咨询与建议

限定检索结果

文献类型

  • 511,400 篇 会议
  • 181,371 篇 期刊文献
  • 3,600 册 图书
  • 12 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 696,381 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 379,452 篇 工学
    • 209,795 篇 计算机科学与技术...
    • 167,869 篇 软件工程
    • 91,198 篇 信息与通信工程
    • 74,974 篇 电气工程
    • 73,736 篇 电子科学与技术(可...
    • 62,898 篇 控制科学与工程
    • 36,350 篇 生物工程
    • 33,055 篇 光学工程
    • 29,074 篇 生物医学工程(可授...
    • 27,254 篇 机械工程
    • 24,301 篇 仪器科学与技术
    • 23,730 篇 动力工程及工程热...
    • 22,751 篇 化学工程与技术
    • 21,897 篇 材料科学与工程(可...
    • 11,308 篇 交通运输工程
    • 11,230 篇 安全科学与工程
    • 10,108 篇 力学(可授工学、理...
  • 216,636 篇 理学
    • 101,754 篇 数学
    • 83,323 篇 物理学
    • 40,733 篇 生物学
    • 32,861 篇 统计学(可授理学、...
    • 27,466 篇 系统科学
    • 24,253 篇 化学
  • 76,688 篇 管理学
    • 48,552 篇 管理科学与工程(可...
    • 30,673 篇 图书情报与档案管...
    • 24,163 篇 工商管理
  • 26,201 篇 医学
    • 21,786 篇 临床医学
    • 19,235 篇 基础医学(可授医学...
    • 12,206 篇 药学(可授医学、理...
  • 14,106 篇 法学
    • 11,782 篇 社会学
  • 9,746 篇 经济学
  • 6,564 篇 农学
  • 6,194 篇 教育学
  • 3,153 篇 文学
  • 1,590 篇 军事学
  • 764 篇 艺术学
  • 95 篇 哲学
  • 56 篇 历史学

主题

  • 22,257 篇 computer science
  • 15,310 篇 computational mo...
  • 11,565 篇 bandwidth
  • 11,492 篇 feature extracti...
  • 11,382 篇 accuracy
  • 9,507 篇 control systems
  • 9,459 篇 costs
  • 9,437 篇 computer archite...
  • 9,373 篇 training
  • 9,366 篇 delay
  • 9,272 篇 testing
  • 9,268 篇 hardware
  • 9,188 篇 machine learning
  • 9,001 篇 application soft...
  • 8,784 篇 algorithm design...
  • 8,695 篇 deep learning
  • 8,577 篇 robustness
  • 8,539 篇 mathematical mod...
  • 8,453 篇 switches
  • 8,420 篇 frequency

机构

  • 5,274 篇 department of el...
  • 1,653 篇 department of co...
  • 1,315 篇 department of co...
  • 1,308 篇 ieee
  • 1,288 篇 department of el...
  • 1,275 篇 department of el...
  • 1,143 篇 department of el...
  • 1,080 篇 department of el...
  • 1,017 篇 department of el...
  • 982 篇 department of el...
  • 959 篇 department of ph...
  • 945 篇 department of el...
  • 940 篇 cavendish labora...
  • 808 篇 physikalisches i...
  • 807 篇 oliver lodge lab...
  • 776 篇 department of el...
  • 770 篇 department of co...
  • 764 篇 department of el...
  • 725 篇 university of ch...
  • 701 篇 department of el...

作者

  • 255 篇 s. chen
  • 253 篇 j. wang
  • 242 篇 barter w.
  • 226 篇 niyato dusit
  • 221 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 212 篇 han zhu
  • 208 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 brundu d.
  • 203 篇 beiter a.
  • 202 篇 boettcher t.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 192 篇 c. amelung
  • 192 篇 y. chen
  • 190 篇 g. bella

语言

  • 669,153 篇 英文
  • 18,758 篇 其他
  • 8,249 篇 中文
  • 286 篇 日文
  • 124 篇 朝鲜文
  • 63 篇 德文
  • 43 篇 法文
  • 31 篇 土耳其文
  • 17 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 12 篇 葡萄牙文
  • 10 篇 荷兰文
  • 4 篇 俄文
  • 3 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer and Electrical Engineering and Computer Science"
696385 条 记 录,以下是4721-4730 订阅
排序:
Automate Threat Detection and Analysis Through Intelligent Data Mining Techniques for Network Traffic and Cybersecurity  2nd
Automate Threat Detection and Analysis Through Intelligent D...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Muloor, Kiran Hemanthraj Sahu, Somesh Samanta, Debabrata Karuppiah, Marimuthu Bhattacharya, Abhishek Dutta, Soumi LTIMindtree Limited Karnataka Bangalore India Department of Computer Science CHRIST University Karnataka Bangalore India Department of Computing and Information Technologies Rochester Institute of Technology Pristina Kosovo School of Computer Science and Engineering and Information Science Presidency University Karnataka Bengaluru560064 India Sister Nivedita University Kolkata India
Today, we are constantly surrounded by vast amounts of data, a trend that is expected to grow significantly over the next decade. The abundance of data presents challenges for thorough analysis and extraction of valua... 详细信息
来源: 评论
An 81.7M Ω-lnput-lmpedance 179.5dB-FOMSNDR 1.8Vpp-lnput-Range Noise-Shaping-SAR-Based Sensing Frontend with Dynamic Input-Impedance Boosting and Prediction-Assisted Mismatch-Shaping-DEM
An 81.7M Ω-lnput-lmpedance 179.5dB-FOMSNDR 1.8Vpp-lnput-Ran...
收藏 引用
Custom Integrated Circuits Conference (CICC)
作者: Yiming Han Linran Zhao Tzuping Huang Alper Bozkurt Yaoyao Jia Chandra Family Department of Electrical and Computer Engineering The University of Texas at Austin USA Department of Electrical and Computer Engineering North Carolina State University USA
Sensing body vital signals, such as ECG, EEG, EMG, and EOG (ExG), is crucial for human health monitoring. To achieve accurate signal acquisition, sensing frontends are expected to have high input impedance $(Z_{1\math... 详细信息
来源: 评论
Reinforcement Learning-based Hybrid Routing Algorithms for Vehicular Ad Hoc Networks
收藏 引用
Procedia computer science 2025年 257卷 623-630页
作者: Narges Haghighati Boroujeni Suprakash Datta Pouya Firouzmakan Telus Corp Toronto Canada Electrical Engineering and Computer Science Dept York University Toronto Canada
This paper proposes a new hybrid routing algorithm, ReLeVR, for vehicular ad hoc networks (VANETs). Our algorithm aims to efficiently solve the problem of routing messages from vehicles to specific geographical locati... 详细信息
来源: 评论
Efficient Policy Iteration and Value Iteration via State Space Clustering
Efficient Policy Iteration and Value Iteration via State Spa...
收藏 引用
2025 IEEE SoutheastCon, SoutheastCon 2025
作者: Paidi, Avinash Mitra, Pabitra Indian Institute of Technology Department of Artificial Intelligence Kharagpur India Indian Institute of Technology Department of Computer Science and Engineering Kharagpur India
This paper presents a novel state-space clustering technique specifically designed for Reinforcement Learning (RL) problems with discrete state and action spaces. Building on this clustering methodology, we propose a ... 详细信息
来源: 评论
A Study of Contemporary ML Algorithm on Intrusion Detection Using IIoT Datasets
收藏 引用
Procedia computer science 2025年 258卷 3682-3692页
作者: Sunday A. Ajagbe T. Ananth Kumar Rajendrane Rajmohan Emmanuel O. Balogun Oluwafemi O. Olawoyind Morolake O. Lawrence Matthew O. Adigun Computer Science Department University of Zululand Kwadlangezwa 3886 South Africa Computer Engineering Department Abiola Ajimobi Technical University Ibadan 200255 Nigeria Computer Science and Engineering Department IFET College of Engineering India Computing Technologies Department SRM Institute of Science and Technology India ICT Unit Ajayi Crowther University Oyo Oyo Nigeria Computer Science Department Baze University Abuja Nigeria
The global digitization of most activities of corporate and non-corporate bodies has come to stay. The interconnection of physical object "things" embedded with different technologies such as sensors, softwa... 详细信息
来源: 评论
Optimized deep transfer learning techniques for spine fracture detection using CT scan images
收藏 引用
Multimedia Tools and Applications 2025年 1-34页
作者: Kanna, G. Prabu Kumar, Jagadeesh Parthasarathi, P. Bhardwaj, Priya Kumar, Yogesh VIT Bhopal University Bhopal India Department of Computer Science and Engineering Kathir College of Engineering Coimbatore India Department of CS Bannari Amman Institute of Technology Sathyamangalam India School of Computing DIT University Dehradun India Department of CSE School of Technology Pandit Deendayal Energy University Gujarat Gandhinagar India
Spine fractures pose an important health concern that requires a quick diagnosis to protect people from any long-term complications. This paper aims to propose an automatic prediction system that uses deep transfer le... 详细信息
来源: 评论
Infants Sucking Pattern Identification Using Machine-Learned Computational Modeling
收藏 引用
Journal of engineering and science in Medical Diagnostics and Therapy 2025年 第3期8卷 031003页
作者: Olapojoye, Abdullahi Singh, Abhishek Nishi, Eri Fei, Baowei Nostratinia, Aria Hassanipour, Fatemeh Department of Mechanical Engineering University of Texas at Dallas RichardsonTX75080 United States Department of Electrical Engineering Setsunan University Osaka Prefecture Neyagawa572-8508 Japan Department of Bioengineering University of Texas at Dallas RichardsonTX75080 United States Department of Radiology UT Southwestern Medical Center DallasTX75390 United States Department of Electrical and Computer Engineering University of Texas at Dallas RichardsonTX75080 United States
Breastfeeding involves a complex coordination of swallowing, breathing, and sucking, with the infant's sucking proficiency being crucial for adequate nutrient intake. However, real-time assessment of milk intake i... 详细信息
来源: 评论
Intermediate-Task Transfer Learning: Leveraging Sarcasm Detection for Stance Detection
arXiv
收藏 引用
arXiv 2025年
作者: Nkhata, Gibson Gauch, Susan Department of Electrical Engineering & Computer Science University of Arkansas FayettevilleAR72701 United States
Stance Detection (SD) in the context of social media has emerged as a prominent area of interest with implications for social, business, and political applications, thereby garnering escalating research attention with... 详细信息
来源: 评论
Intrusion Detection in Cybersecurity: A Machine Learning Classifier with Optimized Feature Selection  3
Intrusion Detection in Cybersecurity: A Machine Learning Cla...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Ahamed, S. Niyas Thayanandeswari, C. S. Sree Vasanth, R. Durai Subharathna, N. Malik, M. Abdul Tamizharasi, A. Anna University Department of Electronics and Communication Engineering Chennai India Pet Engineering College Department of Electronics and Communication Engineering Tirunelveli India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Bannari Amman Institute of Technology Department of Electronics and Communication Engineering Erode India R.M.D Engineering College Department of Computer Science and Engineering Thiruvallur India
Concerns about security and privacy were heightened by the increasing dependence on interconnected networks, underscoring the vital role intrusion detection systems (IDS) play in protecting private data. As essential ... 详细信息
来源: 评论
Leveraging Feature engineering and Machine Learning for Internet of Things (IoT) Cyberattack Detection: A Scalable Approach
Leveraging Feature Engineering and Machine Learning for Inte...
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Arafat Asim Peter J. Hawrylak School of Cyber Studies College of Engineering and Computer Science The University of Tulsa Tulsa OK USA Electrical & Computer Engineering College of Engineering and Computer Science The University of Tulsa Tulsa OK USA
Internet of Things (IoT) devices are a fast-growing market, but they also possess a great challenge in terms of cyber-security, and therefore need a strong intrusion detection system (IDS). We present a machine learni... 详细信息
来源: 评论