咨询与建议

限定检索结果

文献类型

  • 728 篇 期刊文献
  • 580 篇 会议
  • 30 篇 学位论文
  • 1 册 图书
  • 1 篇 科技报告

馆藏范围

  • 1,340 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,231 篇 工学
    • 749 篇 电气工程
    • 543 篇 计算机科学与技术...
    • 185 篇 信息与通信工程
    • 129 篇 控制科学与工程
    • 122 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 82 篇 软件工程
    • 61 篇 机械工程
    • 48 篇 航空宇航科学与技...
    • 44 篇 材料科学与工程(可...
    • 44 篇 核科学与技术
    • 40 篇 石油与天然气工程
    • 28 篇 动力工程及工程热...
    • 18 篇 力学(可授工学、理...
    • 18 篇 生物医学工程(可授...
    • 13 篇 交通运输工程
    • 11 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 测绘科学与技术
    • 8 篇 生物工程
  • 204 篇 理学
    • 138 篇 物理学
    • 27 篇 数学
    • 26 篇 化学
    • 25 篇 生物学
  • 82 篇 管理学
    • 71 篇 管理科学与工程(可...
    • 8 篇 公共管理
    • 8 篇 图书情报与档案管...
  • 69 篇 医学
    • 43 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 7 篇 特种医学
  • 5 篇 法学
  • 5 篇 农学
  • 4 篇 军事学
  • 2 篇 经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 1,340 篇 field programmab...
  • 194 篇 field programmab...
  • 109 篇 fpga
  • 35 篇 digital signal p...
  • 34 篇 hardware
  • 23 篇 cryptography
  • 21 篇 system-on-chip
  • 19 篇 hardware descrip...
  • 19 篇 convolutional ne...
  • 18 篇 image processing
  • 17 篇 logic circuits
  • 17 篇 digital signal p...
  • 17 篇 vhdl
  • 15 篇 computer archite...
  • 15 篇 real-time system...
  • 14 篇 signal processin...
  • 14 篇 graphics process...
  • 14 篇 reconfigurable a...
  • 14 篇 power consumptio...
  • 14 篇 machine learning

机构

  • 6 篇 george mason uni...
  • 5 篇 univ sci & techn...
  • 5 篇 kyushu inst tech...
  • 4 篇 beihang univ sch...
  • 4 篇 indian inst tech...
  • 4 篇 weifang univ inf...
  • 4 篇 huazhong univ sc...
  • 4 篇 naval postgradua...
  • 4 篇 auburn univ dept...
  • 4 篇 shanghai univ sc...
  • 3 篇 lodz univ techno...
  • 3 篇 univ london impe...
  • 3 篇 shanghai jiao to...
  • 3 篇 harbin univ sci ...
  • 3 篇 kyushu inst tech...
  • 3 篇 univ burdwan uni...
  • 3 篇 indian inst tech...
  • 3 篇 univ washington ...
  • 3 篇 tennessee techno...
  • 3 篇 univ sci & techn...

作者

  • 8 篇 diehl william
  • 8 篇 gaj kris
  • 7 篇 tamukoh hakaru
  • 7 篇 wang peng
  • 6 篇 monmasson e.
  • 6 篇 makowski d.
  • 6 篇 de castro angel
  • 5 篇 jablonski g.
  • 5 篇 wang yonggang
  • 5 篇 garrido javier
  • 5 篇 mielczarek a.
  • 5 篇 napieralski a.
  • 5 篇 perek p.
  • 4 篇 sanchez alberto
  • 4 篇 torikai hiroyuki
  • 4 篇 tsang p. w. m.
  • 4 篇 watanabe minoru
  • 4 篇 luk wayne
  • 4 篇 xu tongge
  • 4 篇 wang fan

语言

  • 1,278 篇 英文
  • 41 篇 其他
  • 19 篇 中文
  • 2 篇 土耳其文
检索条件"主题词=Field Programmable Gate array"
1340 条 记 录,以下是741-750 订阅
排序:
Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware  2nd
Gigabit Network Intrusion Detection System Using Extended Bl...
收藏 引用
2nd International Conference on Computer and Communication Technologies
作者: Jose, Akshay Eldho Gireeshkumar, T. Amrita Vishwa Vidyapeetham TIFAC CORE Cyber Secur Coimbatore Tamil Nadu India
Network intrusion detection system collects information from network and identifies all the possible existing network security threats. Software based detection systems are common but are not good enough for the curre... 详细信息
来源: 评论
The Modeling and Simulation for Current Regulation of PMSM Drive System using Verilog HDL and Variable Structure Control
The Modeling and Simulation for Current Regulation of PMSM D...
收藏 引用
International Automatic Control Conference (CACS)
作者: Lai, Chiu-Keng Tsai, Chia-Che Natl Chin Yi Univ Technol Dept Elect Engn Taichung Taiwan
In this study, we design the permanent magnet synchronous motor (PMSM) drive system using field programmable gate array (FPGA), and adopt variable structure control (VSC) to the current regulation. The system is first... 详细信息
来源: 评论
GPlace: A Congestion-Aware Placement Tool for UltraScale FPGAs  35
GPlace: A Congestion-Aware Placement Tool for UltraScale FPG...
收藏 引用
35th IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
作者: Pattison, Ryan Abuowaimer, Ziad Areibi, Shawki Grewal, Gary Vannelli, Anthony Univ Guelph Sch Engn Guelph ON Canada Univ Guelph Sch Comp Sci Guelph ON Canada
Traditional FPGA flows that wait until the routing stage to tackle congestion are quickly becoming less effective. This is due to the increasing size and complexity of FPGA architectures and the designs targeted for t... 详细信息
来源: 评论
FPGA-Based System Level Design of Control Systems: A Case Study of Three-Axis Positioning Controller Implementation
FPGA-Based System Level Design of Control Systems: A Case St...
收藏 引用
International Conference on New Trends in Signal Processing (NTSP)
作者: Stankovic, Momir Manojlovic, Stojadin Simic, Slobodan Mitrovic, Srdjan Naumovic, Milica Univ Def Mil Acad Belgrade Serbia Univ Nis Fac Elect Engn Nish Serbia
In this paper field programmable gate array (FPGA) system level based methodology for control system design is proposed and described in details on the case study of three-axis positioning controller implementation. S... 详细信息
来源: 评论
Investigations of Power and EM Attacks on AES Implemented in FPGA  5th
Investigations of Power and EM Attacks on AES Implemented in...
收藏 引用
5th International Conference on Soft Computing for Problem Solving (SocProS)
作者: Singh, Arvind Kumar Mishra, S. P. Suri, B. M. Khosla, Anu Minist Def DRDO SAG Metcalfe House Delhi 110054 India
Side-channel attack is a new area of research which exploits the leakages such as power consumption, execution time, EM radiation, etc., of crypto algorithms running on electronic circuitry to extract the secret key. ... 详细信息
来源: 评论
Resource-Efficient Scheduling for Partially-Reconfigurable FPGA-based Systems  30
Resource-Efficient Scheduling for Partially-Reconfigurable F...
收藏 引用
30th IEEE International Parallel and Distributed Processing Symposium (IPDPS)
作者: Purgato, Andrea Tantillo, Davide Rabozzi, Marco Sciuto, Donatella Santambrogio, Marco D. Politecn Milan Milan Italy
In this paper we present a novel scheduling technique for partially-reconfigurable FPGA-based systems that allows to achieve high quality results in terms of overall application execution time. The proposed algorithm ... 详细信息
来源: 评论
RTL Implementations and FPGA Benchmarking of Three Authenticated Ciphers Competing in CAESAR Round Two  19
RTL Implementations and FPGA Benchmarking of Three Authentic...
收藏 引用
19th Euromicro Conference on Digital System Design (DSD)
作者: Diehl, William Gaj, Kris George Mason Univ Dept Elect & Comp Engn Fairfax VA 22030 USA
Authenticated ciphers are cryptographic transformations which combine the functionality of confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) design to describe selected a... 详细信息
来源: 评论
An Analytical Approach for Estimation of Single Event Transients
An Analytical Approach for Estimation of Single Event Transi...
收藏 引用
IEEE International Conference on Emerging Technological Trends in Computing, Communications and Electrical Engineering (ICETT)
作者: Suseelan, Surya Mohan, Pooja S. Sree Buddha Coll Engn Elect & Commun Dept Pattoor Alappuzha India
Transient faults are a matter of increasing concern as advanced technologies scales to smaller and smaller feature technologies. Transient errors are random faults of the hardware, which also called as soft errors. Si... 详细信息
来源: 评论
A System-Level Design for Foreground and Background Identification in 3D Scenes
A System-Level Design for Foreground and Background Identifi...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Safaei, Amin Wu, Q. M. Jonathan Univ Windsor Dept Elect & Comp Engn Windsor ON Canada
This paper proposes a system-on-chip (SoC) FPGA - based real-time video processing platform for background and foreground identification. Background and foreground identification is a common feature in many tasks in v... 详细信息
来源: 评论
Structural Modification based Netlist Obfuscation Technique for PLDs
Structural Modification based Netlist Obfuscation Technique ...
收藏 引用
IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
作者: Sumathi, G. Srivani, L. Murthy, D. Thirugnana Kumar, Anish Madhusoodanan, K. Murty, S. A. V. Satya Homi Bhabha Natl Inst Kalpakkam 603102 Tamil Nadu India Indira Gandhi Ctr Atom Res Kalpakkam 603102 Tamil Nadu India
Logic obfuscation is widely followed in intellectual property cores and chip designs as hardware protection mechanism against design security threats such as reverse engineering (RE), piracy, cloning, overbuilding, et... 详细信息
来源: 评论