咨询与建议

限定检索结果

文献类型

  • 523 篇 会议
  • 144 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 417 篇 工学
    • 278 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 97 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 56 篇 电气工程
    • 50 篇 电子科学与技术(可...
    • 34 篇 生物工程
    • 32 篇 仪器科学与技术
    • 30 篇 化学工程与技术
    • 29 篇 材料科学与工程(可...
    • 27 篇 机械工程
    • 27 篇 生物医学工程(可授...
    • 26 篇 建筑学
    • 23 篇 光学工程
    • 22 篇 动力工程及工程热...
    • 19 篇 土木工程
    • 18 篇 环境科学与工程(可...
    • 17 篇 交通运输工程
  • 215 篇 理学
    • 98 篇 数学
    • 66 篇 物理学
    • 43 篇 生物学
    • 34 篇 统计学(可授理学、...
    • 30 篇 化学
    • 30 篇 系统科学
  • 116 篇 管理学
    • 83 篇 管理科学与工程(可...
    • 46 篇 工商管理
    • 43 篇 图书情报与档案管...
  • 23 篇 医学
    • 21 篇 基础医学(可授医学...
    • 20 篇 临床医学
  • 19 篇 法学
  • 19 篇 农学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 9 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 18 篇 internet of thin...
  • 15 篇 computational mo...
  • 15 篇 feature extracti...
  • 12 篇 convolutional ne...
  • 11 篇 accuracy
  • 10 篇 machine learning
  • 9 篇 computer archite...
  • 9 篇 real-time system...
  • 9 篇 software
  • 8 篇 bandwidth
  • 8 篇 predictive model...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 complexity theor...
  • 6 篇 computer science
  • 6 篇 reliability

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 dep. of civil an...
  • 4 篇 zarqa university...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 639 篇 英文
  • 21 篇 其他
  • 8 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Civil Engineering and Computer Science"
669 条 记 录,以下是31-40 订阅
排序:
A New Implementation of SHA-3 Hash Function Using Seed Value  5
A New Implementation of SHA-3 Hash Function Using Seed Value
收藏 引用
5th International Conference on Information Technology, Applied Mathematics and Statistics, ICITAMS 2023
作者: Kashmar, Ali H. Shihab, Ammar I. Jawad, Wafaa S. University Of Baghdad Dept. Of Computer Science College Of Science Baghdad Iraq Islamic University Of Lebanon Faculty Of Engineering Dep. Of Computer And Communication Beirut Lebanon
This paper aimed to suggest a new Secured Hash Algorithm 3 (SHA-3) with seed value implementation. Seed worth ensuring that there are fewer expectations collisions, despite an attacker selecting the data. Furthermore,... 详细信息
来源: 评论
Enhancing Freezing of Gait Detection in Parkinson’s Through Fine-Tuned Deep Learning Models
Enhancing Freezing of Gait Detection in Parkinson’s Through...
收藏 引用
Digital Health (ICDH), IEEE International Conference on
作者: Michele Tebaldi Graziano Pravadelli Florenc Demrozi Rosalba Giugno Cristian Turetta Dep. of Computer Science University of Verona Italy Dep. of Engineering for Innovation Medicine University of Verona Italy Dep. of Electrical Engineering and Computer Science University of Stavanger Norway
Freezing of Gait (FoG) is a common and disabling symptom in Parkinson’s Disease (PD), characterized by a sudden and temporary inability to initiate or continue walking. FoG arises from various factors such as environ... 详细信息
来源: 评论
Parallel and hierarchically-distributed Shoreline Alert Model (SAM)  31
Parallel and hierarchically-distributed Shoreline Alert Mode...
收藏 引用
31st Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2023
作者: De Vita, Ciro Giuseppe Mellone, Gennaro Florio, Aniello Charles, Catherine Alessandra Torres Di Luccio, Diana Lapegna, Marco Benassai, Guido Budillon, Giorgio Montella, Raffaele University of Naples 'Parthenope' Dep. of Science and Technologies Naples Italy University of Madrid Carlos Iii Dep. of Computer Science and Engineering Madrid Spain University of Naples 'Federico II' Dept. of Mathematics and Applications Naples Italy
In this paper, the Shoreline Alert Model (SAM) is presented as a component of a computation platform based on workflows dedicated to extreme weather/marine event simulation. The model aims to mitigate the effects of g... 详细信息
来源: 评论
Exploring Genetic Programming Models in computer-Aided Diagnosis of Skin Cancer Images  13
Exploring Genetic Programming Models in Computer-Aided Diagn...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Ain, Qurrat Ui Al-Sahaf, Harith Xue, Bing Zhang, Mengjie School of Engineering and Computer Science Victoria University of Wellington PO Box 600 Wellington New Zealand College of Engineering and Info. Technology AlShaab University Dep. of Cybersecurity Engineering Baghdad Iraq
Extracting important information from complex skin lesion images is vital to effectively distinguish between different types of skin cancer images. In addition to providing high classification performance, such comput... 详细信息
来源: 评论
Deep Learning Technique for Real-Time Forest Fire Detection from Video Streams  11
Deep Learning Technique for Real-Time Forest Fire Detection ...
收藏 引用
11th International Conference on Intelligent Systems and Embedded Design, ISED 2023
作者: Gupta, Nidhi Chakravarty, Sujata Dash, Satyabrata Centurion University of Technology & Management Dept. of Computer Science & Engineering Odisha India Gandhi Institute of Technology & Management Gitam Deemed to Be University Dep. of Computer Science and Engineering Andhra Pradesh India
Forest fires are currently the most common issue that we are dealing with. The resources that have been lost are irreplaceable. Forest fires are uncontrollable fires that occur in nature as a result of human involveme... 详细信息
来源: 评论
Comparative Analysis of ML Algorithms for Fraud Detection
Comparative Analysis of ML Algorithms for Fraud Detection
收藏 引用
Smart Information Systems and Technologies (SIST), IEEE International Conference on
作者: Gulnara Abitova Miras Abalkanov Dep. of Eletrical Engineering and Computer Science Dep. of Computer Engineering State University of New York Astana IT University Binghamton NY USA Dep. of Eletrical Engineering and Computer Science Dep. of Computer Engineering State University of New York Astana IT University Astana Kazakhstan Department of Computer Engineeering Astana IT University Astana Kazakhstan
The challenge of credit card fraud presents a significant threat to both consumers and financial institutions alike, leading to substantial economic detriment. In response, this research applies various machine learni... 详细信息
来源: 评论
Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning
arXiv
收藏 引用
arXiv 2024年
作者: Varotto, Matteo Valentin, Stefan Tomasin, Stefano Dep. of Computer Science Darmstadt University of Applied Sciences Germany Dep. of Information Engineering Dep. of Mathematics University of Padova Italy
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or ... 详细信息
来源: 评论
Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning
Detecting 5G Signal Jammers Using Spectrograms with Supervis...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Matteo Varotto Stefan Valentin Stefano Tomasin Dep. of Computer Science Darmstadt University of Applied Sciences Germany Dep. of Information Engineering Dep. of Mathematics University of Padova Italy
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or ... 详细信息
来源: 评论
A Region-Wide Cost-Benefit Assessment of Residential V2G Participation in Demand Response
A Region-Wide Cost-Benefit Assessment of Residential V2G Par...
收藏 引用
Canadian Conference on Electrical and computer engineering (CCECE)
作者: Khunsha Nasr Hany Farag Shivam Saxena Dep. Of Electrical Engineering and Computer Science York University Toronto Canada Dep. Of Electrical Engineering and Computer Engineering University of New Brunswick Fredericton Canada
Participation of Electric Vehicles (EVs) in providing grid services is becoming popular for the economic benefits to their stakeholders, i.e., Local Distribution Companies (LDCs), ratepayers, and EV owners. Battery El... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management  25
A Proposed Approach for Risk Planning and Management
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Al Refai, Mohammed N. Al-Smadi, Yazan Al-Momani, Adai Jamhawi, Zeyad M. Otoom, Ahmed Ali Atoum, Issa Yaseen, Ahid Ababneh, Jafar Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Applied Science Private University Department of Computer Science Amman Jordan Applied Science Private University Department of Cyber Security Amman Jordan Philadelphia University Faculty of Information Technology Software Engineering Department Jordan Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论