咨询与建议

限定检索结果

文献类型

  • 604 篇 会议
  • 146 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 752 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 303 篇 计算机科学与技术...
    • 251 篇 软件工程
    • 111 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 80 篇 电气工程
    • 70 篇 电子科学与技术(可...
    • 38 篇 仪器科学与技术
    • 36 篇 生物工程
    • 32 篇 机械工程
    • 30 篇 动力工程及工程热...
    • 29 篇 生物医学工程(可授...
    • 27 篇 化学工程与技术
    • 22 篇 光学工程
    • 22 篇 材料科学与工程(可...
    • 19 篇 交通运输工程
    • 16 篇 安全科学与工程
    • 15 篇 建筑学
  • 221 篇 理学
    • 102 篇 数学
    • 70 篇 物理学
    • 48 篇 生物学
    • 34 篇 系统科学
    • 34 篇 统计学(可授理学、...
    • 29 篇 化学
  • 130 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 52 篇 工商管理
    • 44 篇 图书情报与档案管...
  • 24 篇 法学
    • 19 篇 社会学
  • 23 篇 医学
    • 22 篇 基础医学(可授医学...
    • 21 篇 临床医学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 5 篇 文学
  • 2 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 16 篇 computational mo...
  • 16 篇 feature extracti...
  • 14 篇 convolutional ne...
  • 13 篇 computer archite...
  • 13 篇 accuracy
  • 11 篇 wireless communi...
  • 10 篇 real-time system...
  • 10 篇 machine learning
  • 10 篇 mathematical mod...
  • 9 篇 bandwidth
  • 9 篇 predictive model...
  • 9 篇 software
  • 8 篇 security
  • 8 篇 protocols
  • 8 篇 training
  • 7 篇 support vector m...
  • 7 篇 deep learning
  • 7 篇 delays
  • 7 篇 cameras

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 graduate school ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 dep. of informat...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 727 篇 英文
  • 13 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Electronics Engineering and Computer Science"
752 条 记 录,以下是91-100 订阅
排序:
Designing Participatory AI: Creative Professionals' Worries and Expectations about Generative AI
Designing Participatory AI: Creative Professionals' Worries ...
收藏 引用
Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, CHI EA 2023
作者: Inie, Nanna Falk, Jeanette Tanimoto, Steve It University of Copenhagen Copenhagen Denmark Dep. of Artificial Intelligence and Human Interfaces University of Salzburg Salzburg Austria Paul G. Allen School of Computer Science & Engineering University of Washington Seattle United States
Generative AI, i.e., the group of technologies that automatically generate visual or written content based on text prompts, has undergone a leap in complexity and become widely available within just a few years. Such ... 详细信息
来源: 评论
Feature Selection for Robust Spoofing Detection: A Chi-Square-based Machine Learning Approach
Feature Selection for Robust Spoofing Detection: A Chi-Squar...
收藏 引用
Electrical, Energy, and Artificial Intelligence (EICEEAI), International engineering Conference on
作者: Qais Al-Na'amneh Mohammad Aljaidi Hasan Gharaibeh Ahmad Nasayreh Rabia Emhamed Al Mamlook Sattam Almatarneh Dalia Alzu'bi Abla Suliman Husien Dep. of Cyber Security Applied Science Private University Amman Jordan Dep. of Computer Science Zarqa University Zarqa Jordan Dep. Computer Science Yarmouk University Irbid Jordan Dep. of Business Administration Trine University Indiana USA Department of Industrial Engineering University of Zawia Tripoli Libia Dep. of Data Science and Artificial Intelligence Zarqa University Zarqa Jordan Dep. Information and Systems Engineering Concordia University Montreal Canada
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A “spoofing attack” refers to a type of cyber-attack ... 详细信息
来源: 评论
A Bayesian Take on Gaussian Process Networks
arXiv
收藏 引用
arXiv 2023年
作者: Giudice, Enrico Kuipers, Jack Moffa, Giusi Dep. of Mathematics and Computer Science University of Basel Basel Switzerland Dep. of Biosystems Science and Engineering ETH Zurich Basel Switzerland Dep. of Mathematics and Computer Science University of Basel Basel Switzerland Division of Psychiatry University College London London United Kingdom
Gaussian Process Networks (GPNs) are a class of directed graphical models which employ Gaussian processes as priors for the conditional expectation of each variable given its parents in the network. The model allows t... 详细信息
来源: 评论
Deep Feature Extraction Framework Based on DNN for Enhancing Mirai Attachment Classification in Machine Learning
Deep Feature Extraction Framework Based on DNN for Enhancing...
收藏 引用
Electrical, Energy, and Artificial Intelligence (EICEEAI), International engineering Conference on
作者: Hasan Gharaibeh Mohammad Aljaidi Ahmad Nasayreh Qais Al-Na'amneh Ameera S. Jaradat Ghassan Samara Rabia Emhamed Al Mamlook Dep. Computer Science Yarmouk University Irbid Jordan Dep. of Computer Science Zarqa University Zarqa Jordan Dep. of Cyber Security Applied Science Private University Amman Jordan Dep. of Business Administration Trine University Indiana USA Department of Mechanical and Industrial Engineering University of Zawia Tripoli Libia
Nowadays, the rapid growth of Internet of Things (IoT) devices has changed many parts of our lives by providing seamless connectivity and automation. However, this expansion has created new challenges and vulnerabilit... 详细信息
来源: 评论
Bayesian Network Structure Discovery Using Antlion Optimization Algorithm.
International Journal of Systematic Innovation
收藏 引用
International Journal of Systematic Innovation 2022年 第1期7卷 46-65页
作者: Awla, Hoshang Qasim Kareem, Shahab Wahhab Mohammed, Amin Salih Computer science department Faculty of Science Soran University Erbil Iraq Dep. of Technical Information Systems Engineering Erbil Technical Engineering College Erbil Poly-technic University Erbil Iraq Department of Information Technology College of Engineering and Computer Science Lebanese French University Kurdistan Region Erbil Iraq
Bayesian networks have recently been used for discovering an optimal learning structure in machine learning. Bayes networks can describe possible dep.ndencies of explanatory variables. As a novel approach to studying ... 详细信息
来源: 评论
Machine Learning-Enhanced Standard Deviation to Detect and Handle of Outlier in the 3D Point-Cloud Data
Machine Learning-Enhanced Standard Deviation to Detect and H...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Mohammad Rasoul Tanhatalab Manuel Forrer Michael Nelz Dep. of Information Engineering and Computer Science Trento University Italy ferrisol Co Graz Austria Nelo Intelligence Eichenau Germany
Outlier removal is an important step in 3D point cloud data processing. Various methodologies for outlier removal will be analyzed shortly in this paper by describing a range of statistical and machine-learning techni... 详细信息
来源: 评论
An Efficient Quantum cryptanalysis of lightweight hash function - PHOTON-Beetle  2
An Efficient Quantum cryptanalysis of lightweight hash funct...
收藏 引用
2nd International Conference on Automation, Computing and Renewable Systems, ICACRS 2023
作者: Allu, Swamy Naidu Tentu, Appala Naidu Kancharla, Gangadhara Rao Dep. of Computer Science & Engineering Acharya Nagarjuna University Andhra Pradesh Guntur522510 India CR Rao AIMSCS UoH Campus Telangana Hyderabad500046 India CR Rao Advanced Institute of Mathematics Statistics and Computer Science University of Hyderabad Campus Telangana Hyderabad500046 India
Quantum cryptanalysis methods are used to crack the majority of symmetric key ciphers. With this knowledge, cryptologists should be able to create post-quantum symmetric ciphers by incorporating these new quantum cryp... 详细信息
来源: 评论
Machine learning algorithms in Bigdata Analysis and its applications: A review  4
Machine learning algorithms in Bigdata Analysis and its appl...
收藏 引用
4th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2022
作者: Khoshaba, Farah Kareem, Shahab Awla, Hoshang Mohammed, Chnar Erbil Polytechnic University Technical Engineering College Information System Engineering Department Erbil Iraq Lebanese French University College of Engineering and Computer Science Dep. of Information Technology Kurdistan Erbil Iraq Soran University College of Science Department of Computer Science Erbil Iraq
A wide range of disparate variety of heterogeneous and even disparate data sources has been integrated into the computer science research principles through the assistance of Artificial Intelligence (AI) and Machine L... 详细信息
来源: 评论
Biological age estimation from ECG using Artificial Intelligence approaches
Biological age estimation from ECG using Artificial Intellig...
收藏 引用
Biomedical engineering Conference (JIBEC), Jordanian International
作者: Jana Sleiman Mohamad Daher Mohamad Khalil Ahmad Diab Abdallah Kassem Computer and Communications Engineering Lebanese University Tripoli Lebanon Dep. of Computer Science/Dep. of Computer Science & Information Technology Faculty of Science/Faculty of Applied Sciences & Technology Tripoli Lebanon Electrical Engineering Lebanese University Tripoli Lebanon Biomedical Engineering Lebanese International University Beirut Lebanon ECCE Dept. Faculty Of Engineering Notre Dame University Zouk Mosbeh Lebanon
This paper explores the application of Artificial Intelligence (AI) techniques in healthcare, specifically focusing on electrocardiogram (ECG) data analysis and biological age estimation. The study begins with an over... 详细信息
来源: 评论
Secure Password Using EEG-based BrainPrint System: Unlock Smartphone Password Using Brain-computer Interface Technology
Secure Password Using EEG-based BrainPrint System: Unlock Sm...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Alkhyeli, Zuwaina Alshehhi, Ayesha Alhemeiri, Mazna Aldhanhani, Salma Albalushi, Khalil Alnuaimi, Fatima Ali Belkacem, Abdelkader Nasreddine UAE University CIT Dep. Computer Science and Software Engineering Al Ain United Arab Emirates UAE University CIT Dep. Information Systems and Security Al Ain United Arab Emirates United Arab Emirates University CIT Dep. Computer & Network Engineering Al Ain United Arab Emirates Autonomous Robotics Research Center TII Abu Dhabi United Arab Emirates
As security becomes a strong factor in daily activities, finding secure ways to unlock machines and smartphones is a challenge due to hardware limitations and the high risk of hacking. Considering the level of securit... 详细信息
来源: 评论