咨询与建议

限定检索结果

文献类型

  • 908 篇 会议
  • 894 篇 期刊文献

馆藏范围

  • 1,802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,052 篇 工学
    • 509 篇 计算机科学与技术...
    • 394 篇 软件工程
    • 199 篇 信息与通信工程
    • 187 篇 电子科学与技术(可...
    • 183 篇 电气工程
    • 129 篇 光学工程
    • 128 篇 生物工程
    • 127 篇 生物医学工程(可授...
    • 120 篇 材料科学与工程(可...
    • 120 篇 化学工程与技术
    • 111 篇 控制科学与工程
    • 73 篇 机械工程
    • 70 篇 动力工程及工程热...
    • 69 篇 仪器科学与技术
    • 44 篇 土木工程
    • 32 篇 船舶与海洋工程
  • 791 篇 理学
    • 367 篇 物理学
    • 246 篇 数学
    • 184 篇 生物学
    • 154 篇 化学
    • 96 篇 统计学(可授理学、...
    • 38 篇 系统科学
  • 218 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 80 篇 工商管理
    • 73 篇 图书情报与档案管...
  • 140 篇 医学
    • 107 篇 临床医学
    • 87 篇 基础医学(可授医学...
    • 47 篇 药学(可授医学、理...
  • 80 篇 教育学
    • 75 篇 教育学
  • 47 篇 法学
    • 42 篇 社会学
  • 34 篇 农学
  • 31 篇 经济学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 27 篇 accuracy
  • 25 篇 deep learning
  • 24 篇 students
  • 24 篇 training
  • 23 篇 machine learning
  • 20 篇 internet of thin...
  • 20 篇 feature extracti...
  • 18 篇 computer science
  • 16 篇 education
  • 16 篇 computational mo...
  • 16 篇 convolutional ne...
  • 14 篇 bandwidth
  • 14 篇 optimization
  • 14 篇 artificial intel...
  • 13 篇 wireless communi...
  • 13 篇 data mining
  • 13 篇 real-time system...
  • 12 篇 computer archite...
  • 12 篇 image segmentati...
  • 12 篇 neural networks

机构

  • 12 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 faculty of infor...
  • 11 篇 department of el...
  • 10 篇 department of ph...
  • 10 篇 department of el...
  • 10 篇 faculty of commu...
  • 9 篇 department of in...
  • 9 篇 ieee
  • 9 篇 school of comput...
  • 8 篇 health managemen...
  • 8 篇 department of bi...
  • 8 篇 department of ph...
  • 8 篇 department of ph...
  • 8 篇 graduate program...
  • 8 篇 university of di...
  • 8 篇 department of ma...
  • 8 篇 interdisciplinar...
  • 8 篇 applied physics ...
  • 8 篇 cognitive engine...

作者

  • 17 篇 heryadi yaya
  • 17 篇 lukas
  • 16 篇 suparta wayan
  • 12 篇 yaya heryadi
  • 11 篇 kono junichiro
  • 11 篇 niyato dusit
  • 11 篇 alù andrea
  • 11 篇 wayan suparta
  • 11 篇 du hongyang
  • 9 篇 xiong zehui
  • 9 篇 kang jiawen
  • 8 篇 tay fuyang
  • 8 篇 mohamed-slim alo...
  • 8 篇 rachmawanto eko ...
  • 7 篇 robbi rahim
  • 7 篇 bens pardamean
  • 7 篇 nuning kurniasih
  • 7 篇 lukas lukas
  • 7 篇 toshiro nunome
  • 7 篇 sari christy ati...

语言

  • 1,724 篇 英文
  • 56 篇 其他
  • 15 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering Technology Program"
1802 条 记 录,以下是251-260 订阅
排序:
Modeling Atomistically Assembled Diffractive Optics in Solids
arXiv
收藏 引用
arXiv 2024年
作者: Kling, Trevor Na, Dong-Yeop Hosseini, Mahdi Department of Electrical and Computer Engineering Applied Physics Program Northwestern University EvanstonIL60208 United States Department of Electrical Engineering Pohang University of Science and Technology Pohang37673 Korea Republic of Elmore Family School of Electrical and Computer Engineering Purdue University West LafayetteIN47907 United States
We develop a model describing long-range atom-atom interactions in a two-dimensional periodic or a-periodic lattice of optical centers inside a solid-state host material. We consider realistic environmental and techni... 详细信息
来源: 评论
Designing Classical Header Bits for Quantum Wrapper Networking with O-band Quantum Signal
Designing Classical Header Bits for Quantum Wrapper Networki...
收藏 引用
2023 Laser Science, LS 2023
作者: Gül, G. On, M. Berkay Singh, S.K. Proietti, R. Kanter, G.S. Yoo, S.J.B. Kumar, P. Graduate Program in Applied Physics Northwestern University 2145 Sheridan Road EvanstonIL60208 United States Department of Electrical and Computer Engineering University of California Davis DavisCA95616 United States Department of Electronics and Communication Eng. Indian Institute of Technology Roorkee247667 India Department of Electronics and Telecommunications Engineering Politecnico di Torino Italy Center for Photonic Communication and Computing Dept. of Electrical and Computer Eng. Northwestern University EvanstonIL60208 United States
We investigate the impact of wavelength choice for the classical headers in quantum wrapper networking with O-band quantum payload. We show that a C-band header performs substantially better than an O-band header. ... 详细信息
来源: 评论
A Two-stage Reconfiguration in Network Function Virtualization: Toward Service Function Chain Optimization
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: Assis, Karcius D. R. Almeida, Raul C. Baghban, Hojjat Santos, Alex F. Boutaba, Raouf Electrical and Computer Engineering Department Salvador Brazil University of Waterloo David R. Cheriton School of Computer Science Canada Department of Electronics and Systems Recife Brazil Chang Gung University Department of Artificial Intelligence Taiwan Chang Gung University College of Intelligent Computing Taiwan Center of Science and Technology in Energy and Sustainability Brazil Postgraduate Program in Computer Science Bahia Brazil
Network Function Virtualization (NFV), as a promising paradigm, speeds up the service deployment by separating network functions from proprietary devices and deploying them on common servers in the form of software. A... 详细信息
来源: 评论
Using Real-Time Integrated computer Vision and Deep Learning for Advanced Factory Safety
Using Real-Time Integrated Computer Vision and Deep Learning...
收藏 引用
Electronic Communications, Internet of Things and Big Data (ICEIB), International Conference on
作者: Shang-Te Tsai Yu-Cheng Chang Chao-Yi Huang Fang-Yuan Yang Wei Chien Zong-Rong Wu School Art and Design Sanming University Fujian China Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Department of Information Management National Yunlin University of Science and Technology Yunlin Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taoyuan Taiwan Department of Technical and Vocational Program in Artificial Intelligence National Yunlin University of Science and Technology Yunlin Taiwan
Innovative safety in the workplace is vital as the high safety risks associated with electrical engineering construction can lead to injuries or even fatalities. Using computer vision technology, we experimented with ... 详细信息
来源: 评论
The Impact of Hot Carrier Injection-Induced Device Degradation for Lower-Power FinFETs
收藏 引用
Journal of Electronic Materials 2023年 第2期52卷 1391-1399页
作者: Chen, Yu-Lin Yeh, Wen-Kuan Hsu, Heng-Tung Chen, Ke-Horng Lien, Der-Hsien Lin, Wen-Chin Yu, Tien-Han Chiu, Yu-Sheng Godwinraj, D. Godfrey, D. Wu, Chien-Hung International College of Semiconductor Technology National Yang Ming Chiao Tung University Hsinchu Taiwan Graduate Degree Program of College of Electrical and Computer Engineering National Yang Ming Chiao Tung University Hsinchu Taiwan Institute of Electronics National Yang Ming Chiao Tung University Hsinchu Taiwan Institute of Microelectronics National Cheng Kung University Tainan Taiwan Department of ECE Amal Jyothi College of Engineering Kerala Kottayam India Department of Optoelectronics and Materials Engineering Chung Hua University Hsinchu Taiwan Department of Electronics and Communication Engineering Dayananda Sagar University Bengaluru India National Applied Research Laboratories Hsinchu Taiwan
The impact of hot carrier injection (HCI) on the performance of standard and low-VT FinFETs are investigated and benchmarked with each other. For this investigation, these FinFETs were fabricated with various gate len... 详细信息
来源: 评论
Comprehensive Analysis and Remediation of Insecure Direct Object References (IDOR) Vulnerabilities in Android APIs
Comprehensive Analysis and Remediation of Insecure Direct Ob...
收藏 引用
Cryptography, Informatics, and Cybersecurity (ICoCICs), IEEE International Conference on
作者: Semi Yulianto Roni Reza Abdullah Benfano Soewito Computer Science Department Binus Graduate Program Computer Science Bina Nusantara University Jakarta Indonesia Faculty of Informatics Engineering National Institute of Science and Technology Jakarta Indonesia Computer Science Department Binus Graduate Program. Master of Computer Science Bina Nusantara University Jakarta Indonesia
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
来源: 评论
Implementation of AI-Based Support Vector Machine Algorithm for Fraud Detection in Digital Payment Systems
Implementation of AI-Based Support Vector Machine Algorithm ...
收藏 引用
International Seminar on Research of Information technology and Intelligent Systems (ISRITI)
作者: Edy Prayitno Rikie Kartadie Uning Lestari Munengsih Sari Bunga Accounting Information Systems Faculty of Information Technology Universitas Teknologi Digital Indonesia Yogyakarta Indonesia Computer Engineering Study Program Faculty of Information Technology Universitas Teknologi Digital Indonesia Yogyakarta Indonesia Informatics Study Program Faculty of Science and Information Technology Universitas Akprind Indonesia Yogyakarta Indonesia Department of Computer Engineering Smart City Information Systems Politeknik Negeri Indramayu Indramayu Indonesia
The increasing use of digital payment systems has led to a rise in fraudulent activities, presenting a significant challenge in ensuring secure transactions. This research focuses on implementing the Support Vector Ma... 详细信息
来源: 评论
Based-on computer Vision Applications for Bus Stop Passenger Detection System
Based-on Computer Vision Applications for Bus Stop Passenger...
收藏 引用
Electronic Communications, Internet of Things and Big Data (ICEIB), International Conference on
作者: Yu-Cheng Chang Hua-Wen Tsai Chao-Yi Huang Zong-Rong Wu Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taiwan Department of Bachelor's Program in Intelligent Robot National Yunlin University of Science and Technology Taiwan Department of Technical and Vocational Program in Artificial Intelligence National Yunlin University of Science and Technology Taiwan
Passenger transport is one of the most common ways of commuting in Taiwan. It plays an important role in the transportation system due to its large number of stations, dense frequency, and cheap transportation. Due to...
来源: 评论
Ant Colony Optimization based Medical Image Preservation and Segmentation  2
Ant Colony Optimization based Medical Image Preservation and...
收藏 引用
2nd IEEE International Conference on Advanced Technologies in Intelligent Control, Environment, Computing and Communication engineering, ICATIECE 2022
作者: Nandihal, Priya Pareek, Piyush Kumar De Albuquerque, Victor Hugo Costa Madhumala, R.B. Khanna, Ashish Sunil Kumar, V. Dayananda Sagar Academy of Technology and Management Dept of Computer Science and Design Bangalore India Graduate Program in Telecommunication Engineering Federal Institute of Education Science and Technology of Ceara Fortaleza Brazil Federal University of Ceara Department of Teleinformatics Engineering Brazil Maharaja Agrasen Institute of Technology GGSIPU CSE Dept India Nitte Meenakshi Institute of Technology Department of Artificial Intelligence & Machine Learning Bengaluru India
Image segmentation is an essential component in many different types of computer vision systems. Image segmentation is used in order to identify objects and boundaries within pictures. It is important to note that the... 详细信息
来源: 评论
Feasibility Study of Semi-supervised Intrusion Detection Systems for Industrial Control Systems
Feasibility Study of Semi-supervised Intrusion Detection Sys...
收藏 引用
International Conference on Applied System Innovation (ICASI)
作者: Fu-Nie Loo Tung-Shou Chen Chia-Wei Tsai Jason Lin Chun-Wei Yang Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung City Taiwan Department of Computer Science and Engineering National Chung Hsing University Taichung City Taiwan Master Program for Digital Health Innovation China Medical University Taichung City Taiwan
Industrial Control systems (ICS) automate industrial processes but also introduces cybersecurity threats. Intrusion Detection System (IDS) are crucial for detecting cyber-attacks on ICS, yet zero-day attacks are often... 详细信息
来源: 评论