咨询与建议

限定检索结果

文献类型

  • 219 篇 会议
  • 84 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 305 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 167 篇 工学
    • 123 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 46 篇 信息与通信工程
    • 31 篇 控制科学与工程
    • 17 篇 仪器科学与技术
    • 16 篇 机械工程
    • 15 篇 电气工程
    • 15 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 9 篇 化学工程与技术
    • 8 篇 环境科学与工程(可...
    • 6 篇 安全科学与工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 交通运输工程
  • 111 篇 理学
    • 51 篇 物理学
    • 39 篇 数学
    • 17 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 8 篇 化学
  • 56 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 26 篇 工商管理
    • 18 篇 图书情报与档案管...
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 1 篇 艺术学

主题

  • 12 篇 internet of thin...
  • 11 篇 computational mo...
  • 9 篇 large hadron col...
  • 9 篇 feature extracti...
  • 9 篇 accuracy
  • 7 篇 proton-proton in...
  • 7 篇 machine learning
  • 6 篇 training
  • 6 篇 convolutional ne...
  • 5 篇 collisions (nucl...
  • 5 篇 wireless communi...
  • 5 篇 authentication
  • 5 篇 higgs bosons
  • 5 篇 cryptography
  • 4 篇 reliability
  • 4 篇 support vector m...
  • 4 篇 computer archite...
  • 4 篇 image segmentati...
  • 4 篇 image edge detec...
  • 4 篇 standard model (...

机构

  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 31 篇 faculté des scie...
  • 31 篇 department of ph...
  • 31 篇 faculty of scien...
  • 31 篇 departamento de ...
  • 31 篇 department of ph...
  • 31 篇 department for p...
  • 31 篇 yerevan physics ...
  • 31 篇 kirchhoff-instit...
  • 31 篇 faculty of pure ...
  • 31 篇 graduate school ...
  • 31 篇 institute of phy...
  • 31 篇 institute of phy...
  • 31 篇 dsm/irfu cea sac...
  • 31 篇 physikalisches i...
  • 31 篇 instituto de fís...
  • 31 篇 physics departme...
  • 31 篇 fakultät für mat...

作者

  • 28 篇 f. buehrer
  • 28 篇 c. alexa
  • 28 篇 j. m. izen
  • 28 篇 s. veneziano
  • 28 篇 m. j. schultens
  • 28 篇 k. bos
  • 28 篇 g. bella
  • 28 篇 j. strandberg
  • 28 篇 d. calvet
  • 28 篇 c. amelung
  • 28 篇 f. pastore
  • 28 篇 e. guido
  • 28 篇 n. orlando
  • 28 篇 h. a. gordon
  • 28 篇 y. tayalati
  • 28 篇 g. spigo
  • 28 篇 v. chiarella
  • 28 篇 f. siegert
  • 28 篇 a. antonov
  • 28 篇 e. hines

语言

  • 297 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"机构=Dep. Information Engineering Computer Science and Mathematics"
305 条 记 录,以下是11-20 订阅
排序:
Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning
Detecting 5G Signal Jammers Using Spectrograms with Supervis...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Matteo Varotto Stefan Valentin Stefano Tomasin Dep. of Computer Science Darmstadt University of Applied Sciences Germany Dep. of Information Engineering Dep. of Mathematics University of Padova Italy
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or ... 详细信息
来源: 评论
AI-driven Risk Assessment and Decision-making in Healthcare Applications Using Machine Learning: A Case Study on Customer Twitter Feeds  2
AI-driven Risk Assessment and Decision-making in Healthcare ...
收藏 引用
2nd International Conference on Computational Intelligence and Network Systems, CINS 2024
作者: Darwiesh, Abdelaziz Elhoseny, Mohamed El-Baz, A.H. Atassi, Reem Mathematics Dep. Faculty of Science Damietta University New Damietta Egypt Information Systems Dep. Faculty of Computing and Info University of Sharjah Sharjah United Arab Emirates Computer Science Dep. Faculty of Computers and Artificial Intelligence Damietta University New Damietta Egypt Higher Colleges of Technology Dubai United Arab Emirates
This study presents an AI-driven strategy for enhancing decision-making in healthcare applications by assessing and managing potential risks through the analysis of customer interactions on social media platforms, spe... 详细信息
来源: 评论
Biological age estimation from ECG using Artificial Intelligence approaches  2
Biological age estimation from ECG using Artificial Intellig...
收藏 引用
2nd Jordanian International Biomedical engineering Conference, JIBEC 2024
作者: Sleiman, Jana Daher, Mohamad Khalil, Mohamad Diab, Ahmad Kassem, Abdallah Lebanese University Computer and Communications Engineering Tripoli Lebanon Faculty of Science Faculty of Applied Sciences & Technology Dep. of Computer Science Dep. of Computer Science & Information Technology Tripoli Lebanon Lebanese University Electrical Engineering Tripoli Lebanon Lebanese International University Biomedical Engineering Beirut Lebanon Notre Dame University Faculty Of Engineering ECCE Dept. Zouk Mosbeh Lebanon
This paper explores the application of Artificial Intelligence (AI) techniques in healthcare, specifically focusing on electrocardiogram (ECG) data analysis and biological age estimation. The study begins with an over... 详细信息
来源: 评论
MPI Impact in C+L+S Multiband Transmission Reach
MPI Impact in C+L+S Multiband Transmission Reach
收藏 引用
2024 Photonic Networks and Devices, NETWORKS 2024
作者: Cancela, Luís G. Pires, João O. Instituto de Telecomunicações Dep. Information Science and Technology Iscte Instituto Universitário de Lisboa Portugal Instituto de Telecomunicações Dep. Electrical and Computer Engineering Instituto Superior Técnico Portugal
Multipath interference (MPI) impact is assessed in a C+L+S multiband transmission scenario. For a typical -34 dB/span MPI, transmission reach in the L-band suffers a 20% reach penalty considering the QPSK modulation f... 详细信息
来源: 评论
Lexicon approach for risk analysis in emerging technologies
Lexicon approach for risk analysis in emerging technologies
收藏 引用
2023 International Conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2023
作者: Elhoseny, Mohamed Darwiesh, Abdelaziz El-Baz, A.H. University of Sharjah Faculty of Computing and Informatics Information Systems Dep. Sharjah United Arab Emirates Damietta University Faculty of Science Mathematics Dep. New Damietta Egypt Damietta University Faculty of Computers and Artificial Intelligence Computer Science Dep. New Damietta Egypt
This article proposes a novel methodology to analyze risks in digital currencies. It dep.nds on the perceptions of users in social media to recognize and estimate the potential risks. Besides, it includes utilizing hi... 详细信息
来源: 评论
Lexicon-enhanced machine learning techniques for predicting risks in cryptocurrencies  4
Lexicon-enhanced machine learning techniques for predicting ...
收藏 引用
4th International Conference on Distributed Sensing and Intelligent Systems, ICDSIS 2023
作者: Darwiesh, Abdelaziz Elhoseny, Mohamed El-Baz, A.H. Nour, Mohamed Abdallah Mathematics Dep Faculty of Science Damietta University New Damietta Egypt Information Systems Dep. College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Computer Science Dep. Faculty of Computers and Artificial Intelligence Damietta University New Damietta Egypt
This study presents a new approach to predict cryptocurrencies risks based on social media platform indicators. This method can help cryptocurrency investors in their future decision-making. It utilizes advanced techn... 详细信息
来源: 评论
Parallel and hierarchically-distributed Shoreline Alert Model (SAM)  31
Parallel and hierarchically-distributed Shoreline Alert Mode...
收藏 引用
31st Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2023
作者: De Vita, Ciro Giuseppe Mellone, Gennaro Florio, Aniello Charles, Catherine Alessandra Torres Di Luccio, Diana Lapegna, Marco Benassai, Guido Budillon, Giorgio Montella, Raffaele University of Naples 'Parthenope' Dep. of Science and Technologies Naples Italy University of Madrid Carlos Iii Dep. of Computer Science and Engineering Madrid Spain University of Naples 'Federico II' Dept. of Mathematics and Applications Naples Italy
In this paper, the Shoreline Alert Model (SAM) is presented as a component of a computation platform based on workflows dedicated to extreme weather/marine event simulation. The model aims to mitigate the effects of g... 详细信息
来源: 评论
Fine-Tuning Pre-Trained Models for Automated Analysis of Ophthalmic Imaging in Diagnosing Eye Diseases  24
Fine-Tuning Pre-Trained Models for Automated Analysis of Oph...
收藏 引用
24th International Arab Conference on information Technology, ACIT 2023
作者: Al Mamlook, Rabia Emhamed Nasayreh, Ahmad Gharaibeh, Hasan Aljaidi, Mohammad Al-Na'amneh, Qais Alzu'bi, Dalia Bzizi, Hanin Abdeltawab, Abdelrahman Trine University Dep. of Business Administration Indiana United States University Zawia Department of Industrial Engineering Tripoli Libya Yarmouk University Dep. Computer Science Irbid Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Applied Science Private University Dep. of Cyber Security Amman Jordan Concordia University Dep. Information and Systems Engineering Montreal Canada Western Michigan University Dep of Biomedical Science KalamazooMI49008 United States Bani Sweif University Faculty of Pharmacy Bani Suwayf Egypt
This paper searches into the convergence of such ad-vanced techniques with architectures like DenseNet201, VGG16, InceptionResNetV2, and NasNetMobile. Our focus centers on harnessing deep learning capabilities for the... 详细信息
来源: 评论
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines
arXiv
收藏 引用
arXiv 2024年
作者: Varotto, Matteo Heinrichs, Florian Schürg, Timo Tomasin, Stefano Valentin, Stefan Dep. of Computer Science Darmstadt University of Applied Sciences Germany Dep. of Information Engineering Dep. of Mathematics University of Padova Italy Dep. of Medical Engineering and Technomathematics FH Aachen University of Applied Sciences Germany
5G cellular networks are particularly vulnerable against narrowband jammers that target specific control subchannels in the radio signal. One mitigation approach is to detect such jamming attacks with an online observ... 详细信息
来源: 评论
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbor...
收藏 引用
IEEE International Workshop on information Forensics and Security (WIFS)
作者: Matteo Varotto Florian Heinrichs Timo Schürg Stefano Tomasin Stefan Valentin Dep. of Computer Science Darmstadt University of Applied Sciences Germany Dep. of Medical Engineering and Technomathematics FH Aachen University of Applied Sciences Germany Dep. of Information Engineering Dep. of Mathematics University of Padova Italy Sciences Germany
5G cellular networks are particularly vulnerable against narrowband jammers that target specific control sub-channels in the radio signal. One mitigation approach is to detect such jamming attacks with an online obser... 详细信息
来源: 评论