咨询与建议

限定检索结果

文献类型

  • 1,104 篇 期刊文献
  • 1,051 篇 会议
  • 8 册 图书

馆藏范围

  • 2,163 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,221 篇 工学
    • 418 篇 计算机科学与技术...
    • 316 篇 软件工程
    • 279 篇 电子科学与技术(可...
    • 264 篇 信息与通信工程
    • 190 篇 电气工程
    • 181 篇 控制科学与工程
    • 138 篇 材料科学与工程(可...
    • 121 篇 化学工程与技术
    • 103 篇 动力工程及工程热...
    • 97 篇 机械工程
    • 93 篇 光学工程
    • 83 篇 仪器科学与技术
    • 82 篇 生物工程
    • 56 篇 生物医学工程(可授...
    • 52 篇 力学(可授工学、理...
    • 41 篇 交通运输工程
    • 33 篇 环境科学与工程(可...
  • 802 篇 理学
    • 382 篇 数学
    • 284 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 130 篇 系统科学
    • 120 篇 生物学
    • 103 篇 化学
  • 190 篇 管理学
    • 129 篇 管理科学与工程(可...
    • 58 篇 工商管理
    • 49 篇 图书情报与档案管...
  • 77 篇 医学
    • 49 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 30 篇 公共卫生与预防医...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 29 篇 农学
  • 24 篇 法学
  • 9 篇 文学
  • 7 篇 教育学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 70 篇 signal to noise ...
  • 55 篇 wireless communi...
  • 48 篇 receivers
  • 42 篇 fading
  • 42 篇 relays
  • 41 篇 interference
  • 41 篇 optimization
  • 39 篇 mathematical mod...
  • 34 篇 integral equatio...
  • 33 篇 machine learning
  • 32 篇 cognitive radio
  • 32 篇 accuracy
  • 31 篇 antennas
  • 29 篇 silicon
  • 27 篇 resource managem...
  • 27 篇 computational mo...
  • 26 篇 sensors
  • 25 篇 deep learning
  • 25 篇 radio frequency
  • 24 篇 bit error rate

机构

  • 53 篇 computer electri...
  • 53 篇 computer electri...
  • 49 篇 computer electri...
  • 40 篇 computer electri...
  • 30 篇 computer electri...
  • 30 篇 division of comp...
  • 27 篇 computer electri...
  • 25 篇 division of comp...
  • 24 篇 mathematical and...
  • 24 篇 computer electri...
  • 23 篇 electrical engin...
  • 22 篇 king abdullah ii...
  • 20 篇 school of comput...
  • 19 篇 king abdullah un...
  • 17 篇 applied mathemat...
  • 17 篇 physical science...
  • 17 篇 division of comp...
  • 16 篇 king abdullah un...
  • 16 篇 computer electri...
  • 15 篇 computer electri...

作者

  • 217 篇 mohamed-slim alo...
  • 91 篇 alouini mohamed-...
  • 56 篇 hakan bagci
  • 47 篇 atif shamim
  • 44 篇 jasra ajay
  • 36 篇 zouheir rezki
  • 36 篇 taous-meriem lal...
  • 32 篇 mohammad s. obai...
  • 31 篇 tareq y. al-naff...
  • 29 篇 al-naffouri tare...
  • 28 篇 obaidat mohammad...
  • 28 篇 ferkan yilmaz
  • 26 篇 boon s. ooi
  • 25 篇 khaled n. salama
  • 25 篇 nazek el-atab
  • 24 篇 xin gao
  • 22 篇 ying wu
  • 22 篇 moshkov mikhail
  • 21 篇 basem shihada
  • 21 篇 haskovec jan

语言

  • 1,949 篇 英文
  • 164 篇 其他
  • 49 篇 中文
  • 4 篇 德文
  • 3 篇 法文
检索条件"机构=Electrical and Computer Engineering Program King Abdullah University of Science and Technology"
2163 条 记 录,以下是621-630 订阅
排序:
Chance-Aware Lane Change with High-Level Model Predictive Control Through Curriculum Reinforcement Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yubin Li, Yulin Peng, Zengqi Ghazzai, Hakim Ma, Jun Guangzhou China The Computer Electrical and Mathematical Science and Engineering Division King Abdullah University of Science and Technology Thuwal Saudi Arabia The Division of Emerging Interdisciplinary Areas The Hong Kong University of Science and Technology Hong Kong The HKUST Shenzhen-Hong Kong Collaborative Innovation Research Institute Futian Shenzhen China
Lane change in dense traffic typically requires the recognition of an appropriate opportunity for maneuvers, which remains a challenging problem in self-driving. In this work, we propose a chance-aware lane-change str... 详细信息
来源: 评论
Skyrmion-Magnetic Tunnel Junction Synapse with Mixed Synaptic Plasticity for Neuromorphic Computing
arXiv
收藏 引用
arXiv 2022年
作者: Lone, Aijaz H. Ganguly, Arnab Amara, Selma Das, Gobind Fariborzi, H. Computer Electrical and Mathematical Science and Engineering Division King Abdullah University of Science and Technology Thuwal Saudi Arabia Department of Physics Khalifa University Abu Dhabi12788 United Arab Emirates
Magnetic skyrmion-based data storage and unconventional computing devices have gained increasing attention due to their topological protection, small size, and low driving current. However, skyrmion creation, deletion... 详细信息
来源: 评论
Design and Implementation of a Security Analysis Tool that Detects and Eliminates Code Caves in Windows Applications
Design and Implementation of a Security Analysis Tool that D...
收藏 引用
2021 International Conference on Data Analytics for Business and Industry, ICDABI 2021
作者: Noman, Haitham Ameen Al-Maatouk, Qusay Noman, Sinan Ameen Princess Sumaya University for Technology King Abdullah Ii School of Engineering Amman Jordan School of Technology Kuala Lumpur Malaysia The University of Alabama Graduate School of Computer Science Alabama United States
Process injection techniques on Windows appli-cations are considered a serious threat to software security specialists. The attackers use these techniques to exploit the targeted program or process and take advantage ... 详细信息
来源: 评论
Modern extreme value statistics for Utopian extremes
arXiv
收藏 引用
arXiv 2023年
作者: Richards, Jordan Alotaibi, Noura Cisneros, Daniela Gong, Yan Guerrero, Matheus B. Redondo, Paolo Shao, Xuanjie School of Mathematics University of Edinburgh United Kingdom Statistics Program Computer Electrical and Mathematical Sciences and Engineering Division King Abdullah University of Science and Technology Thuwal Saudi Arabia Harvard School of Public Health BostonMA United States Department of Mathematics California State University FullertonCA United States
Capturing the extremal behaviour of data often requires bespoke marginal and dependence models which are grounded in rigorous asymptotic theory, and hence provide reliable extrapolation into the upper tails of the dat... 详细信息
来源: 评论
On the Particle Approximation of Lagged Feynman-Kac Formulae
arXiv
收藏 引用
arXiv 2024年
作者: Awadelkarim, Elsiddig Caffarel, Michel Moral, Pierre Del Jasra, Ajay Applied Mathematics and Computational Science Program Computer Electrical and Mathematical Sciences and Engineering Division King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia University of Toulouse CNRS-Lab. de Chimie et Physique Quantiques Toulouse31062 France Centre de Recherche Inria Bordeaux Sud-Ouest Talence33405 France School of Data Science The Chinese University Hong Kong Shenzhen China
In this paper we examine the numerical approximation of the limiting invariant measure associated with Feynman-Kac formulae. These are expressed in a discrete time formulation and are associated with a Markov chain an... 详细信息
来源: 评论
Improved lithium-ion battery health prediction with data-based approach
收藏 引用
e-Prime - Advances in electrical engineering, Electronics and Energy 2024年 7卷
作者: Merrouche, Walid Harrou, Fouzi Taghezouit, Bilal Sun, Ying Center for Renewable Energies Development (CDER) Photovoltaic Solar Energy Division Algiers Bouzareah Algeria Computer Electrical and Mathematical Sciences and Engineering (CEMSE) Division King Abdullah University of Science and Technology (KAUST) Thuwal 23955-6900 Saudi Arabia
The accurate modeling and forecasting of Battery State of Health (SOH) is crucial for ensuring reliable performance and longevity of lithium-ion batteries. This article introduces a data-driven approach for SOH predic... 详细信息
来源: 评论
Decarbonizing Maritime Shipping and Aviation: Disruption, Regime Resistance and Breaking Through Carbon Lock-In for Hard-to-Abate Transport Sectors
SSRN
收藏 引用
SSRN 2023年
作者: Urban, Frauke Nurdiawati, Anissa Harahap, Fumi Morozovska, Kateryna Department of Industrial Economics and Management Royal Institute of Development KTH Sweden King Abdullah University of Science and Technology KAUST Saudi Arabia Department of Energy Technology Royal Institute of Development KTH Sweden School of Electrical Engineering and Computer Science Royal Institute of Development KTH Sweden
Aviation and maritime shipping are hard-to-abate transport sectors that are heavily dependent on fossil fuels. They jointly account for nearly 10% of global greenhouse gas emissions, while infrastructure and investmen... 详细信息
来源: 评论
(10$\bar{1}$3)-oriented semipolar GaN growth on (10$\bar{1}$0) m-plane ScAlMgO4 substrate
收藏 引用
Japanese Journal of Applied Physics 2024年 第10期63卷 101001-101001页
作者: Mohammed A. Najmi Daisuke Iida Kazuhiro Ohkawa Electrical and Computer Engineering Program Computer Electrical and Mathematical Sciences and Engineering Division King Abdullah University of Science and Technology (KAUST) Thuwal 23955-6900 Saudi Arabia
We report the growth of a GaN layer on a (10\bar{1}0)m-plane ScAlMgO4 (SAM) substrate. The GaN layer demonstrated (10\bar{1}3) preference growth orientation. The anisotropy of the crystalline quality was distinctly ob...
来源: 评论
A Static Analysis Tool for Malware Detection
A Static Analysis Tool for Malware Detection
收藏 引用
2021 International Conference on Data Analytics for Business and Industry, ICDABI 2021
作者: Noman, Haitham Ameen Al-Maatouk, Qusay Noman, Sinan Ameen Princess Sumaya University for Technology King Abdullah Ii School of Engineering Amman Jordan School of Technology Kuala Lumpur Malaysia The University of Alabama Gradute School of Computer Science Alabama United States
Malware detection refers to the process of detecting the presence of Malware on a host system or of distinguishing whether a specific program is malicious. The different types of Malware created new challenges for the... 详细信息
来源: 评论
Proactive Insider Threat Detection Using Facial and Behavioral Biometrics
Proactive Insider Threat Detection Using Facial and Behavior...
收藏 引用
Information technology (ACIT)
作者: Hanay Almomani Ayoub Alsarhan Mahmoud AlJamal Mohammad Aljaidi Tamam Alsarhan Bashar Khassawneh Ghassan Samara Manish Kumar Singla Ahmed BaniMustafa Department of Information Technology The Hashemite University Zarqa Jordan Department of Cybersecurity Irbid National University Irbid Jordan Department of Computer Science Zarqa University Jordan College of Engineering University of Business and Technology Jeddah Saudi Arabia King Abdullah II School of IT University of Jordan Amman Jordan Department of Computer Science Amman Arab University Amman Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Interdisciplinary Courses in Engineering Chitkara University Punjab India Department of Computer Information Science The Hashemite University Zarqa Jordan
Insider threats have long posed significant risks to organizational security due to their internal origins and the ethical complexities involved. This paper addresses the critical problem of detecting insider threats ... 详细信息
来源: 评论