: Mahesh Thyluru Ramakrishna Kuppusamy Pothanaicker Padma Selvaraj Surbhi Bhatia Khan Vinoth Kumar Venkatesan Saeed Alzahrani Mohammad Alojail Department of Computer Science&Engineering Faculty of Engineering and TechnologyJAIN(Deemed-to-be University)Bengaluru562112India School of Computer Science and Engineering VIT-AP UniversityAmaravati522241India Department of Computer Science&Technology Madanapalle Institute of Technology&ScienceMadanapalle517325India School of Science Engineering and EnvironmentUniversity of SalfordManchesterM54WTUK School of Computer Science Engineering&Information Systems(SCORE) Vellore Institute of Technology(VIT)Vellore632014India Management Information System Department College of Business AdministrationKing Saud UniversityRiyadh11531Saudi Arabia Adjunct Research Faculty Centre for Research Impact&OutcomeChitkara UniversityRajpuraPunjab140401India
Brain tumor is a global issue due to which several people suffer,and its early diagnosis can help in the treatment in a more efficient *** different types of brain tumors,including gliomas,meningiomas,pituitary tumors... 详细信息
来源: 评论
A Deployment of Ensemble-Based IDS on Raspberry Pi  13
A Deployment of Ensemble-Based IDS on Raspberry Pi
收藏 引用
13th IEEE Global Conference on Consumer Electronic, GCCE 2024
作者: Musthafa, Muhammad Bisri Huda, Samsul Shamim, S.M. Kodera, Yuta Mwaura, Jedidah Araki, Shunsuke Nogami, Yasuyuki Okayama University Graduate School of Environmental Life Natural Science and Technology Japan Okayama University Green Innovation Center Japan Kyushu Institute of Technology Graduate School of Computer Science and Systems Engineering Fukuoka Japan Kyushu Institute of Technology Faculty of Computer Science and Systems Engineering Fukuoka Japan
Intrusion Detection systems (IDS) are essential for safeguarding IoT networks against various attacks. Our previously developed ensemble-based IDS model, which combines stacked Long Short-Term Memory (LSTM) networks w... 详细信息
来源: 评论
Bald Eagle Search Algorithm with Hierarchical Deep Learning for Internet of Things Assisted Sleep Quality Recognition
收藏 引用
SN computer science 2024年 第5期5卷 564页
作者: Duhayyim, Mesfer Al Sharif, Mahir Mohammed Munjal, Muskaan Hilal, Anwer A. Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj 16273 Saudi Arabia Department of Computer Science Faculty of Computer Science and Information Technology Omdurman Islamic University Omdurman Sudan Computer Engineering Thapar Institute of Engineering and Technology Punjab Patiala India Department of Information System Faculty of Computer Science and Information Technology Omdurman Islamic University Omdurman Sudan
Sleep quality prediction in Internet of Things (IoT) involves leveraging a system of interrelated devices to gather as well as analyse related data. Smart devices like wearable devices or smart mattresses endlessly mo... 详细信息
来源: 评论
Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2957-2979页
作者: Zibo Wang Chaobin Huo Yaofang Zhang Shengtao Cheng Yilu Chen Xiaojie Wei Chao Li Bailing Wang School of Computer Science and Technology Harbin Institute of TechnologyWeihai264209China National Computer System Engineering Research Institute of China Beijing100083China School of Cyber Science and Technology Harbin Institute of TechnologyHarbin150001China Weihai Cyberguard Technologies Co.Ltd. Weihai264209China Faculty of Science Vrije Universiteit AmsterdamAmsterdam1081HVNetherlands
With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control system(ICS)administrators to proactively forecas... 详细信息
来源: 评论