咨询与建议

限定检索结果

文献类型

  • 513,770 篇 会议
  • 182,881 篇 期刊文献
  • 3,623 册 图书
  • 12 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 700,284 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 381,920 篇 工学
    • 211,232 篇 计算机科学与技术...
    • 168,609 篇 软件工程
    • 91,743 篇 信息与通信工程
    • 75,383 篇 电气工程
    • 74,048 篇 电子科学与技术(可...
    • 63,625 篇 控制科学与工程
    • 36,509 篇 生物工程
    • 33,206 篇 光学工程
    • 29,279 篇 生物医学工程(可授...
    • 27,363 篇 机械工程
    • 24,392 篇 仪器科学与技术
    • 23,844 篇 动力工程及工程热...
    • 22,864 篇 化学工程与技术
    • 22,145 篇 材料科学与工程(可...
    • 11,388 篇 交通运输工程
    • 11,317 篇 安全科学与工程
    • 10,155 篇 力学(可授工学、理...
  • 217,658 篇 理学
    • 102,103 篇 数学
    • 83,765 篇 物理学
    • 40,843 篇 生物学
    • 33,009 篇 统计学(可授理学、...
    • 27,495 篇 系统科学
    • 24,501 篇 化学
  • 77,044 篇 管理学
    • 48,771 篇 管理科学与工程(可...
    • 30,809 篇 图书情报与档案管...
    • 24,282 篇 工商管理
  • 26,512 篇 医学
    • 22,052 篇 临床医学
    • 19,369 篇 基础医学(可授医学...
    • 12,212 篇 药学(可授医学、理...
  • 14,152 篇 法学
    • 11,815 篇 社会学
  • 9,776 篇 经济学
  • 6,644 篇 农学
  • 6,237 篇 教育学
  • 3,150 篇 文学
  • 1,589 篇 军事学
  • 766 篇 艺术学
  • 94 篇 哲学
  • 55 篇 历史学

主题

  • 22,265 篇 computer science
  • 15,474 篇 computational mo...
  • 11,728 篇 accuracy
  • 11,629 篇 feature extracti...
  • 11,579 篇 bandwidth
  • 9,513 篇 control systems
  • 9,509 篇 training
  • 9,484 篇 computer archite...
  • 9,482 篇 costs
  • 9,367 篇 delay
  • 9,319 篇 machine learning
  • 9,310 篇 testing
  • 9,282 篇 hardware
  • 9,000 篇 application soft...
  • 8,997 篇 deep learning
  • 8,784 篇 algorithm design...
  • 8,630 篇 robustness
  • 8,539 篇 mathematical mod...
  • 8,465 篇 switches
  • 8,420 篇 frequency

机构

  • 5,287 篇 department of el...
  • 1,670 篇 department of co...
  • 1,314 篇 department of co...
  • 1,308 篇 ieee
  • 1,288 篇 department of el...
  • 1,277 篇 department of el...
  • 1,146 篇 department of el...
  • 1,080 篇 department of el...
  • 1,018 篇 department of el...
  • 985 篇 department of el...
  • 961 篇 department of ph...
  • 942 篇 cavendish labora...
  • 939 篇 department of el...
  • 806 篇 oliver lodge lab...
  • 803 篇 physikalisches i...
  • 780 篇 department of co...
  • 775 篇 department of el...
  • 771 篇 department of el...
  • 737 篇 university of ch...
  • 702 篇 department of el...

作者

  • 252 篇 j. wang
  • 252 篇 s. chen
  • 242 篇 barter w.
  • 237 篇 niyato dusit
  • 221 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 215 篇 han zhu
  • 208 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 brundu d.
  • 203 篇 beiter a.
  • 200 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 190 篇 c. amelung
  • 189 篇 y. chen
  • 188 篇 g. bella

语言

  • 663,017 篇 英文
  • 28,723 篇 其他
  • 8,369 篇 中文
  • 286 篇 日文
  • 126 篇 朝鲜文
  • 71 篇 德文
  • 44 篇 法文
  • 31 篇 土耳其文
  • 25 篇 斯洛文尼亚文
  • 20 篇 西班牙文
  • 12 篇 葡萄牙文
  • 8 篇 俄文
  • 7 篇 阿拉伯文
  • 6 篇 荷兰文
  • 4 篇 意大利文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Computer Science and Electrical Engineering"
700288 条 记 录,以下是551-560 订阅
排序:
NCFS:new chaotic fuzzy system as a general function approximator
收藏 引用
Journal of Control and Decision 2023年 第4期10卷 514-528页
作者: Hamid Abbasi Mahdi Yaghoobi Arash Sharifi Mohammad Teshnehlab Department of Computer Engineering Science and Research BranchIslamic Azad UniversityTehranIran Department of Electrical and Computer Engineering Mashhad BranchIslamic Azad UniversityMashhadIran Department of Electrical and Computer Engineering K.N.T University of TechnologyTehranIran
Conventional fuzzy systems(type-1 and type 2)are universal *** goal of this paper is to design and implement a new chaotic fuzzy system(NCFS)based on the Lee oscil-lator for function approximation and chaotic *** inco... 详细信息
来源: 评论
Insider Attack Prevention:LAPUP—Lightweight Authentication Protocol Using PUF
收藏 引用
Journal of Communications and Information Networks 2024年 第2期9卷 192-206页
作者: Siranjeevi Rajamanickam Satyanarayana Vollala N.Ramasubramanian Department of Computer Engineering Government Polytechnic CollegeTiruchirappalli 620022India Department of Computer Science and Engineering Dr.Shyama Prasad Mukherjee International Institute of Information Technology-Naya RaipurChhattisgarh 493661India Department of Computer Science and Engineering National Institute of TechnologyTiruchirappalli 620015India
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha... 详细信息
来源: 评论
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
收藏 引用
Designs, Codes, and Cryptography 2024年 第6期92卷 1477-1500页
作者: Tseng, Yi-Fan Liu, Zi-Yuan Tso, Raylin Department of Computer Science National Chengchi University Zhinan Rd. Taipei116011 Taiwan Division of Electrical Engineering and Computer Science Kanazawa University Kakumamachi Ishikawa Kanazawa920-1192 Japan
With the rise of cloud computing, multi-user scenarios have become a common setting for data sharing nowadays. The conservative security notion might not be sufficient for such a data sharing model. As a response to t... 详细信息
来源: 评论
Optimized Distribution Systems Reconfiguration Considering Protection Devices Constraints
收藏 引用
IEEE Transactions on Power Delivery 2025年 第3期40卷 1267-1278页
作者: Kahnamouei, Ali Shakeri Lotfifard, Saeed Rostami, Mohammadali Washington State University School of Electrical Engineering and Computer Science PullmanWA99164 United States
This paper presents a method for the optimized reconfiguration of radial distribution systems that explicitly considers the protection systems constraints. A fully automated method based on graph analysis is proposed ... 详细信息
来源: 评论
Incomplete and Asymmetric Information in General Lotto Games
收藏 引用
IEEE Transactions on Automatic Control 2024年 第6期70卷 3617-3632页
作者: Paarporn, Keith Chandan, Rahul Alizadeh, Mahnoosh Marden, Jason R. University of Colorado Department of Computer Science Colorado Springs United States Amazon Robotics United States University of California Department of Electrical and Computer Engineering Santa BarbaraCA United States
In this paper, we consider incomplete and asymmetric information formulations of the General Lotto game, which describes two opposing players that strategically allocate limited resources over multiple contests. In pa... 详细信息
来源: 评论
A Study on the Explainability of Thyroid Cancer Prediction:SHAP Values and Association-Rule Based Feature Integration Framework
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3111-3138页
作者: Sujithra Sankar S.Sathyalakshmi Department of Computer Applications Hindustan Institute of Technology and ScienceChennaiTamil NaduIndia Department of Computer Engineering Hindustan Institute of Technology and ScienceChennaiTamil NaduIndia
In the era of advanced machine learning techniques,the development of accurate predictive models for complex medical conditions,such as thyroid cancer,has shown remarkable *** predictivemodels for thyroid cancer enhan... 详细信息
来源: 评论
Hybrid NOMA Based MIMO Offloading for Mobile Edge Computing in 6G Networks
收藏 引用
China Communications 2022年 第10期19卷 12-20页
作者: Yunus Dursun Fang Fang Zhiguo Ding School of Electrical and Electronic Engineering University of ManchesterManchesterUK Department of Electrical and Computer Engineering and the Department of Computer Science Western UniversityLondonCanada
Non-orthogonal multiple access (NOMA), multiple-input multiple-output (MIMO) and mobile edge computing (MEC) are prominent technologies to meet high data rate demand in the sixth generation (6G) communication networks... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
Cross-subcarrier precoder design for massive MIMO-OFDM downlink with symplectic optimization
收藏 引用
science China(Information sciences) 2025年 第2期68卷 216-229页
作者: Yuxuan ZHANG An-An LU Xiang-Gen XIA Xiqi GAO National Mobile Communications Research Laboratory Southeast University Purple Mountain Laboratories Department of Electrical and Computer Engineering University of Delaware
We propose a cross-subcarrier precoder design(CSPD) for massive multiple-input multiple-output(MIMO) orthogonal frequency division multiplexing(OFDM) downlink. This work aims to significantly improve the channel estim... 详细信息
来源: 评论
A Novel Enhanced Approach for Security and Privacy Preserving in IoT Devices with Federal Learning Technique
收藏 引用
SN computer science 2024年 第6期5卷 750页
作者: Moeed, Syed Abdul Karnati, Ramesh Ashmitha, G. Mohammad, Gouse Baig Mohanty, Sachi Nandan Department of Computer Science and Engineering Kakatiya Institute of Technology and Science Department of Computer Science and Engineering Vardhaman College of Engineering School of Computer Science & amp Engineering (SCOPE) VIT-AP University
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa... 详细信息
来源: 评论