咨询与建议

限定检索结果

文献类型

  • 146,973 篇 会议
  • 71,814 篇 期刊文献
  • 1,608 册 图书

馆藏范围

  • 220,394 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 128,061 篇 工学
    • 72,660 篇 计算机科学与技术...
    • 57,411 篇 软件工程
    • 31,459 篇 信息与通信工程
    • 24,405 篇 电子科学与技术(可...
    • 24,352 篇 电气工程
    • 21,103 篇 控制科学与工程
    • 12,380 篇 生物工程
    • 11,315 篇 光学工程
    • 9,809 篇 生物医学工程(可授...
    • 9,160 篇 机械工程
    • 8,413 篇 材料科学与工程(可...
    • 8,096 篇 化学工程与技术
    • 8,040 篇 仪器科学与技术
    • 7,790 篇 动力工程及工程热...
    • 3,784 篇 交通运输工程
    • 3,776 篇 安全科学与工程
    • 3,217 篇 网络空间安全
  • 74,705 篇 理学
    • 34,898 篇 数学
    • 29,284 篇 物理学
    • 13,984 篇 生物学
    • 11,550 篇 统计学(可授理学、...
    • 8,920 篇 系统科学
    • 8,679 篇 化学
  • 26,799 篇 管理学
    • 17,301 篇 管理科学与工程(可...
    • 10,354 篇 图书情报与档案管...
    • 8,276 篇 工商管理
  • 9,016 篇 医学
    • 7,548 篇 临床医学
    • 6,482 篇 基础医学(可授医学...
    • 4,052 篇 药学(可授医学、理...
  • 4,663 篇 法学
    • 3,898 篇 社会学
  • 3,202 篇 经济学
  • 2,103 篇 教育学
  • 2,065 篇 农学
  • 927 篇 文学
  • 533 篇 军事学
  • 282 篇 艺术学
  • 32 篇 哲学
  • 20 篇 历史学

主题

  • 8,883 篇 computer science
  • 4,116 篇 computational mo...
  • 3,626 篇 feature extracti...
  • 3,516 篇 accuracy
  • 3,059 篇 bandwidth
  • 2,980 篇 machine learning
  • 2,839 篇 training
  • 2,833 篇 deep learning
  • 2,690 篇 wireless sensor ...
  • 2,573 篇 optimization
  • 2,559 篇 data mining
  • 2,490 篇 costs
  • 2,397 篇 computer archite...
  • 2,312 篇 algorithm design...
  • 2,304 篇 control systems
  • 2,246 篇 testing
  • 2,244 篇 application soft...
  • 2,183 篇 neural networks
  • 2,151 篇 delay
  • 2,150 篇 robustness

机构

  • 1,454 篇 department of co...
  • 1,447 篇 department of el...
  • 1,417 篇 department of el...
  • 638 篇 institute of inf...
  • 556 篇 department of co...
  • 479 篇 maharishi school...
  • 416 篇 department of el...
  • 395 篇 department of el...
  • 390 篇 department of el...
  • 354 篇 infn laboratori ...
  • 338 篇 department of co...
  • 321 篇 department of co...
  • 317 篇 department of el...
  • 314 篇 department of co...
  • 302 篇 department of ph...
  • 285 篇 department of el...
  • 274 篇 ieee
  • 269 篇 dipartimento di ...
  • 258 篇 yerevan physics ...
  • 234 篇 infn sezione di ...

作者

  • 295 篇 niyato dusit
  • 224 篇 c. alexa
  • 220 篇 j. m. izen
  • 214 篇 g. bella
  • 214 篇 d. calvet
  • 213 篇 j. strandberg
  • 213 篇 c. amelung
  • 207 篇 han zhu
  • 183 篇 h. a. gordon
  • 179 篇 chang chin-chen
  • 171 篇 g. spigo
  • 167 篇 y. tayalati
  • 160 篇 f. siegert
  • 159 篇 h. okawa
  • 152 篇 a. c. könig
  • 151 篇 m. klein
  • 150 篇 r. ströhmer
  • 148 篇 f. pastore
  • 147 篇 h. sakamoto
  • 145 篇 m. rijssenbeek

语言

  • 197,846 篇 英文
  • 19,864 篇 其他
  • 2,610 篇 中文
  • 141 篇 日文
  • 44 篇 朝鲜文
  • 42 篇 德文
  • 30 篇 法文
  • 21 篇 斯洛文尼亚文
  • 8 篇 俄文
  • 5 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 土耳其文
  • 1 篇 加泰罗尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Electrical Engineering and Computer Science and Information Engineering"
220395 条 记 录,以下是551-560 订阅
排序:
A review on spreading and Forensics Analysis of Windows-Based ransomware
收藏 引用
Annals of Data science 2024年 第5期11卷 1503-1524页
作者: Chayal, Narendrakumar Mangilal Saxena, Ankur Khan, Rijwan Department of Computer Science and Technology Faculty of Engineering and Technology Department of Computer Engineering Sankalchand Patel University Visnagar India Department of Computer Science Indus Institute of Information and Communication Technology Dean-ICT & ampDirector-IIICT Indus University Gujarat Ahmedabad India Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad Affiliated to AKTU Lucknow India
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals... 详细信息
来源: 评论
Data-Filtered Prediction with Decomposition and Amplitude-Aware Permutation Entropy for Workload and Resource Utilization in Cloud Data Centers
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19189-19201页
作者: Yuan, Haitao Hu, Qinglong Wang, Meijia Wang, Shen Bi, Jing Buyya, Rajkumar Shi, Shuyuan Yang, Jinhong Zhang, Jia Zhou, MengChu Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Computer Science Hong Kong999077 Hong Kong Beijing University of Technology School of Software Engineering The Faculty of Information Technology Beijing100124 China Lab School of Computing and Information Systems MelbourneVIC3010 Australia Beihang University School of Integrated Circuit Science and Engineering Beijing China CSSC Systems Engineering Research Institute Beijing China Southern Methodist University Department of Computer Science The Lyle School of Engineering DallasTX75205 United States New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s... 详细信息
来源: 评论
Application of adaptive guard channel reservation under hard handoff constraint in wireless cellular network
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 170-185页
作者: Sahu, Promod Kumar Pati, Hemanta Kumar Pradha, Sateesh Kumar Department of Computer Science and Application Utkal University Vani Vihar Odisha Bhubaneswar India Department of Computer Science and Engineering International Institute of Information Technology Bhubaneswar Odisha Bhubaneswar India
Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp... 详细信息
来源: 评论
Learning label-specific features for decomposition-based multi-class classification
收藏 引用
Frontiers of computer science 2023年 第6期17卷 101-110页
作者: Bin-Bin JIA Jun-Ying LIU Jun-Yi HANG Min-Ling ZHANG College of Electrical and Information Engineering Lanzhou University of TechnologyLanzhou 730050China School of Computer Science and Engineering Southeast UniversityNanjing 210096China Key Laboratory of Computer Network and Information Integration(Ministry of Education) Southeast UniversityNanjing 210096China
Multi-class classification can be solved by decomposing it into a set of binary classification problems according to some encoding rules,e.g.,one-vs-one,one-vs-rest,error-correcting output *** works solve these binary... 详细信息
来源: 评论
Aggregated DER_A Model Parameterization Via Online Moving Horizon Estimation
收藏 引用
IEEE Transactions on Smart Grid 2025年 第4期16卷 3030-3044页
作者: Vasquez-Plaza, Jesus D. Subedi, Sunil Bhujel, Niranjan Hansen, Timothy M. Tonkoski, Reinaldo Andrade, Fabio Department of Electrical and Computer Engineering University of Puerto Rico Mayaguez Mayagüez PR USA Electrification and Infrastructures Division Oak Ridge National Laboratory Knoxville TN USA Electrical Engineering and Computer Science Department The University of Maine Orono ME USA Electrical Engineering and Computer Science Department South Dakota State University Brookings SD USA Chair of Electric Power Transmission and Distribution School of Engineering and Design Technical University of Munich Munich Germany
This paper introduces a methodology for parameterizing the DER A model using a novel smooth mathematical representation, simplifying the process and preserving accuracy in modeling inverter-based generator (IBG). The ... 详细信息
来源: 评论
Grid-Side Current Improvement With Direct Digital Control and Capacitor Voltage Feedforward to Mitigate Distorted Grid Currents for 3Φ3W LCL Grid-Connected Inverter Under Distorted Grid Voltages
IEEE Open Journal of Power Electronics
收藏 引用
IEEE Open Journal of Power Electronics 2024年 5卷 37-49页
作者: Wu, Tsai-Fu Chan, Ching-Chih Chang, Yun-Hsiang Chiu, Jui-Yang Hung, Chien-Chih Chuang, Tzu-Hsien National Tsing Hua University Department of Electrical Engineering Hsinchu300044 Taiwan National Tsing-Hua University College of Electrical Engineering and Computer Science Hsinchu300044 Taiwan
A three-phase three-wire LCL grid-connected inverter is usually used as an interface between renewable-energy sources and grid. However, grid voltage is always distorted and results in grid-current distortion when the... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
Robust Coarse-to-fine 3D-Target-Localization Algorithm for Underwater-IoT-Based Networks: Design and Performance Evaluation under Uncertain Multi-Parameters
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25119-25135页
作者: Xian, Jiangfeng Ma, Junling Mei, Xiaojun Wu, Huafeng Saeed, Nasir Han, Dezhi Marino, Mario Donato Li, Kuan-Ching Shanghai Maritime University Institute of Logistics Science and Engineering Shanghai201306 China Shanghai Maritime University Merchant Marine College Shanghai201306 China University of the United Arab Emirates Department of Electrical and Communication Engineering Al Ain15551 United Arab Emirates Shanghai Maritime University College of Information Engineering Shanghai201306 China Oslo Metropolitan University Department of Computer Science Pilestredet 35 Oslo0166 Norway Providence University Department of Computer Science and Information Engineering Taiwan
Underwater Acoustic Internet of Things Networks (UAIoTNs) can furnish excellent technical support and information services for applications involving marine observation and detection, marine disaster prevention and mi... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of Systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
Ensuring Privacy and Integrity in IoT Supply Chains through Blockchain and Homomorphic Encryption
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25547-25558页
作者: Din, Ikram Ud Almogren, Ahmad Han, Zhu Guizani, Mohsen The University of Haripur Department of Information Technology Haripur22620 Pakistan King Saud University College of Computer and Information Sciences Department of Cyber Security Department of Computer Science Riyadh11633 Saudi Arabia University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates
Ensuring data security and privacy in Internet of Things (IoT) is increasingly critical due to the growing interconnectedness of devices and the sensitivity of the data they handle. This paper presents a novel approac... 详细信息
来源: 评论