咨询与建议

限定检索结果

文献类型

  • 681 篇 会议
  • 149 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 837 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 517 篇 工学
    • 363 篇 计算机科学与技术...
    • 301 篇 软件工程
    • 118 篇 信息与通信工程
    • 97 篇 控制科学与工程
    • 69 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 39 篇 生物工程
    • 38 篇 仪器科学与技术
    • 35 篇 生物医学工程(可授...
    • 32 篇 化学工程与技术
    • 30 篇 动力工程及工程热...
    • 28 篇 光学工程
    • 18 篇 材料科学与工程(可...
    • 16 篇 建筑学
    • 16 篇 交通运输工程
  • 239 篇 理学
    • 123 篇 数学
    • 66 篇 物理学
    • 52 篇 生物学
    • 48 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 31 篇 化学
  • 160 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 65 篇 工商管理
    • 58 篇 图书情报与档案管...
  • 25 篇 农学
    • 20 篇 作物学
  • 24 篇 法学
    • 20 篇 社会学
  • 24 篇 医学
    • 22 篇 基础医学(可授医学...
    • 22 篇 临床医学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 21 篇 internet of thin...
  • 20 篇 computational mo...
  • 18 篇 feature extracti...
  • 14 篇 accuracy
  • 13 篇 convolutional ne...
  • 11 篇 security
  • 11 篇 software
  • 11 篇 training
  • 10 篇 computer archite...
  • 9 篇 bandwidth
  • 9 篇 optimization
  • 9 篇 predictive model...
  • 9 篇 machine learning
  • 9 篇 protocols
  • 9 篇 complexity theor...
  • 9 篇 mathematical mod...
  • 8 篇 computer science
  • 8 篇 wireless communi...
  • 8 篇 monitoring
  • 8 篇 real-time system...

机构

  • 8 篇 institute of com...
  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 graduate school ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...

作者

  • 9 篇 piattini mario
  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 7 篇 moura paulo
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 mukund bhole
  • 5 篇 ahmed aziz
  • 5 篇 kastner wolfgang

语言

  • 806 篇 英文
  • 21 篇 其他
  • 8 篇 中文
  • 1 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. Computer Science and Systems Engineering"
837 条 记 录,以下是111-120 订阅
排序:
An Efficient Quantum cryptanalysis of lightweight hash function - PHOTON-Beetle  2
An Efficient Quantum cryptanalysis of lightweight hash funct...
收藏 引用
2nd International Conference on Automation, Computing and Renewable systems, ICACRS 2023
作者: Allu, Swamy Naidu Tentu, Appala Naidu Kancharla, Gangadhara Rao Dep. of Computer Science & Engineering Acharya Nagarjuna University Andhra Pradesh Guntur522510 India CR Rao AIMSCS UoH Campus Telangana Hyderabad500046 India CR Rao Advanced Institute of Mathematics Statistics and Computer Science University of Hyderabad Campus Telangana Hyderabad500046 India
Quantum cryptanalysis methods are used to crack the majority of symmetric key ciphers. With this knowledge, cryptologists should be able to create post-quantum symmetric ciphers by incorporating these new quantum cryp... 详细信息
来源: 评论
Towards Unveiling Vulnerabilities and Securing IoT Devices: An Ontology-Based Approach
Towards Unveiling Vulnerabilities and Securing IoT Devices: ...
收藏 引用
International Conference on Emerging Technologies and Factory Automation (ETFA)
作者: Mukund Bhole Wolfgang Kastner Thilo Sauter TU Wien Institute of Computer Engineering Vienna Austria Dep. of Integrated Sensor Systems TU Wien Institute of Computer Technology Danube University Krems Austria
In the rapidly expanding landscape of Internet of Things (IoT), sensors have emerged as pivotal components, playing a critical role in sensing and data collection. However, this crucial function also renders them susc... 详细信息
来源: 评论
From Manual to Semi-Automated Safety and Security Requirements engineering: Ensuring Compliance in Industry 4.0
From Manual to Semi-Automated Safety and Security Requiremen...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Mukund Bhole Wolfgang Kastner Thilo Sauter Institute of Computer Engineering TU Wien Vienna Austria Dep. of Integrated Sensor Systems Institute of Computer Technology TU Wien Danube University Krems Austria
In response to the growing need for compliance with diverse safety and security regulations, crucial for safeguarding both humans and machines in the era of Industry 4.0 (I4.0), it has also become increasingly crucial... 详细信息
来源: 评论
AI-driven Risk Assessment and Decision-making in Healthcare Applications Using Machine Learning: A Case Study on Customer Twitter Feeds
AI-driven Risk Assessment and Decision-making in Healthcare ...
收藏 引用
Computational Intelligence and Network systems (CINS), International Conference on
作者: Abdelaziz Darwiesh Mohamed Elhoseny A.H. El-Baz Reem Atassi Mathematics Dep. Faculty of Science Damietta University New Damietta Egypt Information Systems Dep. Faculty of Computing and Info. University of Sharjah Sharjah UAE Computer Science Dep. Faculty of Computers and Artificial Intelligence Damietta University New Damietta Egypt Higher Colleges of Technology Dubai UAE
This study presents an AI-driven strategy for enhancing decision-making in healthcare applications by assessing and managing potential risks through the analysis of customer interactions on social media platforms, spe... 详细信息
来源: 评论
IT Security Solutions for IT/OT Integration: Identifying Gaps and Opportunities
IT Security Solutions for IT/OT Integration: Identifying Gap...
收藏 引用
International Conference on Emerging Technologies and Factory Automation (ETFA)
作者: Mukund Bhole Wolfgang Kastner Thilo Sauter Institute of Computer Engineering TU Wien Vienna Austria Dep. of Integrated Sensor Systems Institute of Computer Technology TU Wien Danube University Krems Austria
In the contemporary landscape of convergence between Information Technology (IT) and Operational Technology (OT), maintaining asset visibility within the Industrial Control systems (ICS) infrastructure is paramount. Y... 详细信息
来源: 评论
Biological age estimation from ECG using Artificial Intelligence approaches
Biological age estimation from ECG using Artificial Intellig...
收藏 引用
Biomedical engineering Conference (JIBEC), Jordanian International
作者: Jana Sleiman Mohamad Daher Mohamad Khalil Ahmad Diab Abdallah Kassem Computer and Communications Engineering Lebanese University Tripoli Lebanon Dep. of Computer Science/Dep. of Computer Science & Information Technology Faculty of Science/Faculty of Applied Sciences & Technology Tripoli Lebanon Electrical Engineering Lebanese University Tripoli Lebanon Biomedical Engineering Lebanese International University Beirut Lebanon ECCE Dept. Faculty Of Engineering Notre Dame University Zouk Mosbeh Lebanon
This paper explores the application of Artificial Intelligence (AI) techniques in healthcare, specifically focusing on electrocardiogram (ECG) data analysis and biological age estimation. The study begins with an over... 详细信息
来源: 评论
Machine learning algorithms in Bigdata Analysis and its applications: A review  4
Machine learning algorithms in Bigdata Analysis and its appl...
收藏 引用
4th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2022
作者: Khoshaba, Farah Kareem, Shahab Awla, Hoshang Mohammed, Chnar Erbil Polytechnic University Technical Engineering College Information System Engineering Department Erbil Iraq Lebanese French University College of Engineering and Computer Science Dep. of Information Technology Kurdistan Erbil Iraq Soran University College of Science Department of Computer Science Erbil Iraq
A wide range of disparate variety of heterogeneous and even disparate data sources has been integrated into the computer science research principles through the assistance of Artificial Intelligence (AI) and Machine L... 详细信息
来源: 评论
Development of an Electricity Loop Current Monitor System Based on MQTT Broker
Development of an Electricity Loop Current Monitor System Ba...
收藏 引用
2021 IEEE International Conference on Electronic Communications, Internet of Things and Big Data, ICEIB 2021
作者: Tsao, Yung-Chung Kuo, Yaw-Wen Wu, Chia-Chun Tsai, Yin-Te Hsu, Chih-Cheng National Chi Nan University Dep. of Electrical Engineering Taiwan National Quemoy University Dep. of Industrial Engineering and Management Taiwan Providence University Dep. of Computer Science and Communication Engineering Taiwan National Central University Dep. of Information Management Taiwan
The energy monitoring system is always a critical and popular issue for a long time, although many information systems have been built and dep.oyed into schools, factories, schools, commercial organizations, and gover... 详细信息
来源: 评论
Evaluating the Impact of Injected Mobility Data on Measuring Data Coverage in CrowdSensing Scenarios
Evaluating the Impact of Injected Mobility Data on Measuring...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Alexander Kocian Michele Girolami Stefano Capoccia Luca Foschini Stefano Chessa Dep. of Computer Science University of Pisa Italian National Council of Research ISTI-CNR Pisa Italy Department of Computer Science and Engineering University of Bologna Bologna Italy
A major weakness of Mobile CrowdSensing Platforms (MCS) is the willingness of users to participate, as this implies disclosing their private data (for example, concerning mobility) to the MCS platform. In the effort t... 详细信息
来源: 评论
Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two Nodes
Maximize Leader Election Algorithm Performance in Bi-Directi...
收藏 引用
Information Technology (ACIT)
作者: Mohammed N. Al Refai Hamed Fawareh Hamzeh Aljawawdeh Fuad Sameh Alshraiedeh Mohammad Al-quraan Hisham Al-Odat Ahmed Ali Otoom Zeyad M. Jamhawi Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Computer Science Zarqa University Zarqa Jordan Department of Cyber Security Applied Science Private University Amman Jordan Department of Computer Science Applied Science Private University Amman Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
The process of selecting a leader to avoid instability in distributed system network after leader failure is called Leader Election Algorithm (LEA). This process becomes more complicated when it faces intermittent or ... 详细信息
来源: 评论