咨询与建议

限定检索结果

文献类型

  • 478,664 篇 会议
  • 171,862 篇 期刊文献
  • 3,430 册 图书
  • 2 篇 科技报告
  • 1 篇 学位论文

馆藏范围

  • 653,955 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 355,879 篇 工学
    • 197,682 篇 计算机科学与技术...
    • 157,992 篇 软件工程
    • 85,618 篇 信息与通信工程
    • 70,121 篇 电气工程
    • 68,712 篇 电子科学与技术(可...
    • 58,554 篇 控制科学与工程
    • 34,330 篇 生物工程
    • 31,174 篇 光学工程
    • 27,729 篇 生物医学工程(可授...
    • 25,166 篇 机械工程
    • 22,540 篇 仪器科学与技术
    • 22,127 篇 动力工程及工程热...
    • 21,242 篇 化学工程与技术
    • 20,748 篇 材料科学与工程(可...
    • 10,701 篇 安全科学与工程
    • 10,594 篇 交通运输工程
    • 9,421 篇 力学(可授工学、理...
  • 203,423 篇 理学
    • 95,182 篇 数学
    • 78,413 篇 物理学
    • 38,546 篇 生物学
    • 30,862 篇 统计学(可授理学、...
    • 25,579 篇 系统科学
    • 22,788 篇 化学
  • 72,354 篇 管理学
    • 45,681 篇 管理科学与工程(可...
    • 29,080 篇 图书情报与档案管...
    • 22,786 篇 工商管理
  • 25,273 篇 医学
    • 20,990 篇 临床医学
    • 18,520 篇 基础医学(可授医学...
    • 11,630 篇 药学(可授医学、理...
  • 13,448 篇 法学
    • 11,211 篇 社会学
  • 9,182 篇 经济学
  • 6,327 篇 农学
  • 5,910 篇 教育学
  • 2,999 篇 文学
  • 1,508 篇 军事学
  • 719 篇 艺术学
  • 93 篇 哲学
  • 53 篇 历史学

主题

  • 20,373 篇 computer science
  • 14,539 篇 computational mo...
  • 11,070 篇 accuracy
  • 10,937 篇 bandwidth
  • 10,784 篇 feature extracti...
  • 8,986 篇 costs
  • 8,953 篇 computer archite...
  • 8,935 篇 delay
  • 8,934 篇 control systems
  • 8,810 篇 testing
  • 8,719 篇 machine learning
  • 8,707 篇 hardware
  • 8,706 篇 training
  • 8,660 篇 application soft...
  • 8,503 篇 deep learning
  • 8,347 篇 algorithm design...
  • 8,119 篇 robustness
  • 8,111 篇 frequency
  • 7,898 篇 switches
  • 7,853 篇 wireless sensor ...

机构

  • 5,287 篇 department of el...
  • 1,670 篇 department of co...
  • 1,316 篇 department of co...
  • 1,291 篇 department of el...
  • 1,277 篇 department of el...
  • 1,252 篇 ieee
  • 1,146 篇 department of el...
  • 1,082 篇 department of el...
  • 1,019 篇 department of el...
  • 985 篇 department of el...
  • 963 篇 department of ph...
  • 957 篇 department of el...
  • 942 篇 cavendish labora...
  • 809 篇 oliver lodge lab...
  • 809 篇 physikalisches i...
  • 783 篇 department of el...
  • 782 篇 department of el...
  • 782 篇 department of co...
  • 712 篇 department of el...
  • 708 篇 department of el...

作者

  • 262 篇 s. chen
  • 255 篇 j. wang
  • 244 篇 barter w.
  • 221 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 211 篇 han zhu
  • 210 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 191 篇 niyato dusit
  • 190 篇 c. amelung
  • 190 篇 y. chen
  • 188 篇 g. bella

语言

  • 619,051 篇 英文
  • 27,155 篇 其他
  • 7,622 篇 中文
  • 259 篇 日文
  • 98 篇 朝鲜文
  • 65 篇 德文
  • 44 篇 法文
  • 30 篇 土耳其文
  • 24 篇 斯洛文尼亚文
  • 18 篇 西班牙文
  • 11 篇 葡萄牙文
  • 8 篇 俄文
  • 7 篇 阿拉伯文
  • 6 篇 荷兰文
  • 4 篇 意大利文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science Department and Electrical and Computer Engineering Department"
653959 条 记 录,以下是231-240 订阅
排序:
Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 20219-20247页
作者: Yuan, Longfei Lin, Chia-Chen Chang, Chin-Chen Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi... 详细信息
来源: 评论
AI-Driven Agronomy: Enhancing Crop Yield and Market Profits  4
AI-Driven Agronomy: Enhancing Crop Yield and Market Profits
收藏 引用
4th International Conference on Innovative Practices in Technology and Management, ICIPTM 2024
作者: Mourya, Kona Chandra, Sai Reddy, N Abhinay Kumar, Aiswarya S Department of Computer Science and Engineering Department of Computer Science and Engineering
The agriculture sector plays an important role to the nation's economy, contributing significantly to GDP and employing a sizable section of the labour force. Nonetheless, precisely projecting food production and ... 详细信息
来源: 评论
Deep Learning-Based Trojan Detection in Network Traffic: A CNN-BiLSTM Approach  100
Deep Learning-Based Trojan Detection in Network Traffic: A C...
收藏 引用
100th IEEE Vehicular Technology Conference, VTC 2024-Fall
作者: Hoque, Md Mozammal Alam, Khorshed Monir, Md Fahad Tarek Habib, Md University of Houston Department of Electrical and Computer Engineering United States Department of Computer Science & Engineering Bangladesh
Trojan detection from network traffic data is crucial for safeguarding networks against covert infiltration and potential data breaches. Deep learning (DL) techniques can play a pivotal role in detecting trojans from ... 详细信息
来源: 评论
Enhancing energy efficiency: a protocol assessment in multi-hop mesh-based IOUT networks
收藏 引用
Multimedia Tools and Applications 2024年 第37期83卷 84999-85026页
作者: Sisodia, Ankur Vishnoi, Swati Upadhyay, Sachin Goswami, Jayati Krishna Khenwar, Medha Yadav, Ajay Kumar Department of Computer Engineering and Applications GLA University Mathura India Department of Computer Science and Engineering GL Bajaj Group of Institutions Mathura India Department of Computer Science Banasthali Vidyapith Rajasthan Jaipur India
IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation ... 详细信息
来源: 评论
Robust Conformal Prediction Using Privileged Information  38
Robust Conformal Prediction Using Privileged Information
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Feldman, Shai Romano, Yaniv Department of Computer Science Technion Israel Departments of Electrical and Computer Engineering and of Computer Science Technion Israel
We develop a method to generate prediction sets with a guaranteed coverage rate that is robust to corruptions in the training data, such as missing or noisy variables. Our approach builds on conformal prediction, a po...
来源: 评论
Robust Graph Autoencoder-Based Detection of False Data Injection Attacks Against Data Poisoning in Smart Grids
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第3期5卷 1287-1301页
作者: Takiddin, Abdulrahman Ismail, Muhammad Atat, Rachad Davis, Katherine R. Serpedin, Erchin Department of Electrical and Computer Engineering Texas A and M University College StationTX77843 United States Department of Computer Science Tennessee Tech University CookevilleTN38505 United States Department of Electrical and Computer Engineering Program Texas A and M University Qatar Doha23874 Qatar
Machine learning-based detection of false data injection attacks (FDIAs) in smart grids relies on labeled measurement data for training and testing. The majority of existing detectors are developed assuming that the a... 详细信息
来源: 评论
Revisiting face detection: Supercharging Viola-Jones with particle swarm optimization for enhanced performance
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 10727-10741页
作者: Mohana, M. Subashini, P. Shukla, Diksha Centre for Machine Learning and Intelligence Department of Computer Science Avinashilingam Institute Tamil Nadu Coimbatore India Department of Electrical Engineering and Computer Science University of Wyoming LaramieWY United States
In recent years, face detection has emerged as a prominent research field within computer Vision (CV) and Deep Learning. Detecting faces in images and video sequences remains a challenging task due to various factors ... 详细信息
来源: 评论
Transfer Learning-Based Class Imbalance-Aware Shoulder Implant Classification from X-Ray Images
收藏 引用
Journal of Bionic engineering 2024年 第2期21卷 892-912页
作者: Marut Jindal Birmohan Singh Department of Computer Science and Engineering Sant Longowal Institute of Engineering and TechnologySangrur148106PunjabIndia
Total shoulder arthroplasty is a standard restorative procedure practiced by orthopedists to diagnose shoulder arthritis in which a prosthesis replaces the whole joint or a part of the *** is often challenging for doc... 详细信息
来源: 评论
Comparison of deep learning algorithms for site detection of false data injection attacks in smart grids
收藏 引用
Energy Informatics 2024年 第1期7卷 71页
作者: Nasir, Qassim Abu Talib, Manar Arshad, Muhammad Arbab Ishak, Tracy Berrim, Romaissa Alsaid, Basma Badway, Youssef Abu Waraga, Omnia Department of Computer Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Science University of Sharjah Sharjah United Arab Emirates Department of Computer Science Iowa State University AmesIA United States Department of Electrical Engineering University of Sharjah Sharjah United Arab Emirates
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these atta... 详细信息
来源: 评论
A Novel Approach to Energy Optimization:Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2945-2970页
作者: Muhammad Salman Qamar Ihsan ulHaq Amil Daraz Atif MAlamri Salman A.AlQahtani Muhammad Fahad Munir Department of Electrical and Computer Engineering International Islamic UniversityIslamabad44000Pakistan School of Information Science and Engineering NingboTech UniversityNingbo315100China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11495Saudi Arabia Computer Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11495Saudi Arabia
In pursuit of enhancing the Wireless Sensor Networks(WSNs)energy efficiency and operational lifespan,this paper delves into the domain of energy-efficient routing ***,the limited energy resources of Sensor Nodes(SNs)a... 详细信息
来源: 评论