咨询与建议

限定检索结果

文献类型

  • 737 篇 会议
  • 193 篇 期刊文献

馆藏范围

  • 930 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 556 篇 工学
    • 404 篇 计算机科学与技术...
    • 332 篇 软件工程
    • 139 篇 信息与通信工程
    • 103 篇 控制科学与工程
    • 66 篇 电气工程
    • 61 篇 电子科学与技术(可...
    • 50 篇 生物工程
    • 39 篇 生物医学工程(可授...
    • 37 篇 机械工程
    • 36 篇 仪器科学与技术
    • 31 篇 光学工程
    • 27 篇 动力工程及工程热...
    • 26 篇 化学工程与技术
    • 20 篇 建筑学
    • 19 篇 安全科学与工程
  • 309 篇 理学
    • 139 篇 数学
    • 116 篇 物理学
    • 60 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 41 篇 系统科学
    • 27 篇 化学
  • 168 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 32 篇 法学
    • 25 篇 社会学
  • 32 篇 医学
    • 29 篇 基础医学(可授医学...
    • 28 篇 临床医学
    • 19 篇 药学(可授医学、理...
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 24 篇 农学
    • 20 篇 作物学
  • 16 篇 教育学
  • 6 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 26 篇 internet of thin...
  • 24 篇 feature extracti...
  • 21 篇 computational mo...
  • 16 篇 accuracy
  • 14 篇 training
  • 12 篇 predictive model...
  • 12 篇 software
  • 12 篇 data models
  • 12 篇 convolutional ne...
  • 11 篇 computer archite...
  • 11 篇 machine learning
  • 10 篇 support vector m...
  • 10 篇 technological in...
  • 9 篇 computer science
  • 9 篇 large hadron col...
  • 9 篇 wireless communi...
  • 9 篇 cameras
  • 9 篇 bandwidth
  • 9 篇 security
  • 9 篇 standards

机构

  • 33 篇 department of ph...
  • 32 篇 department of ph...
  • 32 篇 faculty of scien...
  • 32 篇 departamento de ...
  • 32 篇 department of ph...
  • 32 篇 department for p...
  • 32 篇 yerevan physics ...
  • 32 篇 kirchhoff-instit...
  • 32 篇 faculty of pure ...
  • 32 篇 department of ph...
  • 32 篇 graduate school ...
  • 32 篇 department of ph...
  • 32 篇 institute of phy...
  • 32 篇 institute of phy...
  • 32 篇 dsm/irfu cea sac...
  • 32 篇 physikalisches i...
  • 32 篇 instituto de fís...
  • 32 篇 physics departme...
  • 32 篇 fakultät für mat...
  • 32 篇 nikhef national ...

作者

  • 29 篇 f. buehrer
  • 29 篇 c. alexa
  • 29 篇 j. m. izen
  • 29 篇 s. veneziano
  • 29 篇 m. j. schultens
  • 29 篇 k. bos
  • 29 篇 g. bella
  • 29 篇 j. strandberg
  • 29 篇 d. calvet
  • 29 篇 c. amelung
  • 29 篇 f. pastore
  • 29 篇 e. guido
  • 29 篇 n. orlando
  • 29 篇 h. a. gordon
  • 29 篇 y. tayalati
  • 29 篇 g. spigo
  • 29 篇 v. chiarella
  • 29 篇 f. siegert
  • 29 篇 a. antonov
  • 29 篇 e. hines

语言

  • 906 篇 英文
  • 12 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. Computer Science and Information Engineering"
930 条 记 录,以下是1-10 订阅
排序:
CNN-based Human Activity Recognition on Edge Computing Devices
CNN-based Human Activity Recognition on Edge Computing Devic...
收藏 引用
2023 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2023
作者: Singh, Amandeep Margaria, Tiziana Demrozi, Florenc University of Limerick Dep. of Computer Science and Information Systems Ireland University of Stavanger Dep. of Electrical Engineering and Computer Science Norway
Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea... 详细信息
来源: 评论
Traffic sign recognition based on CNN vs different transfer learning techniques  5
Traffic sign recognition based on CNN vs different transfer ...
收藏 引用
5th Symposium on Pattern Recognition and Applications, SPRA 2024
作者: Ghouse, Mohammed Farag, Saber Butt, Usman Engineering and Environment Dep. Northumbria University London United Kingdom Computer and Information Science Dep. British University in Dubai Dubai United Arab Emirates
Traffic sign detection and recognition (TSDR) is a pivotal component of contemporary transportation systems, designed to enhance road safety and operational efficiency. In an era where automation is indispensable, TSD... 详细信息
来源: 评论
Detecting 5G Signal Jammers with Autoencoders Based on Loose Observations
Detecting 5G Signal Jammers with Autoencoders Based on Loose...
收藏 引用
2023 IEEE Globecom Workshops, GC Wkshps 2023
作者: Varotto, Matteo Valentin, Stefan Tomasin, Stefano University of Padova Dep. of Information Engineering Padova Italy Darmstadt University of Applied Sciences Dep. of Computer Science Darmstadt Germany University of Padova Dep. of Information Engineering Dep. of Mathematics Padova Italy
Fifth-generation (5G) networks are prone to jamming attacks, which are particularly dangerous in mission-critical applications such as factory automation. In this paper, we present a simple method to detect jamming at... 详细信息
来源: 评论
ENHANCING E-HEALTH CYBERSECURITY AND RESILIENCE: SHIFTING FROM MONOLITHIC TO MICROSERVICES ARCHITECTURE
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and computer science 2025年 第1期87卷 21-34页
作者: Contașel, Cristian Rughiniș, Răzvan Trancă, Dumitru Cristian Țurcanu, Dinu Dept. of Computer Science and Engineering National University of Science and Technology POLITEHNICA Bucharest Romania Dep. of Software Engineering and Automatics Technical University of Moldova Chișinău Moldova
This study provides an innovative architectural model for e-Health systems that aims to improve cyber resilience while maintaining high availability under fluctuating traffic loads. We examined typical cybersecurity i... 详细信息
来源: 评论
A Review of Grid-Connected Inverters and Control Methods Under Unbalanced Grid Conditions  16
A Review of Grid-Connected Inverters and Control Methods Und...
收藏 引用
16th Annual Power Electronics, Drive Systems, and Technologies Conference, PEDSTC 2025
作者: Marangalu, Milad Ghavipanjeh Rehman, Fazal Ur Kurkdjian, Naser Vosoughi Computer Queen's University Dep. Of Electrical and Computer Engineering KingstonON Canada University of L'Aquila Dep. Information Engineering Computer Science and Mathematics L'Aquila Italy San Diego State University Faculty of Electrical and Computer Engineering San DiegoCA92182-0001 United States
Grid-connected inverters play a pivotal role in integrating renewable energy sources into modern power systems. However, the presence of unbalanced grid conditions poses significant challenges to the stable operation ... 详细信息
来源: 评论
SANA at NADI 2023 shared task: Ensemble of Layer-Wise BERT-based models for Dialectal Arabic Identification  1
SANA at NADI 2023 shared task: Ensemble of Layer-Wise BERT-b...
收藏 引用
1st Arabic Natural Language Processing Conference, ArabicNLP 2023
作者: Almarwani, Nada Aloufi, Samah Dep. of Computer Science College of Computer Science and Engineering Taibah University Saudi Arabia
Our system, submitted to the Nuanced Arabic Dialect Identification (NADI-23), tackles the first sub-task: Closed Country-level dialect identification. In this work, we propose a model that is based on an ensemble of l...
来源: 评论
A User Experience Study on University of Isfahan's LMS and Exploring Features of AI-Enhanced E-Learning Platforms  11
A User Experience Study on University of Isfahan's LMS and E...
收藏 引用
11th International and the 17th National Conference on E-Learning and E-Teaching, ICeLeT 2024
作者: Ghaffari, Milad Akbari, Ali Ostani, Morteza Mohammadi Islamic Azad University Majlesi Branch Dep. of Mechatronics Engineering Isfahan Iran University of Isfahan Dep. of Knowledge & Information Science Isfahan Iran
The main objective of this paper was to evaluate the user experience (UX) of students in higher education by conducting usability testing in the e-learning context, specifically utilizing the University of Isfahan (UI... 详细信息
来源: 评论
Design and Implementation of Minkowski Feature Selection for Machine Learning Techniques  5
Design and Implementation of Minkowski Feature Selection for...
收藏 引用
5th International Conference on information Technology, Applied Mathematics and Statistics, ICITAMS 2023
作者: Hakim, Ekram Al-Shammary, Dhiah Mahdi, Ahmed M. University Of Al-Qadisiyah College Of Computer Science And Information Technology Dep. Computer Science Diwaniyah Iraq
This paper proposes a design and implementation of a highly efficient feature selection based on Minkowski's mathematical similarity for machine learning. Moreover, the development of the Minkowski feature selecti... 详细信息
来源: 评论
Performance Analysis of Intelligent Reflecting Surfaces for 5G/6G-Enabled Future Smart Industries with a Focus on Millimeter-Wave Band Communications  59
Performance Analysis of Intelligent Reflecting Surfaces for ...
收藏 引用
2024 Annual IEEE International Conference on Communications Workshops, ICC Workshops 2024
作者: Khan, Muhammad Farhan Raza, Ali Iqbal, Adeel Rashid, Adnan Jamshed, Muhammad Ali Pesch, Dirk School of Computer Science and Information Technology University College Cork Cork Ireland Comsats University Islamabad Dep. of Electrical and Computer Engineering Pakistan Yeungnam University Dep. of Info. & Com. Engineering Gyeongsan-si38541 Korea Republic of Politecnico di Bari Dep. of Electrical & Information Engineering Bari Italy James Watt School of Engineering University of Glasgow Glasgow United Kingdom
Industry 4.0's emergence necessitates reliable communication systems. Millimeter-wave (mmWave) communication is a promising solution, but challenges like limited coverage and atmospheric absorption persist. The In... 详细信息
来源: 评论
Feature Selection for Robust Spoofing Detection: A Chi-Square-based Machine Learning Approach  2
Feature Selection for Robust Spoofing Detection: A Chi-Squar...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Al-Na'amneh, Qais Aljaidi, Mohammad Gharaibeh, Hasan Nasayreh, Ahmad Emhamed Al Mamlook, Rabia Almatarneh, Sattam Alzu'bi, Dalia Suliman Husien, Abla Applied Science Private University Dep. of Cyber Security Amman Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Yarmouk University Dep. Computer Science Irbid Jordan Trine University Dep. of Business Administration Indiana United States University of Zawia Department of Industrial Engineering Tripoli Libya Zarqa University Dep. of Data Science and Artificial Intelligence Zarqa Jordan Concordia University Dep. Information and Systems Engineering Montreal Canada
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A 'spoofing attack' refers to a type of cyber-a... 详细信息
来源: 评论