咨询与建议

限定检索结果

文献类型

  • 3,619 篇 期刊文献
  • 1,876 篇 会议
  • 78 册 图书

馆藏范围

  • 5,573 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,350 篇 理学
    • 2,372 篇 物理学
    • 833 篇 数学
    • 405 篇 化学
    • 341 篇 生物学
    • 325 篇 统计学(可授理学、...
    • 307 篇 地球物理学
  • 2,902 篇 工学
    • 1,281 篇 计算机科学与技术...
    • 1,040 篇 软件工程
    • 415 篇 信息与通信工程
    • 355 篇 电子科学与技术(可...
    • 334 篇 电气工程
    • 310 篇 化学工程与技术
    • 285 篇 仪器科学与技术
    • 285 篇 控制科学与工程
    • 267 篇 生物医学工程(可授...
    • 266 篇 光学工程
    • 261 篇 生物工程
    • 227 篇 冶金工程
    • 209 篇 核科学与技术
    • 199 篇 机械工程
    • 196 篇 力学(可授工学、理...
    • 173 篇 材料科学与工程(可...
    • 152 篇 动力工程及工程热...
    • 136 篇 航空宇航科学与技...
  • 560 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 299 篇 医学
    • 243 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 133 篇 药学(可授医学、理...
  • 75 篇 农学
  • 74 篇 法学
  • 63 篇 经济学
  • 55 篇 教育学
  • 8 篇 文学
  • 7 篇 艺术学
  • 6 篇 军事学

主题

  • 297 篇 bosons
  • 137 篇 hadrons
  • 92 篇 hadron colliders
  • 89 篇 relativistic hea...
  • 86 篇 photons
  • 80 篇 machine learning
  • 75 篇 charged particle...
  • 65 篇 artificial intel...
  • 63 篇 higgs bosons
  • 61 篇 tellurium compou...
  • 59 篇 deep learning
  • 55 篇 accuracy
  • 51 篇 proton-proton in...
  • 46 篇 cosmic rays
  • 44 篇 large hadron col...
  • 44 篇 feature extracti...
  • 40 篇 computational mo...
  • 39 篇 training
  • 38 篇 informatics
  • 36 篇 support vector m...

机构

  • 1,144 篇 horia hulubei na...
  • 1,013 篇 school of physic...
  • 995 篇 department for p...
  • 973 篇 institute of phy...
  • 910 篇 cavendish labora...
  • 901 篇 institute of phy...
  • 885 篇 niels bohr insti...
  • 851 篇 physics departme...
  • 841 篇 department of ph...
  • 827 篇 department of ph...
  • 826 篇 department of ph...
  • 801 篇 institute of hig...
  • 795 篇 cern geneva
  • 789 篇 school of physic...
  • 770 篇 dipartimento di ...
  • 747 篇 faculté des scie...
  • 722 篇 west university ...
  • 695 篇 department of ph...
  • 680 篇 institut für ker...
  • 678 篇 department of ph...

作者

  • 648 篇 ali b.
  • 562 篇 bachacou h.
  • 552 篇 annovi a.
  • 515 篇 akimov a.v.
  • 496 篇 aad g.
  • 487 篇 alonso f.
  • 486 篇 amidei d.
  • 485 篇 alexopoulos t.
  • 481 篇 azuelos g.
  • 480 篇 alimonti g.
  • 478 篇 arnaez o.
  • 474 篇 anastopoulos c.
  • 473 篇 alexa c.
  • 472 篇 argyropoulos s.
  • 469 篇 aloisio a.
  • 468 篇 adelman j.
  • 467 篇 amelung c.
  • 464 篇 arce a.t.h.
  • 460 篇 arnold h.
  • 458 篇 augsten k.

语言

  • 5,194 篇 英文
  • 325 篇 其他
  • 26 篇 中文
  • 25 篇 日文
  • 3 篇 德文
  • 3 篇 俄文
  • 2 篇 西班牙文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Informatics Engineering Faculty of Science and Technology"
5573 条 记 录,以下是201-210 订阅
排序:
Deciphering the Geometric Bonferroni Mean Operator in Pythagorean Neutrosophic Sets Framework
收藏 引用
Neutrosophic Sets and Systems 2025年 75卷 139-161页
作者: Kamari, Mohammad Shafiq Bin Mohammad Rodzi, Zahari Bin Md. Al-Obaidi, R.H. Al-Sharqi, Faisal Al-Quran, Ashraf Shlaka, Rawan A. College of Computing Informatics and Mathematics Studies MARA University of Technology Negeri Sembilan Branch Seremban Campus Negeri Sembilan Seremban70300 Malaysia Faculty of Science and Technology National University of Malaysia Selangor Bandar Baru Bangi43600 Malaysia Fuel and Energy Techniques Engineering Department College of Engineering and Technologies AI-mustaqbal University Babylon51001 Iraq Department of Mathematics Faculty of Education for Pure Sciences University of Anbar Anbar Ramadi Iraq Department of Basic Sciences Preparatory Year King Faisal University Al-Ahsa31982 Saudi Arabia College of Pharmacy National University of Science and Technology Dhi Qar Iraq
The Geometric Bonferroni Mean (GBM), is an extension of The Bonferroni mean (BM), that combines both BM and the geometric mean, allowing for the representation of correlations among the combined factors while acknowle... 详细信息
来源: 评论
An Improved Modified Jaya Optimization Algorithm: Application to the Solution of Nonlinear Equation Systems  4th
An Improved Modified Jaya Optimization Algorithm: Applicatio...
收藏 引用
4th International Conference on Numerical Computations: Theory and Algorithms, NUMTA 2023
作者: Silva, Bruno Guerreiro Lopes, Luiz Doctoral Program in Informatics Engineering University of Madeira Madeira Island Funchal Portugal Regional Secretariat for Education Science and Technology Regional Government of Madeira Funchal Portugal Faculty of Exact Sciences and Engineering University of Madeira Madeira Island Funchal9020-105 Portugal
Population-based metaheuristic algorithms have been used to solve challenging optimization problems, and numerous modifications to make these algorithms more efficient have been proposed. Jaya is one of these algorith... 详细信息
来源: 评论
Early Recognition of the Speaker's Age  21
Early Recognition of the Speaker's Age
收藏 引用
21st International Conference on Emerging eLearning Technologies and Applications, ICETA 2023
作者: Kupcova, Eva Haluska, Renat Popovic, Michal Pleva, Matus Heng, Marie Somnea Bours, Patrick Technical University Kosice Faculty of Electrical Engineering and Informatics Department of Electronics and Multimedia Communications Košice Slovakia Norwegian University of Science and Technology Department of Information Security and Communication Technology Gjovik Norway
In this article, we describe a method for determining a person's real age based on voice recognition. We seek to contribute to the realm of age group classification not reliant on text by investigating voice featu... 详细信息
来源: 评论
Blockchain-based cross-domain authorization system for user-centric resource sharing
收藏 引用
Blockchain(Research and Applications) 2023年 第2期4卷 67-81页
作者: Yuki Ezawa Shohei Kakei Yoshiaki Shiraishi Masami Mohri Masakatu Morii Department of Electrical and Electronic Engineering Kobe UniversityKobeHyogo657-8501Japan Department of Computer Science Nagoya Institute of TechnologyNagoyaAichi466-8555Japan Faculty of Informatics Kindai UniversityHigashi-OsakaOsaka577-8502Japan
User-centric data sharing is essential to encourage citizens'active participation in the digital *** key to smart cities,a form of the digital economy,is the promotion of public use of citizen ***,it is not easy t... 详细信息
来源: 评论
Grasshopper Optimization Algorithm Based Spam Detection System Using Multi-Objective Wrapper Feature Selection and Neural Network Classification  2nd
Grasshopper Optimization Algorithm Based Spam Detection Syst...
收藏 引用
2nd International Conference on Emerging Technologies and Intelligent Systems, ICETIS 2022
作者: Ghaleb, Sanaa A. A. Mohamad, Mumtazimah Ghanem, Waheed A. H. M. Abdullahi, Akibu Mahmoud Nasser, Abdullah B. Saleh, Sami Abdulla Mohsen Arshad, Humaira Omolara, Abiodun Esther Abiodun, Oludare Isaac Ghetas, Mohamed Faculty of Informatics and Computing Universiti Sultan Zainal Abidin Terengganu Malaysia Faculty of Ocean Engineering Technology and Informatics Universiti Malaysia Terengganu Terengganu Malaysia Faculty of Education Saber University of Lahej Lahej Yemen Faculty of Engineering University of Aden Aden Yemen Faculty of Education Aden University of Aden Aden Yemen Faculty of Computing and Informatics Albukhary International University Kedah Malaysia School of Technology and Innovation University of Vaasa Vaasa Finland School of Electrical and Electronic Engineering Universiti Sains Malaysia Nilai Malaysia Department of Computer Science Islamia University of Bahawalpur Bahawalpur Pakistan Department of Computer Science University of Abuja Abuja Nigeria Department of Computer Science Bingham University Nasarawa Nigeria Faculty of Computer Science Nahda University New Beni Seuf City Egypt
Email classification is essential to the trouble of email and pattern recognition. Nowadays, a number of unsolicited messages are circulated over the internet. While plenty of machine learning techniques are a success... 详细信息
来源: 评论
FPGA design and implementation for montgomery multiplication algorithm using MATLAB HDL coder
收藏 引用
Bulletin of the National Research Centre 2024年 第1期48卷 1-16页
作者: Elsayed, Ghada Abass, Eman S. Computer Science and Informatics Faculty The British University in Egypt Cairo Egypt Electrical Engineering Department Faculty of Engineering Modern University for Technology and information (MTI University) Cairo Egypt
Modular multiplication for large numbers is especially important in cryptography algorithms such as RSA and elliptic curves. The Montgomery algorithm is the most famous and efficient one for calculating it. Hardware i...
来源: 评论
Improving Dynamic Security of the Least Significant Bit Using Block-Based Chaotic Multi-level LSB (BCM-LSB)  1
收藏 引用
9th International Conference on Cyber Security, Privacy in Communication Networks, ICCS 2023
作者: Azam, Muhammad Harith Noor Ridzuan, Farida Norazizi Sham Mohd Sayuti, M. Azni, A.H. Zakaria, Nur Hafiza Harjito, Bambang Faculty of Science and Technology Universiti Sains Islam Malaysia Nilai Malaysia Cybersecurity and Systems Research Unit Faculty of Science and Technology Universiti Sains Islam Malaysia Nilai Malaysia Faculty of Engineering and Built Environment Universiti Sains Islam Malaysia Nilai Malaysia Department of Informatics Universitas Sebelas Maret Jl. Ir. Sutami 36A Kentingan Surakarta Indonesia
Least Significant Bit (LSB) embedding is one of the most common techniques used in audio steganography. LSB audio steganographic techniques have poor dynamic security and are vulnerable to visual and statistical attac... 详细信息
来源: 评论
Pros and Cons of Artificial Intelligence-ChatGPT Adoption in Education Settings: A Literature Review and Future Research Agendas
收藏 引用
IEEE engineering Management Review 2024年 第3期52卷 27-42页
作者: Maita, Idria Saide, Saide Putri, Afifah Mesha Muwardi, Didi Department of Information Systems Faculty of Science and Technology State Islamic University of Sultan Syarif Kasim Riau Pekanbaru28293 Indonesia Department of Information Systems UIN Suska Riau Pekanbaru28293 Indonesia PRO Knowledge Indonesia Pekanbaru28293 Indonesia Dept. Informatics Engineering Faculty of Science and Technology Universitas Pahlawan Tuanku Tambusai Kampar28412 Indonesia Lembaga Enreach UIN Suska Riau Pekanbaru28293 Indonesia Department of Agribusiness Riau University Pekanbaru28293 Indonesia
The integration of artificial intelligence, particularly ChatGPT, in education presents both promising opportunities and notable challenges. Through a systematic review employing the PRISMA method, this article analyz... 详细信息
来源: 评论
A real-time system for detecting personal protective equipment compliance using deep learning model YOLOv5  9th
A real-time system for detecting personal protective equipme...
收藏 引用
9th International Conference on Computer science and Computational Intelligence, ICCSCI 2024
作者: Nazli, Nur Amielia Natasha Mohamad Sabri, Nurbaity Aminuddin, Raihah Ibrahim, Shafaf Yusof, Syafiq Nasir, Siti Diana Nabilah Mohd College of Computing Informatics & Mathematics MARA University of Technology Malacca Branch Jasin Campus Malacca77300 Malaysia Yus Industries Sdn Bhd Malaysia Faculty of Science and Engineering University of Hull Hull United Kingdom
The manufacturing and construction sectors report high rates of occupational accidents and diseases. In response, many countries, including Malaysia, have incorporated the use of Personal Protective Equipment (PPE) in... 详细信息
来源: 评论
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2625-2640页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John Von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathilticsSlovak University of Technology in BratislavaSlovakia
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a... 详细信息
来源: 评论