咨询与建议

限定检索结果

文献类型

  • 1,590 篇 期刊文献
  • 700 篇 会议
  • 14 册 图书

馆藏范围

  • 2,304 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,343 篇 工学
    • 734 篇 计算机科学与技术...
    • 594 篇 软件工程
    • 208 篇 信息与通信工程
    • 166 篇 电气工程
    • 156 篇 控制科学与工程
    • 149 篇 核科学与技术
    • 147 篇 电子科学与技术(可...
    • 128 篇 生物工程
    • 115 篇 光学工程
    • 103 篇 生物医学工程(可授...
    • 88 篇 仪器科学与技术
    • 83 篇 机械工程
    • 69 篇 化学工程与技术
    • 51 篇 材料科学与工程(可...
    • 49 篇 动力工程及工程热...
    • 46 篇 力学(可授工学、理...
  • 1,326 篇 理学
    • 768 篇 物理学
    • 391 篇 数学
    • 171 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 97 篇 系统科学
    • 91 篇 化学
    • 91 篇 地球物理学
  • 277 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 111 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 113 篇 医学
    • 96 篇 临床医学
    • 81 篇 基础医学(可授医学...
    • 46 篇 药学(可授医学、理...
    • 37 篇 公共卫生与预防医...
  • 28 篇 经济学
  • 27 篇 法学
  • 23 篇 农学
  • 19 篇 教育学
  • 8 篇 军事学
  • 6 篇 文学
  • 2 篇 艺术学

主题

  • 86 篇 hadron colliders
  • 72 篇 computer science
  • 62 篇 higgs bosons
  • 52 篇 laboratories
  • 47 篇 proton-proton in...
  • 45 篇 software enginee...
  • 44 篇 machine learning
  • 43 篇 deep learning
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 31 篇 software systems
  • 29 篇 collisions (nucl...
  • 29 篇 nuclear counters
  • 28 篇 relativistic hea...
  • 27 篇 supersymmetric m...
  • 26 篇 top quark
  • 26 篇 quarks
  • 24 篇 data mining
  • 23 篇 w & z bosons
  • 23 篇 hadron-hadron sc...

机构

  • 411 篇 department for p...
  • 408 篇 faculty of scien...
  • 405 篇 kirchhoff-instit...
  • 397 篇 department of ph...
  • 388 篇 department of ph...
  • 385 篇 department of ph...
  • 384 篇 institute of phy...
  • 375 篇 fakultät für phy...
  • 372 篇 institute of phy...
  • 351 篇 instituto de fís...
  • 308 篇 department of ph...
  • 298 篇 department of ph...
  • 296 篇 dipartimento di ...
  • 295 篇 nikhef national ...
  • 285 篇 graduate school ...
  • 284 篇 department of ph...
  • 280 篇 department of ph...
  • 277 篇 department of ph...
  • 273 篇 universidade fed...
  • 273 篇 ictp trieste

作者

  • 337 篇 c. alexa
  • 335 篇 j. m. izen
  • 333 篇 g. bella
  • 332 篇 d. calvet
  • 332 篇 c. amelung
  • 330 篇 j. strandberg
  • 329 篇 g. spigo
  • 328 篇 f. siegert
  • 321 篇 r. ströhmer
  • 321 篇 m. rijssenbeek
  • 321 篇 s. jin
  • 321 篇 g. gaudio
  • 321 篇 s. mohapatra
  • 317 篇 s. guindon
  • 311 篇 a. kaczmarska
  • 308 篇 j. schaarschmidt
  • 304 篇 y. tayalati
  • 300 篇 a. d. pilkington
  • 296 篇 l. chevalier
  • 288 篇 m. kocian

语言

  • 2,158 篇 英文
  • 137 篇 其他
  • 8 篇 中文
检索条件"机构=Software Engineering Research Laboratory Department of Mathematics and Computer Science"
2304 条 记 录,以下是41-50 订阅
排序:
Method for controlling phytoplankton distribution in fresh open water
收藏 引用
International Journal of Environmental Studies 2024年 第5期81卷 2130-2147页
作者: Moldasheva, Raushan Ismailova, Aisulu Turmukhanova, Gulnur Mailybayeva, Aiman Yelezhanova, Shynar Zhanuzakova, Zulfiya Zhamangara, Aizhan Department of Information Systems Faculty of Computer Systems and Vocational Education S. Seifullin Kazakh Agrotechnical University Astana Kazakhstan Department of Software Engineering Faculty of Physics Mathematics and Information Technology Atyrau University named after Kh. Dosmukhamedov Atyrau Kazakhstan Department of Computer Science Faculty of Physics Mathematics and Information Technology Atyrau University named after Kh. Dosmukhamedov Atyrau Kazakhstan Laboratory of Palaeobotany Astana Botanical Garden branch of the Institute of Botany and Phytointroduction Astana Kazakhstan
This paper presents a processed phytoplankton dataset from Lake Zerendi and other Kokshetau Upland lakes, Kazakhstan. The study aimed to develop an automated method for controlling the distribution of phytoplankton in... 详细信息
来源: 评论
EdgeAuth: An intelligent token-based collaborative authentication scheme
EdgeAuth: An intelligent token-based collaborative authentic...
收藏 引用
作者: Jiang, Xutong Dou, Ruihan He, Qiang Zhang, Xuyun Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Mathematics University of Waterloo Waterloo Canada Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Department of Computing Macquarie University Sydney Australia College of Big Data and Intelligent Engineering Southwest Forestry University China
Edge computing is regarded as an extension of cloud computing that brings computing and storage resources to the network edge. For some Industrial Internet of Things (IIoT) applications such as supply-chain supervisio... 详细信息
来源: 评论
Enhancing Multi-Label ECG Classification via Task-Guided Lead Correlations in Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20544-20555页
作者: Yuan, Xiaoyan Wang, Wei Chen, Junxin Fang, Kai Bashir, Ali Kashif Mondal, Tapas Hu, Xiping Deen, M. Jamal Beijing Institute of Technology School of Medical Technology Beijing100081 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Guangdong Shenzhen518172 China Dalian University of Technology School of Software Dalian116621 China Zhejiang A and F University College of Mathematics and Computer Science Hangzhou311300 China Manchester Metropolitan University Department of Computing and Mathematics United Kingdom Chitkara University Institute of Engineering and Technology Centre for Research Impact and Outcome Chitkara University Punjab Rajpura140401 India McMaster University Faculty of Health Science and the Department of Pediatrics Hamilton Canada McMaster University McMaster School of Biomedical Engineering Hamilton Canada McMaster University Electrical and Computer Engineering Department Hamilton Canada
With the rise of the Internet of Things (IoT), wearable devices have enabled real-time health monitoring, particularly through physiological signals like electrocardiograms (ECG). The standard 12-lead ECG records the ... 详细信息
来源: 评论
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论
Assessing the Impact of Physical Configuration and Lead Time on WRF Forecasting of an Extreme Wind Event
收藏 引用
Journal of Meteorological research 2025年 第1期39卷 154-171页
作者: Rocío OTERO Matías SUAREZ Edgardo PIEROBON Leandro MATURANO Ignacio MONTAMAT Juan Ezequiel SANCHEZ Lucia SANDALIO Andrés RODRIGUEZ Denis POFFO Hydrometeorology Laboratory Department of ExactPhysical and Natural SciencesNational University of CordobaCórdobaX5016GCAArgentina Institute for Advanced Studies in Engineering and Technology National Scientific and Technical Research CouncilCordobaX5016GCAArgentina Radar and Remote Sensing Laboratory Department of MathematicsAstronomyPhysics and Computer ScienceNational University of CordobaCordobaX5016HUAArgentina
The central region of Argentina is known to be a source of some most extreme weather events in the world,which are partially associated with the passage of cold fronts accompanied often by extreme wind *** may cause s... 详细信息
来源: 评论
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
收藏 引用
IEEE Access 2024年 12卷 61610-61628页
作者: Hosseinzadeh, Mehdi Servati, Mohammad Reza Rahmani, Amir Masoud Safkhani, Masoumeh Lansky, Jan Janoscova, Renata Ahmed, Omed Hassan Tanveer, Jawad Lee, Sang-Woong Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Duy Tan University School of Medicine and Pharmacy Da Nang550000 Viet Nam Shahid Rajaee Teacher Training University Department of Computer Engineering Tehran16788-15811 Iran National Yunlin University of Science and Technology Future Technology Research Center Douliou Yunlin64002 Taiwan School of Computer Science Tehran19395-5746 Iran University of Finance and Administration Faculty of Economic Studies Department of Computer Science and Mathematics Prague101 00 Czech Republic University of Human Development Department of Information Technology Sulaymaniyah0778-6 Iraq Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of Gachon University Pattern Recognition and Machine Learning Laboratory Department of Ai Software Seongnam-si13557 Korea Republic of
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privac... 详细信息
来源: 评论
A Mathematical Model for the Selection of software Requirements Elicitation Techniques  6th
A Mathematical Model for the Selection of Software Requireme...
收藏 引用
6th International Conference on Information Systems and Management science, ISMS 2023
作者: Saxena, Virat Raj Yadav, Rajeev Parveen, Azra Sadiq, Mohd. Department of Computer Science and Engineering Mangalayatan University Uttar Pradesh Aligarh202001 India Indraprastha Research Laboratory Indraprastha Institute of Information Sciences Private Limited New Delhi110025 India Software Engineering Laboratory Computer Engineering Section UPFET Jamia Millia Islamia A Central University New Delhi110025 India
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based... 详细信息
来源: 评论
Frilled Lizard Optimization: A Novel Bio-Inspired Optimizer for Solving engineering Applications
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 3631-3678页
作者: Ibraheem Abu Falahah Osama Al-Baik Saleh Alomari Gulnara Bektemyssova Saikat Gochhait Irina Leonova OmParkash Malik Frank Werner Mohammad Dehghani Department of Mathematics Faculty of ScienceThe Hashemite UniversityP.O.Box 330127Zarqa13133Jordan Department of Software Engineering Al-Ahliyya Amman UniversityAmman19328Jordan Faculty of Science and Information Technology Software EngineeringJadara UniversityIrbid21110Jordan Department of Computer Engineering International Information Technology UniversityAlmaty050000Kazakhstan Symbiosis Institute of Digital and Telecom Management Constituent of Symbiosis International Deemed UniversityPune412115India Neuroscience Research Institute Samara State Medical UniversitySamara443001Russia Faculty of Social Sciences Lobachevsky UniversityNizhny Novgorod603950Russia Department of Electrical and Software Engineering University of CalgaryCalgaryAB T2N 1N4Canada Faculty of Mathematics Otto-von-Guericke UniversityP.O.Box 4120Magdeburg39016Germany Department of Electrical and Electronics Engineering Shiraz University of TechnologyShiraz***Iran
This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization(FLO),which emulates the unique hunting behavior of frilled lizards in their natural *** draws its inspiration f... 详细信息
来源: 评论
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC)
Cyber Deception System based on Monte Carlo Simulation in th...
收藏 引用
2023 IEEE International Conference on computer, Information, and Telecommunication Systems, CITS 2023
作者: Kabdjou, Joelle Tagne, Elie Fute Rawat, Danda B. Acosta, Jaime Kamhoua, Charles University of Dschang Department of Mathematics and Computer Science Dschang Cameroon University of Buea Department of Computer Engineering Dschang Buea Cameroon Howard University Department of Electrical Engineering and Computer Science Washington United States Network Security Branch Devcom Army Research Laboratory Adelphi United States
The frequency of malicious activities by cyber attackers is on the rise, posing a significant challenge to counter cyber attacks in the Mobile Edge Computing (MEC) environment. The vulnerability of wireless networks, ... 详细信息
来源: 评论
A Mathematical Model for the Selection of software Requirements Elicitation Techniques  14
A Mathematical Model for the Selection of Software Requireme...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Saxena, Virat Raj Yadav, Rajeev Parveen, Azra Sadiq, Mohd. Mangalayatan University Department of Computer Science and Engineering Uttar Pradesh Aligarh202001 India Indraprastha Institute of Information Sciences Private Limited Indraprastha Research Laboratory New Delhi110025 India Upfet Jamia Millia Islamia A Central University Software Engineering Laboratory Computer Engineering Section New Delhi110025 India
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based... 详细信息
来源: 评论