咨询与建议

限定检索结果

文献类型

  • 550 篇 会议
  • 136 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 688 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 432 篇 工学
    • 305 篇 计算机科学与技术...
    • 249 篇 软件工程
    • 114 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 61 篇 电气工程
    • 59 篇 电子科学与技术(可...
    • 36 篇 生物工程
    • 33 篇 仪器科学与技术
    • 29 篇 生物医学工程(可授...
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 20 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 16 篇 交通运输工程
    • 14 篇 材料科学与工程(可...
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
  • 202 篇 理学
    • 98 篇 数学
    • 60 篇 物理学
    • 44 篇 生物学
    • 32 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 23 篇 化学
  • 124 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 24 篇 医学
    • 23 篇 基础医学(可授医学...
    • 22 篇 临床医学
  • 21 篇 法学
    • 18 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 15 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 15 篇 feature extracti...
  • 14 篇 computational mo...
  • 14 篇 convolutional ne...
  • 12 篇 accuracy
  • 11 篇 computer archite...
  • 9 篇 wireless communi...
  • 9 篇 bandwidth
  • 9 篇 machine learning
  • 9 篇 software
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 deep learning
  • 7 篇 delays
  • 7 篇 cameras
  • 7 篇 5g mobile commun...
  • 7 篇 optimization
  • 7 篇 predictive model...
  • 7 篇 complexity theor...

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 dep. of informat...
  • 6 篇 department of co...
  • 6 篇 kyushu univ dep ...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep of computer ...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 666 篇 英文
  • 12 篇 其他
  • 8 篇 中文
  • 1 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Computer Science and Communication Engineering"
688 条 记 录,以下是91-100 订阅
排序:
Machine Learning-Enhanced Standard Deviation to Detect and Handle of Outlier in the 3D Point-Cloud Data
Machine Learning-Enhanced Standard Deviation to Detect and H...
收藏 引用
International Conference on Artificial Intelligence in Information and communication (ICAIIC)
作者: Mohammad Rasoul Tanhatalab Manuel Forrer Michael Nelz Dep. of Information Engineering and Computer Science Trento University Italy ferrisol Co Graz Austria Nelo Intelligence Eichenau Germany
Outlier removal is an important step in 3D point cloud data processing. Various methodologies for outlier removal will be analyzed shortly in this paper by describing a range of statistical and machine-learning techni... 详细信息
来源: 评论
An Implementation and Design of a Digital Light Switch of Smart-Home Based on MQTT Broker  4
An Implementation and Design of a Digital Light Switch of Sm...
收藏 引用
4th IEEE International Conference on Knowledge Innovation and Invention, ICKII 2021
作者: Tsao, Yung-Chung Wu, Chia-Chun Kuo, Yaw-Wen Tsai, Yin-Te Hsu, Chihcheng Wang, Renjie Chou, Polun Ho, Liulin Li, Chiyang Ko, Chihsheng National Chi Nan University Dep. of Electrical Engineering Puli Taiwan National Quemoy University Dep. of Industrial Engineering and Management Kinmen Taiwan Providence University Dep. of Computer Science and Communication Engineering Taichung Taiwan National Central Univeristy Dep. of Information Management Chung-Li Taiwan College of Science and Technology National Chi Nan University Taiwan
Home appliances are designed and manufactured for the market. Most users find that APPs are installed on smartphones or tablets to control home appliances with individual APP. Even light-bulbs with different brands or... 详细信息
来源: 评论
An Efficient Quantum cryptanalysis of lightweight hash function - PHOTON-Beetle  2
An Efficient Quantum cryptanalysis of lightweight hash funct...
收藏 引用
2nd International Conference on Automation, Computing and Renewable Systems, ICACRS 2023
作者: Allu, Swamy Naidu Tentu, Appala Naidu Kancharla, Gangadhara Rao Dep. of Computer Science & Engineering Acharya Nagarjuna University Andhra Pradesh Guntur522510 India CR Rao AIMSCS UoH Campus Telangana Hyderabad500046 India CR Rao Advanced Institute of Mathematics Statistics and Computer Science University of Hyderabad Campus Telangana Hyderabad500046 India
Quantum cryptanalysis methods are used to crack the majority of symmetric key ciphers. With this knowledge, cryptologists should be able to create post-quantum symmetric ciphers by incorporating these new quantum cryp... 详细信息
来源: 评论
Biological age estimation from ECG using Artificial Intelligence approaches
Biological age estimation from ECG using Artificial Intellig...
收藏 引用
Biomedical engineering Conference (JIBEC), Jordanian International
作者: Jana Sleiman Mohamad Daher Mohamad Khalil Ahmad Diab Abdallah Kassem Computer and Communications Engineering Lebanese University Tripoli Lebanon Dep. of Computer Science/Dep. of Computer Science & Information Technology Faculty of Science/Faculty of Applied Sciences & Technology Tripoli Lebanon Electrical Engineering Lebanese University Tripoli Lebanon Biomedical Engineering Lebanese International University Beirut Lebanon ECCE Dept. Faculty Of Engineering Notre Dame University Zouk Mosbeh Lebanon
This paper explores the application of Artificial Intelligence (AI) techniques in healthcare, specifically focusing on electrocardiogram (ECG) data analysis and biological age estimation. The study begins with an over... 详细信息
来源: 评论
Machine learning algorithms in Bigdata Analysis and its applications: A review  4
Machine learning algorithms in Bigdata Analysis and its appl...
收藏 引用
4th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2022
作者: Khoshaba, Farah Kareem, Shahab Awla, Hoshang Mohammed, Chnar Erbil Polytechnic University Technical Engineering College Information System Engineering Department Erbil Iraq Lebanese French University College of Engineering and Computer Science Dep. of Information Technology Kurdistan Erbil Iraq Soran University College of Science Department of Computer Science Erbil Iraq
A wide range of disparate variety of heterogeneous and even disparate data sources has been integrated into the computer science research principles through the assistance of Artificial Intelligence (AI) and Machine L... 详细信息
来源: 评论
Secure Password Using EEG-based BrainPrint System: Unlock Smartphone Password Using Brain-computer Interface Technology
Secure Password Using EEG-based BrainPrint System: Unlock Sm...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Alkhyeli, Zuwaina Alshehhi, Ayesha Alhemeiri, Mazna Aldhanhani, Salma Albalushi, Khalil Alnuaimi, Fatima Ali Belkacem, Abdelkader Nasreddine UAE University CIT Dep. Computer Science and Software Engineering Al Ain United Arab Emirates UAE University CIT Dep. Information Systems and Security Al Ain United Arab Emirates United Arab Emirates University CIT Dep. Computer & Network Engineering Al Ain United Arab Emirates Autonomous Robotics Research Center TII Abu Dhabi United Arab Emirates
As security becomes a strong factor in daily activities, finding secure ways to unlock machines and smartphones is a challenge due to hardware limitations and the high risk of hacking. Considering the level of securit... 详细信息
来源: 评论
Evaluating the Impact of Injected Mobility Data on Measuring Data Coverage in CrowdSensing Scenarios
Evaluating the Impact of Injected Mobility Data on Measuring...
收藏 引用
IEEE Conference on Global communications (GLOBECOM)
作者: Alexander Kocian Michele Girolami Stefano Capoccia Luca Foschini Stefano Chessa Dep. of Computer Science University of Pisa Italian National Council of Research ISTI-CNR Pisa Italy Department of Computer Science and Engineering University of Bologna Bologna Italy
A major weakness of Mobile CrowdSensing Platforms (MCS) is the willingness of users to participate, as this implies disclosing their private data (for example, concerning mobility) to the MCS platform. In the effort t... 详细信息
来源: 评论
Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two Nodes
Maximize Leader Election Algorithm Performance in Bi-Directi...
收藏 引用
Information Technology (ACIT)
作者: Mohammed N. Al Refai Hamed Fawareh Hamzeh Aljawawdeh Fuad Sameh Alshraiedeh Mohammad Al-quraan Hisham Al-Odat Ahmed Ali Otoom Zeyad M. Jamhawi Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Computer Science Zarqa University Zarqa Jordan Department of Cyber Security Applied Science Private University Amman Jordan Department of Computer Science Applied Science Private University Amman Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
The process of selecting a leader to avoid instability in distributed system network after leader failure is called Leader Election Algorithm (LEA). This process becomes more complicated when it faces intermittent or ... 详细信息
来源: 评论
RF-Based Lightweight Machine Learning for Comprehensive Drone Activity Classification
RF-Based Lightweight Machine Learning for Comprehensive Dron...
收藏 引用
Artificial Intelligence, Blockchain, and Internet of Things (AIBThings), IEEE International Conference on
作者: Mohammed A. Alqodah Mahdia Tahsin Mohammad H. Omari Mustafa M. Matalgah David Harrison Dep. of Electrical & Computer Engineering University of Mississippi University MS USA Dept. of Computer and Information Science University of Mississippi University MS USA
The rapid rise of commercially available drones, driven by miniaturization and affordability, has introduced potential security risks alongside numerous societal benefits. While drones serve various industries, their ... 详细信息
来源: 评论
CLIP-VAD: Exploiting Vision-Language Models for Voice Activity Detection
arXiv
收藏 引用
arXiv 2024年
作者: Appiani, Andrea Beyan, Cigdem Dep. of Management Information and Production Engineering University of Bergamo Bergamo Italy Department of Computer Science University of Verona Verona Italy
Voice Activity Detection (VAD) is the process of automatically determining whether a person is speaking and identifying the timing of their speech in an audiovisual data. Traditionally, this task has been tackled by p... 详细信息
来源: 评论