咨询与建议

限定检索结果

文献类型

  • 219 篇 会议
  • 84 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 305 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 167 篇 工学
    • 123 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 46 篇 信息与通信工程
    • 31 篇 控制科学与工程
    • 17 篇 仪器科学与技术
    • 16 篇 机械工程
    • 15 篇 电气工程
    • 15 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 9 篇 化学工程与技术
    • 8 篇 环境科学与工程(可...
    • 6 篇 安全科学与工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 交通运输工程
  • 111 篇 理学
    • 51 篇 物理学
    • 39 篇 数学
    • 17 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 8 篇 化学
  • 56 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 26 篇 工商管理
    • 18 篇 图书情报与档案管...
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 1 篇 艺术学

主题

  • 12 篇 internet of thin...
  • 11 篇 computational mo...
  • 9 篇 large hadron col...
  • 9 篇 feature extracti...
  • 9 篇 accuracy
  • 7 篇 proton-proton in...
  • 7 篇 machine learning
  • 6 篇 training
  • 6 篇 convolutional ne...
  • 5 篇 collisions (nucl...
  • 5 篇 wireless communi...
  • 5 篇 authentication
  • 5 篇 higgs bosons
  • 5 篇 cryptography
  • 4 篇 reliability
  • 4 篇 support vector m...
  • 4 篇 computer archite...
  • 4 篇 image segmentati...
  • 4 篇 image edge detec...
  • 4 篇 standard model (...

机构

  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 31 篇 faculté des scie...
  • 31 篇 department of ph...
  • 31 篇 faculty of scien...
  • 31 篇 departamento de ...
  • 31 篇 department of ph...
  • 31 篇 department for p...
  • 31 篇 yerevan physics ...
  • 31 篇 kirchhoff-instit...
  • 31 篇 faculty of pure ...
  • 31 篇 graduate school ...
  • 31 篇 institute of phy...
  • 31 篇 institute of phy...
  • 31 篇 dsm/irfu cea sac...
  • 31 篇 physikalisches i...
  • 31 篇 instituto de fís...
  • 31 篇 physics departme...
  • 31 篇 fakultät für mat...

作者

  • 28 篇 f. buehrer
  • 28 篇 c. alexa
  • 28 篇 j. m. izen
  • 28 篇 s. veneziano
  • 28 篇 m. j. schultens
  • 28 篇 k. bos
  • 28 篇 g. bella
  • 28 篇 j. strandberg
  • 28 篇 d. calvet
  • 28 篇 c. amelung
  • 28 篇 f. pastore
  • 28 篇 e. guido
  • 28 篇 n. orlando
  • 28 篇 h. a. gordon
  • 28 篇 y. tayalati
  • 28 篇 g. spigo
  • 28 篇 v. chiarella
  • 28 篇 f. siegert
  • 28 篇 a. antonov
  • 28 篇 e. hines

语言

  • 297 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Dep. Information Engineering Computer Science and Mathematics"
305 条 记 录,以下是1-10 订阅
Detecting 5G Signal Jammers with Autoencoders Based on Loose Observations
Detecting 5G Signal Jammers with Autoencoders Based on Loose...
收藏 引用
2023 IEEE Globecom Workshops, GC Wkshps 2023
作者: Varotto, Matteo Valentin, Stefan Tomasin, Stefano University of Padova Dep. of Information Engineering Padova Italy Darmstadt University of Applied Sciences Dep. of Computer Science Darmstadt Germany University of Padova Dep. of Information Engineering Dep. of Mathematics Padova Italy
Fifth-generation (5G) networks are prone to jamming attacks, which are particularly dangerous in mission-critical applications such as factory automation. In this paper, we present a simple method to detect jamming at... 详细信息
来源: 评论
CNN-based Human Activity Recognition on Edge Computing Devices
CNN-based Human Activity Recognition on Edge Computing Devic...
收藏 引用
2023 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2023
作者: Singh, Amandeep Margaria, Tiziana Demrozi, Florenc University of Limerick Dep. of Computer Science and Information Systems Ireland University of Stavanger Dep. of Electrical Engineering and Computer Science Norway
Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea... 详细信息
来源: 评论
A Review of Grid-Connected Inverters and Control Methods Under Unbalanced Grid Conditions  16
A Review of Grid-Connected Inverters and Control Methods Und...
收藏 引用
16th Annual Power Electronics, Drive Systems, and Technologies Conference, PEDSTC 2025
作者: Marangalu, Milad Ghavipanjeh Rehman, Fazal Ur Kurkdjian, Naser Vosoughi Computer Queen's University Dep. Of Electrical and Computer Engineering KingstonON Canada University of L'Aquila Dep. Information Engineering Computer Science and Mathematics L'Aquila Italy San Diego State University Faculty of Electrical and Computer Engineering San DiegoCA92182-0001 United States
Grid-connected inverters play a pivotal role in integrating renewable energy sources into modern power systems. However, the presence of unbalanced grid conditions poses significant challenges to the stable operation ... 详细信息
来源: 评论
Traffic sign recognition based on CNN vs different transfer learning techniques  5
Traffic sign recognition based on CNN vs different transfer ...
收藏 引用
5th Symposium on Pattern Recognition and Applications, SPRA 2024
作者: Ghouse, Mohammed Farag, Saber Butt, Usman Engineering and Environment Dep. Northumbria University London United Kingdom Computer and Information Science Dep. British University in Dubai Dubai United Arab Emirates
Traffic sign detection and recognition (TSDR) is a pivotal component of contemporary transportation systems, designed to enhance road safety and operational efficiency. In an era where automation is indispensable, TSD... 详细信息
来源: 评论
A SENSITIVITY ANALYSIS ON THE EFFECT OF HYPERPARAMETERS IN DEEP NEURAL OPERATORS APPLIED TO SOUND PROPAGATION  10
A SENSITIVITY ANALYSIS ON THE EFFECT OF HYPERPARAMETERS IN D...
收藏 引用
10th Convention of the European Acoustics Association, EAA 2023
作者: Borrel-Jensen, Nikolas Engsig-Karup, Allan P. Jeong, Cheol-Ho Technical University of Denmark Dep. of Electrical and Photonics Engineering Denmark Technical University of Denmark Dep. of Applied Mathematics and Computer Science Denmark
Deep neural operators have seen much attention in the scientific machine learning community over the last couple of years due to their capability of efficiently learning the nonlinear operators mapping from input func... 详细信息
来源: 评论
Performance Analysis of Intelligent Reflecting Surfaces for 5G/6G-Enabled Future Smart Industries with a Focus on Millimeter-Wave Band Communications  59
Performance Analysis of Intelligent Reflecting Surfaces for ...
收藏 引用
2024 Annual IEEE International Conference on Communications Workshops, ICC Workshops 2024
作者: Khan, Muhammad Farhan Raza, Ali Iqbal, Adeel Rashid, Adnan Jamshed, Muhammad Ali Pesch, Dirk School of Computer Science and Information Technology University College Cork Cork Ireland Comsats University Islamabad Dep. of Electrical and Computer Engineering Pakistan Yeungnam University Dep. of Info. & Com. Engineering Gyeongsan-si38541 Korea Republic of Politecnico di Bari Dep. of Electrical & Information Engineering Bari Italy James Watt School of Engineering University of Glasgow Glasgow United Kingdom
Industry 4.0's emergence necessitates reliable communication systems. Millimeter-wave (mmWave) communication is a promising solution, but challenges like limited coverage and atmospheric absorption persist. The In... 详细信息
来源: 评论
Feature Selection for Robust Spoofing Detection: A Chi-Square-based Machine Learning Approach  2
Feature Selection for Robust Spoofing Detection: A Chi-Squar...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Al-Na'amneh, Qais Aljaidi, Mohammad Gharaibeh, Hasan Nasayreh, Ahmad Emhamed Al Mamlook, Rabia Almatarneh, Sattam Alzu'bi, Dalia Suliman Husien, Abla Applied Science Private University Dep. of Cyber Security Amman Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Yarmouk University Dep. Computer Science Irbid Jordan Trine University Dep. of Business Administration Indiana United States University of Zawia Department of Industrial Engineering Tripoli Libya Zarqa University Dep. of Data Science and Artificial Intelligence Zarqa Jordan Concordia University Dep. Information and Systems Engineering Montreal Canada
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A 'spoofing attack' refers to a type of cyber-a... 详细信息
来源: 评论
Logistic Regression Classification for Assessing the Risk of Kidney Tumor  2
Logistic Regression Classification for Assessing the Risk of...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Alzubi, Dalia Al Mamlook, Rabia Emhamed Nasayreh, Ahmad Aljaidi, Mohammad Alazab, Rami Gharaibeh, Hasan Al-Naamneh, Qais Concordia University Dep. Information and Systems Engineering Montreal Canada Trine University Dep. of Business Administration IN United States University Zawia Department of Industrial Engineering Tripoli Libya Yarmouk University Dep. Computer Science Irbid Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Jordan University of Science and Technology Dep. Surgery and Urology Irbid Jordan Applied Science Private University Dep. of Cyber Security Amman Jordan
The kidneys have the important function of filtering waste products and toxins from the blood in the human body. Any problems affecting the kidneys can potentially impact their efficiency and overall function. Kidney ... 详细信息
来源: 评论
RF-Based Lightweight Machine Learning for Comprehensive Drone Activity Classification  2
RF-Based Lightweight Machine Learning for Comprehensive Dron...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Alqodah, Mohammed A. Tahsin, Mahdia Omari, Mohammad H. Matalgah, Mustafa M. Harrison, David University of Mississippi Dep. of Electrical & Computer Engineering UniversityMS United States University of Mississippi Dept. of Computer and Information Science UniversityMS United States
The rapid rise of commercially available drones, driven by miniaturization and affordability, has introduced potential security risks alongside numerous societal benefits. While drones serve various industries, their ... 详细信息
来源: 评论
Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning
arXiv
收藏 引用
arXiv 2024年
作者: Varotto, Matteo Valentin, Stefan Tomasin, Stefano Dep. of Computer Science Darmstadt University of Applied Sciences Germany Dep. of Information Engineering Dep. of Mathematics University of Padova Italy
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or ... 详细信息
来源: 评论