咨询与建议

限定检索结果

文献类型

  • 3,635 篇 期刊文献
  • 1,876 篇 会议
  • 78 册 图书

馆藏范围

  • 5,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,359 篇 理学
    • 2,378 篇 物理学
    • 835 篇 数学
    • 406 篇 化学
    • 344 篇 生物学
    • 325 篇 统计学(可授理学、...
    • 308 篇 地球物理学
  • 2,915 篇 工学
    • 1,285 篇 计算机科学与技术...
    • 1,040 篇 软件工程
    • 419 篇 信息与通信工程
    • 356 篇 电子科学与技术(可...
    • 336 篇 电气工程
    • 311 篇 化学工程与技术
    • 287 篇 控制科学与工程
    • 284 篇 仪器科学与技术
    • 268 篇 生物医学工程(可授...
    • 266 篇 光学工程
    • 263 篇 生物工程
    • 229 篇 冶金工程
    • 209 篇 核科学与技术
    • 201 篇 机械工程
    • 195 篇 力学(可授工学、理...
    • 177 篇 材料科学与工程(可...
    • 151 篇 动力工程及工程热...
    • 137 篇 航空宇航科学与技...
  • 559 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 298 篇 医学
    • 241 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 133 篇 药学(可授医学、理...
  • 75 篇 农学
  • 73 篇 法学
  • 63 篇 经济学
  • 56 篇 教育学
  • 8 篇 文学
  • 7 篇 艺术学
  • 6 篇 军事学

主题

  • 297 篇 bosons
  • 137 篇 hadrons
  • 92 篇 hadron colliders
  • 89 篇 relativistic hea...
  • 86 篇 photons
  • 84 篇 machine learning
  • 75 篇 charged particle...
  • 66 篇 artificial intel...
  • 63 篇 higgs bosons
  • 61 篇 tellurium compou...
  • 59 篇 deep learning
  • 55 篇 accuracy
  • 51 篇 proton-proton in...
  • 46 篇 cosmic rays
  • 44 篇 large hadron col...
  • 44 篇 feature extracti...
  • 40 篇 computational mo...
  • 39 篇 training
  • 38 篇 informatics
  • 36 篇 support vector m...

机构

  • 1,144 篇 horia hulubei na...
  • 1,013 篇 school of physic...
  • 993 篇 department for p...
  • 972 篇 institute of phy...
  • 910 篇 cavendish labora...
  • 899 篇 institute of phy...
  • 886 篇 niels bohr insti...
  • 851 篇 physics departme...
  • 841 篇 department of ph...
  • 826 篇 department of ph...
  • 826 篇 department of ph...
  • 801 篇 institute of hig...
  • 795 篇 cern geneva
  • 789 篇 school of physic...
  • 770 篇 dipartimento di ...
  • 747 篇 faculté des scie...
  • 721 篇 west university ...
  • 695 篇 department of ph...
  • 680 篇 institut für ker...
  • 678 篇 department of ph...

作者

  • 649 篇 ali b.
  • 561 篇 bachacou h.
  • 551 篇 annovi a.
  • 514 篇 akimov a.v.
  • 496 篇 aad g.
  • 487 篇 alonso f.
  • 486 篇 amidei d.
  • 484 篇 alexopoulos t.
  • 480 篇 azuelos g.
  • 480 篇 alimonti g.
  • 478 篇 arnaez o.
  • 474 篇 anastopoulos c.
  • 473 篇 alexa c.
  • 472 篇 argyropoulos s.
  • 469 篇 aloisio a.
  • 468 篇 adelman j.
  • 467 篇 amelung c.
  • 463 篇 arce a.t.h.
  • 460 篇 arnold h.
  • 458 篇 augsten k.

语言

  • 5,212 篇 英文
  • 325 篇 其他
  • 26 篇 中文
  • 25 篇 日文
  • 3 篇 俄文
  • 2 篇 德文
  • 2 篇 西班牙文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Informatics Engineering Faculty of Science and Technology"
5589 条 记 录,以下是41-50 订阅
排序:
Speech Recognition of Sundanese Dialect Using Convolutional Neural Network Method with Mel-Spectrogram Feature Extraction  11
Speech Recognition of Sundanese Dialect Using Convolutional ...
收藏 引用
11th International Conference on Cyber and IT Service Management, CITSM 2023
作者: Setianingrum, Anif Hanifa Hulliyah, Khodijah Amrilla, Muhammad Fitroh Syarif Hidayatullah State Islamic University Jakarta Faculty of Science and Technology Informatics Engineering Jakarta Indonesia
In Indonesia, the Sundanese language is known for its diverse dialects. The distinction between the Bantenese and South Sundanese dialects lies in their usage of words, which can give the impression of shouting. These... 详细信息
来源: 评论
Comparative Evaluation of Resampling Techniques on Machine Learning for Predicting Customer Purchasing Behavior  8
Comparative Evaluation of Resampling Techniques on Machine L...
收藏 引用
8th International Conference on Information technology, InCIT 2024
作者: Diwandari, Saucha Permanasari, Adhistya Erna Hidayah, Indriana Universitas Gadjah Mada Department of Electrical and Information Engineering Indonesia Universitas Teknologi Yogyakarta Faculty of Science and Technology Informatics Department Indonesia
In the era of subscription-based services, customer purchasing behavior presents a significant challenge for organizations because customer retention is essential to long-term success. Imbalanced datasets, where the m... 详细信息
来源: 评论
Selection of a Simple 5G Handover Algorithm: Preparation for Named Data Networking  10
Selection of a Simple 5G Handover Algorithm: Preparation for...
收藏 引用
10th International Conference on Wireless and Telematics, ICWT 2024
作者: Nurhayati, Ade Ahdan, Syaiful Juhana, Tutun Syambas, Nana Rachmana Bandung Institute of Technology School of Electrical Engineering and Informatics Bandung40132 Indonesia Telkom University Faculty of Applied Science Jakarta11710 Indonesia Universitas Teknokrat Indonesia Faculty of Engineering & Computer Science 35132 Indonesia
Named Data Networking as an alternative network for 5G network traffic is required to be able to provide better performance compared to other networks such as internet protocol networks. In NDN wireless, it is known t... 详细信息
来源: 评论
Modeling heterogeneous behaviors with different strategies in a terrorist attack
收藏 引用
Virtual Reality & Intelligent Hardware 2023年 第4期5卷 351-365页
作者: Le BI Tingting LIU Zhen LIU Jason TEO Yumeng ZHAO Yanjie CHAI Faculty of Electrical Engineering and Computer Science Ningbo UniversityNingbo 315211China College of Science&Technology Ningbo UniversityCixi 315300China Faculty of Computing&Informatics Universiti Malaysia SabahKota Kinabalu 88000Malaysia
Existing simulations of terrorist attacks do not consider individual *** overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist *** constructed an emotional mo... 详细信息
来源: 评论
Semi-analytical finite element method applied for characterizing micropolar fibrous composites
收藏 引用
Applied Mathematics and Mechanics(English Edition) 2024年 第12期45卷 2147-2164页
作者: J.A.OTERO Y.ESPINOSA-ALMEYDA R.RODRIGUEZ-RAMOS J.MERODIO School of Engineering and Sciences Monterrey Institute of TechnologyEstado de Mexico 52926Mexico Institute of Engineering and Technology Autonomous University of Ciudad JuarezCiudad JuarezChihuahua 32310Mexico Postgraduate Program in Computational Modeling in Science and Technology Federal Fluminense UniversityRıo de Janeiro 27255-125Brazil Faculty of Mathematics and Computer Science University of HavanaLa Habana 10400Cuba Department of Mathematics Applied to ICT School of Informatics Systems EngineeringTechnical University of MadridMadrid 28031Spain
A semi-analytical finite element method(SAFEM),based on the two-scale asymptotic homogenization method(AHM)and the finite element method(FEM),is implemented to obtain the effective properties of two-phase fiber-reinfo... 详细信息
来源: 评论
K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 5423-5440页
作者: Khalid Hamid Muhammad Waseem Iqbal Erssa Arif Yasir Mahmood Ahmad Salman Khan Nazri Kama Azri Azmi Atif Ikram Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of Lahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi MalaysiaKuala Lumpur54100Malaysia Faculty of Informatics and Applied Mathematics University Malaysia TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of Lahore54000Pakistan
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced env... 详细信息
来源: 评论
Spectral Generalized Category Discovery by training on combined labels  22
Spectral Generalized Category Discovery by training on combi...
收藏 引用
2024 IEEE 22nd World Symposium on Applied Machine Intelligence and informatics, SAMI 2024
作者: Mao, Ruixuan Al-Shouha, Modafar Szucs, Gabor Eötvös Loránd University Faculty of Informatics Department of Data Science BudapestH-1117 Hungary Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Telecommunications and Media Informatics BudapestH-1111 Hungary
Hyperspectral imaging poses major challenges for supervised classification methods due to the high dimensionality of the data. This classification was solved in previous works with known classes. In this paper we pres... 详细信息
来源: 评论
Neutrosophic Model for Evaluation Healthcare Security Criteria for Powerful and Lightweight Secure Storage System in Cloud-Based E-Healthcare Services
收藏 引用
Neutrosophic Sets and Systems 2023年 58卷 367-378页
作者: El-Douh, Ahmed A. Lu, SongFeng Abdelhafeez, Ahmed Ali, Ahmed M. Aziz, Alber S. School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Faculty of Information Systems and Computer Science October 6th University Giza12585 Egypt Faculty of Computers and Informatics Zagazig University Sharqiyah Zagazig44519 Egypt
Large data volumes make manually keeping and preserving health records for future reference problematic. Most unusual is the coronavirus epidemic's overcrowding of hospitals. The Secure Pattern Electronic Healthca... 详细信息
来源: 评论
ADVANCED MULTI-OBJECTIVE ALGORITHM USED TO OPTIMIZE CONSUMPTION OF AN INTEGRATED SYSTEM FOR FLEXIBLE MANUFACTURING
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and Computer science 2024年 第2期86卷 113-127页
作者: Păun, Marius-Adrian Coandă, Henri-George Mincă, Eugenia Duca, Octavian Gabriel Făgărășan, Ioana Dragomir, Florin Iliescu, Sergiu Stelian National University of Science and Technology POLITEHNICA of Bucharest Automation and Industrial Informatics Department Romania Faculty of Electrical Engineering Electronics and Information Technology Valahia University of Targoviste Romania Institute of Multidisciplinary Research for Science and Technology Valahia University of Targoviste Romania Academy of Romanian Scientists 54 Splaiul Independentei Bucharest050044 Romania
The optimization of power consumption of manufacturing lines (ML) is a relevant topic in the context of increasing electricity prices. This paper presents the topic of optimizing the energy consumption of a production... 详细信息
来源: 评论
Cross-Layer Distributed Attack Detection Model for the IoT
收藏 引用
International Journal of Ambient Computing and Intelligence 2022年 第1期13卷 1-17页
作者: Ahmed, Hassan I. Nasr, Abdurrahman A. Abdel-Mageid, Salah M. Aslan, Heba K. Informatics Department Electronics Research Institute Cairo Egypt Computer Engineering Faculty of Engineering Al-Azhar University Cairo Egypt Computer Engineering Department College of Computer Science and Engineering Taibah University Saudi Arabia Center of Informatics Science Faculty of Information Technology and Computer Science Nile University Egypt
The security of IoT that is based on layered approaches has shortcomings such as the redundancy, inflexibility, and inefficiently of security solutions. There are many harmful attacks in IoT networks such as DoS and D... 详细信息
来源: 评论