咨询与建议

限定检索结果

文献类型

  • 1,718 篇 期刊文献
  • 778 篇 会议
  • 24 册 图书

馆藏范围

  • 2,520 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,320 篇 工学
    • 756 篇 计算机科学与技术...
    • 618 篇 软件工程
    • 226 篇 信息与通信工程
    • 176 篇 生物工程
    • 160 篇 核科学与技术
    • 156 篇 生物医学工程(可授...
    • 152 篇 电气工程
    • 144 篇 控制科学与工程
    • 116 篇 光学工程
    • 107 篇 化学工程与技术
    • 99 篇 电子科学与技术(可...
    • 48 篇 机械工程
    • 46 篇 仪器科学与技术
    • 39 篇 安全科学与工程
    • 37 篇 网络空间安全
  • 1,226 篇 理学
    • 659 篇 物理学
    • 366 篇 数学
    • 248 篇 生物学
    • 144 篇 统计学(可授理学、...
    • 137 篇 化学
    • 63 篇 系统科学
  • 304 篇 管理学
    • 167 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 94 篇 工商管理
  • 237 篇 医学
    • 195 篇 临床医学
    • 137 篇 基础医学(可授医学...
    • 76 篇 公共卫生与预防医...
    • 72 篇 药学(可授医学、理...
  • 70 篇 法学
    • 55 篇 社会学
  • 48 篇 农学
  • 38 篇 经济学
    • 38 篇 应用经济学
  • 30 篇 教育学
  • 5 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 155 篇 hadron colliders
  • 76 篇 hadrons
  • 62 篇 machine learning
  • 60 篇 accuracy
  • 59 篇 deep learning
  • 52 篇 semantics
  • 46 篇 hadronic decays
  • 44 篇 feature extracti...
  • 43 篇 artificial intel...
  • 41 篇 bottom mesons
  • 37 篇 branching fracti...
  • 36 篇 training
  • 34 篇 computational mo...
  • 33 篇 particle decays
  • 33 篇 data models
  • 31 篇 w & z bosons
  • 30 篇 federated learni...
  • 26 篇 leptonic, semile...
  • 26 篇 data mining
  • 26 篇 predictive model...

机构

  • 418 篇 department of ph...
  • 389 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 365 篇 h.h. wills physi...
  • 356 篇 university of ch...
  • 355 篇 van swinderen in...
  • 355 篇 cavendish labora...
  • 355 篇 school of physic...
  • 347 篇 department of ph...
  • 347 篇 imperial college...
  • 342 篇 center for high ...
  • 340 篇 stfc rutherford ...
  • 338 篇 institute of par...
  • 335 篇 yandex school of...
  • 326 篇 infn sezione di ...
  • 322 篇 henryk niewodnic...
  • 313 篇 infn sezione di ...
  • 313 篇 nikhef national ...
  • 301 篇 school of physic...
  • 301 篇 physik-institut ...

作者

  • 236 篇 beiter a.
  • 218 篇 barter w.
  • 214 篇 bellee v.
  • 200 篇 casse g.
  • 196 篇 bowcock t.j.v.
  • 194 篇 blake t.
  • 191 篇 borsato m.
  • 191 篇 betancourt c.
  • 191 篇 amato s.
  • 191 篇 boettcher t.
  • 190 篇 bediaga i.
  • 187 篇 braun s.
  • 186 篇 baryshnikov f.
  • 186 篇 borisyak m.
  • 184 篇 bizzeti a.
  • 181 篇 bencivenni g.
  • 179 篇 brundu d.
  • 177 篇 back j.j.
  • 177 篇 bay a.
  • 176 篇 bursche a.

语言

  • 2,180 篇 英文
  • 328 篇 其他
  • 22 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Computer Science Research Network Data Science"
2520 条 记 录,以下是141-150 订阅
排序:
Effectiveness of generative adversarial networks in denoising medical imaging (CT/MRI images)
收藏 引用
Multimedia Tools and Applications 2024年 1-25页
作者: Ramadass, Sudhir Narayanan, Sreekumar Kumar, Rajiv K, Thilagavathi Data Analytics Sterck Systems Private Limited Chennai Nungambakkam India Network and Infrastructure Management Faculty of Engineering and Technology Botho University Gaborone Botswana School of Computer Science Engineering and Technology Bennett University Uttar Pradesh Greater Noida India Department of Electronics and Communication Engineering Kumaraguru College of Technology Coimbatore India
For clinical analysis or medical intrusion, imaging technology is a potent tool for producing visual images of a body's inside. However, several existing methods include restricted access to high-quality and diver... 详细信息
来源: 评论
The Effectiveness of SPBE Application and Infrastructure Audit Tools in Enhancing Information Technology Governance Using COBIT 2019
The Effectiveness of SPBE Application and Infrastructure Aud...
收藏 引用
2023 International Conference on Informatics, Multimedia, Cyber and Information Systems, ICIMCIS 2023
作者: Irzavika, Nindy Mahda, Friyogi Resvy Universitas Pembangunan Nasional Veteran Jakarta Faculty of Computer Science Jakarta Indonesia Badan Riset Dan Inovasi Nasional Research Center for Data and Information Sciences Jakarta Indonesia
Information Technology (IT) has become the core of nearly every aspect of business and organizations. Effective IT governance is vital for achieving organizational goals and managing risks. This study uses COBIT 2019 ... 详细信息
来源: 评论
ADEdgeDrop: Adversarial Edge Dropping for Robust Graph Neural networks
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zhaoliang Wu, Zhihao Sadikaj, Ylli Plant, Claudia Dai, Hong-Ning Wang, Shiping Cheung, Yiu-Ming Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou350116 China Department of Computer Science Hong Kong Baptist University Hong Kong Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Faculty of Computer Science and with the research network Data Science @ Uni Vienna University of Vienna Vienna1090 Austria
Although Graph Neural networks (GNNs) have exhibited the powerful ability to gather graph-structured information from neighborhood nodes via various message-passing mechanisms, the performance of GNNs is limited by po... 详细信息
来源: 评论
BlueVR: Design and Evaluation of a Virtual Reality Serious Game for Promoting Understanding towards People with Color Vision Deficiency
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2023年 第CHIPLAY期7卷 289–318页
作者: You, Ruoxin Zhou, Yihao Zheng, Weicheng Zuo, Yiran Barrera Machuca, Mayra Donaji Tong, Xin University College London Gower Street LondonWC1E 6BT United Kingdom School of Computer Science and Technology East China Normal University Shanghai China Duke Kunshan University Kunshan China Shanghai Yue Kong Pao Senior Secondary School Shanghai China Faculty of Computer Science Dalhousie University 6050 University Avenue HalifaxNS Canada Data Science Research Center Duke Kunshan University Kunshan China
People with color vision deficiency (CVD) often encounter color-related challenges in their daily life, which are difficult for those with non-CVD to comprehend fully. Therefore, we designed a Virtual Reality (VR) ser... 详细信息
来源: 评论
Multilingual Hate Speech Detection: Innovations in Optimized Deep Learning for English and Arabic Hate Speech Detection
收藏 引用
SN computer science 2025年 第3期6卷 1-16页
作者: AL-Sukhani, Hassan Bsoul, Qusay Elhawary, Abdelrahman H. Nasr, Ziad M. Mansour, Ahmed E. Batyha, Radwan M. Alqadi, Basma S. Alqurni, Jehad Saad Alfagham, Hayat Madbouly, Magda M. Cybersecurity Department Faculty of Science and Information Technology Jadara University Irbid Jordan Cybersecurity Department College of Computer Sciences and Informatics Amman Arab University Amman Jordan Faculty of Engineering Ain Shams University Cairo Egypt Faculty of Computer Science Misr International University Cairo Egypt Faculty of Information Technology Applied Science Private University Amman 11931 Jordan Computer Science Department College of Computer and Information Sciences Al Imam Mohammad Ibn Saud Islamic University Riyadh Saudi Arabia Department of Educational Technologies College of Education Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam Saudi Arabia Department of MIS College of Applied Studies and Community Service Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam Saudi Arabia Institute of Graduate Studies & Research Alexandria University Alexandria Egypt Faculty of Computer and Data Science Alexandria University Alexandria Egypt
This paper presents the development of a multilingual hate speech detection model that effectively processes and classifies content in both Arabic and English. The study leverages both traditional machine learning mod... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Novelty of Different Distance Approach for Multi-Criteria Decision-Making Challenges Using q-Rung Vague Sets
收藏 引用
computer Modeling in Engineering & sciences 2024年 第6期139卷 3353-3385页
作者: Murugan Palanikumar Nasreen Kausar Dragan Pamucar Seifedine Kadry Chomyong Kim Yunyoung Nam Saveetha School of Engineering Saveetha Institute of Medical and Technical SciencesChennai602105India Department of Mathematics Faculty of Arts and ScienceYildiz Technical UniversityEsenlerIstanbul34220Turkey Department of Operations Research and Statistics Faculty of Organizational SciencesUniversity of BelgradeBelgrade11000Serbia College of Engineering Yuan Ze UniversityTaoyuan City320315TaiwanChina Department of Applied Data Science Noroff University CollegeKristiansand4612Norway Artificial Intelligence Research Center(AIRC) Ajman UniversityAjman346United Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityByblos1102-2801Lebanon ICT Convergence Research Center Soonchunhyang UniversityAsan31538South Korea Department of Computer Science and Engineering Soonchunhyang UniversityAsan31538South Korea
In this article,multiple attribute decision-making problems are solved using the vague normal set(VNS).It is possible to generalize the vague set(VS)and q-rung fuzzy set(FS)into the q-rung vague set(VS).A log q-rung n... 详细信息
来源: 评论
ARSlice:Head-Mounted Display Augmented with Dynamic Tracking and Projection
收藏 引用
Journal of computer science & Technology 2022年 第3期37卷 666-679页
作者: Yu-Ping Wang Sen-Wei Xie Li-Hui Wang Hongjin Xu Satoshi Tabata Masatoshi Ishikawa Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Institute of Semiconductors Guangdong Academy of SciencesGuangzhou 510651China Data Science Research Division Information Technology CenterThe University of TokyoTokyo 113-8656Japan Core Network Department Advanced Operations Development DivisionKDDI CooperationTokyo 206-0034Japan Tokyo University of Science Tokyo 113-8601Japan
Computed tomography(CT)generates cross-sectional images of the *** CT images has been a challenging *** emergence of the augmented and virtual reality technology has provided promising ***,existing solutions suffer fr... 详细信息
来源: 评论
Twin Transition or Competing Interests? Validation of the Artificial Intelligence and Sustainability Perceptions Inventory (AISPI)
arXiv
收藏 引用
arXiv 2025年
作者: Bush, Annika Research Center Trustworthy Data Science and Security University Alliance Ruhr Faculty of Computer Science Technical University Dortmund Dortmund Germany
As artificial intelligence (AI) and sustainability initiatives increasingly intersect, understanding public perceptions of their relationship becomes crucial for successful implementation. However, no validated instru... 详细信息
来源: 评论
Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems
收藏 引用
Journal of Bionic Engineering 2023年 第3期20卷 1263-1295页
作者: Jeffrey O.Agushaka Absalom E.Ezugwu Oyelade N.Olaide Olatunji Akinola Raed Abu Zitar Laith Abualigah School of Mathematics Statisticsand Computer ScienceUniversity of KwaZulu-NatalKing Edward AvenuePietermaritzburg CampusPietermaritzburg3201KwaZulu-NatalSouth Africa Department of Computer Science Federal University of LafiaLafia950101Nigeria Unit for Data Science and Computing North-West University11 Hoffman StreetPotchefstroom2520South Africa Sorbonne Center of Artificial Intelligence Sorbonne University-Abu Dhabi38044Abu DhabiUnited Arab Emirates Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman19328Jordan Faculty of Information Technology Middle East UniversityAmman11831Jordan Faculty of Information Technology Applied Science Private UniversityAmman11931Jordan School of Computer Sciences Universiti Sains Malaysia11800Pulau PinangMalaysia
This paper proposes a modified version of the Dwarf Mongoose Optimization Algorithm (IDMO) for constrained engineering design problems. This optimization technique modifies the base algorithm (DMO) in three simple but... 详细信息
来源: 评论