咨询与建议

限定检索结果

文献类型

  • 42,915 篇 会议
  • 23,635 篇 期刊文献
  • 344 册 图书

馆藏范围

  • 66,894 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 36,119 篇 工学
    • 14,133 篇 计算机科学与技术...
    • 10,924 篇 软件工程
    • 9,848 篇 电气工程
    • 9,810 篇 电子科学与技术(可...
    • 7,774 篇 信息与通信工程
    • 6,421 篇 控制科学与工程
    • 4,142 篇 光学工程
    • 3,381 篇 材料科学与工程(可...
    • 2,765 篇 机械工程
    • 2,718 篇 化学工程与技术
    • 2,666 篇 动力工程及工程热...
    • 2,647 篇 仪器科学与技术
    • 2,550 篇 生物工程
    • 2,118 篇 生物医学工程(可授...
    • 1,400 篇 力学(可授工学、理...
    • 1,027 篇 冶金工程
    • 883 篇 航空宇航科学与技...
    • 869 篇 交通运输工程
  • 23,951 篇 理学
    • 11,989 篇 物理学
    • 9,190 篇 数学
    • 3,070 篇 化学
    • 3,062 篇 系统科学
    • 3,052 篇 统计学(可授理学、...
    • 2,972 篇 生物学
  • 5,134 篇 管理学
    • 3,684 篇 管理科学与工程(可...
    • 1,827 篇 工商管理
    • 1,541 篇 图书情报与档案管...
  • 1,918 篇 医学
    • 1,571 篇 临床医学
    • 1,247 篇 基础医学(可授医学...
  • 868 篇 法学
  • 716 篇 经济学
  • 391 篇 农学
  • 296 篇 教育学
  • 180 篇 文学
  • 138 篇 军事学
  • 72 篇 艺术学
  • 7 篇 历史学
  • 6 篇 哲学

主题

  • 2,831 篇 laboratories
  • 1,463 篇 control systems
  • 1,153 篇 computational mo...
  • 1,151 篇 frequency
  • 1,133 篇 bandwidth
  • 861 篇 switches
  • 848 篇 application soft...
  • 804 篇 voltage
  • 779 篇 computer archite...
  • 712 篇 costs
  • 703 篇 computer science
  • 697 篇 systems engineer...
  • 689 篇 testing
  • 638 篇 equations
  • 632 篇 neural networks
  • 611 篇 hardware
  • 604 篇 delay
  • 587 篇 robustness
  • 552 篇 throughput
  • 541 篇 optimization

机构

  • 543 篇 department of el...
  • 320 篇 department of el...
  • 208 篇 national mobile ...
  • 182 篇 radiation labora...
  • 158 篇 electrical compu...
  • 147 篇 national and kap...
  • 146 篇 universidad iber...
  • 146 篇 centro brasileir...
  • 139 篇 ieee
  • 134 篇 infn sezione di ...
  • 134 篇 yerevan physics ...
  • 121 篇 brunel universit...
  • 120 篇 istanbul technic...
  • 105 篇 state university...
  • 100 篇 department of el...
  • 95 篇 department of ph...
  • 93 篇 the university o...
  • 92 篇 faculty of scien...
  • 89 篇 faculté des scie...
  • 89 篇 departamento de ...

作者

  • 145 篇 niyato dusit
  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 107 篇 l. valencia palo...
  • 104 篇 c. hensel
  • 103 篇 t. liu
  • 93 篇 a. babaev
  • 92 篇 w. busza
  • 92 篇 a. garcia-bellid...
  • 90 篇 a. steen
  • 90 篇 n. cartiglia
  • 89 篇 n. colino
  • 89 篇 f. moortgat
  • 89 篇 b. clerbaux
  • 89 篇 g. sultanov
  • 88 篇 v. karjavine
  • 88 篇 m. a. ciocci
  • 87 篇 k. lamichhane
  • 87 篇 s. maselli
  • 86 篇 e. migliore

语言

  • 63,506 篇 英文
  • 2,450 篇 其他
  • 906 篇 中文
  • 8 篇 德文
  • 7 篇 日文
  • 6 篇 法文
  • 5 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
检索条件"机构=Department of Electrical and Computer Engineering and Computer Systems Laboratory"
66894 条 记 录,以下是4531-4540 订阅
排序:
DNN Acceleration: A High-Accuracy Implementation for Base-2 Softmax Layer
DNN Acceleration: A High-Accuracy Implementation for Base-2 ...
收藏 引用
Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), International
作者: Doha Thabit Bassma Alabassy M. Watheq El-Kharashi Mona Safar Mohamed Dessouky Department of Electronics Engineering and Electrical Communications Ain Shams University Cairo Egypt Department of Computer and Systems Engineering Ain Shams University Cairo Egypt
This paper introduces a high-accuracy implementation of the softmax layer in Deep Neural Networks (DNN) used in multi-category classification applications. Calculation of the exponentials or logarithms in the traditio...
来源: 评论
Responding to News Sensitively in Stock Attention Networks via Prompt-Adaptive Trimodal Model
收藏 引用
IEEE Transactions on Neural Networks and Learning systems 2025年 第6期36卷 10099-10113页
作者: Haotian Liu Bowen Hu Yadong Zhou Yuxun Zhou Ministry of Education Key Laboratory for Intelligent Networks and Network Security Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an Shaanxi China Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley CA USA
Modern quantitative finance and portfolio-based investment hinge on multimedia news and historical price trends for stock movement prediction. However, prior studies overlook the long tail effect in the feature distri... 详细信息
来源: 评论
DropMix: A Textual Data Augmentation Combining Dropout with Mixup
DropMix: A Textual Data Augmentation Combining Dropout with ...
收藏 引用
2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022
作者: Kong, Fanshuang Zhang, Richong Guo, Xiaohui Mensah, Samuel Mao, Yongyi SKLSDE Beihang University Beijing China Zhongguancun Laboratory Beijing China Hangzhou Innovation Institute Beihang University Hangzhou China Department of Computer Science University of Sheffield United Kingdom School of Electrical Engineering and Computer Science University of Ottawa Canada
Overfitting is a common problem when there is insufficient data to train deep neural networks in machine learning tasks. Data augmentation regularization methods such as Dropout, Mixup, and their enhanced variants, ar... 详细信息
来源: 评论
Studying the Impact of IBR Modeling on the Commonly Applied Transmission Line Protective Elements
Studying the Impact of IBR Modeling on the Commonly Applied ...
收藏 引用
IEEE Energy Conversion Congress and Exposition, ECCE
作者: Soham Chakraborty Paulo Henrique Pinheiro Goncalves Bainy Romulo Hangtian Lei Brian K. Johnson Scott Manson Jing Wang Rasel Mahmud Andy Hoke Cameron J. Kruse Power Systems Engineering Center National Renewable Energy Laboratory Golden Colorado USA Electrical and Computer Engineering University of Idaho Moscow Idaho USA Schweitzer Engineering Laboratories Kauai Island Utility Cooperative
It is a well-accepted fact that detailed inverter-based resource (IBR) models are needed for electromagnetic transient (EMT) studies, especially for protection studies and protection designs. However, it is not clear ... 详细信息
来源: 评论
Energy Minimization using Custom-Designed Magnetic-Spring Actuators
Energy Minimization using Custom-Designed Magnetic-Spring Ac...
收藏 引用
IEEE/RSJ International Conference on Intelligent Robots and systems (IROS)
作者: Yue Yang Fu Ali U. Kilic David J. Braun Department of Electrical and Computer Engineering SyBBURE Searle Undergraduate Research Program Vanderbilt University Advanced Robotics and Control Laboratory Advanced Robotics and Control Laboratory Vanderbilt University
This study introduces an innovative actuator that resembles a motor with a non-uniform permanent magnetic field. We have developed a prototype of the actuator by combining a standard motor, characterized by a uniform ... 详细信息
来源: 评论
Development of A Surveillance System to Detect Forest Fire and Smoke Using Deep Neural Networks  3
Development of A Surveillance System to Detect Forest Fire a...
收藏 引用
3rd IEEE KhPI Week on Advanced Technology, KhPI Week 2022
作者: Subramanian, Malliga Shanmugavadivel, Kogilavani Muthusamy, Suresh Bajaj, Mohit Rubanenko, Olena Danylchenko, Dmytro Kongu Engineering College Department of Computer Science and Engineering Erode India Department of Electronics and Communication Engineering Tamil Nadu Erode India Department of Electrical Engineering Dehradun248002 India Vinnytsia National Technical University Department of Electrical Stations and Systems Vinnytsya Ukraine National Technical University «kharkiv Polytechnic Institute» Department of Electric Power Transmission Kharkiv Ukraine
Forest fires are a major environmental hazard, causing economic, ecological, and human harm. Forest fires are natural flames that occur in forests, shrubs, and grasslands. Wildfires are usually caused by lightning or ... 详细信息
来源: 评论
Worst-Case Integrity Attacks and Resilient State Estimation With Partially Secured Measurements
收藏 引用
IEEE Transactions on Control of Network systems 2025年
作者: Zhou, Jing Shang, Jun Chen, Tongwen University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada Tongji University Department of Control Science and Engineering Shanghai Institute of Intelligent Science and Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Shanghai200092 China
This paper examines the problem of optimal deception attacks against state estimation with partially secured measurements, where smart sensors transmit innovation sequences to the remote end for information fusion. Du... 详细信息
来源: 评论
Elucidation of the Relationship Between a Song's Spotify Descriptive Metrics and its Popularity on Various Platforms
Elucidation of the Relationship Between a Song's Spotify Des...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Laura Colley Andrew Dybka Adam Gauthier Jacob Laboissonniere Alexandre Mougeot Nayeeb Mowla Kevin Dick Hoda Khalil Gabriel Wainer Department of Systems&#x0026 Computer Engineering Department of Electrical Engineering Carleton University Ottawa Ontario
The music industry and personal music consumption have evolved dramatically with the advent of streaming plat-forms. In this evolving landscape, there is considerable interest in understanding what factors contribute ... 详细信息
来源: 评论
Control of Isolated AC Microgrids with Constant Power Loads: A Set Invariance Approach
Control of Isolated AC Microgrids with Constant Power Loads:...
收藏 引用
Mediterranean Conference on Control and Automation (MED)
作者: Grigoris Michos George C. Konstantopoulos Paul A. Trodden Visakan Kadirkamanathan Department of Automatic Control & Systems Engineering University of Sheffield Mappin Street Sheffield UK Department of Electrical and Computer Engineering University of Patras Rion Greece
This paper proposes a robust control scheme for isolated AC Microgrids, where each node is connected locally to a constant power load (CPL). Contrary to many approaches in the literature, we consider the explicit mode...
来源: 评论
A Taxonomy of Defenses against Memory Corruption Attacks  44
A Taxonomy of Defenses against Memory Corruption Attacks
收藏 引用
44th International Convention on Information, Communication and Electronic Technology, MIPRO 2021
作者: Novkovic, Bojan University of Zagreb Faculty of Electrical Engineering and Computing Department of Electronics Microelectronics Computer and Intelligent Systems Zagreb Croatia
Vulnerabilities caused by memory corruption related bugs are a pervasive threat, continually undermining the security of the whole computing environment. The lack of memory safety mechanisms in indispensable systems p... 详细信息
来源: 评论