咨询与建议

限定检索结果

文献类型

  • 738 篇 会议
  • 193 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 556 篇 工学
    • 404 篇 计算机科学与技术...
    • 332 篇 软件工程
    • 139 篇 信息与通信工程
    • 103 篇 控制科学与工程
    • 66 篇 电气工程
    • 61 篇 电子科学与技术(可...
    • 50 篇 生物工程
    • 39 篇 生物医学工程(可授...
    • 37 篇 机械工程
    • 36 篇 仪器科学与技术
    • 31 篇 光学工程
    • 27 篇 动力工程及工程热...
    • 26 篇 化学工程与技术
    • 20 篇 建筑学
    • 19 篇 安全科学与工程
  • 310 篇 理学
    • 140 篇 数学
    • 116 篇 物理学
    • 60 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 41 篇 系统科学
    • 27 篇 化学
  • 168 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 32 篇 法学
    • 25 篇 社会学
  • 32 篇 医学
    • 29 篇 基础医学(可授医学...
    • 28 篇 临床医学
    • 19 篇 药学(可授医学、理...
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 24 篇 农学
    • 20 篇 作物学
  • 16 篇 教育学
  • 6 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 26 篇 internet of thin...
  • 24 篇 feature extracti...
  • 21 篇 computational mo...
  • 16 篇 accuracy
  • 14 篇 training
  • 12 篇 predictive model...
  • 12 篇 software
  • 12 篇 data models
  • 12 篇 convolutional ne...
  • 11 篇 computer archite...
  • 11 篇 machine learning
  • 10 篇 support vector m...
  • 10 篇 technological in...
  • 9 篇 computer science
  • 9 篇 large hadron col...
  • 9 篇 wireless communi...
  • 9 篇 cameras
  • 9 篇 bandwidth
  • 9 篇 security
  • 9 篇 standards

机构

  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 32 篇 department of ph...
  • 31 篇 faculté des scie...
  • 31 篇 department of ph...
  • 31 篇 faculty of scien...
  • 31 篇 departamento de ...
  • 31 篇 department of ph...
  • 31 篇 department for p...
  • 31 篇 yerevan physics ...
  • 31 篇 kirchhoff-instit...
  • 31 篇 faculty of pure ...
  • 31 篇 graduate school ...
  • 31 篇 institute of phy...
  • 31 篇 institute of phy...
  • 31 篇 dsm/irfu cea sac...
  • 31 篇 physikalisches i...
  • 31 篇 instituto de fís...
  • 31 篇 physics departme...
  • 31 篇 fakultät für mat...

作者

  • 28 篇 f. buehrer
  • 28 篇 c. alexa
  • 28 篇 j. m. izen
  • 28 篇 s. veneziano
  • 28 篇 m. j. schultens
  • 28 篇 k. bos
  • 28 篇 g. bella
  • 28 篇 j. strandberg
  • 28 篇 d. calvet
  • 28 篇 c. amelung
  • 28 篇 f. pastore
  • 28 篇 e. guido
  • 28 篇 n. orlando
  • 28 篇 h. a. gordon
  • 28 篇 y. tayalati
  • 28 篇 g. spigo
  • 28 篇 v. chiarella
  • 28 篇 f. siegert
  • 28 篇 a. antonov
  • 28 篇 e. hines

语言

  • 915 篇 英文
  • 12 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Information Engineering and Computer Science"
939 条 记 录,以下是31-40 订阅
排序:
Fuzzy Logic-Based Visualization and Interpretation of NDVI Maps  14
Fuzzy Logic-Based Visualization and Interpretation of NDVI M...
收藏 引用
14th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing, WHISPERS 2024
作者: Racoviteanu, Andrei Kazak, Artur Secrieru, Nicolae Ivanovici, Mihai Transilvania University of Brasov Electronics and Computers Dep. Romania Politehnica National University of Science and Technology Applied Electronics and Information Engineering Dep. Bucharest Romania Space Technology Center Technical University of Moldova Chisinau Moldova
Normalized Difference Vegetation Index (NDVI) is widely-used for the monitoring of agriculture crops. Its interpretation is based on thresholds and the colormaps used for the visualization of NDVI maps are discrete. W... 详细信息
来源: 评论
Packet Too Big Detection and its Integration into QUIC  16
Packet Too Big Detection and its Integration into QUIC
收藏 引用
16th International Conference on Signal Processing and Communication System, ICSPCS 2023
作者: Völker, Timo Tuxen, Michael FH Münster University of Applied Sciences Dep. of Electrical Engineering and Computer Science Steinfurt Germany
A communication over an Internet Protocol (IP) based network fails if an endpoint sends packets that are too big to reach their destination and if the sender is unable to detect that. The node on the path that drops t... 详细信息
来源: 评论
One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
arXiv
收藏 引用
arXiv 2024年
作者: Varotto, Matteo Valentin, Stefan Ardizzon, Francesco Marzotto, Samuele Tomasin, Stefano Dep. of Computer Science Darmstadt University of Applied Sciences Germany Dep. of Information Engineering University of Padova Italy
Fifth-generation (5G) mobile networks are vulnerable to jamming attacks that may jeopardize valuable applications such as industry automation. In this paper, we propose to analyze radio signals with a dedicated device... 详细信息
来源: 评论
One-Class Classification as GLRT for Jamming Detection in Private 5G Networks
One-Class Classification as GLRT for Jamming Detection in Pr...
收藏 引用
IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
作者: Matteo Varotto Stefan Valentin Francesco Ardizzon Samuele Marzotto Stefano Tomasin Dep. of Computer Science Darmstadt University of Applied Sciences Germany Dep. of Information Engineering University of Padova Italy
Fifth-generation (5G) mobile networks are vulnerable to jamming attacks that may jeopardize valuable applications such as industry automation. In this paper, we propose to analyze radio signals with a dedicated device... 详细信息
来源: 评论
Studying Risks of Hybrid Reengineering on Air-Transportation Systems Management 'A Case Study on Jordanian Civil Aviation Regulatory Commission (CARC)'  24
Studying Risks of Hybrid Reengineering on Air-Transportation...
收藏 引用
24th International Arab Conference on information Technology, ACIT 2023
作者: Al Refai Mohammed, N. Taani, M.K. Otoom, Ahmed Ali Samara, Ghassan Hanandeh, S.E. Khafajeh, Hayel Zarqa University Software Engineering Dep. Zarqa Jordan Applied Science Private University Cybersecurity and Cloud Computing Dep. Amman Jordan Zarqa University Department of Computer Science Zarqa Jordan Zarqa University Artificial Intelligence Dep. Zarqa Jordan
This study examines decision-making in software re-engineering within businesses, focusing on the challenges and considerations involved. Financial constraints, time, and staff efforts are critical factors in these de... 详细信息
来源: 评论
Lexicon approach for risk analysis in emerging technologies
Lexicon approach for risk analysis in emerging technologies
收藏 引用
2023 International Conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2023
作者: Elhoseny, Mohamed Darwiesh, Abdelaziz El-Baz, A.H. University of Sharjah Faculty of Computing and Informatics Information Systems Dep. Sharjah United Arab Emirates Damietta University Faculty of Science Mathematics Dep. New Damietta Egypt Damietta University Faculty of Computers and Artificial Intelligence Computer Science Dep. New Damietta Egypt
This article proposes a novel methodology to analyze risks in digital currencies. It dep.nds on the perceptions of users in social media to recognize and estimate the potential risks. Besides, it includes utilizing hi... 详细信息
来源: 评论
Hybrid Algorithm for Real-Time Data Forecasting with Density-Based Clustering and Penalty Splines
Hybrid Algorithm for Real-Time Data Forecasting with Density...
收藏 引用
2024 International Conference on Industrial engineering, Applications and Manufacturing, ICIEAM 2024
作者: Kochegurova, Elena Denisov, Vladislav Galkina, Maria Tomsk Polytechnic University Information Systems And Technologies Dep. Tomsk Russia School Of Nuclear Science And Engineering Tomsk Polytechnic University Tomsk Russia
We propose a hybrid forecasting model that includes time series segmentation, which is based on the DBScan clustering algorithm, and a penalty spline. Each step of the hybrid model required modification for real-time ... 详细信息
来源: 评论
Internet of Things (IoT): survey of most important security risks  3
Internet of Things (IoT): survey of most important security ...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer engineering, MI-STA 2023
作者: Alaskri, Ahmed Salem Ahmed, Nuredin Ali Shaari, Hala Collage of Computer Technology Software Engineering Dep. Tripoli Libya Faculty of Engineering Computer Engineering Department Tripoli Libya Faculty of Information Web Technologies Department Tripoli Libya
The Internet of things (IoT) is getting more and more intrusive into our lives until the day comes when everything becomes connected to the Internet. Due to the limited resources and heterogeneous Internet of Things (... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management  25
A Proposed Approach for Risk Planning and Management
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Al Refai, Mohammed N. Al-Smadi, Yazan Al-Momani, Adai Jamhawi, Zeyad M. Otoom, Ahmed Ali Atoum, Issa Yaseen, Ahid Ababneh, Jafar Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Applied Science Private University Department of Computer Science Amman Jordan Applied Science Private University Department of Cyber Security Amman Jordan Philadelphia University Faculty of Information Technology Software Engineering Department Jordan Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two Nodes  25
Maximize Leader Election Algorithm Performance in Bi-Directi...
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Al Refai, Mohammed N. Fawareh, Hamed Aljawawdeh, Hamzeh Alshraiedeh, Fuad Sameh Al-Quraan, Mohammad Al-Odat, Hisham Ali Otoom, Ahmed Jamhawi, Zeyad M. Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Zarqa Jordan Applied Science Private University Department of Cyber Security Amman Jordan Applied Science Private University Department of Computer Science Amman Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
The process of selecting a leader to avoid instability in distributed system network after leader failure is called Leader Election Algorithm (LEA). This process becomes more complicated when it faces intermittent or ... 详细信息
来源: 评论