咨询与建议

限定检索结果

文献类型

  • 511,792 篇 会议
  • 181,934 篇 期刊文献
  • 3,614 册 图书
  • 12 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 697,350 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 379,694 篇 工学
    • 209,900 篇 计算机科学与技术...
    • 167,878 篇 软件工程
    • 91,204 篇 信息与通信工程
    • 75,032 篇 电气工程
    • 73,746 篇 电子科学与技术(可...
    • 62,915 篇 控制科学与工程
    • 36,351 篇 生物工程
    • 33,061 篇 光学工程
    • 29,078 篇 生物医学工程(可授...
    • 27,263 篇 机械工程
    • 24,302 篇 仪器科学与技术
    • 23,752 篇 动力工程及工程热...
    • 22,763 篇 化学工程与技术
    • 21,905 篇 材料科学与工程(可...
    • 11,310 篇 交通运输工程
    • 11,233 篇 安全科学与工程
    • 10,112 篇 力学(可授工学、理...
  • 216,724 篇 理学
    • 101,768 篇 数学
    • 83,348 篇 物理学
    • 40,756 篇 生物学
    • 32,864 篇 统计学(可授理学、...
    • 27,469 篇 系统科学
    • 24,261 篇 化学
  • 76,718 篇 管理学
    • 48,575 篇 管理科学与工程(可...
    • 30,674 篇 图书情报与档案管...
    • 24,164 篇 工商管理
  • 26,251 篇 医学
    • 21,815 篇 临床医学
    • 19,243 篇 基础医学(可授医学...
    • 12,208 篇 药学(可授医学、理...
  • 14,109 篇 法学
    • 11,784 篇 社会学
  • 9,746 篇 经济学
  • 6,584 篇 农学
  • 6,200 篇 教育学
  • 3,153 篇 文学
  • 1,588 篇 军事学
  • 765 篇 艺术学
  • 95 篇 哲学
  • 56 篇 历史学

主题

  • 22,262 篇 computer science
  • 15,346 篇 computational mo...
  • 11,569 篇 bandwidth
  • 11,543 篇 feature extracti...
  • 11,458 篇 accuracy
  • 9,511 篇 control systems
  • 9,467 篇 costs
  • 9,445 篇 computer archite...
  • 9,444 篇 training
  • 9,368 篇 delay
  • 9,282 篇 testing
  • 9,275 篇 hardware
  • 9,230 篇 machine learning
  • 9,001 篇 application soft...
  • 8,784 篇 algorithm design...
  • 8,744 篇 deep learning
  • 8,585 篇 robustness
  • 8,539 篇 mathematical mod...
  • 8,457 篇 switches
  • 8,420 篇 frequency

机构

  • 5,280 篇 department of el...
  • 1,659 篇 department of co...
  • 1,316 篇 department of co...
  • 1,308 篇 ieee
  • 1,288 篇 department of el...
  • 1,275 篇 department of el...
  • 1,147 篇 department of el...
  • 1,080 篇 department of el...
  • 1,017 篇 department of el...
  • 985 篇 department of el...
  • 959 篇 department of ph...
  • 943 篇 department of el...
  • 940 篇 cavendish labora...
  • 807 篇 oliver lodge lab...
  • 803 篇 physikalisches i...
  • 777 篇 department of co...
  • 776 篇 department of el...
  • 768 篇 department of el...
  • 726 篇 university of ch...
  • 701 篇 department of el...

作者

  • 252 篇 j. wang
  • 252 篇 s. chen
  • 242 篇 barter w.
  • 226 篇 niyato dusit
  • 221 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 212 篇 han zhu
  • 208 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 brundu d.
  • 203 篇 beiter a.
  • 200 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 191 篇 y. chen
  • 190 篇 c. amelung
  • 188 篇 g. bella

语言

  • 670,115 篇 英文
  • 18,757 篇 其他
  • 8,257 篇 中文
  • 286 篇 日文
  • 124 篇 朝鲜文
  • 64 篇 德文
  • 43 篇 法文
  • 31 篇 土耳其文
  • 17 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 12 篇 葡萄牙文
  • 10 篇 荷兰文
  • 4 篇 俄文
  • 3 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Electrical and Computer Engineering"
697354 条 记 录,以下是81-90 订阅
排序:
Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1978-1989页
作者: Ahmad, Shahnawaz Arif, Mohd Mehfuz, Shabana Ahmad, Javed Nazim, Mohd Bennett University School of Computer Science Engineering and Technology Greater Noida201310 India Galgotias University School of Computer Science & Engineering Greater Noida203201 India Jamia Millia Islamia Department of Electrical Engineering New Delhi110025 India Sharda University Department of Computer Science and Engineering Sharda School of Engineering and Technology Greater Noida201310 India Noida Institute of Engineering and Technology Department of Computer Science and Engineering School of Computer Science and IT Greater Noida201306 India
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad... 详细信息
来源: 评论
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
收藏 引用
Cybersecurity 2024年 第1期7卷 1-15页
作者: Armita Kazeminajafabadi Mahdi Imani Department of Electrical and Computer Engineering Northeastern UniversityBostonMAUSA
Early attack detection is essential to ensure the security of complex networks,especially those in critical *** is particularly crucial in networks with multi-stage attacks,where multiple nodes are connected to extern... 详细信息
来源: 评论
Capacitorless Solid-state Power Filter for Single-phase DC-AC Converters
收藏 引用
CES Transactions on electrical Machines and Systems 2024年 第3期8卷 367-377页
作者: Haitham Kanakri Euzeli C.Dos Santos Purdue University Electrical and Computer Engineering DepartmentIndianapolisIN46202 USA
Converters rely on passive filtering as a crucial element due to the high-frequency operational characteristics of power *** filtering methods involve a dual inductor-capacitor(LC)cell or an inductor-capacitor-inducto... 详细信息
来源: 评论
A Similarity-Based Positional Attention-Aided Deep Learning Model for Copy-Move Forgery Detection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4354-4363页
作者: Roy, Ayush Mohiuddin, S.K. Sarkar, Ram Jadavpur University Department of Electrical Engineering Kolkata700032 India Asutosh College Department of Computer Science Kolkata700026 India Jadavpur University Department of Computer Science and Engineering Kolkata700032 India
The process of modifying digital images has been made significantly easier by the availability of several image editing software. However, in a variety of contexts, including journalism, judicial processes, and histor... 详细信息
来源: 评论
Refinement modeling and verification of secure operating systems for communication in digital twins
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 304-314页
作者: Zhenjiang Qian Gaofei Sun Xiaoshuang Xing Gaurav Dhiman School of Computer Science and Engineering Changshu Institute of TechnologySuzhou215500China University Centre for Research and Development Department of Computer Science and EngineeringChandigarh UniversityMohali140413India Department of Computer Science and Engineering Graphic Era Deemed to be UniversityDehradun248002India
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... 详细信息
来源: 评论
An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4643-4662页
作者: Zinah Khalid Jasim Jasim Sefer Kurnaz Department of Electrical and Computer Engineering Altinbas UniversityIstanbul34000Turkey
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)*** steganography,a technique of embedding hidden information in digital photographs,should ideally ac... 详细信息
来源: 评论
Intelligent integrated sensing and communication:a survey
收藏 引用
science China(Information sciences) 2025年 第3期68卷 5-46页
作者: Jifa ZHANG Weidang LU Chengwen XING Nan ZHAO Naofal AL-DHAHIR George K.KARAGIANNIDIS Xiaoniu YANG School of Information and Communication Engineering Dalian University of Technology College of Information Engineering Zhejiang University of Technology School of Information and Electronics Beijing Institute of Technology Department of Electrical and Computer Engineering The University of Texas at Dallas Department of Electrical and Computer Engineering Aristotle University of Thessaloniki
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve... 详细信息
来源: 评论
Design and Develop Function for Research Based Application of Intelligent Internet-of-Vehicles Model Based on Fog Computing
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3805-3824页
作者: Abduladheem Fadhil Khudhur Ayca Kurnaz Türkben Sefer Kurnaz Department of Electrical and Computer Engineering Altinbas UniversityIstanbul34000Turkey
The fast growth in Internet-of-Vehicles(IoV)applications is rendering energy efficiency management of vehicular networks a highly important *** of the existing models are failing to handle the demand for energy conser... 详细信息
来源: 评论
Medicare fraud detection: a comparative study on the effectiveness of one-class and binary classification models
收藏 引用
International Journal of computers and Applications 2025年 第3期47卷 323-328页
作者: Leevy, Joffrey L. Hancock, John Khoshgoftaar, Taghi M. Department of Electrical Engineering and Computer Science Florida Atlantic University Boca RatonFL United States
Research into Medicare fraud detection that utilizes machine learning methodologies is of great national interest due to the significant fiscal ramifications of this type of fraud. Our big data analysis pertains to th... 详细信息
来源: 评论
Embeddings Between State and Action Based Probabilistic Logics
收藏 引用
Formal Aspects of Computing 2025年 第2期37卷 1-58页
作者: Das, Susmoy Sharma, Arpit Department of Electrical Engineering and Computer Science Indian Institute of Science Education and Research Bhopal Madhya Pradesh Bhopal India
This article defines embeddings between state-based and action-based probabilistic logics which can be used to support probabilistic model checking. First, we slightly modify the model embeddings proposed in the liter... 详细信息
来源: 评论