咨询与建议

限定检索结果

文献类型

  • 35,631 篇 会议
  • 15,979 篇 期刊文献
  • 566 册 图书

馆藏范围

  • 52,176 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 28,231 篇 工学
    • 15,837 篇 计算机科学与技术...
    • 12,697 篇 软件工程
    • 6,332 篇 信息与通信工程
    • 5,958 篇 控制科学与工程
    • 5,055 篇 电气工程
    • 4,455 篇 电子科学与技术(可...
    • 2,556 篇 生物工程
    • 2,394 篇 机械工程
    • 2,085 篇 生物医学工程(可授...
    • 1,816 篇 光学工程
    • 1,812 篇 动力工程及工程热...
    • 1,675 篇 仪器科学与技术
    • 1,328 篇 化学工程与技术
    • 1,198 篇 材料科学与工程(可...
    • 949 篇 交通运输工程
    • 898 篇 安全科学与工程
  • 15,834 篇 理学
    • 8,039 篇 数学
    • 4,755 篇 物理学
    • 2,994 篇 生物学
    • 2,803 篇 系统科学
    • 2,658 篇 统计学(可授理学、...
    • 1,443 篇 化学
  • 6,113 篇 管理学
    • 4,187 篇 管理科学与工程(可...
    • 2,182 篇 工商管理
    • 2,134 篇 图书情报与档案管...
  • 2,024 篇 医学
    • 1,688 篇 临床医学
    • 1,428 篇 基础医学(可授医学...
    • 858 篇 药学(可授医学、理...
  • 1,124 篇 法学
    • 949 篇 社会学
  • 816 篇 经济学
    • 806 篇 应用经济学
  • 506 篇 教育学
  • 447 篇 农学
  • 167 篇 文学
  • 109 篇 军事学
  • 64 篇 艺术学
  • 9 篇 哲学
  • 4 篇 历史学

主题

  • 1,397 篇 systems engineer...
  • 1,275 篇 control systems
  • 1,132 篇 computer science
  • 1,000 篇 computational mo...
  • 665 篇 application soft...
  • 636 篇 bandwidth
  • 633 篇 laboratories
  • 609 篇 costs
  • 594 篇 computer archite...
  • 558 篇 testing
  • 534 篇 machine learning
  • 533 篇 robustness
  • 529 篇 optimization
  • 526 篇 neural networks
  • 522 篇 feature extracti...
  • 512 篇 switches
  • 505 篇 deep learning
  • 501 篇 hardware
  • 499 篇 artificial intel...
  • 488 篇 accuracy

机构

  • 515 篇 department of sy...
  • 403 篇 department of el...
  • 402 篇 department of sy...
  • 360 篇 department of sy...
  • 166 篇 electrical compu...
  • 118 篇 department of sy...
  • 105 篇 department of el...
  • 95 篇 department of co...
  • 82 篇 computer and sys...
  • 75 篇 ieee
  • 73 篇 center for power...
  • 67 篇 department of el...
  • 62 篇 department of el...
  • 61 篇 department of el...
  • 53 篇 department of sy...
  • 48 篇 department of co...
  • 48 篇 department of el...
  • 47 篇 computer and sys...
  • 47 篇 department of el...
  • 45 篇 department of el...

作者

  • 142 篇 halim yanikomero...
  • 100 篇 yanikomeroglu ha...
  • 92 篇 niyato dusit
  • 55 篇 bernhard schölko...
  • 52 篇 hisao ishibuchi
  • 50 篇 d.g. holmes
  • 42 篇 f. richard yu
  • 40 篇 paolo mattavelli
  • 40 篇 gabriel wainer
  • 40 篇 m. zahn
  • 37 篇 sofotasios pasch...
  • 33 篇 kurt gunes karab...
  • 31 篇 venayagamoorthy ...
  • 29 篇 sreeraman rajan
  • 28 篇 jiang liu
  • 28 篇 a.u.h. sheikh
  • 28 篇 frank knoefel
  • 28 篇 john s. baras
  • 27 篇 pedrycz witold
  • 26 篇 hong choong seon

语言

  • 50,183 篇 英文
  • 1,335 篇 其他
  • 612 篇 中文
  • 39 篇 日文
  • 6 篇 德文
  • 5 篇 葡萄牙文
  • 3 篇 西班牙文
  • 3 篇 俄文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Department Systems and Computer Engineering"
52176 条 记 录,以下是1-10 订阅
排序:
Long-range-interacting topological photonic lattices breaking channel-bandwidth limit
收藏 引用
Light(Science & Applications) 2024年 第10期13卷 2367-2375页
作者: Gyunghun Kim Joseph Suh Dayeong Lee Namkyoo Park Sunkyu Yu Department of Electrical and Computer Engineering Intelligent Wave Systems LaboratorySeoul National UniversitySeoul 08826Korea Department of Electrical and Computer Engineering Photonic Systems LaboratorySeoul National UniversitySeoul 08826Korea
The presence of long-range interactions is crucial in distinguishing between abstract complex networks and wave *** photonics,because electromagnetic interactions between optical elements generally decay rapidly with ... 详细信息
来源: 评论
New quantum color image watermarking technique (NQCIWT)
收藏 引用
Soft Computing 2024年 第17-18期28卷 10177-10186页
作者: Aly, Rasha F. Department of Computer and Systems Engineering Faculty of Engineering Helwan University Cairo Egypt
The crazy, unconscious use of the Internet, and the increase in cybercrime and hacking, which resulted in the loss of a large number of sensitive data, the risk of piracy, etc. were the motivation for protecting right... 详细信息
来源: 评论
Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1419-1439页
作者: Khaled Soliman Mohamed Sobh Ayman M.Bahaa-Eldin Department of Computer and Systems Engineering Ain Shams UniversityCairo11517Egypt Department of Computer Engineering Technology ElSewedy University of TechnologyCairo44629Egypt
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins... 详细信息
来源: 评论
Rain Attenuation Modelling Based on Symbolic Regression and Differential Evolution for 5G mmWave Wireless Communication Networks
收藏 引用
Progress in Electromagnetics Research B 2025年 111卷 45-58页
作者: Matondo, Sandra Bazebo Owolawi, Pius Adewale Department of Computer Systems Engineering Tshwane University of Technology Pretoria South Africa
The microphysical structure of rain has a significant impact on the quality of radio signal transmission in the upcoming deployment of 5G millimetre-wave wireless communications in South Africa. To address this, mitig... 详细信息
来源: 评论
Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 299-307页
作者: Xu Yang Hongyan Xing Xinyuan Ji Wei Xu Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and Technology Department of Electrical and Computer Engineering University of Alberta Systems Research Institute Polish Academy of Sciences Department of Computer Engineering Faculty of Engineering and Natural Sciences Istinye University
Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information ... 详细信息
来源: 评论
Why Marginal Pricing?
收藏 引用
Journal of Modern Power systems and Clean Energy 2023年 第3期11卷 693-697页
作者: Antonio J.Conejo Department of Integrated Systems Engineering and the Department of Electrical and Computer Engineering The Ohio State UniversityColumbusOhio 43210USA
Under perfect competition,marginal pricing results in short-term efficiency and the subsequent right short-term price ***,the main reason for the adoption of marginal pricing is not the above,but investment cost *** i... 详细信息
来源: 评论
Real-time drone detection framework based on advanced texture feature extraction and pattern recognition model using GUI
收藏 引用
Neural Computing and Applications 2025年 第5期37卷 3435-3454页
作者: Hussen, Noha Salem, Mofreh Eldesouky, Ali I. Sakr, Noha Elghamrawy, Sally Computers and Control Systems Engineering Department Mansoura University Mansoura Egypt Computer Engineering Department Misr Higher Institute for Engineering and Technology Mansoura Egypt
The increasing prevalence of drones has raised significant concerns regarding their potential for misuse in activities such as smuggling, terrorism, and unauthorized access to restricted airspace. Consequently, the de... 详细信息
来源: 评论
Storing Freshwater Versus Storing Electricity in Power systems with High Freshwater Electric Demand
收藏 引用
Journal of Modern Power systems and Clean Energy 2024年 第2期12卷 323-333页
作者: Mubarak J.Al-Mubarak Antonio J.Conejo Department of Electrical and Computer Engineering The Ohio State UniversityColumbusOHUSA Department of Electrical Engineering Kuwait UniversityP.O.Box 5969Safat 13060Kuwait Department of Integrated Systems Engineering and the Department of Electrical and Computer Engineering The Ohio State UniversityColumbusOH 43210USA IEEE
We consider a power system whose electric demand pertaining to freshwater production is high(high freshwater electric demand),as in the Middle East,and investigate the tradeoff of storing freshwater in tanks versus st... 详细信息
来源: 评论
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
收藏 引用
Tsinghua Science and Technology 2024年 第4期29卷 948-958页
作者: A.E.M.Eljialy Mohammed Yousuf Uddin Sultan Ahmad Department of Information Systems College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i... 详细信息
来源: 评论
A Human Word Association Based Model for Topic Detection in Social Networks
收藏 引用
Annals of Data Science 2024年 1-25页
作者: Ranjbar-Khadivi, Mehrdad Akbarpour, Shahin Feizi-Derakhshi, Mohammad-Reza Anari, Babak Department of Computer Engineering Shabestar Branch Islamic Azad University Shabestar Iran Computerized Intelligence Systems Laboratory Department of Computer Engineering University of Tabriz Tabriz Iran
With the widespread use of social networks, detecting the topics discussed on these platforms has become a significant challenge. Current approaches primarily rely on frequent pattern mining or semantic relations, oft... 详细信息
来源: 评论