咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 56 篇 期刊文献

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 214 篇 工学
    • 135 篇 计算机科学与技术...
    • 111 篇 软件工程
    • 54 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 42 篇 电气工程
    • 31 篇 电子科学与技术(可...
    • 18 篇 机械工程
    • 16 篇 动力工程及工程热...
    • 14 篇 生物工程
    • 13 篇 化学工程与技术
    • 11 篇 光学工程
    • 10 篇 力学(可授工学、理...
    • 10 篇 仪器科学与技术
    • 10 篇 生物医学工程(可授...
    • 9 篇 材料科学与工程(可...
    • 8 篇 农业工程
    • 7 篇 航空宇航科学与技...
    • 7 篇 环境科学与工程(可...
  • 106 篇 理学
    • 53 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 13 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 9 篇 化学
  • 55 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 28 篇 工商管理
    • 15 篇 图书情报与档案管...
  • 12 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 9 篇 农学
  • 5 篇 教育学
  • 3 篇 法学
  • 1 篇 文学

主题

  • 14 篇 internet of thin...
  • 9 篇 feature extracti...
  • 8 篇 accuracy
  • 8 篇 training
  • 6 篇 wireless communi...
  • 5 篇 reliability
  • 5 篇 delays
  • 5 篇 computer archite...
  • 5 篇 logic gates
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 real-time system...
  • 5 篇 industries
  • 5 篇 software
  • 5 篇 cryptography
  • 4 篇 image segmentati...
  • 4 篇 educational inst...
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 genetic algorith...

机构

  • 7 篇 dep. of electric...
  • 7 篇 institute of com...
  • 6 篇 department of co...
  • 4 篇 dep. of computer...
  • 3 篇 dep. of electric...
  • 3 篇 guangxi key labo...
  • 3 篇 dep. of computer...
  • 3 篇 sichuan institut...
  • 3 篇 fir-uf universit...
  • 3 篇 dep. of integrat...
  • 3 篇 ministry of land...
  • 3 篇 institute of com...
  • 3 篇 state key labora...
  • 3 篇 deimos engenhari...
  • 3 篇 school of resour...
  • 3 篇 dep. of electric...
  • 3 篇 sri lanka instit...
  • 3 篇 dep. of computer...
  • 2 篇 school of electr...
  • 2 篇 dep. of industri...

作者

  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 5 篇 mukund bhole
  • 5 篇 thilo sauter
  • 5 篇 wolfgang kastner
  • 4 篇 kastner wolfgang
  • 4 篇 sauter thilo
  • 4 篇 chang ching-lung
  • 4 篇 bhole mukund
  • 4 篇 elke franz
  • 3 篇 mezaris vasileio...
  • 3 篇 tsao yung-chung
  • 3 篇 zezhong zheng
  • 3 篇 tsai yin-te
  • 3 篇 eduard a. jorswi...
  • 3 篇 shengli wang
  • 3 篇 qais al-na'amneh
  • 3 篇 van ossenbruggen...
  • 3 篇 jiang li
  • 3 篇 zhenlu yu

语言

  • 344 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"机构=Dep. Computer Technology Engineering"
349 条 记 录,以下是71-80 订阅
排序:
Challenges and Solutions of 5G technology  4
Challenges and Solutions of 5G Technology
收藏 引用
4th International Iraqi Conference on engineering technology and Their Applications, IICETA 2021
作者: Thabit, Ahmed A. Abd, Bassam H. Alkhayyat, Ahmed Computer Communication Department Al-Rafidain University College Baghdad Iraq University of Technology Baghdad Iraq Dep. of Computer Technical Engineering College of Technical Engineering Islamic University Najaf Iraq
Mobile access innovation is experiencing a progressive change. Every mobile generation witnessed fast and huge execution upgrades. These are proportional with the requests of the massive data increasing over the last ... 详细信息
来源: 评论
A Multivariate Functional Analysis of Inter-Hands Spatiotemporal Coordination in Human Bimanual Tasks and its Implications for Robotics
A Multivariate Functional Analysis of Inter-Hands Spatiotemp...
收藏 引用
International Conference on Autonomous Robots and Agents, ICARA
作者: Marco Baracca Andre Meixner Giuseppe Averta Paolo Salaris Tamim Asfour Matteo Bianchi Dept. of Information Engineering Research Center “E. Piaggio” University of Pisa Pisa Italy Institute for Anthropomatics and Robotics Karlsruhe Institute of Technology Karlsruhe Germany Dep. of Control and Computer Engineering Politecnico di Torino Turin Italy
Dual-arm manipulation is a key enabler for significantly enhancing the interaction between humans and robots, and their capabilities to purposefully shape the surrounding environment. However, the spatiotemporal coord... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management
A Proposed Approach for Risk Planning and Management
收藏 引用
Information technology (ACIT)
作者: Mohammed N. Al Refai Yazan Al-Smadi Adai Al-Momani Zeyad M. Jamhawi Ahmed Ali Otoom Issa Atoum Ahid Yaseen Jafar Ababneh Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Computer Science Applied Science Private University Amman Jordan Department of Cyber Security Applied Science Private University Amman Jordan Software Engineering Department Faculty of Information Technology Philadelphia University Jordan Department of Cyber Security Zarqa University Zarqa Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
3D Integration for Modular Quantum computer based on Diamond Spin Qubits
3D Integration for Modular Quantum Computer based on Diamond...
收藏 引用
IEEE International Conference on Interconnect technology
作者: R. Ishihara J. Hermias S. Neji K. Y. Yu M. van der Maas S. Nur T. Iwai T. Miyatake S. Miyahara K. Kawaguchi S. Sato QuTech Dep. Quantum and Computer Engineering Delft University of Technology Delft The Netherlands Quantum Hardware Project Quantum Laboratory Fujitsu Research Fujitsu Limited Atsugi Japan
Quantum computer chip based on spin qubits in diamond uses modules that are entangled with on-chip optical links. This enables an increased connectivity and a negligible crosstalk and error-rate when the number of qub...
来源: 评论
Next Generation Image Watermarking via Combined DWT-SVD Technique  2
Next Generation Image Watermarking via Combined DWT-SVD Tech...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Na'amneh, Qais Almomani, Ammar Nasayreh, Ahmad Nahar, Khalid M.O. Gharaibeh, Hasan Al Mamlook, Rabia Emhamed Alauthman, Mohammad Applied Science Private University Department Of Cyber Security Amman Jordan School Of Computing Skyline University College P.O. Box 1797 Sharjah United Arab Emirates AlHuson University College AlBalqa Applied University I. T. Department Irbid Jordan Yarmouk University Department Of Computer Sciences Irbid211633 Jordan Yarmouk University Faculty Of Information Technology Computer Sciences Irbid211633 Jordan Trine University Dep. Of Business Administration IN United States University Of Zawia Dep.of Mechanical And Industrial Engineering Tripoli Libya University Of Petra Faculty Of Information Technology Department Of Information Security Amman Jordan
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte... 详细信息
来源: 评论
Stabilization of THz waves using chaos supremacy
Stabilization of THz waves using chaos supremacy
收藏 引用
2023 International Conference on Smart-Green technology in Electrical and Information Systems, ICSGTEIS 2023
作者: Kuwashima, Fumiyoshi Jarrahi, Mona Cakmakyapan, Semih Wada, Kenji Haraguchi, Masanobu Kawakami, Yuki Moriyasu, Takeshi Morikawa, Osamu Kurihara, Kazuyoshi Kitahara, Hideaki Furuya, Takashi Nakajima, Makoto Tani, Masahiko Fukui University of Technology Dep. of Electr. and Electron. Eng. Fukui Japan Ucla Electrical and Computer Eng. Los AngelesCA90095 United States Osaka Metropolitan University Dep. of Physics and Electronics Osaka Japan Tokushima Univ. Industrial and Social Science Grad. Sch. of Tech. Tokushima Japan Fukui Col. Natl. Inst. of Tech. Dep. of Elec. and Inf. Eng. Fukui Japan University of Fukui Faculty of Engineering Fukui Japan Japan Coast Guard Academy Liberal Arts Kure Japan University. of Fukui School of Education Fukui Japan FIR-UF University of Fukui Fukui Japan Osaka Univ. Inst. of Laser Engineering Osaka Japan
We apply the chaos supremacy of laser chaos system to the high stabilization of THz waves. Stability was demonstrated by down converting the optical beats between laser longitudinal modes in the THz domain to the radi... 详细信息
来源: 评论
Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
Secure Images Transmission Through OFDM System
Secure Images Transmission Through OFDM System
收藏 引用
Computing and Machine Intelligence (ICMI), International Conference on
作者: Jenan Ayad Ahmed Sadiq Basma Makki Zainab Ali Abbood Hanan j. Abdulkareem Zaid Khudhur Hussein Computer Technology Engineering dep Al-Esraa University College Baghdad Iraq Medical Instrumentation Technical Engineering dep. Al-Esraa University College Baghdad Iraq
OFDM (Orthogonal Frequency Division Multiplexing) Next-generation wireless communication networks rely heavily on the OFDM system to transmit digital information in a more effective method as well as other traditional... 详细信息
来源: 评论
Speech Emotion Recognition using Supervised Deep Recurrent System for Mental Health Monitoring
arXiv
收藏 引用
arXiv 2022年
作者: Elsayed, Nelly ElSayed, Zag Asadizanjani, Navid Ozer, Murat Abdelgawad, Ahmed Bayoumi, Magdy School of Information Technology University of Cincinnati OH United States Dep. of Electrical & Computer Engineering University of Florida FL United States School of Engineering and Technology Central Michigan University MI United States Dep. of Electrical & Computer Engineering University of Louisiana at Lafayette LA United States
Understanding human behavior and monitoring mental health are essential to maintaining the community and society's safety. As there has been an increase in mental health problems during the COVID-19 pandemic due t... 详细信息
来源: 评论
Speech Emotion Recognition Using Deep Learning Techniques and Augmented Features
Speech Emotion Recognition Using Deep Learning Techniques an...
收藏 引用
International Conference on Electrical engineering, computer Science and Informatics (EECSI)
作者: Shahed Mohammadi Niloufar Hemati Ali Hashemi Haniye Zandiye Computer Science & Systems Engineering Dep. Ayandegan University Mazandaran Iran Islamic Azad University Central Tehran Branch Tehran Iran Qom University of Technology Qom Iran
This paper presents a study on speech emotion recognition using deep learning techniques. The focus is on utilizing the Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS) and the Toronto Emotional Sp...
来源: 评论