咨询与建议

限定检索结果

文献类型

  • 679 篇 会议
  • 148 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 515 篇 工学
    • 360 篇 计算机科学与技术...
    • 300 篇 软件工程
    • 117 篇 信息与通信工程
    • 96 篇 控制科学与工程
    • 69 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 39 篇 生物工程
    • 38 篇 仪器科学与技术
    • 35 篇 生物医学工程(可授...
    • 32 篇 化学工程与技术
    • 30 篇 动力工程及工程热...
    • 28 篇 光学工程
    • 18 篇 材料科学与工程(可...
    • 16 篇 建筑学
    • 16 篇 交通运输工程
  • 238 篇 理学
    • 122 篇 数学
    • 65 篇 物理学
    • 52 篇 生物学
    • 47 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 31 篇 化学
  • 159 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 65 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 25 篇 农学
    • 20 篇 作物学
  • 24 篇 法学
    • 20 篇 社会学
  • 24 篇 医学
    • 22 篇 基础医学(可授医学...
    • 22 篇 临床医学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 21 篇 internet of thin...
  • 20 篇 computational mo...
  • 18 篇 feature extracti...
  • 14 篇 accuracy
  • 13 篇 convolutional ne...
  • 11 篇 security
  • 11 篇 software
  • 11 篇 training
  • 10 篇 computer archite...
  • 9 篇 bandwidth
  • 9 篇 optimization
  • 9 篇 predictive model...
  • 9 篇 machine learning
  • 9 篇 protocols
  • 9 篇 complexity theor...
  • 9 篇 mathematical mod...
  • 8 篇 computer science
  • 8 篇 wireless communi...
  • 8 篇 monitoring
  • 8 篇 real-time system...

机构

  • 8 篇 institute of com...
  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 graduate school ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...

作者

  • 9 篇 piattini mario
  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 7 篇 moura paulo
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 mukund bhole
  • 5 篇 ahmed aziz
  • 5 篇 kastner wolfgang

语言

  • 814 篇 英文
  • 10 篇 其他
  • 8 篇 中文
  • 1 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. Computer Science and Systems Engineering"
834 条 记 录,以下是101-110 订阅
排序:
Implementation and Design of Water Flow Meter of Smart Home Integrated with Environment Monitor System  4
Implementation and Design of Water Flow Meter of Smart Home ...
收藏 引用
4th IEEE Eurasia Conference on Biomedical engineering, Healthcare and Sustainability, ECBIOS 2022
作者: Tsao, Yung-Chung Kuo, Yaw-Wen Wu, Chia-Chun Tsai, Yin-Te Hsu, Chihcheng Ho, Liulin Wang, Han-Ching National Chi Nan University Dep. of Electrical Engineering Nantou County Taiwan National Quemoy University Dep. of Industrial Engineering and Management Kinmen County Taiwan Providence University Dep. of Computer Science and Communication Engineering Taichung City Taiwan National Central University Dep. of Information Management Taoyuan Country Taiwan College of Science and Technology National Chi Nan University Nantou County Taiwan Xinhe Elementary School Xindian District New Taipei City Taiwan
More home appliances were designed and manufactured in the market, but fewer commercial products related to water-flow monitoring are sold in the current market. Water-related costs and expenses are cheaper than other... 详细信息
来源: 评论
TIoT: A Trust by Design Architecture for Secure and Private Internet of Things (IoT)  21
TIoT: A Trust by Design Architecture for Secure and Private ...
收藏 引用
21st International Multi-Conference on systems, Signals and Devices, SSD 2024
作者: Alsheakh, H. Mahdi, Tareq Nasser Kadhm, Mustafa S. Al Shammari, Abeer Abdulsahib, Fatimah I. Taher, Hazeem B Algriree, Waleed Alobaidi, Marwa Q. Mohammed, Hayder Dhafer College of Science Mustansiriyah University Department of Computer Science Baghdad Iraq College of Pharmacy Mustansiriyah University Clinical Laboratory Science Baghdad Iraq Ministry of Science and Technology Baghdad Iraq Szechenyi Istvan Egyetem Department of Computer Science Gyor9026 Hungary University of Thi-Qar Department of Computer Science Thi-Qar Iraq University Putra Malaysia Dep. of Wireless Communication and Network Engineering Selangor Malaysia National Engineering School of Sfax Sfax University Sfax Tunisia College of Pharmacy Mustansiriyah University Baghdad Iraq
The Internet of Things (loT) facilitates the interconnection of a vast array of devices, services, and individuals for data exchange in multi-domain loT ecosystems, the social, physical, and cyber domains. That emerge... 详细信息
来源: 评论
A Bayesian take on Gaussian process networks  23
A Bayesian take on Gaussian process networks
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing systems
作者: Enrico Giudice Jack Kuipers Giusi Moffa Dep. of Mathematics and Computer Science University of Basel Basel Switzerland Dep. of Biosystems Science and Engineering ETH Zurich Basel Switzerland Dep. of Mathematics and Computer Science University of Basel Basel Switzerland and Division of Psychiatry University College London London UK
Gaussian Process Networks (GPNs) are a class of directed graphical models which employ Gaussian processes as priors for the conditional expectation of each variable given its parents in the network. The model allows t...
来源: 评论
Designing Participatory AI: Creative Professionals' Worries and Expectations about Generative AI
Designing Participatory AI: Creative Professionals' Worries ...
收藏 引用
Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing systems, CHI EA 2023
作者: Inie, Nanna Falk, Jeanette Tanimoto, Steve It University of Copenhagen Copenhagen Denmark Dep. of Artificial Intelligence and Human Interfaces University of Salzburg Salzburg Austria Paul G. Allen School of Computer Science & Engineering University of Washington Seattle United States
Generative AI, i.e., the group of technologies that automatically generate visual or written content based on text prompts, has undergone a leap in complexity and become widely available within just a few years. Such ... 详细信息
来源: 评论
A Bayesian Take on Gaussian Process Networks
arXiv
收藏 引用
arXiv 2023年
作者: Giudice, Enrico Kuipers, Jack Moffa, Giusi Dep. of Mathematics and Computer Science University of Basel Basel Switzerland Dep. of Biosystems Science and Engineering ETH Zurich Basel Switzerland Dep. of Mathematics and Computer Science University of Basel Basel Switzerland Division of Psychiatry University College London London United Kingdom
Gaussian Process Networks (GPNs) are a class of directed graphical models which employ Gaussian processes as priors for the conditional expectation of each variable given its parents in the network. The model allows t... 详细信息
来源: 评论
Deep Feature Extraction Framework Based on DNN for Enhancing Mirai Attachment Classification in Machine Learning
Deep Feature Extraction Framework Based on DNN for Enhancing...
收藏 引用
Electrical, Energy, and Artificial Intelligence (EICEEAI), International engineering Conference on
作者: Hasan Gharaibeh Mohammad Aljaidi Ahmad Nasayreh Qais Al-Na'amneh Ameera S. Jaradat Ghassan Samara Rabia Emhamed Al Mamlook Dep. Computer Science Yarmouk University Irbid Jordan Dep. of Computer Science Zarqa University Zarqa Jordan Dep. of Cyber Security Applied Science Private University Amman Jordan Dep. of Business Administration Trine University Indiana USA Department of Mechanical and Industrial Engineering University of Zawia Tripoli Libia
Nowadays, the rapid growth of Internet of Things (IoT) devices has changed many parts of our lives by providing seamless connectivity and automation. However, this expansion has created new challenges and vulnerabilit... 详细信息
来源: 评论
Machine Learning-Enhanced Standard Deviation to Detect and Handle of Outlier in the 3D Point-Cloud Data
Machine Learning-Enhanced Standard Deviation to Detect and H...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Mohammad Rasoul Tanhatalab Manuel Forrer Michael Nelz Dep. of Information Engineering and Computer Science Trento University Italy ferrisol Co Graz Austria Nelo Intelligence Eichenau Germany
Outlier removal is an important step in 3D point cloud data processing. Various methodologies for outlier removal will be analyzed shortly in this paper by describing a range of statistical and machine-learning techni... 详细信息
来源: 评论
An Efficient Quantum cryptanalysis of lightweight hash function - PHOTON-Beetle  2
An Efficient Quantum cryptanalysis of lightweight hash funct...
收藏 引用
2nd International Conference on Automation, Computing and Renewable systems, ICACRS 2023
作者: Allu, Swamy Naidu Tentu, Appala Naidu Kancharla, Gangadhara Rao Dep. of Computer Science & Engineering Acharya Nagarjuna University Andhra Pradesh Guntur522510 India CR Rao AIMSCS UoH Campus Telangana Hyderabad500046 India CR Rao Advanced Institute of Mathematics Statistics and Computer Science University of Hyderabad Campus Telangana Hyderabad500046 India
Quantum cryptanalysis methods are used to crack the majority of symmetric key ciphers. With this knowledge, cryptologists should be able to create post-quantum symmetric ciphers by incorporating these new quantum cryp... 详细信息
来源: 评论
Bi2S3 and NiBiS3 electrocatalysts for alkaline hydrogen evolution reactions
收藏 引用
International Journal of Hydrogen Energy 2025年
作者: Aksaray, Goncagül Mert, Mehmet Erman Mert, Başak Doğru Kardaş, Gülfeza Çukurova University Arts and Sciences Faculty Chemistry Dep. Adana01330 Turkey Adana Alparslan Türkeş Science and Technology University Advanced Technology Research and Application Center Adana01250 Turkey Adana Alparslan Türkeş Science and Technology University Engineering Faculty Energy Systems Engineering Dep. Adana01250 Turkey
Developing efficient and available catalysts is important for advancing hydrogen evolution reaction (HER) in alkaline water electrolysis, a promising technology for sustainable hydrogen production. This study reports ... 详细信息
来源: 评论
Towards Unveiling Vulnerabilities and Securing IoT Devices: An Ontology-Based Approach
Towards Unveiling Vulnerabilities and Securing IoT Devices: ...
收藏 引用
International Conference on Emerging Technologies and Factory Automation (ETFA)
作者: Mukund Bhole Wolfgang Kastner Thilo Sauter TU Wien Institute of Computer Engineering Vienna Austria Dep. of Integrated Sensor Systems TU Wien Institute of Computer Technology Danube University Krems Austria
In the rapidly expanding landscape of Internet of Things (IoT), sensors have emerged as pivotal components, playing a critical role in sensing and data collection. However, this crucial function also renders them susc... 详细信息
来源: 评论