咨询与建议

限定检索结果

文献类型

  • 3,635 篇 期刊文献
  • 1,876 篇 会议
  • 78 册 图书

馆藏范围

  • 5,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,359 篇 理学
    • 2,378 篇 物理学
    • 835 篇 数学
    • 406 篇 化学
    • 344 篇 生物学
    • 325 篇 统计学(可授理学、...
    • 308 篇 地球物理学
  • 2,915 篇 工学
    • 1,285 篇 计算机科学与技术...
    • 1,040 篇 软件工程
    • 419 篇 信息与通信工程
    • 356 篇 电子科学与技术(可...
    • 336 篇 电气工程
    • 311 篇 化学工程与技术
    • 287 篇 控制科学与工程
    • 284 篇 仪器科学与技术
    • 268 篇 生物医学工程(可授...
    • 266 篇 光学工程
    • 263 篇 生物工程
    • 229 篇 冶金工程
    • 209 篇 核科学与技术
    • 201 篇 机械工程
    • 195 篇 力学(可授工学、理...
    • 177 篇 材料科学与工程(可...
    • 151 篇 动力工程及工程热...
    • 137 篇 航空宇航科学与技...
  • 559 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 298 篇 医学
    • 241 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 133 篇 药学(可授医学、理...
  • 75 篇 农学
  • 73 篇 法学
  • 63 篇 经济学
  • 56 篇 教育学
  • 8 篇 文学
  • 7 篇 艺术学
  • 6 篇 军事学

主题

  • 297 篇 bosons
  • 137 篇 hadrons
  • 92 篇 hadron colliders
  • 89 篇 relativistic hea...
  • 86 篇 photons
  • 84 篇 machine learning
  • 75 篇 charged particle...
  • 66 篇 artificial intel...
  • 63 篇 higgs bosons
  • 61 篇 tellurium compou...
  • 59 篇 deep learning
  • 55 篇 accuracy
  • 51 篇 proton-proton in...
  • 46 篇 cosmic rays
  • 44 篇 large hadron col...
  • 44 篇 feature extracti...
  • 40 篇 computational mo...
  • 39 篇 training
  • 38 篇 informatics
  • 36 篇 support vector m...

机构

  • 1,144 篇 horia hulubei na...
  • 1,013 篇 school of physic...
  • 993 篇 department for p...
  • 972 篇 institute of phy...
  • 910 篇 cavendish labora...
  • 899 篇 institute of phy...
  • 886 篇 niels bohr insti...
  • 851 篇 physics departme...
  • 841 篇 department of ph...
  • 826 篇 department of ph...
  • 826 篇 department of ph...
  • 801 篇 institute of hig...
  • 795 篇 cern geneva
  • 789 篇 school of physic...
  • 770 篇 dipartimento di ...
  • 747 篇 faculté des scie...
  • 721 篇 west university ...
  • 695 篇 department of ph...
  • 680 篇 institut für ker...
  • 678 篇 department of ph...

作者

  • 649 篇 ali b.
  • 561 篇 bachacou h.
  • 551 篇 annovi a.
  • 514 篇 akimov a.v.
  • 496 篇 aad g.
  • 487 篇 alonso f.
  • 486 篇 amidei d.
  • 484 篇 alexopoulos t.
  • 480 篇 azuelos g.
  • 480 篇 alimonti g.
  • 478 篇 arnaez o.
  • 474 篇 anastopoulos c.
  • 473 篇 alexa c.
  • 472 篇 argyropoulos s.
  • 469 篇 aloisio a.
  • 468 篇 adelman j.
  • 467 篇 amelung c.
  • 463 篇 arce a.t.h.
  • 460 篇 arnold h.
  • 458 篇 augsten k.

语言

  • 5,212 篇 英文
  • 325 篇 其他
  • 26 篇 中文
  • 25 篇 日文
  • 3 篇 俄文
  • 2 篇 德文
  • 2 篇 西班牙文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Informatics Engineering Faculty of Science and Technology"
5589 条 记 录,以下是141-150 订阅
排序:
Using negative exponential function to characterize built-up land density along slope gradient for 19 urban areas in China
收藏 引用
Journal of Mountain science 2024年 第11期21卷 3859-3870页
作者: SONG Yufei PENG Qiuzhi LU Jiating LYU Leting PENG Fengcan Faculty of Land Resources Engineering Kunming University of Science and TechnologyKunming 650093China Surveying and Mapping Geo-informatics Technology Research Center on Plateau Mountains of Yunnan Higher Education Kunming 650093China Yunnan Natural Resources and Planning Intelligence Innovation Laboratory Kunming 650093China School of Geographical Sciences Liaoning Normal UniversityDalian 116029China
In China,numerous cities are expanding into sloping land,yet the quantitative distribution patterns of urban built-up land density along the slope gradient remain unclear,limiting the understanding of sloping land ***... 详细信息
来源: 评论
Compression through extraction of learned parameters from images in de-correlated image space
收藏 引用
Iran Journal of Computer science 2024年 第2期7卷 259-277页
作者: Hasnat, Abul Halder, Santanu Bhattacharjee, Debotosh Government College of Engineering and Textile Technology West Bengal Berhampore India Government College of Engineering and Leather Technology West Bengal Kolkata India Computer Science and Engineering Jadavpur University Kolkata 700032 India Center for Basic and Applied Science Faculty of Informatics and Management University of Hradec Kralove Rokitanskeho 62 Hradec Kralove 500 03 Czech Republic
Image compression is a class of algorithms that reduces the storage space requirement for a digital image. Lossy image compression techniques achieve higher compression but the visual quality of the decompressed image... 详细信息
来源: 评论
Efficient Time-Delay System Optimization with Auto-Configured Metaheuristics
Efficient Time-Delay System Optimization with Auto-Configure...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Senkerik, Roman Byrski, Aleksander Guzowski, Hubert Janku, Peter Kadavy, Tomas Oplatkova, Zuzana Kominkova Matusu, Radek Pluhacek, Michal Pekar, Libor Smolka, MacIej Viktorin, Adam Tomas Bata University A.I. Lab Faculty of Applied Informatics Department of Informatics and Artificial Intelligence Zlin Czech Republic Tomas Bata University Faculty of Applied Informatics Department of Automation and Control Engineering Zlin Czech Republic Institute of Computer Science Agh University of Science and Technology Krakow Poland
This paper presents an experimental study that compares the performance of four selected metaheuristic algorithms for optimizing a time delay system model. Time delay system models are complex and challenging to optim...
来源: 评论
Optimization Accuracy of CNN Model by Utilizing CLAHE Parameters in Image Classification Problems
Optimization Accuracy of CNN Model by Utilizing CLAHE Parame...
收藏 引用
2023 International Conference on Networking, Electrical engineering, Computer science, and technology, IConNECT 2023
作者: Wanto, Anjar Yuhandri, Yuhandri Okfalisa, Okfalisa Universitas Putra Indonesia Yptk Padang Information Technology Faculty of Computer Science Padang Indonesia Universitas Putra Indonesia Yptk Padang Faculty of Computer Science Department of Information Technology Padang Indonesia Universitas Islam Negeri Sultan Syarif Faculty of Science and Technology Department Informatics Engineering Kasim Riau Indonesia
This study aims to optimize popular Convolutional Neural Network (CNN) models, such as ResNet50, InceptionV4, VGG19, MobileNetV1, MobileNetV2, MobileNetV3 Small, and MobileNetV3 Large, by utilizing the CLAHE (Contrast... 详细信息
来源: 评论
Risk Countermeasures Based on Five Whys Analysis Considering Offensive Security  12
Risk Countermeasures Based on Five Whys Analysis Considering...
收藏 引用
12th IEEE Global Conference on Consumer Electronics, GCCE 2023
作者: Tanimoto, Shigeaki Nakajima, Ryusei Goromaru, Hideki Hatashima, Takashi Kanai, Atsushi Chiba Institute of Technology Faculty of Social System Science Chiba Japan Nippon Telegraph and Telephone Corporation Ntt Social Informatics Laboratories Tokyo Japan Hosei University Faculty of Science and Engineering Tokyo Japan
As digital transformation progresses, security incidents are becoming more sophisticated and more numerous. In general, it is not clear who the attackers are or what their motives may be. In such a situation, the defe... 详细信息
来源: 评论
Innovative Strategies for Preventing Online Child Grooming: A Multilingual Web Application  22
Innovative Strategies for Preventing Online Child Grooming: ...
收藏 引用
22nd International Conference on Emerging eLearning Technologies and Applications, ICETA 2024
作者: Kupcová, Eva Pleva, Matúš Haluška, Renát Sokolová, Zuzana Gajdoš, Patrik Bours, Patrick Technical University Košice Faculty of Electrical Engineering and Informatics Department of Electronics and Multimedia Communications Košice Slovakia Norwegian University of Science and Technology Department of Information Security and Communication Technology Gjøvik Norway
This article investigates modern approaches to preventing online child grooming, emphasizing raising awareness and analyzing current trends. It focuses on identifying emerging threats and examining existing prevention... 详细信息
来源: 评论
Improving DL-Learner on a Malware Detection Use Case  36
Improving DL-Learner on a Malware Detection Use Case
收藏 引用
36th International Workshop on Description Logics, DL 2023
作者: Bisták, Tomáš Švec, Peter Kluka, Ján Šimko, Alexander Balogh, Štefan Homola, Martin Department of Applied Informatics Faculty of Mathematics Physics and Informatics Comenius University Mlynská dolina Bratislava842 48 Slovakia Institute of Computer Science and Mathematics Faculty of Electrical Engineering and Information Technology Slovak University of Technology Ilkovicova 3 Bratislava812 19 Slovakia
Automation of malware characterization has become increasingly important for early malware detection over the past decades. Since it is crucial to be able to perform malware detection transparently, explainable machin... 详细信息
来源: 评论
Implementing Linear Regression to Improve the Performance of Low-Cost Water Filling Machine  1
Implementing Linear Regression to Improve the Performance of...
收藏 引用
1st International Conference on Advanced engineering and Technologies, ICONNIC 2023
作者: Wibawanto, Slamet Zaeni, Ilham Ari Elbaith Wardhana, Arya Kusuma Universitas Negeri Malang Faculty of Applied Science and Technology Malang Indonesia Universitas Negeri Malang Dept. of Electrical Engineering and Informatics Malang Indonesia
The manufacturing of bottled beverages, including mineral water, energy drinks, and soft drinks, relies heavily on filling water bottles. Automation can improve quality and precision by reducing human interference. A ... 详细信息
来源: 评论
Securing the Future after Pager Bombs:Lifecycle Protection of Smart Devices via Blockchain Intelligence
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第12期11卷 2355-2358页
作者: Fei Lin Qinghua Ni Jing Yang Juanjuan Li Nan Zheng Levente Kovács Radu Prodan Mariagrazia Dotoli Qing-Long Han Fei-Yue Wang the Department of Engineering Science Faculty of Innovation EngineeringMacao University of Science and TechnologyMacao 999078China the State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China the School of Artificial Intelligence University of Chinese Academy of SciencesBei-jing 100049China IEEE Obuda University John von Neumann Faculty of InformaticsBecsi Str.96/bH-1034 BudapestHungary the Institute of Information Technology University of Klagenfurt9020 Klagenfurt am WortherseeAustria the Department of Electrical and Information Engineering Polytechnic of Bari70126 BariItaly the School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyMelbourne VIC 3122Australia the State Key Laboratory for Management and Control of Complex Systems Chinese Academy of SciencesBeijing 100190
THE Lebanese wireless device explosion incident has drawn widespread attention,involving devices such as pagers,walkie-talkies,and other common devices[1].This event has revealed and highlighted the security vulnerabi... 详细信息
来源: 评论
Cybersecurity Revolution via Large Language Models and Explainable AI  17
Cybersecurity Revolution via Large Language Models and Expla...
收藏 引用
17th International Conference on Security of Information and Networks, SIN 2024
作者: Ghazal, Taher M. Janjua, Jamshaid Iqbal Abushiba, Walid Ahmad, Munir Ihsan, Anuam Al-Dmour, Nidal A. College of Arts & Science Applied Science University Manama Bahrain Center for Cyber Security Faculty of Information Science and Technology Selangor Malaysia Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul02841 Korea Republic of College of Engineering Mutah University Department of Computer Engineering Jordan
Integrating Groundbreaking advancements in AI, like language models, interpretable AI, and machine learning, opens up a world of exciting new possibilities. The Evolving face of cybersecurity and Modern cyber threats ... 详细信息
来源: 评论