咨询与建议

限定检索结果

文献类型

  • 3,312 篇 会议
  • 2,013 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,362 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,174 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 960 篇 信息与通信工程
    • 487 篇 电气工程
    • 475 篇 电子科学与技术(可...
    • 405 篇 控制科学与工程
    • 275 篇 生物工程
    • 216 篇 生物医学工程(可授...
    • 194 篇 光学工程
    • 172 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 99 篇 材料科学与工程(可...
    • 88 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,659 篇 理学
    • 831 篇 数学
    • 558 篇 物理学
    • 315 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 171 篇 系统科学
    • 129 篇 化学
  • 725 篇 管理学
    • 483 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 158 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 103 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 78 篇 wireless communi...
  • 77 篇 computer archite...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 69 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 64 篇 costs
  • 64 篇 machine learning

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,062 篇 英文
  • 208 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5362 条 记 录,以下是1021-1030 订阅
排序:
Safeguarding Smart Vehicles: GNN-Powered Real- Time IDS for CAN networks
Safeguarding Smart Vehicles: GNN-Powered Real- Time IDS for ...
收藏 引用
Machine Intelligence and Smart Innovation (ICMISI), International Conference on
作者: Sarah El-Dawy Abdallah Hussien Mostafa Ammar Ahmed El-Dawy Software Development Engineer S2S Vista Virtual Platforms Siemens EDA Cairo Egypt Electrical and Computer Engineering Department University of Waterloo Waterloo Canada Computer Network and Datacenter Department Arab Academy for Science Technology and Submarine Alexandria Egypt Electrical Power Department University of Alexandria Alexandria Egypt
With the increasing integration of Controller Area network (CAN) in modern vehicles, securing the communication network from malicious attacks is imperative. A novel Graph Neural network (GNN)-based Intrusion Detectio... 详细信息
来源: 评论
Defensive Auto-Updatable and Adaptable Bot Recommender System (DAABRS): A New Architecture Approach in Cloud Computing Systems
Defensive Auto-Updatable and Adaptable Bot Recommender Syste...
收藏 引用
Human-computer Interaction, Optimization and Robotic Applications (HORA), International Congress on
作者: Sufian Khwaldeh Mohit Y Khushwant S Department of Network and Information Security College of Information Technology University of Fujairah UAE Department of Information Technology Faculty of Information Technology and Systems The University of Jordan Aqaba Jordan Department of Mathematics University Institute of Sciences Chandigarh University Mohali Punjab India Department of Computer Science & Engineering University Institute of Engineering and Technology M. D. University Rohtak India
Cloud server data security makes extensive use of data centers and instantly accessible edge systems for possible transactions involving sizable and confidential data. These Edge Systems are chosen for rental based on... 详细信息
来源: 评论
Joint Precoding and Reflection Optimization for IRS-Assisted MU-MIMO-OTFS Downlink Systems
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Zou, Tingting Wang, Fengyu Xu, Wenjun Zhang, Yimeng Pan, Miao Han, Zhu Beijing University of Posts and Telecommunications State Key Laboratory of Network and Switching Technology Beijing100876 China Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing100876 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology China Mobile Research Institute Beijing100876 China University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Orthogonal time frequency space (OTFS) modulation has been proposed as a promising technique to achieve high-reliability communications in high-mobility scenarios. In this paper, we consider a multi-user (MU) multiple... 详细信息
来源: 评论
A Comparative Study for Predicting Burned Areas of a Forest Fire Using Soft Computing Techniques  2nd
A Comparative Study for Predicting Burned Areas of a Forest ...
收藏 引用
2nd International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2020
作者: Al-Shourbaji, Ibrahim Alhameed, Mohammed Katrawi, Anwer Jeribi, Fathe Alim, Sophia Department of Computer and Network Engineering Computer Science and Information Technology College Jazan University Jazan82822-6649 Saudi Arabia Department of Computer Science Computer Science and Information Technology College Jazan University Jazan82822-6649 Saudi Arabia Faculty Member Academic Development Deanship Jazan University Jazan82822-6649 Saudi Arabia Department of Information Technology and Security Computer Science and Information Technology College Jazan University Jazan82822-6649 Saudi Arabia Independent Researcher Bradford United Kingdom
Forest fires is an important environmental disasters that have many consequences in our life. As a result, early forecasting and rapid action of fires are needed to control such a phenomenon and saving lives. In this ... 详细信息
来源: 评论
Collaborative Reinforcement Learning Based Unmanned Aerial Vehicle (UAV) Trajectory Design for 3D UAV Tracking
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Yujiao Chen, Mingzhe Wang, Sihua Hu, Ye Liu, Yuchen Yin, Changchuan The Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing100876 China The Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States The Department of Industrial and System Engineering University of Miami Coral GablesFL33146 United States The Department of Computer Science North Carolina State University RaleighNC27695 United States
In this paper, the problem of using one active unmanned aerial vehicle (UAV) and four passive UAVs to localize a 3D target UAV in real time is investigated. In the considered model, each passive UAV receives reflectio... 详细信息
来源: 评论
Enhancing Efficiency and Empowering Institutions: Leveraging Wireless Sensor Devices, IoT Edge Computing, and Fog Computing in Educational Systems
Enhancing Efficiency and Empowering Institutions: Leveraging...
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Shams Tabrez Siddiqui Md Mohammed Ali Sohail Aasif Aftab Mohd Sarfaraz Mohammad Imran Alam Abu Salim Department of Computer Science College of CS & IT Jazan University Jazan Saudi Arabia Department of Computer & Network Engineering College of CS & IT Jazan University Jazan K.S.A Department of Information Technology and Security College of CS & IT Jazan University Jazan Saudi Arabia
Wireless sensor devices, edge computing, and fog computing can transform education by improving efficiency and empowering institutions. This research paper explores the application of these technologies in educational...
来源: 评论
Detecting Activities of Daily Living in Egocentric Video to Contextualize Hand Use at Home in Outpatient Neurorehabilitation Settings
arXiv
收藏 引用
arXiv 2024年
作者: Kadambi, Adesh Zariffa, José Institute of Biomedical Engineering University of Toronto TorontoON Canada KITE - Toronto Rehabilitation Institute University Health Network TorontoON Canada Rehabilitation Sciences Institute University of Toronto TorontoON Canada Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto TorontoON Canada
Wearable egocentric cameras and machine learning have the potential to provide clinicians with a more nuanced understanding of patient hand use at home after stroke and spinal cord injury (SCI). However, they require ...
来源: 评论
ATEDU-NET: An Attention-Embedded Deep Unet for multi-disease diagnosis in chest X-ray images, breast ultrasound, and retina fundus
收藏 引用
computers in Biology and Medicine 2025年 186卷 109708-109708页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Ejiyi, Makuachukwu Bennedith Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Onyekwere, Favour Ezinne Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering Chengdu University of Technology Sichuan 610059 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In image segmentation for medical image analysis, effective upsampling is crucial for recovering spatial information lost during downsampling. This challenge becomes more pronounced when dealing with diverse medical i... 详细信息
来源: 评论
Sum Computation Rate Maximization in Self-Sustainable RIS-Assisted MEC
Sum Computation Rate Maximization in Self-Sustainable RIS-As...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Han Li Ming Liu Bo Gao Ke Xiong Pingyi Fan Khaled B. Letaief Engineering Research Center of Network Management Technology for High Speed Railway of Ministry of Education School of Computer and Information Technology Beijing Jiaotong University Beijing China Collaborative Innovation Center of Railway Traffic Safety Beijing Jiaotong University Beijing China Department of Electronic Engineering Tsinghua University Beijing China Department of Electrical and Computer Engineering Hong Kong University of Science and Technology Hong Kong
This paper studies a self-sustainable reconfigurable intelligent surface (SRIS)-assisted mobile edge computing (MEC) network, where a SRIS first harvests energy from a hybrid access point (HAP), and then enhances the ...
来源: 评论
SSI−FL: Self-sovereign identity based privacy-preserving federated learning
收藏 引用
Journal of Parallel and Distributed Computing 2024年 191卷
作者: Haque, Rakib Ul Touhidul Hasan, A.S.M. Al-Hababi, Mohammed Ali Mohammed Zhang, Yuqing Xu, Dianxiang Department of Electrical & Computer Engineering University of Texas at San Antonio San Antonio United States School of Computer Science & Technology University of Chinese Academy of Sciences Beijing100049 China Division of Computing Analytics and Mathematics School of Science and Engineering University of Missouri-Kansas City Kansas CityMO64110 United States School of Computer Science & Technology University of Chinese Academy of Sciences Beijing101408 China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing100049 China
Traditional federated learning (FL) raises security and privacy concerns such as identity fraud, data poisoning attacks, membership inference attacks, and model inversion attacks. In the conventional FL, any entity ca... 详细信息
来源: 评论