咨询与建议

限定检索结果

文献类型

  • 518,642 篇 会议
  • 196,577 篇 期刊文献
  • 3,589 册 图书
  • 2 篇 科技报告
  • 1 篇 学位论文

馆藏范围

  • 718,807 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 392,458 篇 工学
    • 208,228 篇 计算机科学与技术...
    • 165,832 篇 软件工程
    • 91,739 篇 信息与通信工程
    • 83,225 篇 电气工程
    • 80,249 篇 电子科学与技术(可...
    • 64,935 篇 控制科学与工程
    • 36,212 篇 生物工程
    • 35,158 篇 光学工程
    • 29,783 篇 生物医学工程(可授...
    • 28,494 篇 机械工程
    • 26,213 篇 化学工程与技术
    • 26,127 篇 动力工程及工程热...
    • 25,971 篇 材料科学与工程(可...
    • 25,630 篇 仪器科学与技术
    • 11,467 篇 交通运输工程
    • 11,426 篇 安全科学与工程
    • 11,207 篇 力学(可授工学、理...
  • 229,129 篇 理学
    • 103,745 篇 数学
    • 93,767 篇 物理学
    • 40,847 篇 生物学
    • 33,290 篇 统计学(可授理学、...
    • 27,848 篇 化学
    • 27,783 篇 系统科学
  • 76,848 篇 管理学
    • 49,347 篇 管理科学与工程(可...
    • 29,943 篇 图书情报与档案管...
    • 24,168 篇 工商管理
  • 27,084 篇 医学
    • 22,433 篇 临床医学
    • 19,654 篇 基础医学(可授医学...
    • 12,380 篇 药学(可授医学、理...
  • 14,011 篇 法学
    • 11,733 篇 社会学
  • 10,013 篇 经济学
  • 6,716 篇 农学
  • 6,247 篇 教育学
  • 3,153 篇 文学
  • 1,622 篇 军事学
  • 747 篇 艺术学
  • 99 篇 哲学
  • 54 篇 历史学

主题

  • 20,303 篇 computer science
  • 15,086 篇 computational mo...
  • 11,764 篇 bandwidth
  • 11,622 篇 accuracy
  • 11,291 篇 feature extracti...
  • 10,160 篇 control systems
  • 9,568 篇 costs
  • 9,387 篇 testing
  • 9,355 篇 delay
  • 9,169 篇 computer archite...
  • 9,130 篇 training
  • 9,127 篇 hardware
  • 9,034 篇 machine learning
  • 8,971 篇 frequency
  • 8,916 篇 switches
  • 8,795 篇 mathematical mod...
  • 8,780 篇 application soft...
  • 8,770 篇 algorithm design...
  • 8,760 篇 deep learning
  • 8,740 篇 robustness

机构

  • 5,287 篇 department of el...
  • 1,899 篇 infn laboratori ...
  • 1,736 篇 infn sezione di ...
  • 1,564 篇 department of co...
  • 1,508 篇 infn sezione di ...
  • 1,367 篇 ieee
  • 1,302 篇 infn sezione di ...
  • 1,274 篇 infn sezione di ...
  • 1,161 篇 department of co...
  • 1,143 篇 department of el...
  • 1,135 篇 department of el...
  • 1,065 篇 infn sezione di ...
  • 1,064 篇 infn sezione di ...
  • 1,038 篇 infn sezione di ...
  • 1,024 篇 department of el...
  • 1,015 篇 yerevan physics ...
  • 939 篇 infn sezione di ...
  • 928 篇 department of el...
  • 881 篇 department of el...
  • 829 篇 department of el...

作者

  • 501 篇 waltenberger w.
  • 501 篇 lowette s.
  • 468 篇 tavernier s.
  • 417 篇 lemaitre v.
  • 413 篇 skovpen k.
  • 409 篇 schieck j.
  • 406 篇 vannerom d.
  • 402 篇 sznajder a.
  • 382 篇 adam w.
  • 373 篇 alves g.a.
  • 363 篇 tytgat m.
  • 358 篇 j. wang
  • 351 篇 tumasyan a.
  • 343 篇 da silveira g.g.
  • 336 篇 coelho e.
  • 326 篇 moraes a.
  • 325 篇 van mechelen p.
  • 309 篇 delaere c.
  • 309 篇 jeitler m.
  • 308 篇 wulz c.-e.

语言

  • 679,685 篇 英文
  • 30,096 篇 其他
  • 8,615 篇 中文
  • 452 篇 日文
  • 140 篇 朝鲜文
  • 75 篇 德文
  • 55 篇 法文
  • 32 篇 土耳其文
  • 24 篇 斯洛文尼亚文
  • 20 篇 西班牙文
  • 15 篇 俄文
  • 13 篇 葡萄牙文
  • 11 篇 阿拉伯文
  • 6 篇 荷兰文
  • 4 篇 意大利文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 罗马尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Electrical Engineering and Department of Computer Science and Engineering"
718811 条 记 录,以下是341-350 订阅
排序:
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 1-17页
作者: Ji, Xiaoyu Zhang, Guoming Li, Xinfeng Qu, Gang Cheng, Xiuzhen Xu, Wenyuan Electrical Engineering of Zhejiang University Hangzhou China School of Computer Science and Technology of Shandong University Qingdao China Department of Electrical and Computer Engineering at the University of Maryland College Park MD USA
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E... 详细信息
来源: 评论
Developing a Secure Framework Using Feature Selection and Attack Detection Technique
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4183-4201页
作者: Mahima Dahiya Nitin Nitin Department of Electrical Engineering and Computer Science College of Engineering and Applied ScienceUniversity of Cincinnati2600 Clifton AveCincinnatiOH 45221USA
Intrusion detection is critical to guaranteeing the safety of the data in the *** though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristic... 详细信息
来源: 评论
Low-profile,low sidelobe array antenna with ultrawide beam coverage for UAV communication
收藏 引用
Chinese Journal of Aeronautics 2025年 第1期38卷 444-454页
作者: Mei LI Zhiliang SHANG Lin PU Ming-Chun TANG Lei ZHU School of Microelectronics and Communication Engineering Chongqing UniversityChongqing 400044China Department of Electrical and Computer Engineering University of MacaoMacao SAR 999078China
This paper presents a design method to implement an antenna array characterized by ultra-wide beam coverage,low profile,and low Sidelobe Level(SLL)for the application of Unmanned Aerial Vehicle(UAV)air-to-ground *** a... 详细信息
来源: 评论
Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model
收藏 引用
computer Modeling in engineering & sciences 2024年 第11期141卷 1651-1671页
作者: Mohamed A.Mahdi Suliman Mohamed Fati Mohamed A.G.Hazber Shahanawaj Ahamad Sawsan A.Saad Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Information Systems Department College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap... 详细信息
来源: 评论
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论
xCViT:Improved Vision Transformer Network with Fusion of CNN and Xception for Skin Disease Recognition with Explainable AI
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1367-1398页
作者: Armughan Ali Hooria Shahbaz Robertas Damaševicius Department of Electrical Engineering Wah Engineering CollegeUniversity of WahWah Cantt47040Pakistan Department of Computer Science HITEC UniversityTaxila47080Pakistan Department of Applied Informatics Vytautas Magnus UniversityKaunas44309Lithuania
Skin cancer is the most prevalent cancer globally,primarily due to extensive exposure to Ultraviolet(UV)*** identification of skin cancer enhances the likelihood of effective treatment,as delays may lead to severe tum... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论
Robotic FDM for free-form fabrication: evaluating adaptive non-planar slicing with different contour methods
收藏 引用
Rapid Prototyping Journal 2025年 第11期31卷 160-178页
作者: Furlan, Valentina Insero, Federico Giberti, Hermes Department of Electrical Computer and Biomedical Engineering Università di Pavia Pavia Italy
Purpose: This study aims to investigate and compare three nonplanar (NP) slicing algorithms. The algorithms aim to control the layer thickness variation (LTV), which is a common issue in supportless fabrication of fre... 详细信息
来源: 评论
Consensus-relevance kNN and covariate shift mitigation
收藏 引用
MACHINE LEARNING 2024年 第1期113卷 325-353页
作者: Kalpakis, Konstantinos Computer Science and Electrical Engineering Department University of Maryland Baltimore County 1000 Hilltop Circle Baltimore MD 21250 USA
Classification and regression algorithms based on k-nearest neighbors (kNN) are often ranked among the top-10 Machine learning algorithms, due to their performance, flexibility, interpretability, non-parametric nature... 详细信息
来源: 评论
Knowledge‐based deep learning system for classifying Alzheimer's disease for multi‐task learning
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 805-820页
作者: Amol Dattatray Dhaygude Gaurav Kumar Ameta Ihtiram Raza Khan Pavitar Parkash Singh Renato R.Maaliw III Natrayan Lakshmaiya Mohammad Shabaz Muhammad Attique Khan Hany S.Hussein Hammam Alshazly Department of Data Science University of WashingtonSeattleWashingtonUSA Department of Computer Science&Engineering Parul Institute of TechnologyParul UniversityVadodaraGujaratIndia Department of Computer Science Jamia HamdardDelhiIndia Department of Management Lovely Professional UniversityPhagwaraIndia 5 College of Engineering Southern Luzon State UniversityLucbanQuezonPhilippines Department of Mechanical Engineering Saveetha School of EngineeringSIMATSChennaiTamil NaduIndia Model Institute of Engineering and Technology JammuJ&KIndia Department of Computer Science HITEC UniversityTaxilaPakistan Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Electrical Engineering Department College of EngineeringKing Khalid UniversityAbhaSaudi Arabia Electrical Engineering Department Aswan UniversityAswanEgypt Faculty of Computers and Information South Valley UniversityQenaEgypt
Deep learning has recently become a viable approach for classifying Alzheimer's disease(AD)in medical ***,existing models struggle to efficiently extract features from medical images and may squander additional in... 详细信息
来源: 评论