咨询与建议

限定检索结果

文献类型

  • 4,461 篇 会议
  • 3,231 篇 期刊文献
  • 177 册 图书

馆藏范围

  • 7,869 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,498 篇 工学
    • 2,825 篇 计算机科学与技术...
    • 2,326 篇 软件工程
    • 1,000 篇 信息与通信工程
    • 602 篇 生物医学工程(可授...
    • 579 篇 生物工程
    • 530 篇 控制科学与工程
    • 444 篇 电气工程
    • 444 篇 电子科学与技术(可...
    • 425 篇 光学工程
    • 305 篇 核科学与技术
    • 279 篇 机械工程
    • 265 篇 仪器科学与技术
    • 209 篇 化学工程与技术
    • 152 篇 动力工程及工程热...
    • 150 篇 材料科学与工程(可...
    • 119 篇 交通运输工程
  • 2,910 篇 理学
    • 1,249 篇 数学
    • 1,186 篇 物理学
    • 681 篇 生物学
    • 415 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 232 篇 化学
  • 1,089 篇 管理学
    • 616 篇 管理科学与工程(可...
    • 498 篇 图书情报与档案管...
    • 349 篇 工商管理
  • 605 篇 医学
    • 505 篇 临床医学
    • 455 篇 基础医学(可授医学...
    • 304 篇 药学(可授医学、理...
    • 188 篇 公共卫生与预防医...
  • 167 篇 法学
    • 139 篇 社会学
  • 118 篇 经济学
  • 99 篇 农学
  • 83 篇 教育学
  • 21 篇 文学
  • 10 篇 军事学
  • 10 篇 艺术学
  • 2 篇 哲学

主题

  • 257 篇 informatics
  • 145 篇 artificial intel...
  • 133 篇 machine learning
  • 113 篇 computer archite...
  • 108 篇 computational mo...
  • 106 篇 data mining
  • 95 篇 quality of servi...
  • 93 篇 feature extracti...
  • 92 篇 deep learning
  • 90 篇 wireless sensor ...
  • 88 篇 computer science
  • 82 篇 hadron colliders
  • 78 篇 training
  • 77 篇 resource managem...
  • 76 篇 optimization
  • 76 篇 monitoring
  • 76 篇 protocols
  • 75 篇 image segmentati...
  • 74 篇 predictive model...
  • 70 篇 mobile communica...

机构

  • 416 篇 department for p...
  • 408 篇 faculty of scien...
  • 404 篇 kirchhoff-instit...
  • 403 篇 department of ph...
  • 388 篇 department of ph...
  • 387 篇 department of ph...
  • 370 篇 institute of phy...
  • 368 篇 fakultät für phy...
  • 367 篇 institute of phy...
  • 313 篇 instituto de fís...
  • 309 篇 department of ph...
  • 285 篇 graduate school ...
  • 280 篇 department of ph...
  • 271 篇 department of ph...
  • 270 篇 universidade fed...
  • 264 篇 ictp trieste
  • 263 篇 dipartimento di ...
  • 257 篇 yerevan physics ...
  • 257 篇 nikhef national ...
  • 255 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 334 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 327 篇 g. spigo
  • 326 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 320 篇 s. mohapatra
  • 309 篇 s. guindon
  • 308 篇 a. kaczmarska
  • 301 篇 y. tayalati
  • 300 篇 j. schaarschmidt
  • 288 篇 a. d. pilkington
  • 285 篇 m. klein
  • 285 篇 l. chevalier

语言

  • 7,077 篇 英文
  • 715 篇 其他
  • 73 篇 中文
  • 9 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Institute of Informatics and Computer Engineering"
7869 条 记 录,以下是801-810 订阅
排序:
ECG-Image-Database: A Dataset of ECG Images with Real-World Imaging and Scanning Artifacts;A Foundation for computerized ECG Image Digitization and Analysis
arXiv
收藏 引用
arXiv 2024年
作者: Reyna, Matthew A. Deepanshi Weigle, James Koscova, Zuzana Campbell, Kiersten Shivashankara, Kshama Kodthalu Saghafi, Soheil Nikookar, Sepideh Motie-Shirazi, Mohsen Kiarashi, Yashar Seyedi, Salman Clifford, Gari D. Sameni, Reza Department of Biomedical Informatics Emory University AtlantaGA30322 United States School of Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA30332 United States Department of Biomedical Engineering Georgia Institute of Technology AtlantaGA30332 United States
Objective: We introduce ECG-Image-Database, a large and diverse collection of electrocardiogram (ECG) images generated from ECG time-series data that exhibit real-world scanning, imaging, and physical artifacts. This ... 详细信息
来源: 评论
Integrating Blockchain Technology with PKI for Secure and Interoperable Communication in 5G and Beyond Vehicular Networks
Integrating Blockchain Technology with PKI for Secure and In...
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Fetulhak Abdurahman Shewajo Abdelwahab Boualouache Sidi Mohammed Senouci Ines El-Korbi Bouziane Brik Kinde Anlay Fante DRIVE Lab University of Burgundy Nevers France Faculty of Electrical and Computer Engineering Jimma Institute of Technology Jimma University Jimma FSTM University of Luxembourg Luxembourg Computer Science Department College of Computing and Informatics Sharjah University Sharjah UAE
Security and privacy are crucial in V2X networks due to sensitive user information. Public Key Infrastructure (PKI) is widely used in C-ITS to ensure security and privacy. However, the practical implementation of PKI ...
来源: 评论
Cooperative Plug-and-Play-KalmanNet for 4D situational awareness in autonomous driving
Cooperative Plug-and-Play-KalmanNet for 4D situational aware...
收藏 引用
Industrial Cyber-Physical Systems (ICPS)
作者: Nikos Piperigkos Alexandros Gkillas Christos Anagnostopoulos Aris S. Lalos Computer Engineering & Informatics Department University of Patras Greece AviSense.AI Patras Science Park Greece Athena Research Center Industrial Systems Institute Patras Science Park Greece
Fully operational autonomous driving requires accurate 4D situational awareness from vehicles, i.e., 3D location information over time. For that purpose, each vehicle establishes connectivity links with its direct nei... 详细信息
来源: 评论
Directional Metasurface Using Transistor-Loaded Circularly Polarized Antenna Elements
Directional Metasurface Using Transistor-Loaded Circularly P...
收藏 引用
2023 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting, AP-S/URSI 2023
作者: Chatzichristodoulou, David Vryonides, Photos Psychogiou, Dimitra Nikolaou, Symeon Frederick Research Center Nicosia Cyprus Rf and Microwave Solutions Ltd Cyprus School of Engineering University College Cork CorkT12 K8AF Ireland Tyndall National Institute CorkT12 R5CP Ireland Frederick University Dept. Electrical Computer Engineering and Informatics Nicosia Cyprus
This paper discusses the RF design of a compact metasurface that enables directional propagation characteristics. It allows for circularly-polarized waves to penetrate through its volume in one direction of propagatio... 详细信息
来源: 评论
A Machine Learning Approach for the Underwater Investigation of Malicious Activity in a Wireless Sensor Network
A Machine Learning Approach for the Underwater Investigation...
收藏 引用
Sustainable Communication Networks and Application (ICSCNA), International Conference on
作者: Murali Dhar M S Mahaveerakannan R F. Ravindaran Kommisetti MurthyRaju Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Tamil Nadu Department of Spatial Informatics The Institute of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering (Cyber Security) Karpagam College of Engineering Coimbatore Tamil Nadu Department of Electronics and Communication Engineering Shri Vishnu Engineering College For Women BHIMAVARAM Andha Pradesh
Underwater Wireless Sensor Networks (UWSN) have drawn increased interest from researchers in recent years due to advancements in underwater tracking, the implementation of multiple uses, and marine monitoring. Both re...
来源: 评论
A Comparative Study of Text Classification Using Artificial Intelligence Models
A Comparative Study of Text Classification Using Artificial ...
收藏 引用
Current Research in engineering and Science Applications (ICCRESA), International Conference on
作者: Maysaa H. Abdulameer Mahmood Z. Abdullah Informatics Institute for Post-Graduation Studies Iraqi Commission for Computer & informatics Baghdad Iraq College of Engineering Al-Mustansiriyah University Baghdad Iraq
The presented study provides experiments for carrying out empirical studies related to deep learning, especially convolution networks, concerning novel dataset classification (video and audio). The study will utilize ...
来源: 评论
AI-based Drone Assisted Human Rescue in Disaster Environments: Challenges and Opportunities
arXiv
收藏 引用
arXiv 2024年
作者: Papyan, Narek Kulhandjian, Michel Kulhandjian, Hovannes Aslanyan, Levon Department of Telecommunication Engineering Russian-Armenian University Yerevan Armenia Department of Electrical and Computer Engineering Rice University HoustonTX United States Department of Electrical and Computer Engineering California State University Fresno FresnoCA United States Institute for Informatics and Automation Problems National Academy of Sciences Yerevan Armenia
In this survey we are focusing on utilizing drone-based systems for the detection of individuals, particularly by identifying human screams and other distress signals. This study has significant relevance in post-disa... 详细信息
来源: 评论
An Exploratory Case Study on Effort Estimation in Microservices
An Exploratory Case Study on Effort Estimation in Microservi...
收藏 引用
Euromicro Conference on Software engineering and Advanced Applications (SEAA)
作者: Hüseyin Ünlü Tuna Hacaloğlu Neslihan Küçükateş Ömüral Neslihan Çalişkanel Onur Leblebici Onur Demirörs Computer Engineering Izmir Institute of Technology Izmir Turkey Information Systems Engineering Atilim University Ankara Turkey Informatics Institute Middle East Technical University Ankara Turkey Univera Inc. Izmir Turkey
Software project management plays an important role in producing high-quality software, and effort estimation can be considered as a backbone for successful project management. Size is a very significant attribute of ...
来源: 评论
Online Resource Allocation for User Experience Improvement in Heterogeneous MEC Systems
Online Resource Allocation for User Experience Improvement i...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Weiya Ni Jingwen Tong Liqun Fu Institute of Artificial Intelligence Xiamen University Xiamen China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong School of Informatics Xiamen University Xiamen China
Mobile edge cloud (MEC) has emerged as a critical technology for enabling low-latency and real-time mobile device applications. However, an efficient resource allocation framework for improving the user experience in ... 详细信息
来源: 评论
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack Tree and Fuzzy Logic  3
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack T...
收藏 引用
3rd IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Naik, Nitin Jenkins, Paul Grace, Paul Naik, Dishita Song, Jingping Prajapat, Shaligram Mishra, Durgesh Yang, Longzhi Boongoen, Tossapon Iam-On, Natthakan School of Informatics and Digital Engineering Aston University United Kingdom Cardiff School of Technologies Cardiff Metropolitan University United Kingdom Birmingham City University United Kingdom Software College Northeastern University China International Institute of Professional Studies Devi Ahilya University India School of Computer Science & Information Technology Symbiosis University of Applied Sciences India Northumbria University Department of Computer and Information Sciences United Kingdom Aberystwyth University Department of Computer Science United Kingdom
Organisations and users have been experiencing significant rises in cyberattacks and their severity, which means that they require a greater awareness and understanding of the anatomy of cyberattacks, to prevent and m... 详细信息
来源: 评论