咨询与建议

限定检索结果

文献类型

  • 491 篇 会议
  • 121 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 614 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 374 篇 工学
    • 268 篇 计算机科学与技术...
    • 219 篇 软件工程
    • 96 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 50 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 33 篇 生物工程
    • 29 篇 仪器科学与技术
    • 26 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 21 篇 光学工程
    • 19 篇 动力工程及工程热...
    • 19 篇 化学工程与技术
    • 14 篇 交通运输工程
    • 13 篇 材料科学与工程(可...
    • 12 篇 建筑学
    • 12 篇 安全科学与工程
  • 183 篇 理学
    • 88 篇 数学
    • 54 篇 物理学
    • 41 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 21 篇 化学
  • 111 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 45 篇 工商管理
    • 42 篇 图书情报与档案管...
  • 21 篇 医学
    • 20 篇 基础医学(可授医学...
    • 19 篇 临床医学
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 18 篇 internet of thin...
  • 15 篇 feature extracti...
  • 14 篇 computational mo...
  • 12 篇 convolutional ne...
  • 11 篇 accuracy
  • 9 篇 computer archite...
  • 9 篇 machine learning
  • 9 篇 software
  • 8 篇 bandwidth
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 predictive model...
  • 7 篇 complexity theor...
  • 6 篇 computer science
  • 6 篇 reliability

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 zarqa university...
  • 4 篇 institute of com...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 587 篇 英文
  • 19 篇 其他
  • 7 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Engineering and Computer Science"
614 条 记 录,以下是51-60 订阅
排序:
CNN-based Human Activity Recognition on Edge Computing Devices
CNN-based Human Activity Recognition on Edge Computing Devic...
收藏 引用
Omni-layer Intelligent Systems (COINS), International Conference on
作者: Amandeep Singh Tiziana Margaria Florenc Demrozi Dep. of Computer Science and Information Systems University of Limerick Ireland Dep. of Electrical Engineering and Computer Science University of Stavanger Norway
Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea...
来源: 评论
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbors, and Support Vector Machines
Detecting 5G Narrowband Jammers with CNN, k-nearest Neighbor...
收藏 引用
IEEE International Workshop on Information Forensics and Security (WIFS)
作者: Matteo Varotto Florian Heinrichs Timo Schürg Stefano Tomasin Stefan Valentin Dep. of Computer Science Darmstadt University of Applied Sciences Germany Dep. of Medical Engineering and Technomathematics FH Aachen University of Applied Sciences Germany Dep. of Information Engineering Dep. of Mathematics University of Padova Italy Sciences Germany
5G cellular networks are particularly vulnerable against narrowband jammers that target specific control sub-channels in the radio signal. One mitigation approach is to detect such jamming attacks with an online obser... 详细信息
来源: 评论
Review of Cloud AI for Real-Time Fraud Detection  10
Review of Cloud AI for Real-Time Fraud Detection
收藏 引用
10th International Conference on Automation, Robotics, and Applications, ICARA 2024
作者: Aabitova, Gulnara Abalkanov, Miras Abitova, Gulnara A. Shuteyeva, Gulnur Aitmukhanbetova, Elvira Kulniyazova, Korlan Astana IT University Dep. Computer Engineeering Astana Kazakhstan State Univerity of New York at Binghamton Dept. Electical Engineering and Computer Science Binghamton United States Eurasian National University Dept. System Anslysis and Managemnt Astana Kazakhstan
The paper presents a comprehensive analysis of the integration of Cloud AI in real-time fraud detection, highlighting significant advancements and practical applications. It is identifying a key challenge such as data... 详细信息
来源: 评论
Usage of Blockchain Technology for Improving computer Security  25
Usage of Blockchain Technology for Improving Computer Securi...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Almomani, Adai Al Refai Mohammed, N. Aburomman, Ahmad Alidmat, Omar Khair Alla Saber, Qotadeh Alshariedeh, Fuad Khouj, Mohammed Zarqa University Department of Computer Science Zarqa Jordan Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Data Science and A Zarqa Jordan Univeristy of Business and Technology Department of Electronic Enginnering Jeddah Saudi Arabia
Cyber threats have grown increasingly sophisticated, surpassing the capabilities of traditional security measures. Blockchain technology, with its decentralized and immutable structure, offers a potential solution to ... 详细信息
来源: 评论
Standardization Review on Non-Terrestrial Networks  39
Standardization Review on Non-Terrestrial Networks
收藏 引用
39th International Conference on Information Networking, ICOIN 2025
作者: Kyung, Yeunwoong Lee, Jaewook Ko, Haneul Oh, Seungmin Lee, Jaehwan Kim, Youngjun Kongju National University Div. of Info. & Comm. Eng Cheonan South Korea Pukyong National University Dep. of Info. and Comm. Engineering Busan South Korea Kyung Hee University Dep. of Electronic Eng Yongin-si South Korea Kongju National University Dep. of Computer Science and Eng Cheonan South Korea Kyungnam University School of Computer Science and Eng Changwon South Korea
As the demand for global connectivity increases, non-terrestrial networks (NTNs), particularly satellite-based systems, have gained significant attention in communication network standardization. The 3rd Generation Pa... 详细信息
来源: 评论
Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices  19
Blockchain-based Device Identity Management with Consensus A...
收藏 引用
19th IEEE Annual Consumer Communications and Networking Conference, CCNC 2022
作者: Mukhandi, Munkenyi Damiao, Francisco Granjal, Jorge Vilela, Joao P. University of Coimbra Cisuc Dep. of Informatics Engineering Coimbra Portugal Pdmfc Lisbon Portugal University of Porto Faculty of Sciences Cracs Inesctec Cisuc Dep. of Computer Science Porto Portugal
To decrease the IoT attack surface and provide protection against security threats such as introduction of fake IoT nodes and identity theft, IoT requires scalable device identity and authentication management. This w... 详细信息
来源: 评论
Design of Technology for Secure File Storage Based on Hybrid Cryptography Methods: Short Overview
Design of Technology for Secure File Storage Based on Hybrid...
收藏 引用
Smart Information Systems and Technologies (SIST), IEEE International Conference on
作者: Gulnara A. Abitova Abu Said Manap Korlan Kulniyaziva Vladimir Nikulin Dep. of Electrical Engineering and Computer Science State University of New York Binghamton NY USA Dep. of Computer Engineering Astana IT University Astana Kazakhstan Master’s Degree Astana IT University Astana Kazakhstan Dep. of System Analysis and Management L.N. Gumilyov Eurasian National University Astana Kazakhstan Dep. of Electrical Engineering and Computer Science Binghamton University Binghamton NY USA
In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography for design of an advanced tools and techniques for secure ... 详细信息
来源: 评论
Performance assessment of low-cost sensors under representative indoor air conditions  17
Performance assessment of low-cost sensors under representat...
收藏 引用
17th International Conference on Indoor Air Quality and Climate, INDOOR AIR 2022
作者: Alonso, Maria Justo Jørgensen, Rikke Bramming Madsen, Henrik Mathisen, Hans Martin NTNU Dep. Energy and Process Engineering Trondheim Norway NTNU Dep. Industrial Economics and Technology Management Trondheim Norway DTU Applied Mathematics and Computer Science Kgs. Lyngby Denmark
Recently many indoor air quality (IAQ) low-cost sensors (LCS) have arrived in the market. Being cost-effective encourages sensor installation in many different situations for IAQ-monitoring and sometimes for control o... 详细信息
来源: 评论
Pollutant correlation analysis in measurements at four classrooms in four Norwegian schools  17
Pollutant correlation analysis in measurements at four class...
收藏 引用
17th International Conference on Indoor Air Quality and Climate, INDOOR AIR 2022
作者: Alonso, Maria Justo Jørgensen, Rikke Bramming Madsen, Henrik Mathisen, Hans Martin Dep. Energy and Process Engineering Trondheim Norway Dep. Industrial Economics and Technology Management Trondheim Norway Technical University of Denmark Applied Mathematics and Computer Science Kgs. Lyngby Denmark
Demand-controlled ventilation (DCV) is often used in school buildings to save energy by modulating the airflow rates based on the demand. However, other pollutants and indoor air parameters may affect health and are n... 详细信息
来源: 评论
Intelligent Recognition of Immune Cells: Analysis and Research  19
Intelligent Recognition of Immune Cells: Analysis and Resear...
收藏 引用
19th IEEE International Conference on e-Business engineering, ICEBE 2023
作者: Li, Chih-En Liu, Wei-Lun Lai, Kun-Yi Chiang, Yu-Hsiang Yan, Xiaowei Chen, Hao-Xiang Li, Hsu-Ching Cheng, Wan-Shu National Kaohsiung University of Science and Technology Department of Electrical Engineering Kaohsiung Taiwan Institute for Systems Biology Seattle Washington United States Providence University Dep. of Computer Science and Information Management Taichung Taiwan
Immunotherapy utilizes the potential of the patient's immune system to fight disease. T-lymphocytes have become the central focus of the immune system in the fight against cancer. One of the fundamental studies in... 详细信息
来源: 评论