咨询与建议

限定检索结果

文献类型

  • 1,982 篇 会议
  • 1,671 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 3,658 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 791 篇 计算机科学与技术...
    • 620 篇 电子科学与技术(可...
    • 578 篇 软件工程
    • 554 篇 电气工程
    • 382 篇 信息与通信工程
    • 360 篇 材料科学与工程(可...
    • 356 篇 光学工程
    • 312 篇 化学工程与技术
    • 294 篇 生物医学工程(可授...
    • 268 篇 生物工程
    • 262 篇 控制科学与工程
    • 188 篇 动力工程及工程热...
    • 183 篇 仪器科学与技术
    • 138 篇 机械工程
    • 104 篇 冶金工程
    • 90 篇 力学(可授工学、理...
  • 1,723 篇 理学
    • 995 篇 物理学
    • 462 篇 数学
    • 400 篇 化学
    • 347 篇 生物学
    • 185 篇 统计学(可授理学、...
    • 91 篇 系统科学
  • 334 篇 管理学
    • 229 篇 管理科学与工程(可...
    • 117 篇 工商管理
    • 116 篇 图书情报与档案管...
  • 284 篇 医学
    • 227 篇 临床医学
    • 178 篇 基础医学(可授医学...
    • 95 篇 药学(可授医学、理...
  • 119 篇 教育学
    • 111 篇 教育学
  • 61 篇 法学
  • 56 篇 农学
  • 49 篇 经济学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 50 篇 accuracy
  • 45 篇 students
  • 41 篇 computational mo...
  • 40 篇 training
  • 39 篇 deep learning
  • 34 篇 optimization
  • 33 篇 neural networks
  • 33 篇 feature extracti...
  • 33 篇 hardware
  • 31 篇 neurons
  • 31 篇 electrodes
  • 30 篇 metamaterials
  • 29 篇 mathematical mod...
  • 28 篇 computer science
  • 28 篇 wireless communi...
  • 27 篇 image segmentati...
  • 27 篇 educational inst...
  • 27 篇 topology
  • 26 篇 signal to noise ...
  • 26 篇 bandwidth

机构

  • 51 篇 department of el...
  • 49 篇 department of el...
  • 43 篇 renewable and su...
  • 39 篇 interdisciplinar...
  • 35 篇 department of ph...
  • 34 篇 department of el...
  • 33 篇 applied physics ...
  • 32 篇 department of el...
  • 31 篇 photonics initia...
  • 29 篇 photonics initia...
  • 28 篇 department of ma...
  • 26 篇 department of ph...
  • 24 篇 ieee
  • 23 篇 renewable and su...
  • 23 篇 physics program ...
  • 22 篇 department of el...
  • 21 篇 department of el...
  • 19 篇 physics program ...
  • 16 篇 department of el...
  • 16 篇 department of ph...

作者

  • 48 篇 yoon sungroh
  • 43 篇 smalyukh ivan i.
  • 41 篇 andrea alù
  • 35 篇 alù andrea
  • 34 篇 ivan i. smalyukh
  • 29 篇 kono junichiro
  • 25 篇 lukas
  • 21 篇 mohamed-slim alo...
  • 20 篇 balandin alexand...
  • 19 篇 heryadi yaya
  • 19 篇 baylis charles
  • 18 篇 kargar fariborz
  • 17 篇 tay fuyang
  • 17 篇 baydin andrey
  • 16 篇 weiss sharon m.
  • 16 篇 yaya heryadi
  • 15 篇 niyato dusit
  • 15 篇 wayan suparta
  • 15 篇 du hongyang
  • 14 篇 shih wei-chuan

语言

  • 3,508 篇 英文
  • 101 篇 其他
  • 35 篇 中文
  • 5 篇 日文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
检索条件"机构=Department of Electrical and Computer Engineering Program"
3658 条 记 录,以下是3581-3590 订阅
排序:
SHIP SERVICE electrical SYSTEMS - DESIGNING FOR SURVIVABILITY
收藏 引用
NAVAL ENGINEERS JOURNAL 1990年 第5期102卷 32-36页
作者: CERMINARA, J KOTACKA, RO John Cerminara:is a principal engineer with Westinghouse Machinery Technology Division Electrical Systems Department. He holds a B.S. degree in electrical engineering from the University of Pittsburgh. He is a registered professional engineer and a member of IEEE ASNE and the Ship Steering Group of the Combat Survivability Division of ADPA. Mr. Cerminara has had over 30 years of multidiscipline experience ranging from engineering and construction in heavy industry to standards and publications. Past assignments include DOE/ NASA wind turbine project manager for Westinghouse and task leader of MTD electrical systems. Most recent assignments have included hull mechanical and electrical (HM&E) distributive system survivability analyses of the LSD-41 mobility mission area and application and validation of NavSea computer-aided design of Survivable Distributive System (CADSDiS) Program. Rolf O. Kotacka:is presently a ship systems engineer in the Ship Systems Engineering Branch of the Naval Sea Systems Command Engineering Directorate where his primary responsibility is ship system survivability. He is a 1977 graduate of SUNY Maritime College where he received his bachelor of engineering degree in marine electrical engineering as well as a U.S. Coast Guard Third Assistant Engineer License and a commission in the U. S. Naval Reserve. Upon graduation Mr. Kotacka was employed by Charleston Naval Shipyard as a field engineer until 1981 where he gained his background in surface ship HM&E systems and equipment. He then transferred to the Supervisor of Shipbuilding Conversion and Repair Groton where he served as a senior electrical engineer monitoring the design and construction of Trident and 688 class submarines and received the Meritorious Unit Citation. Prior to his present position Mr. Kotacka was the life cycle manager for diesel generator sets in the Naval Sea Systems Command's Generators Branch. He has coauthored several papers dealing with power generation for ASE and SNAME. Mr. Kotacka is also a lieutena
This paper highlights the survivability concerns in the design of ship service power systems. The paper gives a brief description of what constitutes a typical ship service electric power system and concentrates on el... 详细信息
来源: 评论
AN APPROACH TO EXPERIMENTAL EVALUATION OF REAL-TIME FAULT-TOLERANT DISTRIBUTED COMPUTING SCHEMES
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE engineering 1989年 第6期15卷 715-725页
作者: KIM, KH Computer Engineering Program Department of Electrical Engineering University of California Irvine CA 92717
A testbed-based approach to the evaluation of fault-tolerant distributed computing schemes is discussed. The approach is based on experimental incorporation of system structuring and design techniques into real-time d... 详细信息
来源: 评论
FAULT TOLERANCE ANALYSIS OF THE CLASS OF REARRANGEABLE INTERCONNECTION NETWORKS
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 1989年 第1期7卷 148-164页
作者: PAKZAD, S Computer Engineering Program Department of Electrical Engineering The Pennsylvania State University University Park Pennsylvania 16802 USA
The issue of the fault tolerance of interconnection networks has received considerable attention since the last decade. The theoretical framework developed by J. P. Shen and J. P. Hays ( IEEE Trans. Comput. C-33 , 3 (... 详细信息
来源: 评论
ON THE DESIGN OF A SINGLE-KEY-LOCK MECHANISM BASED ON NEWTONS INTERPOLATING POLYNOMIAL
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE engineering 1989年 第9期15卷 1135-1137页
作者: LAIH, CS HARN, L LEE, JY Department of Electrical Engineering National Cheng Kung University Tainan Taiwan Republic of China Computer Science and Telecommunications Program University of Missouri Kansas City MO 64110
A new single-key-lock (SKL) mechanism used for implementing the access matrix of the computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively based on the N... 详细信息
来源: 评论
electricalLY INDUCED TRANSMISSIVITY MODULATION IN POLYMERIC THIN-FILM FABRY-PEROT ETALONS
收藏 引用
APPLIED OPTICS 1989年 第20期28卷 4442-4445页
作者: ELDERING, CA KOWEL, ST KNOESEN, A []The authors are with University of California Davis Department of Electrical Engineering Computer Science Organized Research Program on Polymeric Ultrathin Film Systems Davis California 95616
We report the observation of electrically induced changes in transmissivity in Fabry-Perot devices consisting of spin-cast azo-dye/polymer films deposited between gold mirrors. In poled samples the observed modulation... 详细信息
来源: 评论
A Monte Carlo model of light propagation in tissue
A Monte Carlo model of light propagation in tissue
收藏 引用
Dosimetry of Laser Radiation in Medicine and Biology 1988
作者: Prahl, S.A. Keijzer, M. Jacques, S.L. Welch, A.J. Department of Electrical and Computer Engineering Biomedical Engineering Program University of Texas at Austin United States Department of Dermatology Wellman Laboratory Harvard Medical School United States
The Monte Carlo method is rapidly becoming the model of choice for simulating light transport in tissue. This paper provides all the details necessary for implementation of a Monte Carlo program. Variance reduction sc... 详细信息
来源: 评论
A new scheme for ID-based cryptosystem and signature
A new scheme for ID-based cryptosystem and signature
收藏 引用
8th Annual Joint Conference of the IEEE computer and Communications Societies, INFOCOM'89
作者: Laih, Chi Sung Lee, Jau Yien Harn, Lein Chen, Chin Hsing Department of Electrical Engineering National Cheng Kung University Tainan Taiwan Computer Science Program University of Missouri Kansas City MO 64110 United States
This paper proposes a new ID-based cryptographic scheme for implementing public-key cryptosystem and signature. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to... 详细信息
来源: 评论
Implementation of the conversion scheme in loosely coupled distributed computer systems
Implementation of the conversion scheme in loosely coupled d...
收藏 引用
International Conference on Distributed Computing Systems
作者: S.M. Yang K.H. Kim Computer Science Engineering Department University of Texas Arlington Arlington TX USA Computer Engineering Program Department of Electrical Engineering University of California Irvine CA USA
Several different approaches are discussed for implementing conversations in loosely coupled distributed computer systems (DCSs). Important implementation factors considered include the control of exits of processes o... 详细信息
来源: 评论
A new scheme for ID-based cryptosystem and signature
A new scheme for ID-based cryptosystem and signature
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: C.S. Laih J.Y. Lee L. Harn C.H. Chen Department of Electrical Engineering National Cheng Kung University Tainan Taiwan Computer Science Program University of Missouri Kansas City MO USA
A novel ID-based cryptographic scheme for implementing a public-key cryptosystem and signature is proposed. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to cho... 详细信息
来源: 评论
Password authentication based on public-key distribution cryptosystem
Password authentication based on public-key distribution cry...
收藏 引用
International Conference on Data engineering
作者: L. Harn D. Huang C.-S. Laih Computer Science Program University of Missouri Kansas City Kansas City MO USA Department of Electrical Engineering National Cheng Kung University Tainan Taiwan
A password authentication mechanism based on the public-key distribution cryptosystem is proposed. The scheme uses an authentication table to replace the traditional password file. With this scheme, even if the authen... 详细信息
来源: 评论