咨询与建议

限定检索结果

文献类型

  • 194 篇 会议
  • 171 篇 期刊文献

馆藏范围

  • 365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 175 篇 工学
    • 107 篇 计算机科学与技术...
    • 93 篇 软件工程
    • 29 篇 电气工程
    • 27 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 20 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 动力工程及工程热...
    • 11 篇 机械工程
    • 11 篇 材料科学与工程(可...
    • 10 篇 生物医学工程(可授...
    • 9 篇 光学工程
    • 9 篇 核科学与技术
    • 8 篇 安全科学与工程
  • 153 篇 理学
    • 93 篇 物理学
    • 30 篇 数学
    • 22 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 9 篇 化学
    • 8 篇 天文学
    • 8 篇 大气科学
    • 7 篇 系统科学
  • 45 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 18 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 16 篇 法学
    • 16 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 10 篇 公共卫生与预防医...
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 5 篇 教育学
  • 4 篇 农学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 13 篇 machine learning
  • 7 篇 task analysis
  • 7 篇 information tech...
  • 7 篇 higgs bosons
  • 7 篇 wireless sensor ...
  • 7 篇 virtual reality
  • 7 篇 data models
  • 7 篇 training
  • 7 篇 energy efficienc...
  • 6 篇 deep learning
  • 6 篇 supersymmetric m...
  • 6 篇 systematics
  • 6 篇 smart grids
  • 6 篇 search engines
  • 6 篇 optimization
  • 6 篇 computer crime
  • 6 篇 visualization
  • 6 篇 security
  • 6 篇 software
  • 6 篇 particle data an...

机构

  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 tomsk state univ...
  • 39 篇 department of ph...
  • 39 篇 physics departme...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 358 篇 英文
  • 4 篇 中文
  • 3 篇 其他
检索条件"机构=Informatics and Computing in Energy"
365 条 记 录,以下是181-190 订阅
排序:
A review on bystanders terminologies in cyberbullying
收藏 引用
AIP Conference Proceedings 2022年 第1期2617卷
作者: Rina Md Anwar Fiza Abdul Rahim Puven Alvin Victor 1Institute of Informatics and Computing Energy Universiti Tenaga Nasional (UNITEN) 43000 Kajang Selangor Malaysia 2Advanced Informatics Department Razak Faculty of Technology and Informatics Universiti Teknologi Malaysia 54100 Kuala Lumpur Malaysia
Most of the communication today takes place online, thereby reflecting a significant part of our lives. Commuting from offline to online contact causes many challenges, misunderstandings, and differences, not knowing ...
来源: 评论
An Adaptive Digital Twin-Driven Model Based on Consumer Internet of Things To Ensure the Safe Operation of Aero-Engine
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Gou, Ruijia Wang, Wei Liu, Zongyao Gadekallu, Thippa Reddy Amoon, Mohammed Lin, Chuan Xiamen University School of Informatics Xiamen361005 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Guangdong Shenzhen518172 China Northwestern Polytechnical University School of Power and Energy Xian710072 China Lovely Professional University Division of Research and Development Phagwara India Chitkara University Center of Research Impact and Outcome Punjab Rajpura140401 India King Saud University Department of Computer Science Community College Riyadh Saudi Arabia Northeastern University School of Software Shenyang110819 China
The aero-engine, often hailed as the manufacturing's 'crown jewel' presents considerable complexity in its design, manufacturing, and maintenance. To enhance safety and efficacy of the aero-engine especial... 详细信息
来源: 评论
Theoretical Bases of Identifying Determinants of Protection Intentions towards Bring-Your-Own-Device (BYOD) Protection Behaviors  1
Theoretical Bases of Identifying Determinants of Protection ...
收藏 引用
1st International Conference of Intelligent computing and Engineering, ICOICE 2019
作者: Al-Harthy, Ibrahim Mohammed Rahim, Fiza Abdul Ali, Nor"Ashikin Singun, Amando P. Computer Services Educational Technologies Centre Higher College of Technology Muscat Oman Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Malaysia College of Computing and Informatics Universiti Tenaga Nasional Malaysia Information Technology Department Higher College of Technology Muscat Oman
Bring-Your-Own-Device (BYOD) has been acknowledged as a very good practice in the workplace. With its increasing popularity where personal as well as organizational data are accessed using BYOD, there have been raisin... 详细信息
来源: 评论
Performance Analysis of Deep Neural Networks for Object Classification with Edge TPU
Performance Analysis of Deep Neural Networks for Object Clas...
收藏 引用
International Conference on Information Technology and Multimedia (ICIM)
作者: Ahmad Ammar Asyraaf Jainuddin Yew Cheong Hou Mohd Zafri Baharuddin Salman Yussof College of Engineering Universiti Tenaga Nasional Kajang Selangor Malaysia Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Kajang Selangor Malaysia
Deep learning becomes a more popular, widespread, and common tool in almost any task that requires information extraction from a large dataset. Hence, the data transmission speed between the data-gathering devices and... 详细信息
来源: 评论
Risk-ranking matrix for security patching of exploitable vulnerabilities
收藏 引用
AIP Conference Proceedings 2023年 第1期2808卷
作者: Mohammad Shamsul Hoque Norziana Jamil Nowshad Amin Muhamad Mansor College of Computing and Informatics Universiti Tenaga Nasional Kajang Selangor Malaysia Institute of Sustainable Energy Universiti Tenaga Nasional Kajang Selangor Malaysia Institute of Power Engineering Universiti Tenaga Nasional Kajang Selangor Malaysia
A vulnerability in cybersecurity can be any weakness within a software or hardware of any information systems, internal controls, network or system processes that can be exploited to cause damage, or allow an attacker...
来源: 评论
An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems
An Anomaly Detection Technique for Deception Attacks in Indu...
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Q.S. Qassim A.R. Ahmad R. Ismail A. Abu Bakar F. Abdul Rahim M.Z. Mokhtar R. Ramli B. Mohd Yusof Mohammed Najah Mahdi Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Malaysia College of Computing & Informatics Universiti Tenaga Nasional Malaysia Institute of Informatics and Computing in Energy Universiti Tenaga Nasional 43000 Malaysia
The increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-... 详细信息
来源: 评论
A new model to analyze power and communication system intra-and-inter dependencies
arXiv
收藏 引用
arXiv 2020年
作者: Roy, Sohini Chandrasekaran, Harish Pal, Anamitra Sen, Arunabha School of Computing Informatics and Decision System Engineering School of Electrical Computer and Energy Engineering Arizona State University Tempe- AZ85281 United States
—The reliable and resilient operation of the smart grid necessitates a clear understanding of the intra-and-inter dependencies of its power and communication systems. This understanding can only be achieved by accura... 详细信息
来源: 评论
Advancing Thyroid Pathologies Detection with Recurrent Neural Networks and Micro-FTIR Hyperspectral Imaging
Advancing Thyroid Pathologies Detection with Recurrent Neura...
收藏 引用
Annual IEEE Symposium on Computer-Based Medical Systems
作者: Matheus De Freitas Oliveira Baffa Luciano Bachmann Denise Maria Zezell Thiago Martini Pereira Thomas Martin Deserno Joaquim Cezar Felipe Dept. of Computing and Mathematics University of São Paulo (USP) Ribeirao Preto SP Brazil Dept. of Physics University of São Paulo (USP) Ribeirao Preto SP Brazil Nuclear and Energy Research Institute São Paulo SP Brazil Dept. of Science and Technology Federal University of são Paulo (UNIFESP) São José dos Campos SP Brazil Peter L. Reichertz Institute for Medical Informatics Technische Universität Braunschweig Braunschweig Germany
Thyroid disorders are a complex group of diseases that require an accurate diagnosis for effective treatment. Fine-needle aspiration biopsies can assist in detecting many thyroid diseases. These materials can be analy...
来源: 评论
Decentralized attribution of generative models
arXiv
收藏 引用
arXiv 2020年
作者: Kim, Changhoon Ren, Yi Yang, Yezhou School of Computing Informatics and Decision Systems Engineering Arizona State University United States School for Engineering of Matter Transport and Energy Arizona State University United States
Growing applications of generative models have led to new threats such as malicious personation and digital copyright infringement. One solution to these threats is model attribution, i.e., the identification of user-... 详细信息
来源: 评论
Towards SCADA Threat Intelligence based on Intrusion Detection Systems - A Short Review
Towards SCADA Threat Intelligence based on Intrusion Detecti...
收藏 引用
International Conference on Information Technology and Multimedia (ICIM)
作者: Qais Saif Qassim Norziana Jamil Mohammed Najah Mahdi Azril Azam Abdul Rahim Ibri College of Technology Ibri Sultanate of Oman Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Selangor Malaysia Tenaga Nasional Berhad Kuala Lumpur Malaysia
Securing and protecting Supervisory Control and Data Acquisition (SCADA) systems have been an active topic of research for the past decades due to the catastrophic and disastrous consequences when these systems are br... 详细信息
来源: 评论