咨询与建议

限定检索结果

文献类型

  • 518,655 篇 会议
  • 197,303 篇 期刊文献
  • 3,580 册 图书
  • 2 篇 科技报告
  • 1 篇 学位论文

馆藏范围

  • 719,537 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 393,089 篇 工学
    • 208,585 篇 计算机科学与技术...
    • 165,797 篇 软件工程
    • 91,912 篇 信息与通信工程
    • 83,427 篇 电气工程
    • 80,377 篇 电子科学与技术(可...
    • 65,247 篇 控制科学与工程
    • 36,299 篇 生物工程
    • 35,103 篇 光学工程
    • 29,868 篇 生物医学工程(可授...
    • 28,521 篇 机械工程
    • 26,259 篇 化学工程与技术
    • 26,200 篇 动力工程及工程热...
    • 26,188 篇 材料科学与工程(可...
    • 25,660 篇 仪器科学与技术
    • 11,497 篇 交通运输工程
    • 11,437 篇 安全科学与工程
    • 11,231 篇 力学(可授工学、理...
  • 229,450 篇 理学
    • 103,772 篇 数学
    • 93,954 篇 物理学
    • 40,894 篇 生物学
    • 33,269 篇 统计学(可授理学、...
    • 28,061 篇 化学
    • 27,796 篇 系统科学
  • 76,883 篇 管理学
    • 49,341 篇 管理科学与工程(可...
    • 29,974 篇 图书情报与档案管...
    • 24,148 篇 工商管理
  • 27,202 篇 医学
    • 22,512 篇 临床医学
    • 19,639 篇 基础医学(可授医学...
    • 12,384 篇 药学(可授医学、理...
  • 13,987 篇 法学
    • 11,711 篇 社会学
  • 10,014 篇 经济学
  • 6,729 篇 农学
  • 6,226 篇 教育学
  • 3,155 篇 文学
  • 1,620 篇 军事学
  • 751 篇 艺术学
  • 99 篇 哲学
  • 54 篇 历史学

主题

  • 20,303 篇 computer science
  • 15,102 篇 computational mo...
  • 11,768 篇 bandwidth
  • 11,660 篇 accuracy
  • 11,313 篇 feature extracti...
  • 10,161 篇 control systems
  • 9,573 篇 costs
  • 9,391 篇 testing
  • 9,356 篇 delay
  • 9,173 篇 computer archite...
  • 9,156 篇 training
  • 9,130 篇 hardware
  • 9,095 篇 machine learning
  • 8,971 篇 frequency
  • 8,919 篇 switches
  • 8,824 篇 deep learning
  • 8,795 篇 mathematical mod...
  • 8,780 篇 application soft...
  • 8,770 篇 algorithm design...
  • 8,746 篇 robustness

机构

  • 5,287 篇 department of el...
  • 1,900 篇 infn laboratori ...
  • 1,737 篇 infn sezione di ...
  • 1,565 篇 department of co...
  • 1,509 篇 infn sezione di ...
  • 1,367 篇 ieee
  • 1,302 篇 infn sezione di ...
  • 1,274 篇 infn sezione di ...
  • 1,165 篇 department of co...
  • 1,143 篇 department of el...
  • 1,135 篇 department of el...
  • 1,066 篇 infn sezione di ...
  • 1,061 篇 infn sezione di ...
  • 1,038 篇 infn sezione di ...
  • 1,024 篇 department of el...
  • 1,015 篇 yerevan physics ...
  • 940 篇 infn sezione di ...
  • 928 篇 department of el...
  • 882 篇 department of el...
  • 831 篇 department of el...

作者

  • 501 篇 waltenberger w.
  • 501 篇 lowette s.
  • 468 篇 tavernier s.
  • 417 篇 lemaitre v.
  • 413 篇 skovpen k.
  • 407 篇 schieck j.
  • 406 篇 vannerom d.
  • 398 篇 sznajder a.
  • 380 篇 adam w.
  • 373 篇 alves g.a.
  • 363 篇 tytgat m.
  • 358 篇 j. wang
  • 351 篇 tumasyan a.
  • 343 篇 da silveira g.g.
  • 336 篇 coelho e.
  • 330 篇 moraes a.
  • 325 篇 van mechelen p.
  • 309 篇 delaere c.
  • 309 篇 jeitler m.
  • 308 篇 wulz c.-e.

语言

  • 680,301 篇 英文
  • 30,235 篇 其他
  • 8,607 篇 中文
  • 452 篇 日文
  • 141 篇 朝鲜文
  • 75 篇 德文
  • 55 篇 法文
  • 32 篇 土耳其文
  • 24 篇 斯洛文尼亚文
  • 20 篇 西班牙文
  • 15 篇 俄文
  • 13 篇 葡萄牙文
  • 11 篇 阿拉伯文
  • 6 篇 荷兰文
  • 4 篇 意大利文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 罗马尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Electrical Engineering and Department of Computer Science and Engineering"
719541 条 记 录,以下是331-340 订阅
排序:
Robust Image Forgery Localization Using Hybrid CNN-Transformer Synergy Based Framework
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4691-4708页
作者: Sachin Sharma Brajesh Kumar Singh Hitendra Garg Department of Computer Science Abdul Kalam Technical UniversityLucknow226031India Department of Computer Engineering & Applications GLA UniversityMathura281406India Department of Computer Science Raja Balwant Singh Engineering Technical CampusAgra283105India
Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing... 详细信息
来源: 评论
Testing the Feasibility of Linear Programs with Bandit Feedback  41
Testing the Feasibility of Linear Programs with Bandit Feedb...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Gangrade, Aditya Gopalan, Aditya Saligrama, Venkatesh Scott, Clayton Department of Electrical Computer Engineering Boston University United States Department of Electrical Engineering and Computer Science University of Michigan United States Department of Electrical Communication Engineering Indian Institute of Science India
While the recent literature has seen a surge in the study of constrained bandit problems, all existing methods for these begin by assuming the feasibility of the underlying problem. We initiate the study of testing su... 详细信息
来源: 评论
Three-Level Unipolar/Bipolar Buck-Boost AC-AC Converters with Less Active Switches and No Commutation Issues
收藏 引用
IEEE Transactions on Transportation Electrification 2024年 第2期10卷 4184-4200页
作者: Ahmed, Hafiz Furqan Zaabi, Omar Al El Moursi, Mohamed Shawky Hosani, Khalifa Al National Sun Yat-sen University Department of Electrical Engineering Kaohsiung80424 Taiwan Department of Electrical Engineering and Computer Science Abu Dhabi United Arab Emirates Mansoura University Faculty of Engineering Mansoura35516 Egypt
This article proposes three-level (TL) buck-boost direct ac-ac converters based on switching-cell configuration with coupled magnetics. The proposed converters use only six active switches and can produce noninverting... 详细信息
来源: 评论
A Self-Aware Digital Memory Framework Powered by Artificial Intelligence
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3579-3594页
作者: Chakraborty, Prabuddha Bhunia, Swarup University of Maine Department of Electrical & Computer Engineering OronoME04469 United States University of Florida Department of Electrical & Computer Engineering GainesvilleFL32603 United States
Edge computing devices in Internet-of-Things (IoT) systems are being widely used in diverse application domains including industrial automation, surveillance, and smart housing. These applications typically employ a l... 详细信息
来源: 评论
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 1-17页
作者: Ji, Xiaoyu Zhang, Guoming Li, Xinfeng Qu, Gang Cheng, Xiuzhen Xu, Wenyuan Electrical Engineering of Zhejiang University Hangzhou China School of Computer Science and Technology of Shandong University Qingdao China Department of Electrical and Computer Engineering at the University of Maryland College Park MD USA
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E... 详细信息
来源: 评论
Developing a Secure Framework Using Feature Selection and Attack Detection Technique
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4183-4201页
作者: Mahima Dahiya Nitin Nitin Department of Electrical Engineering and Computer Science College of Engineering and Applied ScienceUniversity of Cincinnati2600 Clifton AveCincinnatiOH 45221USA
Intrusion detection is critical to guaranteeing the safety of the data in the *** though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristic... 详细信息
来源: 评论
Low-profile,low sidelobe array antenna with ultrawide beam coverage for UAV communication
收藏 引用
Chinese Journal of Aeronautics 2025年 第1期38卷 444-454页
作者: Mei LI Zhiliang SHANG Lin PU Ming-Chun TANG Lei ZHU School of Microelectronics and Communication Engineering Chongqing UniversityChongqing 400044China Department of Electrical and Computer Engineering University of MacaoMacao SAR 999078China
This paper presents a design method to implement an antenna array characterized by ultra-wide beam coverage,low profile,and low Sidelobe Level(SLL)for the application of Unmanned Aerial Vehicle(UAV)air-to-ground *** a... 详细信息
来源: 评论
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论
Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model
收藏 引用
computer Modeling in engineering & sciences 2024年 第11期141卷 1651-1671页
作者: Mohamed A.Mahdi Suliman Mohamed Fati Mohamed A.G.Hazber Shahanawaj Ahamad Sawsan A.Saad Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Information Systems Department College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论