咨询与建议

限定检索结果

文献类型

  • 146,973 篇 会议
  • 71,814 篇 期刊文献
  • 1,608 册 图书

馆藏范围

  • 220,394 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 128,061 篇 工学
    • 72,660 篇 计算机科学与技术...
    • 57,411 篇 软件工程
    • 31,459 篇 信息与通信工程
    • 24,405 篇 电子科学与技术(可...
    • 24,352 篇 电气工程
    • 21,103 篇 控制科学与工程
    • 12,380 篇 生物工程
    • 11,315 篇 光学工程
    • 9,809 篇 生物医学工程(可授...
    • 9,160 篇 机械工程
    • 8,413 篇 材料科学与工程(可...
    • 8,096 篇 化学工程与技术
    • 8,040 篇 仪器科学与技术
    • 7,790 篇 动力工程及工程热...
    • 3,784 篇 交通运输工程
    • 3,776 篇 安全科学与工程
    • 3,217 篇 网络空间安全
  • 74,705 篇 理学
    • 34,898 篇 数学
    • 29,284 篇 物理学
    • 13,984 篇 生物学
    • 11,550 篇 统计学(可授理学、...
    • 8,920 篇 系统科学
    • 8,679 篇 化学
  • 26,799 篇 管理学
    • 17,301 篇 管理科学与工程(可...
    • 10,354 篇 图书情报与档案管...
    • 8,276 篇 工商管理
  • 9,016 篇 医学
    • 7,548 篇 临床医学
    • 6,482 篇 基础医学(可授医学...
    • 4,052 篇 药学(可授医学、理...
  • 4,663 篇 法学
    • 3,898 篇 社会学
  • 3,202 篇 经济学
  • 2,103 篇 教育学
  • 2,065 篇 农学
  • 927 篇 文学
  • 533 篇 军事学
  • 282 篇 艺术学
  • 32 篇 哲学
  • 20 篇 历史学

主题

  • 8,883 篇 computer science
  • 4,116 篇 computational mo...
  • 3,626 篇 feature extracti...
  • 3,516 篇 accuracy
  • 3,059 篇 bandwidth
  • 2,980 篇 machine learning
  • 2,839 篇 training
  • 2,833 篇 deep learning
  • 2,690 篇 wireless sensor ...
  • 2,573 篇 optimization
  • 2,559 篇 data mining
  • 2,490 篇 costs
  • 2,397 篇 computer archite...
  • 2,312 篇 algorithm design...
  • 2,304 篇 control systems
  • 2,246 篇 testing
  • 2,244 篇 application soft...
  • 2,183 篇 neural networks
  • 2,151 篇 delay
  • 2,150 篇 robustness

机构

  • 1,454 篇 department of co...
  • 1,447 篇 department of el...
  • 1,417 篇 department of el...
  • 638 篇 institute of inf...
  • 556 篇 department of co...
  • 479 篇 maharishi school...
  • 416 篇 department of el...
  • 395 篇 department of el...
  • 390 篇 department of el...
  • 354 篇 infn laboratori ...
  • 338 篇 department of co...
  • 321 篇 department of co...
  • 317 篇 department of el...
  • 314 篇 department of co...
  • 302 篇 department of ph...
  • 285 篇 department of el...
  • 274 篇 ieee
  • 269 篇 dipartimento di ...
  • 258 篇 yerevan physics ...
  • 234 篇 infn sezione di ...

作者

  • 295 篇 niyato dusit
  • 224 篇 c. alexa
  • 220 篇 j. m. izen
  • 214 篇 g. bella
  • 214 篇 d. calvet
  • 213 篇 j. strandberg
  • 213 篇 c. amelung
  • 207 篇 han zhu
  • 183 篇 h. a. gordon
  • 179 篇 chang chin-chen
  • 171 篇 g. spigo
  • 167 篇 y. tayalati
  • 160 篇 f. siegert
  • 159 篇 h. okawa
  • 152 篇 a. c. könig
  • 151 篇 m. klein
  • 150 篇 r. ströhmer
  • 148 篇 f. pastore
  • 147 篇 h. sakamoto
  • 145 篇 m. rijssenbeek

语言

  • 197,846 篇 英文
  • 19,864 篇 其他
  • 2,610 篇 中文
  • 141 篇 日文
  • 44 篇 朝鲜文
  • 42 篇 德文
  • 30 篇 法文
  • 21 篇 斯洛文尼亚文
  • 8 篇 俄文
  • 5 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 土耳其文
  • 1 篇 加泰罗尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Electrical Engineering and Computer Science and Information Engineering"
220395 条 记 录,以下是4611-4620 订阅
排序:
Application of Fuzzy Theory in Fault Diagnosis of Satellite Communication Ground Stations
Application of Fuzzy Theory in Fault Diagnosis of Satellite ...
收藏 引用
2024 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2024
作者: Su, Te-Jen Cheng, Jui-Chuan Lin, Wei-Hong Zhuang, Qian-Yi Huang, Yao-Tzeng Wang, Shih-Ming Horng, Mong-Fong Department of Electronic Engineering National Kaohsiung University of Sciences and Technology Kaohsiung Taiwan Department of Computer Science and Information Engineering Cheng Shiu University Kaohsiung Taiwan
With the development and application of internet and information communication technology, countries around the world have invested heavily in the space industry in recent years, with particular emphasis on the deploy... 详细信息
来源: 评论
A Robotic-based Remote Control Painting System for Exterior Walls of High-Rise Buildings
A Robotic-based Remote Control Painting System for Exterior ...
收藏 引用
2024 IEEE International Conference on Computing, Applications and Systems, COMPAS 2024
作者: Das, Diganta Kundu, Dipanjali Rahman, Anichur Rahman, Muaz Sazzad, Sadia Jahangirnagar University Department of Statistics Dhaka1342 Bangladesh Department of Computer Science Engineering Dhaka1350 Bangladesh Department of Electrical and Electronic Engineering Dhaka1350 Bangladesh
Exterior painting of high-rise buildings is a challenging task. In our country, as well as in other countries of the world, this task is accomplished manually, which is risky and life-threatening for the workers. Rese... 详细信息
来源: 评论
Domain-Adaptive Clustered Federated Transfer Learning for EV Charging Demand Forecasting
收藏 引用
IEEE Transactions on Power Systems 2025年 第2期40卷 1241-1254页
作者: Wang, Tianjing Ren, Chao Dong, Zhao Yang Yip, Christine Nanyang Technological University School of Electrical and Electronic Engineering 639798 Singapore KTH Royal Institute of Technology Wallenberg-NTU Presidential Researcher School of Electrical Engineering and Computer Science StockholmSE-100 44 Sweden City University of Hong Kong Department of Electrical Engineering Hong Kong999077 Hong Kong The University of Sydney CAFEA Smart City Limited Hong Kong and School of Civil Engineering SydneyNSW2006 Australia
To address the privacy concerns for state-of-the-art cutting-edge centralized machine learning in electric vehicle (EV) charging demand forecasting applications, federated learning (FL) has been employed to transfer t... 详细信息
来源: 评论
Interactive Blood Bank Repository: Django AWS Approach  5
Interactive Blood Bank Repository: Django AWS Approach
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Sujatha, E. Manickavasagan, V. Lakshminarayanan, S. Ani Minisha, R. Rekha, K.S. Loganathan, V. Department of Computer Science and Engineering Saveetha Engineering College Tamil Nadu India Department of Computer Science and Business Systems Sri Sairam Engineering College Tamil Nadu India Department of Computer Science and Engineering Sri Sairam Engineering College Tamil Nadu India Department of Information Technology Saveetha Engineering College Tamil Nadu India Department of Artificial Intelligence and Data Science Vel Tech Multi Tech Dr Rr and Dr Sr Engineering College Tamil Nadu India
Everyday, there are a growing number of people who require blood transfusions and there is no substitute for human blood. The secure blood donors are voluntary non-remunerated blood donors from risk populations. Donor... 详细信息
来源: 评论
A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2741-2757页
作者: Muhammad Usman Sana Zhanli Li Tayybah Kiren Hannan Bin Liaqat Shahid Naseem Atif Saeed College of Computer Science and Technology Xi’an University of Science and TechnologyXi’anShaanxi710054China Department of Computer Science(RCET Campus) University of Engineering and TechnologyLahore39161Pakistan Department of Information Sciences Division of Science&TechnologyUniversity of EducationLahore54700Pakistan Department of Computer Science COMSATS UniversityIslamabadLahore54700Pakistan
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt... 详细信息
来源: 评论
Enhancing ChatGPT’s Querying Capability with Voice-Based Interaction and CNN-Based Impair Vision Detection Model
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3129-3150页
作者: Awais Ahmad Sohail Jabbar Sheeraz Akram Anand Paul Umar Raza Nuha Mohammed Alshuqayran College of Computer and Information Sciences Imam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudia Arabia 2 School of Computer Science and EngineeringKyungpook National UniversityDaegu41566South Korea 3 Department of EngineeringManchester Metropolitan UniversityManchesterM156BHUK
This paper presents an innovative approach to enhance the querying capability of ChatGPT,a conversational artificial intelligence model,by incorporating voice-based interaction and a convolutional neural network(CNN)-... 详细信息
来源: 评论
Predicting Software Errors Using Neural Networks  12
Predicting Software Errors Using Neural Networks
收藏 引用
12th International Conference on System Modeling and Advancement in Research Trends, SMART 2023
作者: Pandey, Ratnesh Kumar Chand, Jay Srivastava, Ashish Kumar Singh, Narendra Pal Gautam, Rakesh Kumar Invertis University Department of Computer Science & Engineering UP Bareilly India Kamla Nehru Institute of Physical and Social Sciences Department of Computer Science & Engineering UP Sultanpur India Madyanchal Professional University Department of Computer Science & Engineering MP Bhopal India Iimt College of Engineering Department of Computer Science & Engineering UP Greater Noida India Iet Department of Computer Science & Engineering Department of Information Technology UP Lucknow India
The growing call for online technology software has additionally elevated the call for great and occasional-cost merchandise. Predicting software vulnerabilities is one of the most essential obligations of a very good... 详细信息
来源: 评论
Sustainable-Security Assessment Through a Multi Perspective Benchmarking Framework
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 6011-6037页
作者: Ahmed Saeed Alfakeeh Abdulmohsen Almalawi Fawaz Jaber Alsolami Yoosef B.Abushark Asif Irshad Khan Adel Aboud SBahaddad Md Mottahir Alam Alka Agrawal Rajeev Kumar Raees Ahmad Khan Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Electrical and Computer Engineering Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow-226025Uttar PradeshIndia Department of Computer Science and Engineering Babu Banarasi Das UniversityLucknow-226028Uttar PradeshIndia
The current cyber-attack environment has put even the most protected systems at risk as the hackers are nowmodifying technologies to exploit even the tiniest of weaknesses and infiltrate *** this situation,it’s criti... 详细信息
来源: 评论
Analysis of Advanced Persistent Threat Attacks, Lifecycle, and Counter Measures: A Comprehensive Review  6th
Analysis of Advanced Persistent Threat Attacks, Lifecycle, a...
收藏 引用
6th International Conference on Recent Innovations in Computing, ICRIC 2023
作者: Bhardwaj, Rohit Kumar, Neerendra Kour, Harnain Verma, Narinder Ashish, Ankit Department of Computer Science and Information Technology Central University of Jammu Samba181143 India Department of Computer Science and Engineering Central University of Jammu Samba181143 India
Large organizations including big IT firms and military organizations are interconnected through a large cyber network and these organizations are prone to highly sophisticated forms of cyber-attacks like Advanced Per... 详细信息
来源: 评论
Joint Resource Allocation and Trajectory Design for UAV-Assisted Covert Coverage Maximization
Joint Resource Allocation and Trajectory Design for UAV-Assi...
收藏 引用
2023 IEEE Globecom Workshops, GC Wkshps 2023
作者: Mao, Haobin Liu, Yanming Yang, Junyi Xiao, Zhenyu Han, Zhu Xia, Xiang-Gen School of Electronic and Information Engineering Beihang University Beijing100191 China University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of University of Delaware Department of Electrical and Computer Engineering NewarkDE19716 United States
The successful and complete downlink transmission of critical data from an unmanned aerial vehicle (UAV) base station, such as control command and intelligence information, is essential for ground users to perform spe... 详细信息
来源: 评论