咨询与建议

限定检索结果

文献类型

  • 737 篇 会议
  • 193 篇 期刊文献

馆藏范围

  • 930 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 556 篇 工学
    • 404 篇 计算机科学与技术...
    • 332 篇 软件工程
    • 139 篇 信息与通信工程
    • 103 篇 控制科学与工程
    • 66 篇 电气工程
    • 61 篇 电子科学与技术(可...
    • 50 篇 生物工程
    • 39 篇 生物医学工程(可授...
    • 37 篇 机械工程
    • 36 篇 仪器科学与技术
    • 31 篇 光学工程
    • 27 篇 动力工程及工程热...
    • 26 篇 化学工程与技术
    • 20 篇 建筑学
    • 19 篇 安全科学与工程
  • 309 篇 理学
    • 139 篇 数学
    • 116 篇 物理学
    • 60 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 41 篇 系统科学
    • 27 篇 化学
  • 168 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 32 篇 法学
    • 25 篇 社会学
  • 32 篇 医学
    • 29 篇 基础医学(可授医学...
    • 28 篇 临床医学
    • 19 篇 药学(可授医学、理...
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 24 篇 农学
    • 20 篇 作物学
  • 16 篇 教育学
  • 6 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 26 篇 internet of thin...
  • 24 篇 feature extracti...
  • 21 篇 computational mo...
  • 16 篇 accuracy
  • 14 篇 training
  • 12 篇 predictive model...
  • 12 篇 software
  • 12 篇 data models
  • 12 篇 convolutional ne...
  • 11 篇 computer archite...
  • 11 篇 machine learning
  • 10 篇 support vector m...
  • 10 篇 technological in...
  • 9 篇 computer science
  • 9 篇 large hadron col...
  • 9 篇 wireless communi...
  • 9 篇 cameras
  • 9 篇 bandwidth
  • 9 篇 security
  • 9 篇 standards

机构

  • 33 篇 department of ph...
  • 32 篇 department of ph...
  • 32 篇 faculty of scien...
  • 32 篇 departamento de ...
  • 32 篇 department of ph...
  • 32 篇 department for p...
  • 32 篇 yerevan physics ...
  • 32 篇 kirchhoff-instit...
  • 32 篇 faculty of pure ...
  • 32 篇 department of ph...
  • 32 篇 graduate school ...
  • 32 篇 department of ph...
  • 32 篇 institute of phy...
  • 32 篇 institute of phy...
  • 32 篇 dsm/irfu cea sac...
  • 32 篇 physikalisches i...
  • 32 篇 instituto de fís...
  • 32 篇 physics departme...
  • 32 篇 fakultät für mat...
  • 32 篇 nikhef national ...

作者

  • 29 篇 f. buehrer
  • 29 篇 c. alexa
  • 29 篇 j. m. izen
  • 29 篇 s. veneziano
  • 29 篇 m. j. schultens
  • 29 篇 k. bos
  • 29 篇 g. bella
  • 29 篇 j. strandberg
  • 29 篇 d. calvet
  • 29 篇 c. amelung
  • 29 篇 f. pastore
  • 29 篇 e. guido
  • 29 篇 n. orlando
  • 29 篇 h. a. gordon
  • 29 篇 y. tayalati
  • 29 篇 g. spigo
  • 29 篇 v. chiarella
  • 29 篇 f. siegert
  • 29 篇 a. antonov
  • 29 篇 e. hines

语言

  • 906 篇 英文
  • 12 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Information Engineering and Computer Science"
930 条 记 录,以下是91-100 订阅
排序:
Usage of Blockchain Technology for Improving computer Security  25
Usage of Blockchain Technology for Improving Computer Securi...
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Almomani, Adai Al Refai Mohammed, N. Aburomman, Ahmad Alidmat, Omar Khair Alla Saber, Qotadeh Alshariedeh, Fuad Khouj, Mohammed Zarqa University Department of Computer Science Zarqa Jordan Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Data Science and A Zarqa Jordan Univeristy of Business and Technology Department of Electronic Enginnering Jeddah Saudi Arabia
Cyber threats have grown increasingly sophisticated, surpassing the capabilities of traditional security measures. Blockchain technology, with its decentralized and immutable structure, offers a potential solution to ... 详细信息
来源: 评论
Design and Implementation of Minkowski Feature Selection for Machine Learning Techniques
Design and Implementation of Minkowski Feature Selection for...
收藏 引用
information Technology, Applied Mathematics and Statistics (ICITAMS), International Conference on
作者: Ekram Hakim Dhiah Al-Shammary Ahmed M. Mahdi Dep. Computer Science College of computer science and information technology University of Al-Qadisiyah Diwaniyah Iraq
This paper proposes a design and implementation of a highly efficient feature selection based on Minkowski’s mathematical similarity for machine learning. Moreover, the development of the Minkowski feature selection ... 详细信息
来源: 评论
Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices  19
Blockchain-based Device Identity Management with Consensus A...
收藏 引用
19th IEEE Annual Consumer Communications and Networking Conference, CCNC 2022
作者: Mukhandi, Munkenyi Damiao, Francisco Granjal, Jorge Vilela, Joao P. University of Coimbra Cisuc Dep. of Informatics Engineering Coimbra Portugal Pdmfc Lisbon Portugal University of Porto Faculty of Sciences Cracs Inesctec Cisuc Dep. of Computer Science Porto Portugal
To decrease the IoT attack surface and provide protection against security threats such as introduction of fake IoT nodes and identity theft, IoT requires scalable device identity and authentication management. This w... 详细信息
来源: 评论
Enhancing Industrial 4.0 Connectivity: A D2D-Based Algorithm for Blind Spot Mitigation in 5G Future Networks Enabled Smart Industry
Enhancing Industrial 4.0 Connectivity: A D2D-Based Algorithm...
收藏 引用
2023 IEEE Globecom Workshops, GC Wkshps 2023
作者: Khan, Muhammad Farhan Iqbal, Adeel Shakeel, Atif Rashid, Adnan Pesch, Dirk University College Cork Confirm Centre for Smart Manufacturing Cork Ireland Comsats University Islamabad Department of Electrical and Computer Engineering Islamabad Pakistan Politecnico di Bari Dep. of Electrical & Information Engineering Bari Italy
The Industry 4.0 is characterized by the integration of advanced and emerging technologies such as Fifth Generation (5G) and Next-Generation Networks & beyond, Artificial Intelligence (AI), Internet-of- Things (Io... 详细信息
来源: 评论
Performance Analysis of Intelligent Reflecting Surfaces for 5G/6G-Enabled Future Smart Industries with a Focus on Millimeter-Wave Band Communications
Performance Analysis of Intelligent Reflecting Surfaces for ...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Muhammad Farhan Khan Ali Raza Adeel Iqbal Adnan Rashid Muhammad Ali Jamshed Dirk Pesch School of Computer Science and Information Technology University College Cork Cork Ireland Dep. of Electrical and Computer Engineering COMSATS University Islamabad Pakistan Dep. of Info. & Com. Engineering Yeungnam University Gyeongsan-si Republic of Korea Dep. of Electrical & Information Engineering Politecnico di Bari Bari Italy James Watt School of Engineering University of Glasgow Glasgow U.K
Industry 4.0's emergence necessitates reliable communication systems. Millimeter-wave (mmWave) communication is a promising solution, but challenges like limited coverage and atmospheric absorption persist. The In... 详细信息
来源: 评论
Design of Technology for Secure File Storage Based on Hybrid Cryptography Methods: Short Overview
Design of Technology for Secure File Storage Based on Hybrid...
收藏 引用
Smart information Systems and Technologies (SIST), IEEE International Conference on
作者: Gulnara A. Abitova Abu Said Manap Korlan Kulniyaziva Vladimir Nikulin Dep. of Electrical Engineering and Computer Science State University of New York Binghamton NY USA Dep. of Computer Engineering Astana IT University Astana Kazakhstan Master’s Degree Astana IT University Astana Kazakhstan Dep. of System Analysis and Management L.N. Gumilyov Eurasian National University Astana Kazakhstan Dep. of Electrical Engineering and Computer Science Binghamton University Binghamton NY USA
In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography for design of an advanced tools and techniques for secure ... 详细信息
来源: 评论
Performance assessment of low-cost sensors under representative indoor air conditions  17
Performance assessment of low-cost sensors under representat...
收藏 引用
17th International Conference on Indoor Air Quality and Climate, INDOOR AIR 2022
作者: Alonso, Maria Justo Jørgensen, Rikke Bramming Madsen, Henrik Mathisen, Hans Martin NTNU Dep. Energy and Process Engineering Trondheim Norway NTNU Dep. Industrial Economics and Technology Management Trondheim Norway DTU Applied Mathematics and Computer Science Kgs. Lyngby Denmark
Recently many indoor air quality (IAQ) low-cost sensors (LCS) have arrived in the market. Being cost-effective encourages sensor installation in many different situations for IAQ-monitoring and sometimes for control o... 详细信息
来源: 评论
Logistic Regression Classification for Assessing the Risk of Kidney Tumor
Logistic Regression Classification for Assessing the Risk of...
收藏 引用
Electrical, Energy, and Artificial Intelligence (EICEEAI), International engineering Conference on
作者: Dalia Alzu'bi Rabia Emhamed Al Mamlook Ahmad Nasayreh Mohammad Aljaidi Rami AlAzab Hasan Gharaibeh Qais Al-Na'amneh Dep. Information and Systems Engineering Concordia University Montreal Canada Dep. of Business Administration Trine University Indiana USA Department of Industrial Engineering University Zawia Tripoli Libia Dep. Computer Science Yarmouk University Irbid Jordan Dep. of Computer Science Zarqa University Zarqa Jordan Dep. Surgery and Urology Jordan University of Science and Technology Irbid Jordan Dep. of Cyber Security Applied Science Private University Amman Jordan
The kidneys have the important function of filtering waste products and toxins from the blood in the human body. Any problems affecting the kidneys can potentially impact their efficiency and overall function. Kidney ... 详细信息
来源: 评论
Pollutant correlation analysis in measurements at four classrooms in four Norwegian schools  17
Pollutant correlation analysis in measurements at four class...
收藏 引用
17th International Conference on Indoor Air Quality and Climate, INDOOR AIR 2022
作者: Alonso, Maria Justo Jørgensen, Rikke Bramming Madsen, Henrik Mathisen, Hans Martin Dep. Energy and Process Engineering Trondheim Norway Dep. Industrial Economics and Technology Management Trondheim Norway Technical University of Denmark Applied Mathematics and Computer Science Kgs. Lyngby Denmark
Demand-controlled ventilation (DCV) is often used in school buildings to save energy by modulating the airflow rates based on the demand. However, other pollutants and indoor air parameters may affect health and are n... 详细信息
来源: 评论
Secure Password Using EEG-based BrainPrint System: Unlock Smartphone Password Using Brain-computer Interface Technology
Secure Password Using EEG-based BrainPrint System: Unlock Sm...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Alkhyeli, Zuwaina Alshehhi, Ayesha Alhemeiri, Mazna Aldhanhani, Salma Albalushi, Khalil Alnuaimi, Fatima Ali Belkacem, Abdelkader Nasreddine UAE University CIT Dep. Computer Science and Software Engineering Al Ain United Arab Emirates UAE University CIT Dep. Information Systems and Security Al Ain United Arab Emirates United Arab Emirates University CIT Dep. Computer & Network Engineering Al Ain United Arab Emirates Autonomous Robotics Research Center TII Abu Dhabi United Arab Emirates
As security becomes a strong factor in daily activities, finding secure ways to unlock machines and smartphones is a challenge due to hardware limitations and the high risk of hacking. Considering the level of securit... 详细信息
来源: 评论