咨询与建议

限定检索结果

文献类型

  • 491 篇 会议
  • 121 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 614 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 374 篇 工学
    • 268 篇 计算机科学与技术...
    • 219 篇 软件工程
    • 96 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 50 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 33 篇 生物工程
    • 29 篇 仪器科学与技术
    • 26 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 21 篇 光学工程
    • 19 篇 动力工程及工程热...
    • 19 篇 化学工程与技术
    • 14 篇 交通运输工程
    • 13 篇 材料科学与工程(可...
    • 12 篇 建筑学
    • 12 篇 安全科学与工程
  • 183 篇 理学
    • 88 篇 数学
    • 54 篇 物理学
    • 41 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 21 篇 化学
  • 111 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 45 篇 工商管理
    • 42 篇 图书情报与档案管...
  • 21 篇 医学
    • 20 篇 基础医学(可授医学...
    • 19 篇 临床医学
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 18 篇 internet of thin...
  • 15 篇 feature extracti...
  • 14 篇 computational mo...
  • 12 篇 convolutional ne...
  • 11 篇 accuracy
  • 9 篇 computer archite...
  • 9 篇 machine learning
  • 9 篇 software
  • 8 篇 bandwidth
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 predictive model...
  • 7 篇 complexity theor...
  • 6 篇 computer science
  • 6 篇 reliability

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 zarqa university...
  • 4 篇 institute of com...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 587 篇 英文
  • 19 篇 其他
  • 7 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Engineering and Computer Science"
614 条 记 录,以下是11-20 订阅
排序:
DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW  4
DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Abitova, Gulnara A. Manap, Abu Said Kulniyaziva, Korlan Nikulin, Vladimir Dep. of Electrical Engineering and Computer Science Dep. of Computer Engineering State University of New York Astana IT University BinghamtonNY United States Astana Kazakhstan Astana IT University Astana Kazakhstan Dep.of System analysis and management L.N. Gumilyov Eurasian National University Astana Kazakhstan Dep. of Electrical Engineering and Computer Science Binghamton University BinghamtonNY United States
In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography for design of an advanced tools and techniques for secure ... 详细信息
来源: 评论
Blockchain Enabled Secure Agri-Goods Traceability using RFID in Supply Chain Management  3
Blockchain Enabled Secure Agri-Goods Traceability using RFID...
收藏 引用
3rd International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2023
作者: Muthu, S. Esakki Kartheeban, K. Kalasalingam Academy of Research and Education Dep. of Computer Science and Engineering Srivilliputtur India
Supply chain is the universal link network to deliver the product from one place to another. Capability to trace and track the Agri-goods products is very important throughout various stages of the supplychain includi... 详细信息
来源: 评论
Feature Selection for Robust Spoofing Detection: A Chi-Square-based Machine Learning Approach  2
Feature Selection for Robust Spoofing Detection: A Chi-Squar...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Al-Na'amneh, Qais Aljaidi, Mohammad Gharaibeh, Hasan Nasayreh, Ahmad Emhamed Al Mamlook, Rabia Almatarneh, Sattam Alzu'bi, Dalia Suliman Husien, Abla Applied Science Private University Dep. of Cyber Security Amman Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Yarmouk University Dep. Computer Science Irbid Jordan Trine University Dep. of Business Administration Indiana United States University of Zawia Department of Industrial Engineering Tripoli Libya Zarqa University Dep. of Data Science and Artificial Intelligence Zarqa Jordan Concordia University Dep. Information and Systems Engineering Montreal Canada
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A 'spoofing attack' refers to a type of cyber-a... 详细信息
来源: 评论
Optimization of Methods for Querying Formal Ontologies in Natural Language Using a Neural Network  16
Optimization of Methods for Querying Formal Ontologies in Na...
收藏 引用
16th International Conference on Knowledge engineering and Ontology Development, KEOD 2024 as part of 16th International Joint Conference on Knowledge Discovery, Knowledge engineering and Knowledge Management, IC3K 2024
作者: Ondo, Anicet Lepetit Capus, Laurence Bousso, Mamadou Dep. of Computer and Software Engineering Laval University QuebecQCG1V 0A6 Canada Dep. Computer Science Iba Der Thiam University Thies967 Senegal
A well-designed ontology must be capable of addressing all the needs it is intended to satisfy. This complex task involves gathering all the potential questions from future users that the ontology should answer in ord... 详细信息
来源: 评论
Logistic Regression Classification for Assessing the Risk of Kidney Tumor  2
Logistic Regression Classification for Assessing the Risk of...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Alzubi, Dalia Al Mamlook, Rabia Emhamed Nasayreh, Ahmad Aljaidi, Mohammad Alazab, Rami Gharaibeh, Hasan Al-Naamneh, Qais Concordia University Dep. Information and Systems Engineering Montreal Canada Trine University Dep. of Business Administration IN United States University Zawia Department of Industrial Engineering Tripoli Libya Yarmouk University Dep. Computer Science Irbid Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Jordan University of Science and Technology Dep. Surgery and Urology Irbid Jordan Applied Science Private University Dep. of Cyber Security Amman Jordan
The kidneys have the important function of filtering waste products and toxins from the blood in the human body. Any problems affecting the kidneys can potentially impact their efficiency and overall function. Kidney ... 详细信息
来源: 评论
A SENSITIVITY ANALYSIS ON THE EFFECT OF HYPERPARAMETERS IN DEEP NEURAL OPERATORS APPLIED TO SOUND PROPAGATION  10
A SENSITIVITY ANALYSIS ON THE EFFECT OF HYPERPARAMETERS IN D...
收藏 引用
10th Convention of the European Acoustics Association, EAA 2023
作者: Borrel-Jensen, Nikolas Engsig-Karup, Allan P. Jeong, Cheol-Ho Technical University of Denmark Dep. of Electrical and Photonics Engineering Denmark Technical University of Denmark Dep. of Applied Mathematics and Computer Science Denmark
Deep neural operators have seen much attention in the scientific machine learning community over the last couple of years due to their capability of efficiently learning the nonlinear operators mapping from input func... 详细信息
来源: 评论
Deep Feature Extraction Framework Based on DNN for Enhancing Mirai Attachment Classification in Machine Learning  2
Deep Feature Extraction Framework Based on DNN for Enhancing...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Gharaibeh, Hasan Aljaidi, Mohammad Nasayreh, Ahmad Al-Na'amneh, Qais Jaradat, Ameera S. Samara, Ghassan Emhamed Al Mamlook, Rabia Yarmouk University Dep. Computer Science Irbid Jordan Zarqa University Dep. of Computer Science Zarqa Jordan Applied Science Private University Dep. of Cyber Security Amman Jordan Dep. of Business Administration Trine University IN United States Department of Mechanical and Industrial Engineering University of Zawia Tripoli Libya
Nowadays, the rapid growth of Internet of Things (IoT) devices has changed many parts of our lives by providing seamless connectivity and automation. However, this expansion has created new challenges and vulnerabilit... 详细信息
来源: 评论
Genetic Optimization Techniques for Enhancing Web Attacks Classification in Machine Learning
Genetic Optimization Techniques for Enhancing Web Attacks Cl...
收藏 引用
2023 IEEE International Conference on dep.ndable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Jaradat, Ameera S. Nasayreh, Ahmad Al-Na'amneh, Qais Gharaibeh, Hasan Al Mamlook, Rabia Emhamed Yarmouk University Dep. of Computer Science Irbid Jordan Yarmouk University Dep. of Computer Science Irbid211633 Jordan Applied Science Private University Dep. of Cyber Security and Cloud Computing Amman Jordan Trine University Dep. of Business Administration IN United States University Zawia Department of Industrial Engineering Tripoli Libya
Web-based applications are now the preferred approach for delivering a variety of services via the Internet. As a result of the globalization of commerce, web applications have been growing quickly and becoming increa... 详细信息
来源: 评论
Biological age estimation from ECG using Artificial Intelligence approaches  2
Biological age estimation from ECG using Artificial Intellig...
收藏 引用
2nd Jordanian International Biomedical engineering Conference, JIBEC 2024
作者: Sleiman, Jana Daher, Mohamad Khalil, Mohamad Diab, Ahmad Kassem, Abdallah Lebanese University Computer and Communications Engineering Tripoli Lebanon Faculty of Science Faculty of Applied Sciences & Technology Dep. of Computer Science Dep. of Computer Science & Information Technology Tripoli Lebanon Lebanese University Electrical Engineering Tripoli Lebanon Lebanese International University Biomedical Engineering Beirut Lebanon Notre Dame University Faculty Of Engineering ECCE Dept. Zouk Mosbeh Lebanon
This paper explores the application of Artificial Intelligence (AI) techniques in healthcare, specifically focusing on electrocardiogram (ECG) data analysis and biological age estimation. The study begins with an over... 详细信息
来源: 评论
Evaluating the Impact of Injected Mobility Data on Measuring Data Coverage in CrowdSensing Scenarios
Evaluating the Impact of Injected Mobility Data on Measuring...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Kocian, Alexander Girolami, Michele Capoccia, Stefano Foschini, Luca Chessa, Stefano University of Bologna Department of Computer Science and Engineering Bologna Italy ISTI-CNR Italian National Council of Research Pisa Italy University of Pisa Dep. of Computer Science Italy
A major weakness of Mobile CrowdSensing Platforms (MCS) is the willingness of users to participate, as this implies disclosing their private data (for example, concerning mobility) to the MCS platform. In the effort t... 详细信息
来源: 评论