咨询与建议

限定检索结果

文献类型

  • 534 篇 会议
  • 106 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 645 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 402 篇 工学
    • 266 篇 计算机科学与技术...
    • 212 篇 软件工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 57 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物工程
    • 22 篇 光学工程
    • 21 篇 化学工程与技术
    • 20 篇 动力工程及工程热...
    • 19 篇 仪器科学与技术
    • 19 篇 材料科学与工程(可...
    • 16 篇 力学(可授工学、理...
    • 16 篇 生物医学工程(可授...
    • 13 篇 交通运输工程
    • 10 篇 农业工程
  • 205 篇 理学
    • 112 篇 数学
    • 61 篇 物理学
    • 31 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 16 篇 化学
  • 112 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 15 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 农学
  • 11 篇 法学
    • 10 篇 社会学
  • 8 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 19 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 training
  • 12 篇 computer archite...
  • 10 篇 data mining
  • 10 篇 computational mo...
  • 9 篇 wireless communi...
  • 9 篇 real-time system...
  • 9 篇 software
  • 9 篇 technological in...
  • 8 篇 wireless sensor ...
  • 8 篇 predictive model...
  • 8 篇 genetic algorith...
  • 8 篇 topology
  • 8 篇 mathematical mod...
  • 8 篇 data models
  • 7 篇 fuzzy logic
  • 7 篇 reliability
  • 7 篇 educational inst...

机构

  • 8 篇 dep. of mathemat...
  • 7 篇 dep. of electric...
  • 7 篇 institute of com...
  • 6 篇 department of co...
  • 5 篇 university of ag...
  • 5 篇 kristiania unive...
  • 5 篇 tu wien inst. of...
  • 5 篇 school of inform...
  • 5 篇 advanced researc...
  • 4 篇 dep. of computer...
  • 4 篇 institute of com...
  • 4 篇 king mongkut's u...
  • 3 篇 dep. of electric...
  • 3 篇 guangxi key labo...
  • 3 篇 department of ma...
  • 3 篇 dep. of computer...
  • 3 篇 applied computer...
  • 3 篇 sichuan institut...
  • 3 篇 fir-uf universit...
  • 3 篇 dep. of integrat...

作者

  • 8 篇 arani elahe
  • 8 篇 zonooz bahram
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 thilo sauter
  • 6 篇 cerdà-alabern ll...
  • 5 篇 grønli tor-morte...
  • 5 篇 mukund bhole
  • 5 篇 kaindl hermann
  • 5 篇 wolfgang kastner
  • 5 篇 majchrzak tim a.
  • 4 篇 ganokratanaa thi...
  • 4 篇 kastner wolfgang
  • 4 篇 gómez-pulido jua...
  • 4 篇 ignacio rojas
  • 4 篇 vega-rodríguez m...
  • 4 篇 rosa agostinho c...
  • 4 篇 fernandes carlos...
  • 4 篇 sauter thilo
  • 4 篇 mehdi ghatee

语言

  • 634 篇 英文
  • 7 篇 中文
  • 4 篇 其他
检索条件"机构=Dep. of Computer Architecture and Computer Technology"
645 条 记 录,以下是101-110 订阅
排序:
Application of ML algorithms for prediction of the QoT in optical networks with imbalanced and incomplete data  29
Application of ML algorithms for prediction of the QoT in op...
收藏 引用
29th International Conference on Software, Telecommunications and computer Networks, SoftCOM 2021
作者: Cichosz, Pawel Kozdrowski, Stanislaw Sujecki, Slawomir Department of Computer Science Warsaw University of Technology Warsaw Poland Telecommunications and Teleinformatics Dep. University of Science and Technology Wroclaw Poland
Telecommunication optical networks grow steadily in response to increasing traffic. Thus, to accommodate a steady traffic growth, network operators need to increase the number of active optical channels and reconfigur... 详细信息
来源: 评论
Bayesian Network Structure Discovery Using Antlion Optimization Algorithm.
International Journal of Systematic Innovation
收藏 引用
International Journal of Systematic Innovation 2022年 第1期7卷 46-65页
作者: Awla, Hoshang Qasim Kareem, Shahab Wahhab Mohammed, Amin Salih Computer science department Faculty of Science Soran University Erbil Iraq Dep. of Technical Information Systems Engineering Erbil Technical Engineering College Erbil Poly-technic University Erbil Iraq Department of Information Technology College of Engineering and Computer Science Lebanese French University Kurdistan Region Erbil Iraq
Bayesian networks have recently been used for discovering an optimal learning structure in machine learning. Bayes networks can describe possible dep.ndencies of explanatory variables. As a novel approach to studying ... 详细信息
来源: 评论
Internet of Things (IoT): survey of most important security risks
Internet of Things (IoT): survey of most important security ...
收藏 引用
Sciences and Techniques of Automatic Control and computer Engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Ahmed Alaskri Nuredin Ali Salem Ahmed Hala Shaari Software Engineering Dep. Collage of Computer Technology Tripoli Libya Computer Engineering Department Faculty of Engineering Tripoli Libya Web Technologies Department Faculty of Information Tripoli Libya
The Internet of things (IoT) is getting more and more intrusive into our lives until the day comes when everything becomes connected to the Internet. Due to the limited resources and heterogeneous Internet of Things (...
来源: 评论
EEG-Based Stress Assessment During Robot Assisted Surgery. Comparison of Statistical Methods with Machine Learning
EEG-Based Stress Assessment During Robot Assisted Surgery. C...
收藏 引用
Metrology for Extended Reality, Artificial Intelligence and Neural Engineering (MetroXRAINE), IEEE International Conference on
作者: Pasquale Arpaia Irene Del Chicca Matteo De Luca Ludovica Gargiulo Giovanna Mastrati Nicola Moccaldi Elisa Morganti Marco Nalin Mauro Picciafuoco Francesca Pierro Filippo Rigoni Riccardo Rigoni Dep. of Electrical Engineering and Information Technology (DIETI) University of Naples Federico II Naples Italy ab medica S.p.A. Cerro Maggiore MI Italy Dep. of Electronics Information and Bioengineering (DEIB) Polytechnic University of Milan Milan Italy Dep. of Computer Science (D-INFK) ETH Zurich Zurich Switzerland
This study proposes a adaptive pipeline (feature extraction, feature selection, and classification) for the processing of electroencephalographic (EEG) signals to assess Mental Workload (MWL) during training sessions ... 详细信息
来源: 评论
Deep Learning Technique for Real-Time Forest Fire Detection from Video Streams
Deep Learning Technique for Real-Time Forest Fire Detection ...
收藏 引用
Intelligent Systems and Embedded Design (ISED), International Conference on
作者: Nidhi Gupta Sujata Chakravarty Satyabrata Dash Dept. of Computer Science & Engineering Centurion University of Technology & Management Odisha India Dep. of Computer Science and Engineering Gandhi Institute of Technology & Management (GITAM Deemed to be University) Andhra Pradesh India
Forest fires are currently the most common issue that we are dealing with. The resources that have been lost are irreplaceable. Forest fires are uncontrollable fires that occur in nature as a result of human involveme...
来源: 评论
Machine learning algorithms in Bigdata Analysis and its applications: A review  4
Machine learning algorithms in Bigdata Analysis and its appl...
收藏 引用
4th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2022
作者: Khoshaba, Farah Kareem, Shahab Awla, Hoshang Mohammed, Chnar Erbil Polytechnic University Technical Engineering College Information System Engineering Department Erbil Iraq Lebanese French University College of Engineering and Computer Science Dep. of Information Technology Kurdistan Erbil Iraq Soran University College of Science Department of Computer Science Erbil Iraq
A wide range of disparate variety of heterogeneous and even disparate data sources has been integrated into the computer science research principles through the assistance of Artificial Intelligence (AI) and Machine L... 详细信息
来源: 评论
Introduction to the HICSS-56 Software Development for Mobile Devices, the Internet-of-Things, and Cyber-Physical Systems Minitrack
Proceedings of the Annual Hawaii International Conference on...
收藏 引用
Proceedings of the Annual Hawaii International Conference on System Sciences 2023年 2023-January卷 6893-6894页
作者: Majchrzak, Tim A. Grønli, Tor-Morten Kaindl, Hermann University of Agder Kristiansand Norway Kristiania University College Dep. Technology Oslo Norway TU Wien Inst. of Computer Tech. Vienna Austria
来源: 评论
Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
Real-time Control of UGV Robot in Gazebo Simulator using P300-based Brain-computer Interface
Real-time Control of UGV Robot in Gazebo Simulator using P30...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Nuaimi, Fatima Ali Al Zeddoug, Jamal Belkacem, Abdelkader Nasreddine Autonomous Robotics Research Center Technology Innovation Institute Abu Dhabi United Arab Emirates CIT United Arab Emirates University Dep. Computer and Network Engineering Al Ain United Arab Emirates
Brain computer interface (BCI)-based virtual environment control has found broad applications in solving and pursuing factual healthcare issues concerning efficiency, safety, and costs. In this technical paper, an unm... 详细信息
来源: 评论
An analysis of the Oracles used in Ethereum’s blockchain
An analysis of the Oracles used in Ethereum’s blockchain
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Giuseppe Antonio Pierro Honore Mahugnon Dep. of Mathematics and Computer Science University of Cagliari Cagliari Italy National Institute for Research in Digital Science and Technology INRIA Lille France
Smart contracts are programs whose business logic runs in a decentralized architecture named blockchain where each of the executing nodes trusts and agrees with the execution outcomes. Blockchain is an isolated execut... 详细信息
来源: 评论