咨询与建议

限定检索结果

文献类型

  • 1,578 篇 期刊文献
  • 700 篇 会议
  • 14 册 图书

馆藏范围

  • 2,292 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,491 篇 工学
    • 729 篇 计算机科学与技术...
    • 587 篇 软件工程
    • 303 篇 核科学与技术
    • 204 篇 信息与通信工程
    • 165 篇 电气工程
    • 154 篇 控制科学与工程
    • 149 篇 电子科学与技术(可...
    • 127 篇 生物工程
    • 109 篇 光学工程
    • 102 篇 生物医学工程(可授...
    • 88 篇 仪器科学与技术
    • 81 篇 机械工程
    • 69 篇 化学工程与技术
    • 58 篇 材料科学与工程(可...
    • 48 篇 动力工程及工程热...
    • 46 篇 力学(可授工学、理...
  • 1,315 篇 理学
    • 766 篇 物理学
    • 390 篇 数学
    • 168 篇 生物学
    • 123 篇 统计学(可授理学、...
    • 101 篇 天文学
    • 97 篇 系统科学
    • 91 篇 化学
    • 91 篇 地球物理学
  • 272 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 113 篇 医学
    • 96 篇 临床医学
    • 81 篇 基础医学(可授医学...
    • 46 篇 药学(可授医学、理...
  • 28 篇 经济学
  • 25 篇 法学
  • 22 篇 农学
  • 19 篇 教育学
  • 8 篇 军事学
  • 5 篇 文学
  • 2 篇 艺术学

主题

  • 78 篇 hadron colliders
  • 71 篇 computer science
  • 52 篇 laboratories
  • 45 篇 software enginee...
  • 43 篇 higgs bosons
  • 42 篇 machine learning
  • 41 篇 deep learning
  • 31 篇 software systems
  • 28 篇 relativistic hea...
  • 27 篇 supersymmetric m...
  • 26 篇 top quark
  • 25 篇 data mining
  • 23 篇 w & z bosons
  • 23 篇 hadron-hadron sc...
  • 23 篇 mathematics
  • 23 篇 quark & gluon je...
  • 22 篇 particle product...
  • 22 篇 extensions of hi...
  • 21 篇 supersymmetry
  • 21 篇 semantics

机构

  • 412 篇 department for p...
  • 409 篇 faculty of scien...
  • 406 篇 kirchhoff-instit...
  • 398 篇 department of ph...
  • 388 篇 institute of phy...
  • 387 篇 department of ph...
  • 386 篇 department of ph...
  • 374 篇 institute of phy...
  • 373 篇 fakultät für phy...
  • 356 篇 instituto de fís...
  • 310 篇 department of ph...
  • 299 篇 nikhef national ...
  • 298 篇 dipartimento di ...
  • 296 篇 department of ph...
  • 286 篇 graduate school ...
  • 283 篇 department of ph...
  • 280 篇 department of ph...
  • 274 篇 universidade fed...
  • 273 篇 department of ph...
  • 271 篇 ictp trieste

作者

  • 339 篇 c. alexa
  • 336 篇 j. m. izen
  • 335 篇 g. bella
  • 334 篇 d. calvet
  • 334 篇 c. amelung
  • 332 篇 j. strandberg
  • 330 篇 g. spigo
  • 330 篇 f. siegert
  • 324 篇 r. ströhmer
  • 324 篇 m. rijssenbeek
  • 324 篇 s. jin
  • 324 篇 g. gaudio
  • 324 篇 s. mohapatra
  • 319 篇 s. guindon
  • 314 篇 a. kaczmarska
  • 312 篇 j. schaarschmidt
  • 306 篇 y. tayalati
  • 303 篇 a. d. pilkington
  • 300 篇 l. chevalier
  • 294 篇 m. kocian

语言

  • 2,038 篇 英文
  • 244 篇 其他
  • 8 篇 中文
检索条件"机构=Software Engineering Research Laboratory Department of Mathematics and Computer Science"
2292 条 记 录,以下是51-60 订阅
排序:
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
收藏 引用
IEEE Access 2024年 12卷 61610-61628页
作者: Hosseinzadeh, Mehdi Servati, Mohammad Reza Rahmani, Amir Masoud Safkhani, Masoumeh Lansky, Jan Janoscova, Renata Ahmed, Omed Hassan Tanveer, Jawad Lee, Sang-Woong Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Duy Tan University School of Medicine and Pharmacy Da Nang550000 Viet Nam Shahid Rajaee Teacher Training University Department of Computer Engineering Tehran16788-15811 Iran National Yunlin University of Science and Technology Future Technology Research Center Douliou Yunlin64002 Taiwan School of Computer Science Tehran19395-5746 Iran University of Finance and Administration Faculty of Economic Studies Department of Computer Science and Mathematics Prague101 00 Czech Republic University of Human Development Department of Information Technology Sulaymaniyah0778-6 Iraq Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of Gachon University Pattern Recognition and Machine Learning Laboratory Department of Ai Software Seongnam-si13557 Korea Republic of
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privac... 详细信息
来源: 评论
Frilled Lizard Optimization: A Novel Bio-Inspired Optimizer for Solving engineering Applications
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 3631-3678页
作者: Ibraheem Abu Falahah Osama Al-Baik Saleh Alomari Gulnara Bektemyssova Saikat Gochhait Irina Leonova OmParkash Malik Frank Werner Mohammad Dehghani Department of Mathematics Faculty of ScienceThe Hashemite UniversityP.O.Box 330127Zarqa13133Jordan Department of Software Engineering Al-Ahliyya Amman UniversityAmman19328Jordan Faculty of Science and Information Technology Software EngineeringJadara UniversityIrbid21110Jordan Department of Computer Engineering International Information Technology UniversityAlmaty050000Kazakhstan Symbiosis Institute of Digital and Telecom Management Constituent of Symbiosis International Deemed UniversityPune412115India Neuroscience Research Institute Samara State Medical UniversitySamara443001Russia Faculty of Social Sciences Lobachevsky UniversityNizhny Novgorod603950Russia Department of Electrical and Software Engineering University of CalgaryCalgaryAB T2N 1N4Canada Faculty of Mathematics Otto-von-Guericke UniversityP.O.Box 4120Magdeburg39016Germany Department of Electrical and Electronics Engineering Shiraz University of TechnologyShiraz***Iran
This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization(FLO),which emulates the unique hunting behavior of frilled lizards in their natural *** draws its inspiration f... 详细信息
来源: 评论
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC)
Cyber Deception System based on Monte Carlo Simulation in th...
收藏 引用
2023 IEEE International Conference on computer, Information, and Telecommunication Systems, CITS 2023
作者: Kabdjou, Joelle Tagne, Elie Fute Rawat, Danda B. Acosta, Jaime Kamhoua, Charles University of Dschang Department of Mathematics and Computer Science Dschang Cameroon University of Buea Department of Computer Engineering Dschang Buea Cameroon Howard University Department of Electrical Engineering and Computer Science Washington United States Network Security Branch Devcom Army Research Laboratory Adelphi United States
The frequency of malicious activities by cyber attackers is on the rise, posing a significant challenge to counter cyber attacks in the Mobile Edge Computing (MEC) environment. The vulnerability of wireless networks, ... 详细信息
来源: 评论
DNBP-CCA:A Novel Approach to Enhancing Heterogeneous Data Traffic and Reliable Data Transmission for Body Area Network
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2851-2878页
作者: Abdulwadood Alawadhi Mohd.Hasbullah Omar Abdullah Almogahed Noradila Nordin Salman A.Alqahtani Atif M.Alamri InterNetWorks Research Laboratory School of ComputingUniversiti Utara MalaysiaSintok06010Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn MalaysiaParit RajaJohor86400Malaysia School of Games&Creative Technology University for the Creative ArtsFarnhamGU97DSUK Computer Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
The increased adoption of Internet of Medical Things (IoMT) technologies has resulted in the widespread use ofBody Area Networks (BANs) in medical and non-medical domains. However, the performance of IEEE 802.15.4-bas... 详细信息
来源: 评论
A NovelMethod for Determining Tourism Carrying Capacity in a Decision-Making Context Using q−Rung Orthopair Fuzzy Hypersoft Environment
收藏 引用
computer Modeling in engineering & sciences 2024年 第2期138卷 1951-1979页
作者: Salma Khan Muhammad Gulistan NasreenKausar Seifedine Kadry Jungeun Kim Department of Mathematics and Statistics Hazara UniversityMansehra21120Pakistan Department of Mathematics Faculty of Arts and SciencesYildiz Technical UniversityEsenlerIstanbul34210Turkey Department of Applied Data Science Noroff University CollegeKristiansand4612Norway Artificial Intelligence Research Center(AIRC) Ajman UniversityAjman346United Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityP.O.Box 13-5053ByblosLebanon Department of Software and CMPSI Konju National UniversityCheonan31080Korea
Tourism is a popular activity that allows individuals to escape their daily routines and explore new destinations for various reasons,including leisure,pleasure,or business.A recent study has proposed a unique mathema... 详细信息
来源: 评论
A deep neural network based surrogate model for damage identification in full-scale structures with incomplete noisy measurements
收藏 引用
Frontiers of Structural and Civil engineering 2024年 第3期18卷 393-410页
作者: Tram BUI-NGOC Duy-Khuong LY Tam T TRUONG Chanachai THONGCHOM T.NGUYEN-THOI Laboratory for Computational Mechanics Institute for Computational Science and Artificial IntelligenceVan Lang UniversityHo Chi Minh City 70000Vietnam Faculty of Mechanical-Electrical and Computer Engineering School of TechnologyVan Lang UniversityHo Chi Minh City 70000Vietnam Faculty of Civil Engineering School of TechnologyVan Lang UniversityHo Chi Minh City 70000Vietnam Department of Computer Science Aarhus UniversityAarhus 8000Denmark Thammasat University research unit in structural and foundation engineering Department of Civil EngineeringThammasat UniversityPathumthani 12120Thailand Laboratory for Applied and Industrial Mathematics Institute for Computational Science and Artificial IntelligenceVan Lang UniversityHo Chi Minh City 70000Vietnam Thammasat School of Engineering Thammasat UniversityPathumthani 12120Thailand
The paper introduces a novel approach for detecting structural damage in full-scale structures using surrogate models generated from incomplete modal data and deep neural networks(DNNs).A significant challenge in this... 详细信息
来源: 评论
On the Noise Robustness of In-Context Learning for Text Generation  38
On the Noise Robustness of In-Context Learning for Text Gene...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Gao, Hongfu Zhang, Feipeng Jiang, Wenyu Shu, Jun Zheng, Feng Wei, Hongxin Department of Statistics and Data Science Southern University of Science and Technology China School of Economics and Finance Xi'an Jiaotong University China National Key Laboratory for Novel Software Technology Nanjing University China School of Mathematics and Statistics Xi'an Jiaotong University China Department of Computer Science and Engineering Southern University of Science and Technology China
Large language models (LLMs) have shown impressive performance on downstream tasks by in-context learning (ICL), which heavily relies on the quality of demonstrations selected from a large set of annotated examples. R...
来源: 评论
Privacy‐preserving remote sensing images recognition based on limited visual cryptography
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1166-1177页
作者: Denghui Zhang Muhammad Shafiq Liguo Wang Gautam Srivastava Shoulin Yin Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhouChina Department of New Networks Peng Cheng LaboratoryShenzhenChina College of Information and Communications Engineering Dalian Minzu UniversityDalianChina Department of Mathematics and Computer Science Brandon UniversityBrandonManitobaCanada Research Centre for Interneural Computing China Medical UniversityTaichungTaiwanChina Department of Computer Science and Math Lebanese American UniversityBeirutLebanon College of Information and Communications Engineering Harbin Engineering UniversityHarbinChina
With the arrival of new data acquisition platforms derived from the Internet of Things(IoT),this paper goes beyond the understanding of traditional remote sensing *** fusion of remote sensing and computer vision has h... 详细信息
来源: 评论
computer-Vision-Based Non-Contact Paste Concentration Measurement*
Computer-Vision-Based Non-Contact Paste Concentration Measur...
收藏 引用
2024 International Conference on Automation in Manufacturing, Transportation and Logistics, ICaMaL 2024
作者: Liang, Tailin Yuan, Zhaolin School of Computer Science and Engineering Beihang University State Key Laboratory of Software Development Environment Beijing China Research Institute of Advanced Manufacturing Hong Kong Polytechnic University Department of Industrial and Systems Engineering Hong Kong Hong Kong
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a no... 详细信息
来源: 评论
Probabilistic Graph Modeling based Safety Classifier Algorithm for Smart Transportation
Probabilistic Graph Modeling based Safety Classifier Algorit...
收藏 引用
2023 International Symposium on Green Technologies and Applications, ISGTA 2023
作者: Karkouri, Najib El Tigani, Smail Saadane, Rachid Chehri, Abdelah Pierre, Samuel Neya, Noureddine Mathematics and Informatics Lab Faculty of Sciences University Ibno Toufial Kenitra Morocco Research and Development Unit Accsellium LLC Fez Morocco SIRC-LaGeS Hassania School of Public Labors Casablanca20250 Morocco Department of Mathematics and Computer Science Royal Military College of Canada Kingston Canada Department of Computer and Software Engineering Polytechnique Montreal Canada
This research introduces a novel Probabilistic Graph Modeling-based Safety Classifier Algorithm designed for the purpose of classifying road safety in smart transportation systems. Leveraging a combination of numerica... 详细信息
来源: 评论