咨询与建议

限定检索结果

文献类型

  • 528 篇 会议
  • 127 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 400 篇 工学
    • 291 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 98 篇 信息与通信工程
    • 74 篇 控制科学与工程
    • 51 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 34 篇 生物工程
    • 29 篇 仪器科学与技术
    • 28 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 22 篇 光学工程
    • 19 篇 动力工程及工程热...
    • 19 篇 化学工程与技术
    • 14 篇 交通运输工程
    • 13 篇 材料科学与工程(可...
  • 198 篇 理学
    • 98 篇 数学
    • 55 篇 物理学
    • 42 篇 生物学
    • 34 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 21 篇 化学
  • 124 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 23 篇 医学
    • 22 篇 基础医学(可授医学...
    • 21 篇 临床医学
    • 14 篇 药学(可授医学、理...
  • 19 篇 法学
    • 16 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 15 篇 农学
  • 12 篇 教育学
    • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 15 篇 computational mo...
  • 15 篇 feature extracti...
  • 12 篇 convolutional ne...
  • 11 篇 accuracy
  • 10 篇 machine learning
  • 10 篇 software
  • 9 篇 computer archite...
  • 9 篇 bandwidth
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 authentication
  • 7 篇 predictive model...
  • 7 篇 genetic algorith...

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 zarqa university...
  • 4 篇 institute of com...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 romero francisco...
  • 5 篇 kuo yaw-wen

语言

  • 641 篇 英文
  • 10 篇 其他
  • 7 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. Computer Science and Software Engineering"
659 条 记 录,以下是1-10 订阅
排序:
ENHANCING E-HEALTH CYBERSECURITY AND RESILIENCE: SHIFTING FROM MONOLITHIC TO MICROSERVICES ARCHITECTURE
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and computer science 2025年 第1期87卷 21-34页
作者: Contașel, Cristian Rughiniș, Răzvan Trancă, Dumitru Cristian Țurcanu, Dinu Dept. of Computer Science and Engineering National University of Science and Technology POLITEHNICA Bucharest Romania Dep. of Software Engineering and Automatics Technical University of Moldova Chișinău Moldova
This study provides an innovative architectural model for e-Health systems that aims to improve cyber resilience while maintaining high availability under fluctuating traffic loads. We examined typical cybersecurity i... 详细信息
来源: 评论
Optimization of Methods for Querying Formal Ontologies in Natural Language Using a Neural Network  16
Optimization of Methods for Querying Formal Ontologies in Na...
收藏 引用
16th International Conference on Knowledge engineering and Ontology Development, KEOD 2024 as part of 16th International Joint Conference on Knowledge Discovery, Knowledge engineering and Knowledge Management, IC3K 2024
作者: Ondo, Anicet Lepetit Capus, Laurence Bousso, Mamadou Dep. of Computer and Software Engineering Laval University QuebecQCG1V 0A6 Canada Dep. Computer Science Iba Der Thiam University Thies967 Senegal
A well-designed ontology must be capable of addressing all the needs it is intended to satisfy. This complex task involves gathering all the potential questions from future users that the ontology should answer in ord... 详细信息
来源: 评论
CNN-based Human Activity Recognition on Edge Computing Devices
CNN-based Human Activity Recognition on Edge Computing Devic...
收藏 引用
2023 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2023
作者: Singh, Amandeep Margaria, Tiziana Demrozi, Florenc University of Limerick Dep. of Computer Science and Information Systems Ireland University of Stavanger Dep. of Electrical Engineering and Computer Science Norway
Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea... 详细信息
来源: 评论
Traffic sign recognition based on CNN vs different transfer learning techniques  5
Traffic sign recognition based on CNN vs different transfer ...
收藏 引用
5th Symposium on Pattern Recognition and Applications, SPRA 2024
作者: Ghouse, Mohammed Farag, Saber Butt, Usman Engineering and Environment Dep. Northumbria University London United Kingdom Computer and Information Science Dep. British University in Dubai Dubai United Arab Emirates
Traffic sign detection and recognition (TSDR) is a pivotal component of contemporary transportation systems, designed to enhance road safety and operational efficiency. In an era where automation is indispensable, TSD... 详细信息
来源: 评论
SANA at NADI 2023 shared task: Ensemble of Layer-Wise BERT-based models for Dialectal Arabic Identification  1
SANA at NADI 2023 shared task: Ensemble of Layer-Wise BERT-b...
收藏 引用
1st Arabic Natural Language Processing Conference, ArabicNLP 2023
作者: Almarwani, Nada Aloufi, Samah Dep. of Computer Science College of Computer Science and Engineering Taibah University Saudi Arabia
Our system, submitted to the Nuanced Arabic Dialect Identification (NADI-23), tackles the first sub-task: Closed Country-level dialect identification. In this work, we propose a model that is based on an ensemble of l...
来源: 评论
Comparative Analysis of ML Algorithms for Fraud Detection  4
Comparative Analysis of ML Algorithms for Fraud Detection
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Abitova, Gulnara Abalkanov, Miras Dep. of Eletrical Engineering and Computer Science Dep. of Computer Engineering State University of New York Astana IT University BinghamtonNY United States Astana Kazakhstan Department of Computer Engineeering Astana IT University Astana Kazakhstan
The challenge of credit card fraud presents a significant threat to both consumers and financial institutions alike, leading to substantial economic detriment. In response, this research applies various machine learni... 详细信息
来源: 评论
Study on the Robotic Arm Trajectory Compensation System with Deviation Sensing  3
Study on the Robotic Arm Trajectory Compensation System with...
收藏 引用
3rd International Conference on Mechatronics and Automation Technology, ICMAT 2024
作者: Liu, Chao-Chung Liu, Jun-Chi Liu, Chao-Shu Dep. of Computer Science Zhaoqing University Zhaoqing526061 China Dep. of Industrial Design National United University Miaoli360301 Taiwan Dep. of Mechanical Engineering National Kaohsiung University of Science and Technology Kaohsiung80778 Taiwan
Robotic arms play an important role in the automation industry. Robotic arms plan processing paths based on the shape of the workpiece. However, the processing path often deviates due to inaccurate placement of the wo... 详细信息
来源: 评论
Detecting 5G Signal Jammers with Autoencoders Based on Loose Observations
Detecting 5G Signal Jammers with Autoencoders Based on Loose...
收藏 引用
2023 IEEE Globecom Workshops, GC Wkshps 2023
作者: Varotto, Matteo Valentin, Stefan Tomasin, Stefano University of Padova Dep. of Information Engineering Padova Italy Darmstadt University of Applied Sciences Dep. of Computer Science Darmstadt Germany University of Padova Dep. of Information Engineering Dep. of Mathematics Padova Italy
Fifth-generation (5G) networks are prone to jamming attacks, which are particularly dangerous in mission-critical applications such as factory automation. In this paper, we present a simple method to detect jamming at... 详细信息
来源: 评论
Investigation of a 7-Axis Suspended Robotic Arm for Automated Spraying System  3
Investigation of a 7-Axis Suspended Robotic Arm for Automate...
收藏 引用
3rd International Conference on Mechatronics and Automation Technology, ICMAT 2024
作者: Liu, Chao-Chung Liu, Jun-Chi Liu, Chao-Shu Dep. of Computer Science ZhaoQing University ZhaoQing526061 China Dep. of Industrial Design National United University Miaoli360301 Taiwan Dep. of Mechanical Engineering National Kaohsiung University of Science and Technology Kaohsiung80778 Taiwan
This study successfully develops a 7-axis suspended robotic arm for an automated spraying system, considering factors such as flexible operation modes, spray area dimensions, workpiece geometry, and the degrees of fre... 详细信息
来源: 评论
Studying Risks of Hybrid Reengineering on Air-Transportation Systems Management 'A Case Study on Jordanian Civil Aviation Regulatory Commission (CARC)'  24
Studying Risks of Hybrid Reengineering on Air-Transportation...
收藏 引用
24th International Arab Conference on Information Technology, ACIT 2023
作者: Al Refai Mohammed, N. Taani, M.K. Otoom, Ahmed Ali Samara, Ghassan Hanandeh, S.E. Khafajeh, Hayel Zarqa University Software Engineering Dep. Zarqa Jordan Applied Science Private University Cybersecurity and Cloud Computing Dep. Amman Jordan Zarqa University Department of Computer Science Zarqa Jordan Zarqa University Artificial Intelligence Dep. Zarqa Jordan
This study examines decision-making in software re-engineering within businesses, focusing on the challenges and considerations involved. Financial constraints, time, and staff efforts are critical factors in these de... 详细信息
来源: 评论