咨询与建议

限定检索结果

文献类型

  • 5,542 篇 期刊文献
  • 3,689 篇 会议
  • 129 册 图书

馆藏范围

  • 9,360 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,098 篇 理学
    • 2,984 篇 物理学
    • 1,707 篇 数学
    • 692 篇 生物学
    • 651 篇 化学
    • 629 篇 统计学(可授理学、...
    • 309 篇 地球物理学
    • 279 篇 系统科学
  • 5,093 篇 工学
    • 2,589 篇 计算机科学与技术...
    • 1,969 篇 软件工程
    • 813 篇 信息与通信工程
    • 802 篇 电子科学与技术(可...
    • 795 篇 电气工程
    • 654 篇 光学工程
    • 621 篇 控制科学与工程
    • 521 篇 化学工程与技术
    • 515 篇 生物医学工程(可授...
    • 512 篇 生物工程
    • 415 篇 材料科学与工程(可...
    • 371 篇 仪器科学与技术
    • 353 篇 机械工程
    • 287 篇 动力工程及工程热...
    • 248 篇 核科学与技术
    • 244 篇 力学(可授工学、理...
    • 180 篇 冶金工程
  • 949 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 371 篇 图书情报与档案管...
    • 309 篇 工商管理
  • 559 篇 医学
    • 460 篇 临床医学
    • 382 篇 基础医学(可授医学...
    • 219 篇 药学(可授医学、理...
  • 154 篇 法学
  • 144 篇 经济学
  • 120 篇 农学
  • 103 篇 教育学
  • 23 篇 文学
  • 13 篇 军事学
  • 10 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 155 篇 machine learning
  • 141 篇 deep learning
  • 129 篇 hadron colliders
  • 129 篇 artificial intel...
  • 114 篇 feature extracti...
  • 107 篇 accuracy
  • 105 篇 hadrons
  • 86 篇 computer science
  • 82 篇 computational mo...
  • 70 篇 training
  • 69 篇 predictive model...
  • 68 篇 proton-proton in...
  • 67 篇 bosons
  • 66 篇 internet of thin...
  • 66 篇 particle decays
  • 64 篇 visualization
  • 64 篇 semantics
  • 63 篇 optimization
  • 62 篇 image segmentati...
  • 62 篇 neural networks

机构

  • 1,109 篇 cavendish labora...
  • 1,038 篇 department of ph...
  • 991 篇 physikalisches i...
  • 988 篇 oliver lodge lab...
  • 633 篇 university of ch...
  • 622 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 568 篇 department of ph...
  • 563 篇 horia hulubei na...
  • 553 篇 iccub universita...
  • 545 篇 school of physic...
  • 537 篇 h.h. wills physi...
  • 534 篇 school of physic...
  • 530 篇 imperial college...
  • 530 篇 infn laboratori ...
  • 522 篇 stfc rutherford ...
  • 522 篇 nikhef national ...
  • 510 篇 physik-institut ...
  • 509 篇 infn sezione di ...
  • 505 篇 school of physic...

作者

  • 284 篇 barter w.
  • 264 篇 beiter a.
  • 264 篇 a. gomes
  • 253 篇 c. alexa
  • 252 篇 c. amelung
  • 251 篇 j. m. izen
  • 251 篇 bellee v.
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 248 篇 g. spigo
  • 245 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 243 篇 brundu d.
  • 243 篇 blake t.
  • 237 篇 s. chen
  • 232 篇 betancourt c.
  • 231 篇 y. tayalati
  • 231 篇 amato s.
  • 229 篇 borsato m.

语言

  • 8,722 篇 英文
  • 572 篇 其他
  • 49 篇 中文
  • 10 篇 德文
  • 5 篇 日文
  • 2 篇 法文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Institute of Computer Vision and applied Computer Sciences"
9360 条 记 录,以下是531-540 订阅
排序:
Advancing Data Security through Blockchain Integration in Encryption Algorithms
Advancing Data Security through Blockchain Integration in En...
收藏 引用
2024 International Conference on Communication, computer sciences and Engineering, IC3SE 2024
作者: Rajani, D. Raj, Vijilius Helena Dutt, Amit Singh, Jay Thandra, Nagarjuna Jabbar, Ahmed Sabah Abed AL-Zahra Institute Of Aeronautical Engineering Department Of Computer Science And Engineering Telangana Hyderabad India New Horizon College Of Engineering Department Of Applied Sciences Bangalore India Lovely Professional University Phagwara India Gl Bajaj Institute Of Technology & Management U.P. Greater Noida India Mlr Institute Of Technology Department Of Computer Science And Engineering Telangana Hyderabad India The Islamic University Medical Laboratory Technology Department College Of Medical Technology Najaf Iraq
This piece describes a complicated blockchain-based system for keeping data safe that is not controlled by a single entity. The suggested design is made up of DKM, SCAC, ILE, QRC, and DAE. These stand for Decentralize... 详细信息
来源: 评论
Neural Network based Tire-Road Friction Estimation Using Experimental Data
收藏 引用
IFAC-PapersOnLine 2023年 第3期56卷 397-402页
作者: Nicolas Lampe Karl-Philipp Kortmann Clemens Westerkamp Institute of Computer Engineering Osnabrück University of Applied Sciences Osnabrück Germany Institute of Mechatronic Systems Leibniz University Hannover Garbsen Germany
Knowledge of the maximum friction coefficient µ max between tire and road is necessary for implementing autonomous driving. As this coefficient cannot be measured via existing serial vehicle sensors, µ max e... 详细信息
来源: 评论
Automated Spam Review Detection Using Hybrid Deep Learning on Arabic Opinions
收藏 引用
computer Systems Science & Engineering 2023年 第9期46卷 2947-2961页
作者: IbrahimM.Alwayle Badriyya B.Al-onazi Mohamed K.Nour Khaled M.Alalayah Khadija M.Alaidarous Ibrahim Abdulrab Ahmed Amal S.Mehanna Abdelwahed Motwakel Department of Computer Science College of Science and ArtsSharurahNajran UniversitySaudi Arabia Department of Language Preparation Arabic Language Teaching InstitutePrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Computer Department Applied CollegeNajran UniversityNajran66462Saudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Online reviews regarding purchasing services or products offered are the main source of users’*** gain fame or profit,generally,spam reviews are written to demote or promote certain targeted products or *** practice ... 详细信息
来源: 评论
Monitoring Electric Vehicles on The Go  19
Monitoring Electric Vehicles on The Go
收藏 引用
19th IEEE Annual Consumer Communications and Networking Conference, CCNC 2022
作者: Aguiari, Davide Chou, Ka Seng Tse, Rita Pau, Giovanni Alma Mater Studiorum - University of Bologna Department of Computer Science and Engineering IT Bologna Italy Macao Polytechnic Institute School of Applied Sciences China University of California Ucla Samueli Computer Science Los Angeles United States
Electric vehicles (EV) feature detailed monitoring and control over the CAN bus. Some of this data is made available to users on the On-Board Diagnostic version II (OBDII) bus thus providing an opportunity for large s... 详细信息
来源: 评论
Evaluating LSTM and GRU Models for Cryptocurrency Price Forecasting in Financial Markets  3
Evaluating LSTM and GRU Models for Cryptocurrency Price Fore...
收藏 引用
3rd International Conference on Technological Advancements in Computational sciences, ICTACS 2023
作者: Mehra, Isha Tyagi, Manoj Kumar Kanthalia, Shilpa Shree, Tanvi Chaturvedi, Rajnish Kumar Singh, Prabhishek ABES Engineering College Department of Applied Sciences & Humanities Ghaziabad India School of Computer Science and Engineering Galgotias University India Faculty of Management Studies Udaipur India Raj Kumar Goel Institute of Technology Department of Information Technology Ghaziabad India School of Computer Science Engineering and Technology Bennett University India
Cryptocurrencies are a type of digital money distinguished by a decentralized system that uses encryption to authenticate transactions and keep records, obviating the need for a central authority. A key element of the... 详细信息
来源: 评论
Blockchain based Secure Data Storage Verification Algorithm for Smart City Environment  4
Blockchain based Secure Data Storage Verification Algorithm ...
收藏 引用
4th International Conference on Innovative Trends in Information Technology, ICITIIT 2023
作者: Vivekanandan, Manojkumar Premkamal, Praveen Kumar Johnpaul, C.I. Ebinazer, Silambarasan Elkana School of Engineering and Applied Sciences SRM University-AP Department of Computer Science & Engineering Andhra Pradesh Amaravati522502 India Kamaraj College of Engineering and Technology Department of Computer Science and Engineering Virudhunagar India St. Thomas College Thrissur India Indian Institute of Information Technology Kottayam Kottayam India
Blockchain based distributed ledger mechanism has got a wide range of applications in this era. The degree of security measurement is always a bottleneck. Since there are technologies to break it. Data sharing through... 详细信息
来源: 评论
Channel Boosted CNN-Transformer-based Multi-Level and Multi-Scale Nuclei Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Rauf, Zunaira Khan, Abdul Rehman Khan, Asifullah Pattern Recognition Lab. Department of Computer & Information Sciences Pakistan Institute of Engineering & Applied Sciences Nilore Islamabad45650 Pakistan Pakistan Institute of Engineering & Applied Sciences Nilore Islamabad45650 Pakistan Center for Mathematical Sciences Pakistan Institute of Engineering & Applied Sciences Nilore Islamabad45650 Pakistan
Accurate nuclei segmentation is an essential foundation for various applications in computational pathology, including cancer diagnosis and treatment planning. Even slight variations in nuclei representations can sign... 详细信息
来源: 评论
A Deep Convolution Network-Based Pneumonia Identification from Thoracic X-Ray Imagery Scans  6th
A Deep Convolution Network-Based Pneumonia Identification fr...
收藏 引用
6th World Conference on Smart Trends in Systems, Security and Sustainability, WS4 2022
作者: Upreti, Kamal Mishra, Prateet Maheshwari, Manish Vats, Prashant Dhankar, Aisha Batra, Reenu Yadav, Saneh Lata Chawla, Tanvi Bhardwaj, Jayant Department of Computer Science and Engineering Dr. Akhilesh Das Gupta Institute of Technology and Management Delhi New Delhi India Department of Computer Science and Information Technology Symbiosis University of Applied Sciences MP Indore India Department of Computer Science and Applications Makhanlal Chaturvedi National University of Journalism and Communication MCNUJC Madhya Pradesh Bhopal India Department of Computer Science and Engineering Faculty of Engineering and Technology SGT University Haryana Gurugram India Department of Electronics and Communication Bhagwan Parshuram Institute of Technology GGSIPU New Delhi India
Pneumonia is an infectious ailment which affects the respiratory system and is caused by microbes that infect the human by affecting their lung air sacs and fill them with fluid. Using chest X-ray is the most popular ... 详细信息
来源: 评论
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack Tree and Fuzzy Logic  3
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack T...
收藏 引用
3rd IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Naik, Nitin Jenkins, Paul Grace, Paul Naik, Dishita Song, Jingping Prajapat, Shaligram Mishra, Durgesh Yang, Longzhi Boongoen, Tossapon Iam-On, Natthakan School of Informatics and Digital Engineering Aston University United Kingdom Cardiff School of Technologies Cardiff Metropolitan University United Kingdom Birmingham City University United Kingdom Software College Northeastern University China International Institute of Professional Studies Devi Ahilya University India School of Computer Science & Information Technology Symbiosis University of Applied Sciences India Northumbria University Department of Computer and Information Sciences United Kingdom Aberystwyth University Department of Computer Science United Kingdom
Organisations and users have been experiencing significant rises in cyberattacks and their severity, which means that they require a greater awareness and understanding of the anatomy of cyberattacks, to prevent and m... 详细信息
来源: 评论
PathLAD+: Towards effective exact methods for subgraph isomorphism problem
收藏 引用
Artificial Intelligence 2024年 337卷
作者: Wang, Yiyuan Jin, Chenghou Cai, Shaowei School of Computer Science and Information Technology Northeast Normal University China Key Laboratory of Applied Statistics of MOE Northeast Normal University Changchun China School of Computer Science Fudan University Shanghai China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences China
The subgraph isomorphism problem (SIP) is a challenging problem with wide practical applications. In the last decade, despite being a theoretical hard problem, researchers designed various algorithms for solving SIP. ... 详细信息
来源: 评论