咨询与建议

限定检索结果

文献类型

  • 513,770 篇 会议
  • 182,881 篇 期刊文献
  • 3,623 册 图书
  • 12 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 700,284 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 381,920 篇 工学
    • 211,232 篇 计算机科学与技术...
    • 168,609 篇 软件工程
    • 91,743 篇 信息与通信工程
    • 75,383 篇 电气工程
    • 74,048 篇 电子科学与技术(可...
    • 63,625 篇 控制科学与工程
    • 36,509 篇 生物工程
    • 33,206 篇 光学工程
    • 29,279 篇 生物医学工程(可授...
    • 27,363 篇 机械工程
    • 24,392 篇 仪器科学与技术
    • 23,844 篇 动力工程及工程热...
    • 22,864 篇 化学工程与技术
    • 22,145 篇 材料科学与工程(可...
    • 11,388 篇 交通运输工程
    • 11,317 篇 安全科学与工程
    • 10,155 篇 力学(可授工学、理...
  • 217,658 篇 理学
    • 102,103 篇 数学
    • 83,765 篇 物理学
    • 40,843 篇 生物学
    • 33,009 篇 统计学(可授理学、...
    • 27,495 篇 系统科学
    • 24,501 篇 化学
  • 77,044 篇 管理学
    • 48,771 篇 管理科学与工程(可...
    • 30,809 篇 图书情报与档案管...
    • 24,282 篇 工商管理
  • 26,512 篇 医学
    • 22,052 篇 临床医学
    • 19,369 篇 基础医学(可授医学...
    • 12,212 篇 药学(可授医学、理...
  • 14,152 篇 法学
    • 11,815 篇 社会学
  • 9,776 篇 经济学
  • 6,644 篇 农学
  • 6,237 篇 教育学
  • 3,150 篇 文学
  • 1,589 篇 军事学
  • 766 篇 艺术学
  • 94 篇 哲学
  • 55 篇 历史学

主题

  • 22,265 篇 computer science
  • 15,474 篇 computational mo...
  • 11,728 篇 accuracy
  • 11,629 篇 feature extracti...
  • 11,579 篇 bandwidth
  • 9,513 篇 control systems
  • 9,509 篇 training
  • 9,484 篇 computer archite...
  • 9,482 篇 costs
  • 9,367 篇 delay
  • 9,319 篇 machine learning
  • 9,310 篇 testing
  • 9,282 篇 hardware
  • 9,000 篇 application soft...
  • 8,997 篇 deep learning
  • 8,784 篇 algorithm design...
  • 8,630 篇 robustness
  • 8,539 篇 mathematical mod...
  • 8,465 篇 switches
  • 8,420 篇 frequency

机构

  • 5,287 篇 department of el...
  • 1,670 篇 department of co...
  • 1,314 篇 department of co...
  • 1,308 篇 ieee
  • 1,288 篇 department of el...
  • 1,277 篇 department of el...
  • 1,146 篇 department of el...
  • 1,080 篇 department of el...
  • 1,018 篇 department of el...
  • 985 篇 department of el...
  • 961 篇 department of ph...
  • 942 篇 cavendish labora...
  • 939 篇 department of el...
  • 806 篇 oliver lodge lab...
  • 803 篇 physikalisches i...
  • 780 篇 department of co...
  • 775 篇 department of el...
  • 771 篇 department of el...
  • 737 篇 university of ch...
  • 702 篇 department of el...

作者

  • 252 篇 j. wang
  • 252 篇 s. chen
  • 242 篇 barter w.
  • 237 篇 niyato dusit
  • 221 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 215 篇 han zhu
  • 208 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 brundu d.
  • 203 篇 beiter a.
  • 200 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 190 篇 c. amelung
  • 189 篇 y. chen
  • 188 篇 g. bella

语言

  • 663,017 篇 英文
  • 28,723 篇 其他
  • 8,369 篇 中文
  • 286 篇 日文
  • 126 篇 朝鲜文
  • 71 篇 德文
  • 44 篇 法文
  • 31 篇 土耳其文
  • 25 篇 斯洛文尼亚文
  • 20 篇 西班牙文
  • 12 篇 葡萄牙文
  • 8 篇 俄文
  • 7 篇 阿拉伯文
  • 6 篇 荷兰文
  • 4 篇 意大利文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Electrical Engineering and Computer Computer Science"
700288 条 记 录,以下是591-600 订阅
排序:
A Communication-Based Solution to Detect Islanding using Correlation Element in Distributed Generation Environment
收藏 引用
Distributed Generation and Alternative Energy Journal 2025年 第2期40卷 427-456页
作者: Ranjan, Sanjeev Kumar, Munna Kumar, Jitendra Mahanty, R.N. Sood, Vijay K. Department of Electrical Engineering NIT Jamshedpur Jharkhand 831014 India Department of Electrical Engineering ARMIET Maharashtra Thane421601 India Department of Electrical Computer and Software Engineering Ontario Tech University ON Canada
Issues regarding safety, circuit breaker reclosing, power quality, and regulatory compliance are identified when islanding is to be detected in a microgrid. In this paper, a novel communication-based, passive islandin... 详细信息
来源: 评论
Broadband angular spectrum analog processors based on all-dielectric metasurfaces
收藏 引用
science China(Physics,Mechanics & Astronomy) 2024年 第7期67卷 188-190页
作者: Lin Deng Yongmin Liu Department of Electrical and Computer Engineering Northeastern UniversityBoston 02115USA Department of Mechanical and Industrial Engineering Northeastern UniversityBoston 02115USA
Digital signal processors are extensively used to execute mathematical operations and advanced computational tasks on digital ***,they suffer from several inherent limitations,including low speed,high energy consumpti... 详细信息
来源: 评论
A Network Model to Study the Underlying Characteristics of Phishing Sites
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第1期6卷 46-49页
作者: Gayen, Avijit Santra, Sukriti Dey, Ayush Jana, Angshuman Indian Institute of Information Technology Guwahati Department of Computer Science and Engineering Guwahati781015 India Swami Vivekanda University Department of Computer Science and Engineering Kolkata700121 India Techno India University Department of Computer Science and Engineering Kolkata700091 India
In the rapidly evolving landscape of cyber threats, phishing continues to be a prominent vector for cyberattacks, posing significant risks to individuals, organizations and information systems. This letter delves into... 详细信息
来源: 评论
Blockchain-based group signature for secure authentication of IoT systems in smart home environments
收藏 引用
Cyber-Physical Systems 2024年 第4期10卷 362-386页
作者: Kara, Mustafa Merzeh, Hisham R.J. Aydin, Muhammed Ali Balik, Hasan Hüseyin Department of Computer Engineering Air Force Academy National Defence University Istanbul Turkey Department of Computer Engineering College of Electrical and Electronic Technology Middle Technical University Baghdad Iraq Department of Computer Engineering Istanbul University-Cerrahpaşa Istanbul Turkey Department of Computer Engineering Istanbul Aydin University Istanbul Turkey
Current solutions that rely on a single-server architecture have privacy, anonymity, integrity, and confidentiality limitations. Blockchain-based solutions can address some of these issues but face challenges regulati... 详细信息
来源: 评论
Bridging the gap in biomedical information retrieval: Harnessing machine learning for enhanced search results and query semantics
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 9491-9510页
作者: Madhubala, P. Ghanimi, Hayder M.A. Sengan, Sudhakar Abhishek, Kumar Department of Computer Science and Engineering Bharathiyar Institute of Engineering for Women Tamil Nadu Salem India Information Technology Department College of Science University of Warith Al-Anbiyaa Karbala Iraq Computer Science Department College of Computer Science and Information Technology University of Kerbala Karbala Iraq Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli India Department of Mathematics VIT Bhopal Bhopal India
The medical domain faces unique challenges in Information Retrieval (IR) due to the complexity of medical language and terminology discrepancies between user queries and documents. While traditional Keyword-Based Meth... 详细信息
来源: 评论
A multi-objective optimization approach for overlapping dynamic community detection
收藏 引用
Soft Computing 2024年 第19期28卷 11323-11342页
作者: Bahadori, Sondos Mirzaie, Mansooreh Nooraei Abadeh, Maryam Department of Computer Engineering Ilam Branch Islamic Azad University Ilam Iran Department of Electrical and Computer Engineering Golpayegan College of Engineering Isfahan University of Technology Isfahan Iran Department of Computer Engineering Abadan Branch Islamic Azad University Abadan Iran
Community detection is a valuable tool for studying the function and dynamic structure of most real-world networks. Existing techniques either concentrate on the network's topological structure or node properties ... 详细信息
来源: 评论
Optimal Offering of Energy Storage in UK Day-Ahead Energy and Frequency Response Markets
收藏 引用
Journal of Modern Power Systems and Clean Energy 2024年 第2期12卷 415-426页
作者: Makedon Karasavvidis Andreas Stratis Dimitrios Papadaskalopoulos Goran Strbac Department of Electrical and Electronic Engineering Imperial College LondonLondonUK Statkraft UK Ltd. LondonUK Department of Electrical and Computer Engineering University of PatrasPatrasGreece IEEE
The offering strategy of energy storage in energy and frequency response(FR) markets needs to account for country-specific market regulations around FR products as well as FR utilization factors, which are highly unce... 详细信息
来源: 评论
REGAC: Multi-Class Offensive Content Identification Using Graphical Approach
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第4期52卷 931-952页
作者: Chinivar, Sneha Roopa, M.S. Arunalatha, J.S. Venugopal, K.R. Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Karnataka Bengaluru India Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Karnataka Bengaluru India
Online offensive behaviour continues to rise with the increasing popularity and use of social media. Various techniques have been used to address this issue. However, most existing studies consider offensive content i... 详细信息
来源: 评论
Improved Leap-frog Method for Time-domain Fault Location
收藏 引用
Journal of Modern Power Systems and Clean Energy 2024年 第2期12卷 670-674页
作者: Izudin Džafić Rabih A.Jabr Faculty of Electrical Engineering University of SarajevoSarajevo 71000Bosnia and Herzegovina Department of Electrical and Computer Engineering American University of BeirutBeirut 11072020Lebanon IEEE
The partial differential equation(PDE)solution of the telegrapher is a promising fault location method among time-domain and model-based *** research works have shown that the leap-frog process is superior to other ex... 详细信息
来源: 评论
Convolutional neural network-based image watermarking using discrete wavelet transform
收藏 引用
International Journal of Information Technology (Singapore) 2023年 第4期15卷 2021-2029页
作者: Tavakoli, Alireza Honjani, Zahra Sajedi, Hedieh Department of Computer Engineering School of Electrical and Computer Engineering College of Engineering University of Tehran Tehran Iran Department of Computer Science School of Mathematics Statistics and Computer Science College of Science University of Tehran Tehran Iran
With the growing popularity of the Internet, digital images are used and transferred more frequently. Although this phenomenon facilitates easy access to information, it also creates security concerns and violates int... 详细信息
来源: 评论