咨询与建议

限定检索结果

文献类型

  • 491 篇 会议
  • 121 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 614 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 374 篇 工学
    • 268 篇 计算机科学与技术...
    • 219 篇 软件工程
    • 96 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 50 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 33 篇 生物工程
    • 29 篇 仪器科学与技术
    • 26 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 21 篇 光学工程
    • 19 篇 动力工程及工程热...
    • 19 篇 化学工程与技术
    • 14 篇 交通运输工程
    • 13 篇 材料科学与工程(可...
    • 12 篇 建筑学
    • 12 篇 安全科学与工程
  • 183 篇 理学
    • 88 篇 数学
    • 54 篇 物理学
    • 41 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 21 篇 化学
  • 111 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 45 篇 工商管理
    • 42 篇 图书情报与档案管...
  • 21 篇 医学
    • 20 篇 基础医学(可授医学...
    • 19 篇 临床医学
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 18 篇 internet of thin...
  • 15 篇 feature extracti...
  • 14 篇 computational mo...
  • 12 篇 convolutional ne...
  • 11 篇 accuracy
  • 9 篇 computer archite...
  • 9 篇 machine learning
  • 9 篇 software
  • 8 篇 bandwidth
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 predictive model...
  • 7 篇 complexity theor...
  • 6 篇 computer science
  • 6 篇 reliability

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 zarqa university...
  • 4 篇 institute of com...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 587 篇 英文
  • 19 篇 其他
  • 7 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Engineering and Computer Science"
614 条 记 录,以下是81-90 订阅
排序:
Bayesian Network Structure Discovery Using Antlion Optimization Algorithm.
International Journal of Systematic Innovation
收藏 引用
International Journal of Systematic Innovation 2022年 第1期7卷 46-65页
作者: Awla, Hoshang Qasim Kareem, Shahab Wahhab Mohammed, Amin Salih Computer science department Faculty of Science Soran University Erbil Iraq Dep. of Technical Information Systems Engineering Erbil Technical Engineering College Erbil Poly-technic University Erbil Iraq Department of Information Technology College of Engineering and Computer Science Lebanese French University Kurdistan Region Erbil Iraq
Bayesian networks have recently been used for discovering an optimal learning structure in machine learning. Bayes networks can describe possible dep.ndencies of explanatory variables. As a novel approach to studying ... 详细信息
来源: 评论
Machine Learning-Enhanced Standard Deviation to Detect and Handle of Outlier in the 3D Point-Cloud Data
Machine Learning-Enhanced Standard Deviation to Detect and H...
收藏 引用
7th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2025
作者: Tanhatalab, Mohammad Rasoul Forrer, Manuel Nelz, Michael Trento University Dep. of Information Engineering and Computer Science Italy Ferrisol Co Graz Austria Nelo Intelligence Eichenau Germany
Outlier removal is an important step in 3D point cloud data processing. Various methodologies for outlier removal will be analyzed shortly in this paper by describing a range of statistical and machine-learning techni... 详细信息
来源: 评论
Machine Learning-Enhanced Standard Deviation to Detect and Handle of Outlier in the 3D Point-Cloud Data
Machine Learning-Enhanced Standard Deviation to Detect and H...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Mohammad Rasoul Tanhatalab Manuel Forrer Michael Nelz Dep. of Information Engineering and Computer Science Trento University Italy ferrisol Co Graz Austria Nelo Intelligence Eichenau Germany
Outlier removal is an important step in 3D point cloud data processing. Various methodologies for outlier removal will be analyzed shortly in this paper by describing a range of statistical and machine-learning techni... 详细信息
来源: 评论
An Efficient Quantum cryptanalysis of lightweight hash function - PHOTON-Beetle  2
An Efficient Quantum cryptanalysis of lightweight hash funct...
收藏 引用
2nd International Conference on Automation, Computing and Renewable Systems, ICACRS 2023
作者: Allu, Swamy Naidu Tentu, Appala Naidu Kancharla, Gangadhara Rao Dep. of Computer Science & Engineering Acharya Nagarjuna University Andhra Pradesh Guntur522510 India CR Rao AIMSCS UoH Campus Telangana Hyderabad500046 India CR Rao Advanced Institute of Mathematics Statistics and Computer Science University of Hyderabad Campus Telangana Hyderabad500046 India
Quantum cryptanalysis methods are used to crack the majority of symmetric key ciphers. With this knowledge, cryptologists should be able to create post-quantum symmetric ciphers by incorporating these new quantum cryp... 详细信息
来源: 评论
Biological age estimation from ECG using Artificial Intelligence approaches
Biological age estimation from ECG using Artificial Intellig...
收藏 引用
Biomedical engineering Conference (JIBEC), Jordanian International
作者: Jana Sleiman Mohamad Daher Mohamad Khalil Ahmad Diab Abdallah Kassem Computer and Communications Engineering Lebanese University Tripoli Lebanon Dep. of Computer Science/Dep. of Computer Science & Information Technology Faculty of Science/Faculty of Applied Sciences & Technology Tripoli Lebanon Electrical Engineering Lebanese University Tripoli Lebanon Biomedical Engineering Lebanese International University Beirut Lebanon ECCE Dept. Faculty Of Engineering Notre Dame University Zouk Mosbeh Lebanon
This paper explores the application of Artificial Intelligence (AI) techniques in healthcare, specifically focusing on electrocardiogram (ECG) data analysis and biological age estimation. The study begins with an over... 详细信息
来源: 评论
Machine learning algorithms in Bigdata Analysis and its applications: A review  4
Machine learning algorithms in Bigdata Analysis and its appl...
收藏 引用
4th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2022
作者: Khoshaba, Farah Kareem, Shahab Awla, Hoshang Mohammed, Chnar Erbil Polytechnic University Technical Engineering College Information System Engineering Department Erbil Iraq Lebanese French University College of Engineering and Computer Science Dep. of Information Technology Kurdistan Erbil Iraq Soran University College of Science Department of Computer Science Erbil Iraq
A wide range of disparate variety of heterogeneous and even disparate data sources has been integrated into the computer science research principles through the assistance of Artificial Intelligence (AI) and Machine L... 详细信息
来源: 评论
Secure Password Using EEG-based BrainPrint System: Unlock Smartphone Password Using Brain-computer Interface Technology
Secure Password Using EEG-based BrainPrint System: Unlock Sm...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Alkhyeli, Zuwaina Alshehhi, Ayesha Alhemeiri, Mazna Aldhanhani, Salma Albalushi, Khalil Alnuaimi, Fatima Ali Belkacem, Abdelkader Nasreddine UAE University CIT Dep. Computer Science and Software Engineering Al Ain United Arab Emirates UAE University CIT Dep. Information Systems and Security Al Ain United Arab Emirates United Arab Emirates University CIT Dep. Computer & Network Engineering Al Ain United Arab Emirates Autonomous Robotics Research Center TII Abu Dhabi United Arab Emirates
As security becomes a strong factor in daily activities, finding secure ways to unlock machines and smartphones is a challenge due to hardware limitations and the high risk of hacking. Considering the level of securit... 详细信息
来源: 评论
Development of an Electricity Loop Current Monitor System Based on MQTT Broker
Development of an Electricity Loop Current Monitor System Ba...
收藏 引用
2021 IEEE International Conference on Electronic Communications, Internet of Things and Big Data, ICEIB 2021
作者: Tsao, Yung-Chung Kuo, Yaw-Wen Wu, Chia-Chun Tsai, Yin-Te Hsu, Chih-Cheng National Chi Nan University Dep. of Electrical Engineering Taiwan National Quemoy University Dep. of Industrial Engineering and Management Taiwan Providence University Dep. of Computer Science and Communication Engineering Taiwan National Central University Dep. of Information Management Taiwan
The energy monitoring system is always a critical and popular issue for a long time, although many information systems have been built and dep.oyed into schools, factories, schools, commercial organizations, and gover... 详细信息
来源: 评论
Evaluating the Impact of Injected Mobility Data on Measuring Data Coverage in CrowdSensing Scenarios
Evaluating the Impact of Injected Mobility Data on Measuring...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Alexander Kocian Michele Girolami Stefano Capoccia Luca Foschini Stefano Chessa Dep. of Computer Science University of Pisa Italian National Council of Research ISTI-CNR Pisa Italy Department of Computer Science and Engineering University of Bologna Bologna Italy
A major weakness of Mobile CrowdSensing Platforms (MCS) is the willingness of users to participate, as this implies disclosing their private data (for example, concerning mobility) to the MCS platform. In the effort t... 详细信息
来源: 评论
Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two Nodes
Maximize Leader Election Algorithm Performance in Bi-Directi...
收藏 引用
Information Technology (ACIT)
作者: Mohammed N. Al Refai Hamed Fawareh Hamzeh Aljawawdeh Fuad Sameh Alshraiedeh Mohammad Al-quraan Hisham Al-Odat Ahmed Ali Otoom Zeyad M. Jamhawi Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Computer Science Zarqa University Zarqa Jordan Department of Cyber Security Applied Science Private University Amman Jordan Department of Computer Science Applied Science Private University Amman Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
The process of selecting a leader to avoid instability in distributed system network after leader failure is called Leader Election Algorithm (LEA). This process becomes more complicated when it faces intermittent or ... 详细信息
来源: 评论