咨询与建议

限定检索结果

文献类型

  • 604 篇 会议
  • 146 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 752 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 303 篇 计算机科学与技术...
    • 251 篇 软件工程
    • 111 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 80 篇 电气工程
    • 70 篇 电子科学与技术(可...
    • 38 篇 仪器科学与技术
    • 36 篇 生物工程
    • 32 篇 机械工程
    • 30 篇 动力工程及工程热...
    • 29 篇 生物医学工程(可授...
    • 27 篇 化学工程与技术
    • 22 篇 光学工程
    • 22 篇 材料科学与工程(可...
    • 19 篇 交通运输工程
    • 16 篇 安全科学与工程
    • 15 篇 建筑学
  • 221 篇 理学
    • 102 篇 数学
    • 70 篇 物理学
    • 48 篇 生物学
    • 34 篇 系统科学
    • 34 篇 统计学(可授理学、...
    • 29 篇 化学
  • 130 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 52 篇 工商管理
    • 44 篇 图书情报与档案管...
  • 24 篇 法学
    • 19 篇 社会学
  • 23 篇 医学
    • 22 篇 基础医学(可授医学...
    • 21 篇 临床医学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 5 篇 文学
  • 2 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 16 篇 computational mo...
  • 16 篇 feature extracti...
  • 14 篇 convolutional ne...
  • 13 篇 computer archite...
  • 13 篇 accuracy
  • 11 篇 wireless communi...
  • 10 篇 real-time system...
  • 10 篇 machine learning
  • 10 篇 mathematical mod...
  • 9 篇 bandwidth
  • 9 篇 predictive model...
  • 9 篇 software
  • 8 篇 security
  • 8 篇 protocols
  • 8 篇 training
  • 7 篇 support vector m...
  • 7 篇 deep learning
  • 7 篇 delays
  • 7 篇 cameras

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 graduate school ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 dep. of informat...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 727 篇 英文
  • 13 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Electronics Engineering and Computer Science"
752 条 记 录,以下是11-20 订阅
排序:
Detecting 5G Signal Jammers with Autoencoders Based on Loose Observations
Detecting 5G Signal Jammers with Autoencoders Based on Loose...
收藏 引用
2023 IEEE Globecom Workshops, GC Wkshps 2023
作者: Varotto, Matteo Valentin, Stefan Tomasin, Stefano University of Padova Dep. of Information Engineering Padova Italy Darmstadt University of Applied Sciences Dep. of Computer Science Darmstadt Germany University of Padova Dep. of Information Engineering Dep. of Mathematics Padova Italy
Fifth-generation (5G) networks are prone to jamming attacks, which are particularly dangerous in mission-critical applications such as factory automation. In this paper, we present a simple method to detect jamming at... 详细信息
来源: 评论
Investigation of a 7-Axis Suspended Robotic Arm for Automated Spraying System  3
Investigation of a 7-Axis Suspended Robotic Arm for Automate...
收藏 引用
3rd International Conference on Mechatronics and Automation Technology, ICMAT 2024
作者: Liu, Chao-Chung Liu, Jun-Chi Liu, Chao-Shu Dep. of Computer Science ZhaoQing University ZhaoQing526061 China Dep. of Industrial Design National United University Miaoli360301 Taiwan Dep. of Mechanical Engineering National Kaohsiung University of Science and Technology Kaohsiung80778 Taiwan
This study successfully develops a 7-axis suspended robotic arm for an automated spraying system, considering factors such as flexible operation modes, spray area dimensions, workpiece geometry, and the degrees of fre... 详细信息
来源: 评论
Energy Access Assessment Report Focusing on Energy Poverty and Energy Demand for Rwanda  3
Energy Access Assessment Report Focusing on Energy Poverty a...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer engineering, MI-STA 2023
作者: Asiegbu, Adimchinobi Almaktoof, Ali Khalat, Abdurazag Cape Peninsula University of Technology Dep. of Electrical Electronics and Computer Engineering Cape Town South Africa Sabratha University Dep. of Electrical and Electronics Engineering Sabratha Libya
This technical report is a researched document that examines energy access in Rwanda, focusing on energy poverty assessment and energy demand assessment. The key findings and observations can help mitigate the energy ... 详细信息
来源: 评论
A Review of Grid-Connected Inverters and Control Methods Under Unbalanced Grid Conditions  16
A Review of Grid-Connected Inverters and Control Methods Und...
收藏 引用
16th Annual Power electronics, Drive Systems, and Technologies Conference, PEDSTC 2025
作者: Marangalu, Milad Ghavipanjeh Rehman, Fazal Ur Kurkdjian, Naser Vosoughi Computer Queen's University Dep. Of Electrical and Computer Engineering KingstonON Canada University of L'Aquila Dep. Information Engineering Computer Science and Mathematics L'Aquila Italy San Diego State University Faculty of Electrical and Computer Engineering San DiegoCA92182-0001 United States
Grid-connected inverters play a pivotal role in integrating renewable energy sources into modern power systems. However, the presence of unbalanced grid conditions poses significant challenges to the stable operation ... 详细信息
来源: 评论
DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW  4
DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Abitova, Gulnara A. Manap, Abu Said Kulniyaziva, Korlan Nikulin, Vladimir Dep. of Electrical Engineering and Computer Science Dep. of Computer Engineering State University of New York Astana IT University BinghamtonNY United States Astana Kazakhstan Astana IT University Astana Kazakhstan Dep.of System analysis and management L.N. Gumilyov Eurasian National University Astana Kazakhstan Dep. of Electrical Engineering and Computer Science Binghamton University BinghamtonNY United States
In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography for design of an advanced tools and techniques for secure ... 详细信息
来源: 评论
Blockchain Enabled Secure Agri-Goods Traceability using RFID in Supply Chain Management  3
Blockchain Enabled Secure Agri-Goods Traceability using RFID...
收藏 引用
3rd International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2023
作者: Muthu, S. Esakki Kartheeban, K. Kalasalingam Academy of Research and Education Dep. of Computer Science and Engineering Srivilliputtur India
Supply chain is the universal link network to deliver the product from one place to another. Capability to trace and track the Agri-goods products is very important throughout various stages of the supplychain includi... 详细信息
来源: 评论
Feature Selection for Robust Spoofing Detection: A Chi-Square-based Machine Learning Approach  2
Feature Selection for Robust Spoofing Detection: A Chi-Squar...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Al-Na'amneh, Qais Aljaidi, Mohammad Gharaibeh, Hasan Nasayreh, Ahmad Emhamed Al Mamlook, Rabia Almatarneh, Sattam Alzu'bi, Dalia Suliman Husien, Abla Applied Science Private University Dep. of Cyber Security Amman Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Yarmouk University Dep. Computer Science Irbid Jordan Trine University Dep. of Business Administration Indiana United States University of Zawia Department of Industrial Engineering Tripoli Libya Zarqa University Dep. of Data Science and Artificial Intelligence Zarqa Jordan Concordia University Dep. Information and Systems Engineering Montreal Canada
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A 'spoofing attack' refers to a type of cyber-a... 详细信息
来源: 评论
Optimization of Methods for Querying Formal Ontologies in Natural Language Using a Neural Network  16
Optimization of Methods for Querying Formal Ontologies in Na...
收藏 引用
16th International Conference on Knowledge engineering and Ontology Development, KEOD 2024 as part of 16th International Joint Conference on Knowledge Discovery, Knowledge engineering and Knowledge Management, IC3K 2024
作者: Ondo, Anicet Lepetit Capus, Laurence Bousso, Mamadou Dep. of Computer and Software Engineering Laval University QuebecQCG1V 0A6 Canada Dep. Computer Science Iba Der Thiam University Thies967 Senegal
A well-designed ontology must be capable of addressing all the needs it is intended to satisfy. This complex task involves gathering all the potential questions from future users that the ontology should answer in ord... 详细信息
来源: 评论
Logistic Regression Classification for Assessing the Risk of Kidney Tumor  2
Logistic Regression Classification for Assessing the Risk of...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Alzubi, Dalia Al Mamlook, Rabia Emhamed Nasayreh, Ahmad Aljaidi, Mohammad Alazab, Rami Gharaibeh, Hasan Al-Naamneh, Qais Concordia University Dep. Information and Systems Engineering Montreal Canada Trine University Dep. of Business Administration IN United States University Zawia Department of Industrial Engineering Tripoli Libya Yarmouk University Dep. Computer Science Irbid Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Jordan University of Science and Technology Dep. Surgery and Urology Irbid Jordan Applied Science Private University Dep. of Cyber Security Amman Jordan
The kidneys have the important function of filtering waste products and toxins from the blood in the human body. Any problems affecting the kidneys can potentially impact their efficiency and overall function. Kidney ... 详细信息
来源: 评论
A SENSITIVITY ANALYSIS ON THE EFFECT OF HYPERPARAMETERS IN DEEP NEURAL OPERATORS APPLIED TO SOUND PROPAGATION  10
A SENSITIVITY ANALYSIS ON THE EFFECT OF HYPERPARAMETERS IN D...
收藏 引用
10th Convention of the European Acoustics Association, EAA 2023
作者: Borrel-Jensen, Nikolas Engsig-Karup, Allan P. Jeong, Cheol-Ho Technical University of Denmark Dep. of Electrical and Photonics Engineering Denmark Technical University of Denmark Dep. of Applied Mathematics and Computer Science Denmark
Deep neural operators have seen much attention in the scientific machine learning community over the last couple of years due to their capability of efficiently learning the nonlinear operators mapping from input func... 详细信息
来源: 评论