咨询与建议

限定检索结果

文献类型

  • 528 篇 会议
  • 127 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 400 篇 工学
    • 291 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 98 篇 信息与通信工程
    • 74 篇 控制科学与工程
    • 51 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 34 篇 生物工程
    • 29 篇 仪器科学与技术
    • 28 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 22 篇 光学工程
    • 19 篇 动力工程及工程热...
    • 19 篇 化学工程与技术
    • 14 篇 交通运输工程
    • 13 篇 材料科学与工程(可...
  • 198 篇 理学
    • 98 篇 数学
    • 55 篇 物理学
    • 42 篇 生物学
    • 34 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 21 篇 化学
  • 124 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 23 篇 医学
    • 22 篇 基础医学(可授医学...
    • 21 篇 临床医学
    • 14 篇 药学(可授医学、理...
  • 19 篇 法学
    • 16 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 15 篇 农学
  • 12 篇 教育学
    • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 15 篇 computational mo...
  • 15 篇 feature extracti...
  • 12 篇 convolutional ne...
  • 11 篇 accuracy
  • 10 篇 machine learning
  • 10 篇 software
  • 9 篇 computer archite...
  • 9 篇 bandwidth
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 authentication
  • 7 篇 predictive model...
  • 7 篇 genetic algorith...

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 zarqa university...
  • 4 篇 institute of com...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 romero francisco...
  • 5 篇 kuo yaw-wen

语言

  • 641 篇 英文
  • 10 篇 其他
  • 7 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. Computer Science and Software Engineering"
659 条 记 录,以下是11-20 订阅
排序:
Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two Nodes  25
Maximize Leader Election Algorithm Performance in Bi-Directi...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Al Refai, Mohammed N. Fawareh, Hamed Aljawawdeh, Hamzeh Alshraiedeh, Fuad Sameh Al-Quraan, Mohammad Al-Odat, Hisham Ali Otoom, Ahmed Jamhawi, Zeyad M. Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Zarqa Jordan Applied Science Private University Department of Cyber Security Amman Jordan Applied Science Private University Department of Computer Science Amman Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
The process of selecting a leader to avoid instability in distributed system network after leader failure is called Leader Election Algorithm (LEA). This process becomes more complicated when it faces intermittent or ... 详细信息
来源: 评论
AbotalebNet: A Novel Deep Learning Architecture for Time Series Forecasting with Convolutional and LSTM Layers Enhanced by Multi-Head Attention  2
AbotalebNet: A Novel Deep Learning Architecture for Time Ser...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Abotaleb, Mostafa Makarovskikh, Tatiana Mijwil, Maad M. Bala, Indu Hiran, Kamal Kant Doshi, Ruchi South Ural State University Dep. of System Programming Chelyabinsk454080 Russia Baghdad College of Economic Sciences University Computer Techniques Engineering Department Baghdad Iraq Lovely Professional University Electrical and Electronics Engineering Punjab India Sir Padampat Singhania University Dep. of Computer Science Udaipur India Universidad Azteca Dep. of Computer Science and Engineering Chalco Mexico
This paper introduces AbotalebNet, a novel deep learning architecture optimized for time series forecasting, with a particular focus on the complexities of COVID-19 data. AbotalebNet's architecture is mathematical... 详细信息
来源: 评论
A Review of Grid-Connected Inverters and Control Methods Under Unbalanced Grid Conditions  16
A Review of Grid-Connected Inverters and Control Methods Und...
收藏 引用
16th Annual Power Electronics, Drive Systems, and Technologies Conference, PEDSTC 2025
作者: Marangalu, Milad Ghavipanjeh Rehman, Fazal Ur Kurkdjian, Naser Vosoughi Computer Queen's University Dep. Of Electrical and Computer Engineering KingstonON Canada University of L'Aquila Dep. Information Engineering Computer Science and Mathematics L'Aquila Italy San Diego State University Faculty of Electrical and Computer Engineering San DiegoCA92182-0001 United States
Grid-connected inverters play a pivotal role in integrating renewable energy sources into modern power systems. However, the presence of unbalanced grid conditions poses significant challenges to the stable operation ... 详细信息
来源: 评论
DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW  4
DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Abitova, Gulnara A. Manap, Abu Said Kulniyaziva, Korlan Nikulin, Vladimir Dep. of Electrical Engineering and Computer Science Dep. of Computer Engineering State University of New York Astana IT University BinghamtonNY United States Astana Kazakhstan Astana IT University Astana Kazakhstan Dep.of System analysis and management L.N. Gumilyov Eurasian National University Astana Kazakhstan Dep. of Electrical Engineering and Computer Science Binghamton University BinghamtonNY United States
In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography for design of an advanced tools and techniques for secure ... 详细信息
来源: 评论
Blockchain Enabled Secure Agri-Goods Traceability using RFID in Supply Chain Management  3
Blockchain Enabled Secure Agri-Goods Traceability using RFID...
收藏 引用
3rd International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2023
作者: Muthu, S. Esakki Kartheeban, K. Kalasalingam Academy of Research and Education Dep. of Computer Science and Engineering Srivilliputtur India
Supply chain is the universal link network to deliver the product from one place to another. Capability to trace and track the Agri-goods products is very important throughout various stages of the supplychain includi... 详细信息
来源: 评论
Feature Selection for Robust Spoofing Detection: A Chi-Square-based Machine Learning Approach  2
Feature Selection for Robust Spoofing Detection: A Chi-Squar...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Al-Na'amneh, Qais Aljaidi, Mohammad Gharaibeh, Hasan Nasayreh, Ahmad Emhamed Al Mamlook, Rabia Almatarneh, Sattam Alzu'bi, Dalia Suliman Husien, Abla Applied Science Private University Dep. of Cyber Security Amman Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Yarmouk University Dep. Computer Science Irbid Jordan Trine University Dep. of Business Administration Indiana United States University of Zawia Department of Industrial Engineering Tripoli Libya Zarqa University Dep. of Data Science and Artificial Intelligence Zarqa Jordan Concordia University Dep. Information and Systems Engineering Montreal Canada
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A 'spoofing attack' refers to a type of cyber-a... 详细信息
来源: 评论
Logistic Regression Classification for Assessing the Risk of Kidney Tumor  2
Logistic Regression Classification for Assessing the Risk of...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Alzubi, Dalia Al Mamlook, Rabia Emhamed Nasayreh, Ahmad Aljaidi, Mohammad Alazab, Rami Gharaibeh, Hasan Al-Naamneh, Qais Concordia University Dep. Information and Systems Engineering Montreal Canada Trine University Dep. of Business Administration IN United States University Zawia Department of Industrial Engineering Tripoli Libya Yarmouk University Dep. Computer Science Irbid Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Jordan University of Science and Technology Dep. Surgery and Urology Irbid Jordan Applied Science Private University Dep. of Cyber Security Amman Jordan
The kidneys have the important function of filtering waste products and toxins from the blood in the human body. Any problems affecting the kidneys can potentially impact their efficiency and overall function. Kidney ... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management  25
A Proposed Approach for Risk Planning and Management
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Al Refai, Mohammed N. Al-Smadi, Yazan Al-Momani, Adai Jamhawi, Zeyad M. Otoom, Ahmed Ali Atoum, Issa Yaseen, Ahid Ababneh, Jafar Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Applied Science Private University Department of Computer Science Amman Jordan Applied Science Private University Department of Cyber Security Amman Jordan Philadelphia University Faculty of Information Technology Software Engineering Department Jordan Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
A SENSITIVITY ANALYSIS ON THE EFFECT OF HYPERPARAMETERS IN DEEP NEURAL OPERATORS APPLIED TO SOUND PROPAGATION  10
A SENSITIVITY ANALYSIS ON THE EFFECT OF HYPERPARAMETERS IN D...
收藏 引用
10th Convention of the European Acoustics Association, EAA 2023
作者: Borrel-Jensen, Nikolas Engsig-Karup, Allan P. Jeong, Cheol-Ho Technical University of Denmark Dep. of Electrical and Photonics Engineering Denmark Technical University of Denmark Dep. of Applied Mathematics and Computer Science Denmark
Deep neural operators have seen much attention in the scientific machine learning community over the last couple of years due to their capability of efficiently learning the nonlinear operators mapping from input func... 详细信息
来源: 评论
Deep Feature Extraction Framework Based on DNN for Enhancing Mirai Attachment Classification in Machine Learning  2
Deep Feature Extraction Framework Based on DNN for Enhancing...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Gharaibeh, Hasan Aljaidi, Mohammad Nasayreh, Ahmad Al-Na'amneh, Qais Jaradat, Ameera S. Samara, Ghassan Emhamed Al Mamlook, Rabia Yarmouk University Dep. Computer Science Irbid Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Applied Science Private University Dep. of Cyber Security Amman Jordan Dep. of Business Administration Trine University IN United States Department of Mechanical and Industrial Engineering University of Zawia Tripoli Libya
Nowadays, the rapid growth of Internet of Things (IoT) devices has changed many parts of our lives by providing seamless connectivity and automation. However, this expansion has created new challenges and vulnerabilit... 详细信息
来源: 评论