咨询与建议

限定检索结果

文献类型

  • 738 篇 会议
  • 193 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 556 篇 工学
    • 404 篇 计算机科学与技术...
    • 332 篇 软件工程
    • 139 篇 信息与通信工程
    • 103 篇 控制科学与工程
    • 66 篇 电气工程
    • 61 篇 电子科学与技术(可...
    • 50 篇 生物工程
    • 39 篇 生物医学工程(可授...
    • 37 篇 机械工程
    • 36 篇 仪器科学与技术
    • 31 篇 光学工程
    • 27 篇 动力工程及工程热...
    • 26 篇 化学工程与技术
    • 20 篇 建筑学
    • 19 篇 安全科学与工程
  • 310 篇 理学
    • 140 篇 数学
    • 116 篇 物理学
    • 60 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 41 篇 系统科学
    • 27 篇 化学
  • 168 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 32 篇 法学
    • 25 篇 社会学
  • 32 篇 医学
    • 29 篇 基础医学(可授医学...
    • 28 篇 临床医学
    • 19 篇 药学(可授医学、理...
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 24 篇 农学
    • 20 篇 作物学
  • 16 篇 教育学
  • 6 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 26 篇 internet of thin...
  • 24 篇 feature extracti...
  • 21 篇 computational mo...
  • 16 篇 accuracy
  • 14 篇 training
  • 12 篇 predictive model...
  • 12 篇 software
  • 12 篇 data models
  • 12 篇 convolutional ne...
  • 11 篇 computer archite...
  • 11 篇 machine learning
  • 10 篇 support vector m...
  • 10 篇 technological in...
  • 9 篇 computer science
  • 9 篇 large hadron col...
  • 9 篇 wireless communi...
  • 9 篇 cameras
  • 9 篇 bandwidth
  • 9 篇 security
  • 9 篇 standards

机构

  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 31 篇 faculté des scie...
  • 31 篇 department of ph...
  • 31 篇 faculty of scien...
  • 31 篇 departamento de ...
  • 31 篇 department of ph...
  • 31 篇 department for p...
  • 31 篇 yerevan physics ...
  • 31 篇 kirchhoff-instit...
  • 31 篇 faculty of pure ...
  • 31 篇 graduate school ...
  • 31 篇 institute of phy...
  • 31 篇 institute of phy...
  • 31 篇 dsm/irfu cea sac...
  • 31 篇 physikalisches i...
  • 31 篇 instituto de fís...
  • 31 篇 physics departme...
  • 31 篇 fakultät für mat...

作者

  • 28 篇 f. buehrer
  • 28 篇 c. alexa
  • 28 篇 j. m. izen
  • 28 篇 s. veneziano
  • 28 篇 m. j. schultens
  • 28 篇 k. bos
  • 28 篇 g. bella
  • 28 篇 j. strandberg
  • 28 篇 d. calvet
  • 28 篇 c. amelung
  • 28 篇 f. pastore
  • 28 篇 e. guido
  • 28 篇 n. orlando
  • 28 篇 h. a. gordon
  • 28 篇 y. tayalati
  • 28 篇 g. spigo
  • 28 篇 v. chiarella
  • 28 篇 f. siegert
  • 28 篇 a. antonov
  • 28 篇 e. hines

语言

  • 915 篇 英文
  • 12 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Information Engineering and Computer Science"
939 条 记 录,以下是121-130 订阅
排序:
AI-driven Risk Assessment and Decision-making in Healthcare Applications Using Machine Learning: A Case Study on Customer Twitter Feeds
AI-driven Risk Assessment and Decision-making in Healthcare ...
收藏 引用
Computational Intelligence and Network Systems (CINS), International Conference on
作者: Abdelaziz Darwiesh Mohamed Elhoseny A.H. El-Baz Reem Atassi Mathematics Dep. Faculty of Science Damietta University New Damietta Egypt Information Systems Dep. Faculty of Computing and Info. University of Sharjah Sharjah UAE Computer Science Dep. Faculty of Computers and Artificial Intelligence Damietta University New Damietta Egypt Higher Colleges of Technology Dubai UAE
This study presents an AI-driven strategy for enhancing decision-making in healthcare applications by assessing and managing potential risks through the analysis of customer interactions on social media platforms, spe... 详细信息
来源: 评论
Evaluating the Impact of Injected Mobility Data on Measuring Data Coverage in CrowdSensing Scenarios
Evaluating the Impact of Injected Mobility Data on Measuring...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Alexander Kocian Michele Girolami Stefano Capoccia Luca Foschini Stefano Chessa Dep. of Computer Science University of Pisa Italian National Council of Research ISTI-CNR Pisa Italy Department of Computer Science and Engineering University of Bologna Bologna Italy
A major weakness of Mobile CrowdSensing Platforms (MCS) is the willingness of users to participate, as this implies disclosing their private data (for example, concerning mobility) to the MCS platform. In the effort t... 详细信息
来源: 评论
An Implementation and Design of a Digital Light Switch of Smart-Home Based on MQTT Broker  4
An Implementation and Design of a Digital Light Switch of Sm...
收藏 引用
4th IEEE International Conference on Knowledge Innovation and Invention, ICKII 2021
作者: Tsao, Yung-Chung Wu, Chia-Chun Kuo, Yaw-Wen Tsai, Yin-Te Hsu, Chihcheng Wang, Renjie Chou, Polun Ho, Liulin Li, Chiyang Ko, Chihsheng National Chi Nan University Dep. of Electrical Engineering Puli Taiwan National Quemoy University Dep. of Industrial Engineering and Management Kinmen Taiwan Providence University Dep. of Computer Science and Communication Engineering Taichung Taiwan National Central Univeristy Dep. of Information Management Chung-Li Taiwan College of Science and Technology National Chi Nan University Taiwan
Home appliances are designed and manufactured for the market. Most users find that APPs are installed on smartphones or tablets to control home appliances with individual APP. Even light-bulbs with different brands or... 详细信息
来源: 评论
Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two Nodes
Maximize Leader Election Algorithm Performance in Bi-Directi...
收藏 引用
information Technology (ACIT)
作者: Mohammed N. Al Refai Hamed Fawareh Hamzeh Aljawawdeh Fuad Sameh Alshraiedeh Mohammad Al-quraan Hisham Al-Odat Ahmed Ali Otoom Zeyad M. Jamhawi Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Computer Science Zarqa University Zarqa Jordan Department of Cyber Security Applied Science Private University Amman Jordan Department of Computer Science Applied Science Private University Amman Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
The process of selecting a leader to avoid instability in distributed system network after leader failure is called Leader Election Algorithm (LEA). This process becomes more complicated when it faces intermittent or ... 详细信息
来源: 评论
A MULTIVARIATE COMPLEXITY ANALYSIS OF QUALITATIVE REASONING PROBLEMS
arXiv
收藏 引用
arXiv 2022年
作者: Eriksson, Leif Lagerkvist, Victor Dep. Computer and Information Science LinkÖpings Universitet Sweden
Qualitative reasoning is an important subfield of artificial intelligence where one describes relationships with qualitative, rather than numerical, relations. Many such reasoning tasks, e.g., ALLEN’S INTERVAL ALGEBR... 详细信息
来源: 评论
Lexicon approach for risk analysis in emerging technologies
Lexicon approach for risk analysis in emerging technologies
收藏 引用
Electrical, computer, Communications and Mechatronics engineering (ICECCME), International Conference on
作者: Mohamed Elhoseny Abdelaziz Darwiesh A. H. El-Baz Information Systems Dep. Faculty of Computing and Informatics University of Sharjah Sharjah UAE Mathematics Dep. Faculty of Science Damietta University New Damietta Egypt Computer Science Dep. Faculty of Computers and Artificial Intelligence Damietta University New Damietta Egypt
This article proposes a novel methodology to analyze risks in digital currencies. It dep.nds on the perceptions of users in social media to recognize and estimate the potential risks. Besides, it includes utilizing hi...
来源: 评论
Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
The Correlation Between Architecture Smells, Package Stability and Reusability: A Case Study
The Correlation Between Architecture Smells, Package Stabili...
收藏 引用
sciences and Techniques of Automatic Control and computer engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Mrwan BenIdris Ehab A. Omar Elfallah Marwa Aslam Cheema Mohammed Salah Addin Alsma Tareq Ziad Kadiki Abdelfattah Elbarsha Dep. of Computer Science Faculty of Information Technology University of Benghazi Dept. of Software Engineering Faculty of Information Technology Libyan International Medical University Health Informatics Department Faculty of Public Health University of Benghazi
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue... 详细信息
来源: 评论
Parallel Byzantine fault tolerance method for blockchain
Parallel Byzantine fault tolerance method for blockchain
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Dubey, Kumar Pradyot Gnanaprakasam, C.N. Khan, Ihtiram Raza Sadik, Md Shibli Al-Farhani, Liwa H. Ray, Samrat Department of Computer and Information Science Jagadguru Ram Bhadracharya Divyanga University UP Chitrakoot India Department of Electronics and Instrumentation Engineering St. Joseph’s College of Engineering Tamilnadu Chennai India Computer Science Department Jamia Hamdard Delhi India University of Portsmouth Portsmouth United Kingdom System Analysis Control and Information Processing Dep Academy of Engineering RUDN University Moscow Russia The Institute of Industrial Management Economics and Trade Peter The Great Saint Petersburg Polytechnic University Russia
Enterprise-focused blockchain applications that offer safe, anonymous, and immutable transactions are growing as blockchain technology matures. Traditional blockchain architecture has low performance and scalability, ... 详细信息
来源: 评论
Low-Voltage Stress CI-based Quadratic Boost Converter for Distributed Energy Resources
Low-Voltage Stress CI-based Quadratic Boost Converter for Di...
收藏 引用
Power Electronic and Drive Systems and Technologies Conference (PEDSTC)
作者: Morteza Dezhbord Milad Babalou Sobhan Mohamadian Carlo Cecati Dep. Information Engineering Computer Science and Mathematics University of L’Aquila L’Aquila Italy Dept. Electrical Engineering Shahid Beheshti University Tehran Iran
This research introduces a high step-up DC-DC converter for renewable energy sources (RESs) that has lower voltage stress on its single switch. With one linked coupled inductor (CI), a quadratic boost converter plus a... 详细信息
来源: 评论