咨询与建议

限定检索结果

文献类型

  • 537 篇 会议
  • 107 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 649 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 406 篇 工学
    • 269 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 96 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 58 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物工程
    • 22 篇 光学工程
    • 22 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 20 篇 动力工程及工程热...
    • 19 篇 仪器科学与技术
    • 16 篇 力学(可授工学、理...
    • 16 篇 生物医学工程(可授...
    • 13 篇 交通运输工程
    • 10 篇 农业工程
  • 207 篇 理学
    • 113 篇 数学
    • 62 篇 物理学
    • 31 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 16 篇 化学
  • 113 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 15 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 农学
  • 11 篇 法学
    • 10 篇 社会学
  • 8 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 19 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 training
  • 12 篇 computer archite...
  • 10 篇 data mining
  • 10 篇 computational mo...
  • 9 篇 wireless communi...
  • 9 篇 real-time system...
  • 9 篇 software
  • 9 篇 technological in...
  • 8 篇 monitoring
  • 8 篇 wireless sensor ...
  • 8 篇 predictive model...
  • 8 篇 genetic algorith...
  • 8 篇 topology
  • 8 篇 mathematical mod...
  • 8 篇 data models
  • 7 篇 fuzzy logic
  • 7 篇 reliability

机构

  • 8 篇 dep. of mathemat...
  • 7 篇 dep. of electric...
  • 7 篇 institute of com...
  • 6 篇 department of co...
  • 5 篇 university of ag...
  • 5 篇 kristiania unive...
  • 5 篇 tu wien inst. of...
  • 5 篇 institute of com...
  • 5 篇 school of inform...
  • 5 篇 advanced researc...
  • 4 篇 dep. of computer...
  • 4 篇 king mongkut's u...
  • 3 篇 dep. of electric...
  • 3 篇 guangxi key labo...
  • 3 篇 department of ma...
  • 3 篇 dep. of computer...
  • 3 篇 applied computer...
  • 3 篇 sichuan institut...
  • 3 篇 fir-uf universit...
  • 3 篇 dep. of integrat...

作者

  • 8 篇 arani elahe
  • 8 篇 zonooz bahram
  • 7 篇 thilo sauter
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 cerdà-alabern ll...
  • 5 篇 grønli tor-morte...
  • 5 篇 mukund bhole
  • 5 篇 kaindl hermann
  • 5 篇 wolfgang kastner
  • 5 篇 majchrzak tim a.
  • 4 篇 ganokratanaa thi...
  • 4 篇 kastner wolfgang
  • 4 篇 gómez-pulido jua...
  • 4 篇 ignacio rojas
  • 4 篇 vega-rodríguez m...
  • 4 篇 rosa agostinho c...
  • 4 篇 fernandes carlos...
  • 4 篇 sauter thilo
  • 4 篇 mehdi ghatee

语言

  • 592 篇 英文
  • 48 篇 其他
  • 9 篇 中文
检索条件"机构=Dep. Computer Architecture & Computer Technology"
649 条 记 录,以下是111-120 订阅
排序:
Deep Learning Technique for Real-Time Forest Fire Detection from Video Streams
Deep Learning Technique for Real-Time Forest Fire Detection ...
收藏 引用
Intelligent Systems and Embedded Design (ISED), International Conference on
作者: Nidhi Gupta Sujata Chakravarty Satyabrata Dash Dept. of Computer Science & Engineering Centurion University of Technology & Management Odisha India Dep. of Computer Science and Engineering Gandhi Institute of Technology & Management (GITAM Deemed to be University) Andhra Pradesh India
Forest fires are currently the most common issue that we are dealing with. The resources that have been lost are irreplaceable. Forest fires are uncontrollable fires that occur in nature as a result of human involveme...
来源: 评论
Machine learning algorithms in Bigdata Analysis and its applications: A review  4
Machine learning algorithms in Bigdata Analysis and its appl...
收藏 引用
4th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2022
作者: Khoshaba, Farah Kareem, Shahab Awla, Hoshang Mohammed, Chnar Erbil Polytechnic University Technical Engineering College Information System Engineering Department Erbil Iraq Lebanese French University College of Engineering and Computer Science Dep. of Information Technology Kurdistan Erbil Iraq Soran University College of Science Department of Computer Science Erbil Iraq
A wide range of disparate variety of heterogeneous and even disparate data sources has been integrated into the computer science research principles through the assistance of Artificial Intelligence (AI) and Machine L... 详细信息
来源: 评论
Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
An analysis of the Oracles used in Ethereum’s blockchain
An analysis of the Oracles used in Ethereum’s blockchain
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Giuseppe Antonio Pierro Honore Mahugnon Dep. of Mathematics and Computer Science University of Cagliari Cagliari Italy National Institute for Research in Digital Science and Technology INRIA Lille France
Smart contracts are programs whose business logic runs in a decentralized architecture named blockchain where each of the executing nodes trusts and agrees with the execution outcomes. Blockchain is an isolated execut... 详细信息
来源: 评论
Real-time Control of UGV Robot in Gazebo Simulator using P300-based Brain-computer Interface
Real-time Control of UGV Robot in Gazebo Simulator using P30...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Nuaimi, Fatima Ali Al Zeddoug, Jamal Belkacem, Abdelkader Nasreddine Autonomous Robotics Research Center Technology Innovation Institute Abu Dhabi United Arab Emirates CIT United Arab Emirates University Dep. Computer and Network Engineering Al Ain United Arab Emirates
Brain computer interface (BCI)-based virtual environment control has found broad applications in solving and pursuing factual healthcare issues concerning efficiency, safety, and costs. In this technical paper, an unm... 详细信息
来源: 评论
Clinical Informatics System to Understand Lung Cancer Using Transfer Learning-Based computer-Aided Application
Clinical Informatics System to Understand Lung Cancer Using ...
收藏 引用
International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
作者: Ahed Abugabah Atif Mehmood Farah Shahid College of Technological Innovation Zayed University Abu Dhabi UAE Dep. of Computer Science and Technology Zhejiang Normal University Jinhua China
Lung cancer is the second leading cause of death worldwide after cardiovascular disease. Due to late diagnosis, lung cancer patients have an extremely low survival rate when compared to other cancer patients. Hence, e...
来源: 评论
Human Dynamic Behavior: Reconstruction Trajectories Using CDRs  2
Human Dynamic Behavior: Reconstruction Trajectories Using CD...
收藏 引用
2nd International Conference on Physics and Applied Sciences, ICPAS 2021
作者: Behadili, Suhad Faisal Mohammed Ali, Israa Abdulqasim University of Baghdad College of Science Computer Science Dep. Baghdad Iraq Middle Technical University Institute of Technology Baghdad Iraq
Investigating the human mobility patterns is a highly interesting field in the 21th century, and it takes vast attention from multi-disciplinary scientists in physics, economic, social, computer, engineering⋯etc. dep.... 详细信息
来源: 评论
Experimental Comparison of Global Planners for Trajectory Planning of Mobile Robots in an Unknown Environment with Dynamic Obstacles
Experimental Comparison of Global Planners for Trajectory Pl...
收藏 引用
Human-computer Interaction, Optimization and Robotic Applications (HORA), International Congress on
作者: Zehra Tüfekçi Gökhan Erdemir Department of Computer Engineering Istinye University İstanbul Turkiye Department of Computer Science and Engineering Istanbul Sabahattin Zaim University Dep. of Engineering Management & Technology University of Tennessee at Chattanooga Tennessee USA
Interacting with their workspace, detecting obstacles, and real-time path planning in the field to reach the goal in the unknown environment are current working areas of mobile robotics. Working in an unknown environm...
来源: 评论
Health home-monitoring system based on IoT  7
Health home-monitoring system based on IoT
收藏 引用
7th IEEE International Symposium on Electrical and Electronics Engineering, ISEEE 2021
作者: Ionescu, Bogdan Craciun, Marian Petrea, George Epure, Silviu Arama, Catalin Vlad, Ciprian 'Dunarea de Jos' University of Galati Dep. of IT and Digital Communications Romania 'Dunarea de Jos' University of Galati Dep. of Computer Science and Information Technology Romania 'Dunarea de Jos' University of Galati Dep. of Electronics and Telecommunications Romania 'Dunarea de Jos' University of Galati Dep. of Automation and Electrical Engineering Romania
The recent COVID-19 pandemic highlighted that there is a lot of work to do regarding the integration of digital technologies in healthcare. Actual trending offers the possibility to patients to have permanent knowledg... 详细信息
来源: 评论
Exploring Genetic Programming Models in computer-Aided Diagnosis of Skin Cancer Images
Exploring Genetic Programming Models in Computer-Aided Diagn...
收藏 引用
Congress on Evolutionary Computation
作者: Qurrat UI Ain Harith Al-Sahaf Bing Xue Mengjie Zhang School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand Dep. of Cybersecurity Engineering College of Engineering and Info. Technology AlShaab University Baghdad Iraq
Extracting important information from complex skin lesion images is vital to effectively distinguish between different types of skin cancer images. In addition to providing high classification performance, such comput... 详细信息
来源: 评论