咨询与建议

限定检索结果

文献类型

  • 240 篇 期刊文献
  • 170 篇 会议

馆藏范围

  • 410 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 261 篇 理学
    • 156 篇 数学
    • 74 篇 物理学
    • 54 篇 生物学
    • 39 篇 统计学(可授理学、...
    • 32 篇 系统科学
    • 26 篇 化学
    • 17 篇 地球物理学
  • 238 篇 工学
    • 160 篇 计算机科学与技术...
    • 119 篇 软件工程
    • 43 篇 生物工程
    • 40 篇 生物医学工程(可授...
    • 36 篇 信息与通信工程
    • 34 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 27 篇 电气工程
    • 19 篇 光学工程
    • 17 篇 化学工程与技术
    • 16 篇 力学(可授工学、理...
    • 11 篇 机械工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 8 篇 安全科学与工程
  • 48 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 32 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 法学
    • 8 篇 社会学
  • 8 篇 教育学
  • 8 篇 农学
  • 5 篇 文学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 11 篇 computational mo...
  • 10 篇 feature extracti...
  • 7 篇 image segmentati...
  • 6 篇 computer archite...
  • 6 篇 neural networks
  • 6 篇 data visualizati...
  • 5 篇 pulsars
  • 5 篇 data mining
  • 5 篇 visualization
  • 5 篇 computers
  • 5 篇 three dimensiona...
  • 5 篇 machine learning
  • 5 篇 scientific compu...
  • 5 篇 training
  • 5 篇 principal compon...
  • 4 篇 parallel process...
  • 4 篇 message passing
  • 4 篇 data privacy
  • 4 篇 approximation al...
  • 4 篇 deep learning

机构

  • 24 篇 scientific compu...
  • 8 篇 center for scien...
  • 7 篇 university of ch...
  • 7 篇 international ce...
  • 6 篇 center of scient...
  • 6 篇 computer science...
  • 6 篇 hourani center f...
  • 6 篇 ministry of educ...
  • 6 篇 centre for astro...
  • 6 篇 institute of nat...
  • 6 篇 beijing institut...
  • 5 篇 department of ph...
  • 5 篇 faculty of scien...
  • 5 篇 institute for pa...
  • 5 篇 departamento de ...
  • 5 篇 department for p...
  • 5 篇 department of ph...
  • 5 篇 computer network...
  • 5 篇 yerevan physics ...
  • 5 篇 kirchhoff-instit...

作者

  • 12 篇 liu ya-feng
  • 11 篇 shedeed howida a...
  • 10 篇 tolba mohamed f.
  • 9 篇 ebied hala m.
  • 8 篇 ettaouil mohamed
  • 7 篇 yu wei
  • 7 篇 hala m. ebied
  • 6 篇 abualigah laith
  • 5 篇 michael kramer
  • 5 篇 ma yingjin
  • 5 篇 xu dachuan
  • 5 篇 howida a. shedee...
  • 4 篇 xiao nachuan
  • 4 篇 aviad levis
  • 4 篇 alan p. marscher
  • 4 篇 jirong mao
  • 4 篇 charles f. gammi...
  • 4 篇 razieh emami
  • 4 篇 svetlana jorstad
  • 4 篇 nicola marchili

语言

  • 391 篇 英文
  • 16 篇 其他
  • 3 篇 中文
检索条件"机构=Scientific Computing and Computer sciences"
410 条 记 录,以下是21-30 订阅
排序:
Security And Fire Detection System Using Deep Learning Techniques
Security And Fire Detection System Using Deep Learning Techn...
收藏 引用
IEEE International Conference on Intelligent computing and Information Systems (ICICIS)
作者: Ahmed Nouh Khaled Ahmed Ahmed Tarek Nada Magdy Hala M. Ebied Ahmed Khaled Radwa Reda Scientific Computing Department Faculty Of Computer & Information Sciences Ain Shams University Cairo Egypt
Recently, the challenges of security systems in protecting citizens from crime and disasters have become very difficult. While some organizations have developed fire detection security systems, incidents of intrusions...
来源: 评论
Content-based Image Retrieval based on Convolutional Neural Networks  10
Content-based Image Retrieval based on Convolutional Neural ...
收藏 引用
10th IEEE International Conference on Intelligent computing and Information Systems, ICICIS 2021
作者: Ghaleb, Moshira S. Ebied, Hala M. Shedeed, Howida A. Tolba, Mohamed F. Ain Shams University Scientific Computing Faculty of Computer and Inofrmation Sciences Cairo Egypt
Images can communicate a service, brand or product. Moreover, images provide depth and context to a description or story and give a much more intense experience than writing alone. Image retrieval is the highest searc... 详细信息
来源: 评论
Attention Detection using Electro-oculography Signals in E-learning Environment  10
Attention Detection using Electro-oculography Signals in E-l...
收藏 引用
10th IEEE International Conference on Intelligent computing and Information Systems, ICICIS 2021
作者: Abdo, Yassmina Yahya, Ehab Ismail, Hussein Saleh, Mostafa Reda, Radwa Shedeed, Howida A. Ain Shams University Faculty of Computer and Information Sciences Scientific Computing Department Cairo Egypt
Recently, on account of the Covid-19 pandemic online learning has become a main strategy of learning in any educational environment. The main problem is the lack of focus or attention during a student watching an onli... 详细信息
来源: 评论
KSKV:Key-Strategy for Key-Value Data Collection with Local Differential Privacy
收藏 引用
computer Modeling in Engineering & sciences 2024年 第6期139卷 3063-3083页
作者: Dan Zhao Yang You Chuanwen Luo Ting Chen Yang Liu Artificial Intelligence Development Research Center Institute of Scientific and Technical Information of ChinaBeijing100038China Industry Development Department NSFOCUS Inc.BeijingChina School of Information Science and Technology Beijing Forestry UniversityBeijing100083China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu610054China Institute of Computing Technology China Academy of Railway Sciences Corporation LimitedBeijing10081China
In recent years,the research field of data collection under local differential privacy(LDP)has expanded its focus fromelementary data types to includemore complex structural data,such as set-value and graph ***,our co... 详细信息
来源: 评论
Algorithms for the Prize-Collecting k-Steiner Tree Problem
收藏 引用
Tsinghua Science and Technology 2022年 第5期27卷 785-792页
作者: Lu Han Changjun Wang Dachuan Xu Dongmei Zhang School of Science Beijing University of Posts and TelecommunicationsBeijing 100876China Academy of Mathematics and Systems Science Chinese Academy of SciencesBeijing 100190China Beijing Institute for Scientific and Engineering Computing Beijing University of TechnologyBeijing 100124China School of Computer Science and Technology Shandong Jianzhu UniversityJinan 250101China
In this paper,we study the prize-collecting k-Steiner tree(PCkST) *** are given a graph G=(V,E) and an integer *** graph is connected and undirected.A vertex r ∈ V called root and a subset R?V called terminals are al... 详细信息
来源: 评论
Correction: A chemotaxis reaction–diffusion model for Multiple Sclerosis with Allee effect
收藏 引用
Ricerche di Matematica 2023年 第1期73卷 47-49页
作者: Bisi, Marzia Groppi, Maria Martalò, Giorgio Soresina, Cinzia Department of Mathematical Physical and Computer Sciences University of Parma Parma Italy Department of Mathematics and Scientific Computing University of Graz Graz Austria
来源: 评论
Nawrotzki’s algorithm for the countable splitting lemma, constructively  9
Nawrotzki’s algorithm for the countable splitting lemma, co...
收藏 引用
9th Conference on Algebra and Coalgebra in computer Science, CALCO 2021
作者: Sokolova, Ana Woracek, Harald Department of Computer Sciences University of Salzburg Austria Institute of Analysis and Scientific Computing TU Wien Austria
We reprove the countable splitting lemma by adapting Nawrotzki’s algorithm which produces a sequence that converges to a solution. Our algorithm combines Nawrotzki’s approach with taking finite cuts. It is construct... 详细信息
来源: 评论
Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon  14th
Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomi...
收藏 引用
14th EAI International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2022
作者: Nzeket Njoya, Alima Tchakounté, Franklin Atemkeng, Marcellin Udagepola, Kalum Priyanath Bassolé, Didier Department of Mathematics and Computer Science Faculty of Science University of Ngaoundere Ngaoundere Cameroon Ngaoundere Cameroon Department of Mathematics Rhodes University Grahamstown6140 South Africa Department of Information and Computing Sciences Scientific Research Development Institute of Technology Loganlea Australia Laboratory of Mathematics and Computer Science University of Joseph Ki-Zerbo Ouagadougou Burkina Faso
Mobile Money (MM) technologies are popular in developing countries where people are unbanked, and they are exploited as means of financial transactions in the economy. Sophisticated cyber-phishing techniques successfu... 详细信息
来源: 评论
A chemotaxis reaction-diffusion model for Multiple Sclerosis with Allee effect
arXiv
收藏 引用
arXiv 2023年
作者: Bisi, Marzia Groppi, Maria Martalò, Giorgio Soresina, Cinzia Department of Mathematical Physical and Computer Sciences University of Parma Italy Institute for Mathematics and Scientific Computing University of Graz Graz8010 Austria
In this paper, we study a modification of the mathematical model describing inflammation and demyelination patterns in the brain caused by Multiple Sclerosis proposed in [Lombardo et al. (2017), Journal of Mathematica... 详细信息
来源: 评论
Regularized two-stage submodular maximization under streaming
收藏 引用
Science China(Information sciences) 2022年 第4期65卷 102-111页
作者: Ruiqi YANG Dachuan XU Longkun GUO Dongmei ZHANG Beijing Institute for Scientific and Engineering Computing Beijing University of Technology School of Mathematical Sciences University of Chinese Academy Sciences School of Computer Science and Technology Qilu University of Technology School of Computer Science and Technology Shandong Jianzhu University
In the problem of maximizing regularized two-stage submodular functions in streams, we assemble a family ■ of m functions each of which is submodular and is visited in a streaming style that an element is visited for... 详细信息
来源: 评论