咨询与建议

限定检索结果

文献类型

  • 5,451 篇 会议
  • 3,770 篇 期刊文献
  • 97 册 图书

馆藏范围

  • 9,318 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,499 篇 工学
    • 3,339 篇 计算机科学与技术...
    • 2,604 篇 软件工程
    • 1,358 篇 信息与通信工程
    • 1,040 篇 电子科学与技术(可...
    • 1,002 篇 电气工程
    • 827 篇 控制科学与工程
    • 612 篇 光学工程
    • 567 篇 生物工程
    • 403 篇 生物医学工程(可授...
    • 385 篇 材料科学与工程(可...
    • 350 篇 机械工程
    • 290 篇 动力工程及工程热...
    • 284 篇 仪器科学与技术
    • 271 篇 化学工程与技术
    • 174 篇 安全科学与工程
    • 170 篇 交通运输工程
  • 3,293 篇 理学
    • 1,447 篇 数学
    • 1,405 篇 物理学
    • 623 篇 生物学
    • 532 篇 统计学(可授理学、...
    • 370 篇 系统科学
    • 332 篇 化学
  • 1,144 篇 管理学
    • 783 篇 管理科学与工程(可...
    • 403 篇 图书情报与档案管...
    • 392 篇 工商管理
  • 397 篇 医学
    • 337 篇 临床医学
    • 295 篇 基础医学(可授医学...
    • 157 篇 药学(可授医学、理...
    • 153 篇 公共卫生与预防医...
  • 195 篇 法学
    • 159 篇 社会学
  • 119 篇 经济学
  • 86 篇 教育学
  • 73 篇 农学
  • 19 篇 文学
  • 15 篇 军事学
  • 11 篇 艺术学

主题

  • 219 篇 computational mo...
  • 177 篇 laboratories
  • 163 篇 computer archite...
  • 149 篇 deep learning
  • 139 篇 machine learning
  • 138 篇 application soft...
  • 133 篇 feature extracti...
  • 130 篇 computer science
  • 128 篇 quality of servi...
  • 126 篇 bandwidth
  • 124 篇 internet of thin...
  • 118 篇 optimization
  • 112 篇 accuracy
  • 110 篇 hardware
  • 107 篇 throughput
  • 103 篇 routing
  • 103 篇 resource managem...
  • 100 篇 neural networks
  • 100 篇 protocols
  • 98 篇 real-time system...

机构

  • 186 篇 department of el...
  • 102 篇 real-time comput...
  • 80 篇 college of compu...
  • 52 篇 school of comput...
  • 51 篇 department of co...
  • 41 篇 department of co...
  • 39 篇 department of el...
  • 36 篇 nanyang technolo...
  • 36 篇 school of comput...
  • 35 篇 institute for qu...
  • 34 篇 department of co...
  • 32 篇 college of compu...
  • 32 篇 department of ph...
  • 32 篇 faculty of scien...
  • 32 篇 departamento de ...
  • 32 篇 department for p...
  • 32 篇 department of ph...
  • 32 篇 dipartimento di ...
  • 32 篇 yerevan physics ...
  • 31 篇 department of ph...

作者

  • 124 篇 niyato dusit
  • 88 篇 k.g. shin
  • 58 篇 han zhu
  • 35 篇 mei-ling shyu
  • 35 篇 shu-ching chen
  • 33 篇 shin kg
  • 31 篇 zhou mengchu
  • 30 篇 sun geng
  • 29 篇 ender ayanoglu
  • 26 篇 hossam s. hassan...
  • 25 篇 f. buehrer
  • 25 篇 m. khader
  • 25 篇 a. t. law
  • 25 篇 c. alexa
  • 25 篇 j. d. mansour
  • 25 篇 j. m. izen
  • 25 篇 s. veneziano
  • 25 篇 d. di valentino
  • 25 篇 g. bella
  • 25 篇 j. strandberg

语言

  • 8,139 篇 英文
  • 1,106 篇 其他
  • 76 篇 中文
  • 4 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Electrical and Computer Engineering and the Optoelectronic Computing"
9318 条 记 录,以下是141-150 订阅
排序:
DeepCNN:Spectro-temporal feature representation for speech emotion recognition
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 401-417页
作者: Nasir Saleem Jiechao Gao Rizwana Irfan Ahmad Almadhor Hafiz Tayyab Rauf Yudong Zhang Seifedine Kadry Department of Electrical Engineering Faculty of Engineering and TechnologyGomal UniversityD.I.KhanPakistan Department of Computer Science University of VirginiaCharlottesvilleVirginiaUSA Department of Information Technology College of Computing and Information Technology at KhulaisUniversity of JeddahJeddahSaudi Arabia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySkaka AljoufSaudi Arabia Centre for Smart Systems AI and CybersecurityStaffordshire UniversityStoke‐on‐TrentUK School of Computing and Mathematical Sciences University of LeicesterLeicesterUK Department of Applied Data Science Noroff University CollegeKristiansandNorway Artificial Intelligence Research Center(AIRC) Ajman UniversityAjmanUnited Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityByblosLebanon
Speech emotion recognition(SER)is an important research problem in human-computer interaction *** representation and extraction of features are significant challenges in SER *** the promising results of recent studies... 详细信息
来源: 评论
Explainable-AI-based two-stage solution for WSN object localization using zero-touch mobile transceivers
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 27-45页
作者: Kai FANG Junxin CHEN Han ZHU Thippa Reddy GADEKALLU Xiaoping WU Wei WANG School of Mathematics and Computer Science Zhejiang A&F University School of Software Dalian University of Technology Faculty of Applied Sciences Macao Polytechnic University Department of Electrical and Computer Engineering Lebanese American University School of Information Engineering Huzhou University Guangdong-Hong Kong-Macao Joint Laboratory for Emotional Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University
Artificial intelligence technology is widely used in the field of wireless sensor networks(WSN).Due to its inexplicability, the interference factors in the process of WSN object localization cannot be effectively elim... 详细信息
来源: 评论
Multi‐granularity re‐ranking for visible‐infrared person re‐identification
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第3期8卷 770-779页
作者: Yadi Wang Hongyun Zhang Duoqian Miao Witold Pedrycz Department of Computer Science and Technology Tongji UniversityShanghaiChina Key Laboratory of Embedded System and Service Computing Ministry of EducationShanghaiChina Department of Electrical and Computer Engineering University of AlbertaEdmontonAlbertaCanada System Research Institute Polish Academy of SciencesWarsawPoland
Visible‐infrared person re‐identification(VI‐ReID)is a supplementary task of single‐modality re‐identification,which makes up for the defect of conventional re‐identification under insufficient *** is more chall... 详细信息
来源: 评论
Understanding Cybercrime: A Study of Malware Analysis, Phishing Attacks, and Sentiment Trends  3
Understanding Cybercrime: A Study of Malware Analysis, Phish...
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in computing, electrical and Electronics, IITCEE 2025
作者: Kumaran, U. Sreeraag, G. Narendran, Advik Meena, V.P. Gupta, Sushil Kumar Appaji, Abhishek Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bangalore India National Institute of Technology Department of Electrical Engineering Jharkhand Jamshedpur831014 India Bms College of Engineering Department of Medical Electronics Engineering Bangalore India
With the rapid evolution of computer systems and technologies, individuals face an increasing threat of cybercrime. This research explores the changing landscape of cybercrime by focusing on three key areas: malware a... 详细信息
来源: 评论
Face image authentication scheme based on MTCNN and SLT
收藏 引用
Multimedia Tools and Applications 2025年 1-43页
作者: Thabit, Rasha Al-Askari, Mohanad A. Mohammed, Dunya Zeki Anaam, Elham Abdulwahab Mahmood, Zainab H. Jabbar, Dina Jamal Salih, Zahraa Aqeel Information System Department College of Computer Sciences and Information Technology University of Al-Anbar Al-Anbar Iraq Computer Engineering Department College of Engineering Al-Iraqia University Baghdad Iraq Electronic and Communications Engineering Department College of Engineering Gilgamesh University Baghdad Iraq Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia Department of Cybersecurity Engineering College of Information Engineering Al-Nahrain University Baghdad Iraq Electrical Engineering Technical Collage Middle Technical University Baghdad Iraq Department of Business Administration Alamaal University College Baghdad Iraq
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists... 详细信息
来源: 评论
Advanced Malware Detection Methods for Polymorphic Virus Identification  5
Advanced Malware Detection Methods for Polymorphic Virus Ide...
收藏 引用
5th IEEE International Conference on Communication, computing and Industry 6.0, C2I6 2024
作者: Anil, D. Shreeshayana, R. Kiran, B. Preethi Uvce Bangalore University Department of Computer Science and Engineering Bengaluru India Atme College of Engineering Department of Electrical and Electronics Engineering Mysuru India Pes University Department of Computer Science and Engineering Bengaluru India Reva University School of Computing and Information Technology Bengaluru India
Polymorphic viruses pose a significant challenge to traditional malware detection methods due to their ability to modify their code structure with each infection, effectively evading signature-based detection. This pa... 详细信息
来源: 评论
Distance-based mutual congestion feature selection with genetic algorithm for high-dimensional medical datasets
收藏 引用
Neural computing and Applications 2025年 第8期37卷 6217-6232页
作者: Nematzadeh, Hossein Mani, Joseph Nematzadeh, Zahra Akbari, Ebrahim Mohamad, Radziah Modern College of Business and Science Muscat Oman Department of Electrical Engineering and Computer Science Florida Institute of Technology MelbourneFL32901 United States Otolaryngology Department School of Medicine Emory University AtlantaGA30322 United States Department of Computer Engineering Sari Branch Islamic Azad University Sari Iran Faculty of Computing Universiti Teknologi Malaysia Skudai81310 Malaysia
Abstract: Feature selection poses a challenge in high-dimensional datasets, where the number of features exceeds the number of observations, as seen in microarray, gene expression, and medical datasets. There is not a... 详细信息
来源: 评论
DPT‐tracker:Dual pooling transformer for efficient visual tracking
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 948-959页
作者: Yang Fang Bailian Xie Uswah Khairuddin Zijian Min Bingbing Jiang Weisheng Li Key Laboratory of Data Engineering and Visual Computing Chongqing University of Posts and TelecommunicationsChongqingChina Department of Mechanical Precision Engineering Malaysia‐Japan International Institute of TechnologyUniversity of Technology MalaysiaKuala LumpurMalaysia Department of Electrical and Computer Engineering Inha UniversityIncheonRepublic of Korea School of Information Science and Technology Hangzhou Normal UniversityHangzhouChina
Transformer tracking always takes paired template and search images as encoder input and conduct feature extraction and target‐search feature correlation by self and/or cross attention operations,thus the model compl... 详细信息
来源: 评论
TrueAdaptTM- AI Based Maskless Patterning to Compensate for Die-Shift in Fan-Out Wafer Level Packaging  73
TrueAdaptTM- AI Based Maskless Patterning to Compensate for ...
收藏 引用
73rd IEEE Electronic Components and Technology Conference, ECTC 2023
作者: Sabbir, Golam Sahoo, Krutikesh Sun, Henry Iver, Subramanian Ouyang, Guangqi Wu, Yilin Ucla Department of Materials Science and Engineering United States Ucla Department of Electrical and Computing Engineering United States Ucla Department of Computer Science United States
TrueAdapt™ offers an attractive solution to fan-out-wafer-level-packaging (FOWLP) and fan-out-panel-level-packaging, which offers significant cost savings as compared to similar bridge connection technology or interpo... 详细信息
来源: 评论
Large Language Models for Data Annotation and Synthesis: A Survey
Large Language Models for Data Annotation and Synthesis: A S...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Tan, Zhen Li, Dawei Wang, Song Beigi, Alimohammad Jiang, Bohan Bhattacharjee, Amrita Karami, Mansooreh Li, Jundong Cheng, Lu Liu, Huan School of Computing and Augmented Intelligence Arizona State University United States Department of Electrical and Computer Engineering the University of Virginia United States Department of Computer Science University of Illinois Chicago United States
Data annotation and synthesis generally refers to the labeling or generating of raw data with relevant information, which could be used for improving the efficacy of machine learning models. The process, however, is l... 详细信息
来源: 评论