咨询与建议

限定检索结果

文献类型

  • 17,995 篇 会议
  • 14,194 篇 期刊文献
  • 227 册 图书

馆藏范围

  • 32,416 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,873 篇 工学
    • 7,975 篇 计算机科学与技术...
    • 6,168 篇 软件工程
    • 4,897 篇 电气工程
    • 4,792 篇 电子科学与技术(可...
    • 3,887 篇 信息与通信工程
    • 3,199 篇 控制科学与工程
    • 2,168 篇 光学工程
    • 2,036 篇 材料科学与工程(可...
    • 1,465 篇 生物工程
    • 1,421 篇 机械工程
    • 1,411 篇 化学工程与技术
    • 1,306 篇 动力工程及工程热...
    • 1,259 篇 仪器科学与技术
    • 1,182 篇 生物医学工程(可授...
    • 720 篇 力学(可授工学、理...
    • 567 篇 冶金工程
    • 452 篇 交通运输工程
  • 13,021 篇 理学
    • 6,456 篇 物理学
    • 4,990 篇 数学
    • 1,754 篇 生物学
    • 1,718 篇 统计学(可授理学、...
    • 1,633 篇 化学
    • 1,582 篇 系统科学
  • 2,986 篇 管理学
    • 2,086 篇 管理科学与工程(可...
    • 1,020 篇 工商管理
    • 958 篇 图书情报与档案管...
  • 1,110 篇 医学
    • 911 篇 临床医学
    • 724 篇 基础医学(可授医学...
    • 455 篇 药学(可授医学、理...
  • 510 篇 法学
  • 367 篇 经济学
  • 225 篇 农学
  • 157 篇 教育学
  • 74 篇 文学
  • 66 篇 军事学
  • 28 篇 艺术学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 1,247 篇 laboratories
  • 764 篇 computer science
  • 485 篇 control systems
  • 427 篇 computational mo...
  • 321 篇 frequency
  • 318 篇 application soft...
  • 300 篇 computer archite...
  • 282 篇 bandwidth
  • 243 篇 testing
  • 239 篇 deep learning
  • 226 篇 delay
  • 225 篇 costs
  • 210 篇 equations
  • 204 篇 voltage
  • 195 篇 throughput
  • 185 篇 hardware
  • 180 篇 routing
  • 180 篇 neural networks
  • 179 篇 robustness
  • 174 篇 reinforcement le...

机构

  • 255 篇 department of el...
  • 243 篇 radiation labora...
  • 230 篇 yerevan physics ...
  • 148 篇 national and kap...
  • 148 篇 centro brasileir...
  • 145 篇 universidad iber...
  • 143 篇 istanbul technic...
  • 140 篇 brunel universit...
  • 133 篇 infn sezione di ...
  • 127 篇 university of sp...
  • 122 篇 università di to...
  • 108 篇 academy of scien...
  • 107 篇 state university...
  • 103 篇 department of el...
  • 97 篇 national mobile ...
  • 97 篇 the university o...
  • 97 篇 wigner research ...
  • 96 篇 department of ph...
  • 96 篇 faculty of scien...
  • 95 篇 departamento de ...

作者

  • 143 篇 niyato dusit
  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 111 篇 c. hensel
  • 110 篇 l. valencia palo...
  • 109 篇 t. liu
  • 96 篇 w. busza
  • 96 篇 a. garcia-bellid...
  • 95 篇 a. babaev
  • 93 篇 a. steen
  • 91 篇 n. cartiglia
  • 89 篇 v. karjavine
  • 88 篇 n. colino
  • 88 篇 f. moortgat
  • 88 篇 b. clerbaux
  • 88 篇 g. sultanov
  • 88 篇 m. a. ciocci
  • 88 篇 k. lamichhane
  • 87 篇 s. maselli
  • 86 篇 e. migliore

语言

  • 29,235 篇 英文
  • 2,773 篇 其他
  • 403 篇 中文
  • 7 篇 德文
  • 5 篇 法文
  • 5 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 俄文
检索条件"机构=Department of Electrical Engineering and Computer Science and the Computer Systems Laboratory"
32416 条 记 录,以下是1101-1110 订阅
排序:
Efficient multimodal cancelable biometric system based on steganography and cryptography
收藏 引用
Iran Journal of computer science 2023年 第2期6卷 109-121页
作者: Salama, Gerges M. El-Gazar, Safaa Nassar, Rana M. El-Shafai, Walid Khalaf, Ashraf A. M. El-Banby, Ghada M. Hamed, Hesham F. A. El-Samie, Fathi E. Abd Department of Electrical Engineering Faculty of Engineering Minia University Minia 61111 Egypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Security Engineering Laboratory Department of Computer Science Prince Sultan University Riyadh 11586 Saudi Arabia Department of Industrial Electronics and Control Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Department of Electrical Engineering Faculty of Engineering Egyptian-Russian University Cairo Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh 84428 Saudi Arabia
Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use of traditional passwords has become insufficient to secure systems. B... 详细信息
来源: 评论
Hierarchy-Aware and Channel-Adaptive Semantic Communication for Bandwidth-Limited Data Fusion
收藏 引用
IEEE Wireless Communications Letters 2025年 第6期14卷 1748-1752页
作者: Guo, Lei Chen, Wei Sun, Yuxuan Ai, Bo Pappas, Nikolaos Quek, Tony Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation China Beijing Jiaotong University School of Electronic and Information Engineering Beijing China Linköping University Department of Computer and Information Science Linköping Sweden Singapore University of Technology and Design Information Systems Technology and Design Singapore
Obtaining high-resolution hyperspectral images (HR-HSI) is costly and data-intensive, making it necessary to fuse low-resolution hyperspectral images (LR-HSI) with high-resolution RGB images (HR-RGB) for practical app... 详细信息
来源: 评论
A Methodology for Estimating Allocation of Electric Vehicle Grid Interfaces in a Distribution System
A Methodology for Estimating Allocation of Electric Vehicle ...
收藏 引用
IEEE Power engineering Society Conference and Exposition in Africa, PowerAfrica
作者: Imanthi Kalanika Subasinghe Ganesh K. Venayagamoorthy Holcombe Department of Electrical and Computer Engineering Clemson University Real-Time Power and Intelligent Systems Laboratory Clemson USA Department of Electrical Electronic and Computer Engineering University of Pretoria South Africa
The integration of electric vehicles (EVs) into the smart grid has introduced new challenges and opportunities for optimizing power and energy management. This paper presents a simple method using a decision-tree to e... 详细信息
来源: 评论
Privacy Preservation for Cloud-Edge-Collaborative Energy Management System Using Post-Quantum Homomorphic Encryption
收藏 引用
IEEE Transactions on Smart Grid 2025年 第4期16卷 3282-3294页
作者: Jiang, Cheng Li, Xue Du, Dajun Qian, Hong Wen, Mi Wu, Lei Findeisen, Rolf Shanghai University of Electric Power Shanghai Key Laboratory of Power Station Automation Technology College of Automation Engineering Shanghai200090 China Shanghai University Shanghai Key Laboratory of Power Station Automation Technology School of Mechatronical Engineering and Automation Shanghai200072 China Shanghai University of Electric Power College of Computer Science and Technology Shanghai201306 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ07030 United States TU Darmstadt Control and Cyber-Physical Systems Laboratory Darmstadt64227 Germany
Cloud-based energy management systems (EMS) in smart grids face privacy challenges, as existing methods based on traditional homomorphic encryption support limited operations and are vulnerable to quantum attacks. We ... 详细信息
来源: 评论
A Multimodal Learning-based Approach for Autonomous Landing of UAV
A Multimodal Learning-based Approach for Autonomous Landing ...
收藏 引用
IEEE/ASME International Conference on Mechtronic and Embedded systems and Applications, MESA
作者: Francisco S. Neves Luís M. Branco Maria I. Pereira Rafael M. Claro Andry M. Pinto Department of Electrical and Computer Engineering (DEEC) Faculty of Engineering of University of Porto (FEUP) Institute for Systems and Computer Engineering - Technology and Science (INESC TEC) Porto Portugal
In the field of autonomous Unmanned Aerial Vehicles (UAVs) landing, conventional approaches fall short in delivering not only the required precision but also the resilience against environmental disturbances. Yet, lea... 详细信息
来源: 评论
Learning Stereo Depth Estimation with Bio-Inspired Spike Cameras
Learning Stereo Depth Estimation with Bio-Inspired Spike Cam...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Wang, Yixuan Li, Jianing Zhu, Lin Xiang, Xijie Huang, Tiejun Tian, Yonghong School of Electronic and Computer Engineering Peking University China School of Computer Science Peking University China Department of Electrical and Computer Engineering Shanghai Jiao Tong University China Peng Cheng National Laboratory China
Bio-inspired spike cameras, offering high temporal resolution spike streams, have brought a new perspective to address common challenges (e.g.,high-speed motion blur) in depth estimation tasks. In this paper, we propo... 详细信息
来源: 评论
A Probabilistic Public-Key Encryption with Ensuring Data Integrity in Cloud Computing  4
A Probabilistic Public-Key Encryption with Ensuring Data Int...
收藏 引用
4th International Conference on Control, Artificial Intelligence, Robotics and Optimization, ICCAIRO 2023
作者: Kara, Mostefa Karampidis, Konstantinos Papadourakis, Giorgos Laouid, Abdelkader Alshaikh, Muath University of El Oued LIAP Laboratory El Oued El Oued39000 Algeria Hellenic Mediterranean University Department of Electrical and Computer Engineering Greece College of Computing and Informatics Saudi Electronic University Computer Science Department Riyadh11673 Saudi Arabia
Researchers are working hard to face various challenges in the fast-moving field of network security and data exchange. When it comes to encryption techniques, efforts vary to address multiple issues such as computati... 详细信息
来源: 评论
Multi-domain feature fusion for target color decoding from multichannel neural recordings of pigeons
Multi-domain feature fusion for target color decoding from m...
收藏 引用
2023 International Conference on Image, Signal Processing, and Pattern Recognition, ISPP 2023
作者: Li, Hongxun Liu, Ruiqing Niu, Xiaoke Wang, Zhizhong Henan Key Laboratory of Brain Science and Brain-Computer Interface Technology School of Electrical Engineering Zhengzhou University Zhengzhou450001 China Department of Mechanical and Electrical Engineering Henan Light Industry Vocational College Zhengzhou450000 China
The entopallium is a high-level neural structure of the avian visual system that is related to the processing of color- and shape-related information during target recognition. The mechanism underlying it remains uncl... 详细信息
来源: 评论
Accelerating R&D Processes Through In-House Pre-compliance Testing Using In-Lab Constructed Setups
收藏 引用
IEEE Access 2025年 13卷 97559-97566页
作者: Kaczmarek, Kamil Lazarowska, Agnieszka Gdynia Maritime University Faculty of Electrical Engineering Gdynia Poland Gdynia Maritime University Faculty of Computer Science Department of Autonomous Systems Gdynia Poland
This paper explores strategies for accelerating the research and development (R&D) process through in-house pre-compliance testing in a dedicated laboratory. The focus is on conducting electromagnetic compatibilit... 详细信息
来源: 评论
Risk Management in Robotic Process Automation  2
Risk Management in Robotic Process Automation
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Yendluri, Dileep Kumar Thatikonda, Ramya Thatikonda, Reshmi Ponnala, Jainath Kempanna, M. Bhuvanesh, A. University of the Cumberlands Department of Computer Science Williamsburg United States University of the Cumberlands Department of Information Technology Williamsburg United States University of Central Missouri Department of Computer Information Systems Williamsburg United States Jawaharlal Technological University Department of Electronics and Communication Engineering Hyderbad India Bangalore Institute of Technology Department of Artificial Intelligence and Machine Learning Bangalore India Psn College of Engineering and Technology Department of Electrical and Electronics Engineering Tirunelveli India
The paper investigates the nuances of RPA risk management, detailing the difficulties, tendencies, and approaches organizations must adopt to integrate RPA into their operations successfully. From automation to optimi... 详细信息
来源: 评论