咨询与建议

限定检索结果

文献类型

  • 35,893 篇 会议
  • 20,019 篇 期刊文献
  • 480 册 图书

馆藏范围

  • 56,391 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 32,736 篇 工学
    • 17,700 篇 计算机科学与技术...
    • 14,006 篇 软件工程
    • 8,879 篇 信息与通信工程
    • 6,973 篇 电子科学与技术(可...
    • 6,160 篇 电气工程
    • 5,147 篇 控制科学与工程
    • 3,224 篇 生物工程
    • 2,927 篇 光学工程
    • 2,741 篇 生物医学工程(可授...
    • 2,410 篇 机械工程
    • 2,189 篇 仪器科学与技术
    • 2,049 篇 动力工程及工程热...
    • 1,973 篇 化学工程与技术
    • 1,809 篇 材料科学与工程(可...
    • 1,009 篇 交通运输工程
    • 901 篇 安全科学与工程
    • 839 篇 建筑学
  • 19,042 篇 理学
    • 8,860 篇 数学
    • 7,355 篇 物理学
    • 3,685 篇 生物学
    • 2,871 篇 统计学(可授理学、...
    • 2,094 篇 系统科学
    • 2,057 篇 化学
  • 6,697 篇 管理学
    • 4,439 篇 管理科学与工程(可...
    • 2,465 篇 图书情报与档案管...
    • 2,092 篇 工商管理
  • 2,591 篇 医学
    • 2,189 篇 临床医学
    • 1,831 篇 基础医学(可授医学...
    • 1,193 篇 药学(可授医学、理...
  • 1,092 篇 法学
    • 918 篇 社会学
  • 794 篇 经济学
  • 515 篇 农学
  • 496 篇 教育学
  • 213 篇 文学
  • 141 篇 军事学
  • 78 篇 艺术学
  • 13 篇 哲学
  • 8 篇 历史学

主题

  • 880 篇 computer science
  • 834 篇 computational mo...
  • 677 篇 feature extracti...
  • 623 篇 bandwidth
  • 616 篇 accuracy
  • 607 篇 optimization
  • 571 篇 training
  • 563 篇 wireless communi...
  • 526 篇 machine learning
  • 509 篇 wireless sensor ...
  • 480 篇 computer archite...
  • 479 篇 deep learning
  • 471 篇 hardware
  • 464 篇 mathematical mod...
  • 452 篇 control systems
  • 441 篇 neural networks
  • 434 篇 switches
  • 433 篇 robustness
  • 427 篇 algorithm design...
  • 422 篇 internet of thin...

机构

  • 896 篇 department of el...
  • 677 篇 department of el...
  • 563 篇 department of ph...
  • 512 篇 cavendish labora...
  • 431 篇 oliver lodge lab...
  • 406 篇 physikalisches i...
  • 377 篇 faculty of scien...
  • 361 篇 school of comput...
  • 360 篇 department of ph...
  • 355 篇 department of ph...
  • 348 篇 school of electr...
  • 342 篇 department for p...
  • 314 篇 department of ph...
  • 281 篇 department of el...
  • 280 篇 infn sezione di ...
  • 277 篇 department of el...
  • 275 篇 kirchhoff-instit...
  • 274 篇 institute of phy...
  • 261 篇 department of ph...
  • 261 篇 instituto de fís...

作者

  • 324 篇 c. alexa
  • 322 篇 j. m. izen
  • 318 篇 g. bella
  • 317 篇 d. calvet
  • 317 篇 c. amelung
  • 316 篇 j. strandberg
  • 304 篇 g. spigo
  • 294 篇 f. siegert
  • 286 篇 r. ströhmer
  • 284 篇 y. tayalati
  • 277 篇 m. rijssenbeek
  • 272 篇 s. jin
  • 262 篇 g. gaudio
  • 252 篇 m. klein
  • 249 篇 f. pastore
  • 248 篇 s. mohapatra
  • 238 篇 n. orlando
  • 205 篇 s. veneziano
  • 203 篇 s. guindon
  • 200 篇 a. kaczmarska

语言

  • 53,040 篇 英文
  • 2,524 篇 其他
  • 756 篇 中文
  • 51 篇 日文
  • 23 篇 朝鲜文
  • 7 篇 法文
  • 6 篇 德文
  • 4 篇 土耳其文
  • 3 篇 阿拉伯文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 爱沙尼亚文
检索条件"机构=Department of Informatics and Computer Engineering Electronic Engineering"
56392 条 记 录,以下是4461-4470 订阅
排序:
Nonvolatile electrical switching of optical and valleytronic properties of interlayer excitons
收藏 引用
Light(Science & Applications) 2022年 第2期11卷 221-229页
作者: Tong Ye Yongzhuo Li Junze Li Hongzhi Shen Junwen Ren Cun-Zheng Ning Dehui Li School of Optical and Electronic Information Huazhong University of Science and Technology430074 WuhanChina Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology430074 WuhanChina Department of Electronic Engineering Tsinghua University100084 BeijingChina Frontier Science Center for Quantum Information 100084 BeijingChina School of Electrical Computerand Energy EngineeringArizona State UniversityTempeAZ 85287USA
Long-lived interlayer excitons(IXs)in van der Waals heterostructures(HSs)stacked by monolayer transition metal dichalcogenides(TMDs)carry valley-polarized information and thus could find promising applications in vall... 详细信息
来源: 评论
A Fused Machine Learning Approach for Intrusion Detection System
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2607-2623页
作者: Muhammad Sajid Farooq Sagheer Abbas Atta-ur-Rahman Kiran Sultan Muhammad Adnan Khan Amir Mosavi School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam 31441Saudi Arabia Department of CIT The Applied CollegeKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Gachon UniversitySeongnam13120Korea John von Neumann Faculty of Informatics Obuda UniversityBudapest1034Hungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaBratislava81107Slovakia Faculty of Civil Engineering TU-DresdenDresden01062Germany
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availabi... 详细信息
来源: 评论
A Secure Federated Learning Framework using Blockchain and Differential Privacy  9
A Secure Federated Learning Framework using Blockchain and D...
收藏 引用
9th IEEE International Conference on Cyber Security and Cloud Computing and 8th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2022
作者: Firdaus, Muhammad Larasati, Harashta Tatimma Rhee, Kyung-Hyune Pukyong National University Department of Artificial Intelligence Convergence Korea Republic of Pusan National University Department of Computer Engineering Korea Republic of Institut Teknologi Bandung School of Electrical Engineering and Informatics Indonesia
Federated learning (FL) has considerably emerged as a promising solution to enhance user privacy and data security by enabling collaboratively multi-party model learning without exchanging confidential data. Neverthel... 详细信息
来源: 评论
Statistical and Deep Machine Learning Techniques to Forecast Cryptocurrency Volatility  22nd
Statistical and Deep Machine Learning Techniques to Forecast...
收藏 引用
22nd International Conference on Hybrid Intelligent Systems, HIS 2022 and the 18th International Conference on Information Assurance and Security, IAS 2022
作者: Cebrián-Hernández, Ángeles Jiménez-Rodríguez, Enrique Tallón-Ballesteros, Antonio J. Department of Applied Economics Seville University Seville Spain Department of Financial Economics Pablo de Olavide University Seville Spain Department of Electronic Computer Systems and Automatic Engineering University of Huelva Huelva Spain
This paper studies cryptocurrency volatility forecast covering a state-of-the-art review as well empirical comparison through supervised learning. This research has two main objectives. The first objective is the usag... 详细信息
来源: 评论
Deep Learning-Based Automated System for Multi-Classification of Plant Diseases in Real-Time Environments
Deep Learning-Based Automated System for Multi-Classificatio...
收藏 引用
International Conference on Communication, Computing and Internet of Things (IC3IoT)
作者: K.B Aruna S Prema V Sureka L Sudha V Sasikala Computer Science and Engineering Department S.A. Engineering College Chennai Computer Science and Engineering Department Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai Department of Electronic and Communication Engineering Sri Sairam Engineering College
Agriculture provides food for the world's expanding population. Several developing nations are going through this period, and agriculture has been developed to fulfil the rising food demand. While agriculture seek... 详细信息
来源: 评论
Bearing-only Localization Based on an Array Network with Distributed ADMM
Bearing-only Localization Based on an Array Network with Dis...
收藏 引用
Signal, Information and Data Processing (ICSIDP), IEEE International Conference on
作者: Guanxi Sun Wei Liu School of Electronic Engineering and Computer Science Queen Mary University of London UK Department of Electrical and Electronic Engineering The Hong Kong Polytechnic University Hong Kong
The two-dimensional target localization problem for a network of distributed sensor sub-arrays (with a sub-array at each receiver) is investigated in the compressive sensing framework based on group sparsity, and the ... 详细信息
来源: 评论
Advanced Computational Modeling for Brain Tumor Detection:Enhancing Segmentation Accuracy Using ICA-Ⅰ and ICA-Ⅱ Techniques
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 255-287页
作者: Abdullah A Asiri Toufique A.Soomro Ahmed Ali Faisal Bin Ubaid Muhammad Irfan Khlood M.Mehdar Magbool Alelyani Mohammed S.Alshuhri Ahmad Joman Alghamdi Sultan Alamri Radiological Sciences Department College of Applied Medical SciencesNajran UniversityNajran61441Saudi Arabia Artificial Intelligence and Cyber Futures Institute Charles UniversityBathurstNSW 2795Australia Department of Electronic Engineering The University of LarkanoLarkana75660Pakistan Electrical Engineering Department Sukkur IBA UniversitySukkur65200Pakistan Computer Science Department Sukkur IBA UniversitySukkur65200Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Anatomy Department Medicine CollegeNajran UniversityNajran61441Saudi Arabia Department of Radiological Sciences College of Applied Medical ScienceKing Khalid UniversityGuraigerAbha62521Saudi Arabia Radiology andMedical Imaging Department College of AppliedMedical SciencesPrince Sattam bin Abdulaziz UniversityKharj11942Saudi Arabia Radiological Sciences Department College of Applied Medical SciencesTaif UniversityTaif21944Saudi Arabia
Global mortality rates are greatly impacted by malignancies of the brain and nervous ***,Magnetic Resonance Imaging(MRI)plays a pivotal role in detecting brain tumors;however,manual assessment is time-consuming and su... 详细信息
来源: 评论
Sharding:A Scalability Solutions for Blockchain Networks  3
Sharding:A Scalability Solutions for Blockchain Networks
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2024
作者: Kale, Dattatray Raghunath Jadhav, Amolkumar N. Kruishna Prasad, K. Salunkhe, Somanath Janardan Hirve, Sumit Goswami, Chandrashekhar Mit Art Design and Technology University Mit School of Computing Department of Computer Science & Engg Pune India Annasaheb Dange College of Engineering and Technology Department of Computer Science & Engg Ashta India Shrinivas University Department of Computer Science & Engg Mangalore India D Y Patil Agriculture and Technical University Department of Computer Science & Engg Talsande India Sir Padampat Singhania University Faculty of Computing and Informatics Rajasthan Udaipur India
Blockchain technology's decentralized and immutable data storage has changed a number of sectors. But typical blockchain networks scalability issues prevent them from being widely used for large-scale applications... 详细信息
来源: 评论
Multi-UAV path planning for multiple emergency payloads delivery in natural disaster scenarios
收藏 引用
Journal of electronic Science and Technology 2025年 第2期23卷
作者: Kutpanova, Zarina Kadhim, Mustafa Zheng, Xu Zhakiyev, Nurkhat Department of Computer Engineering Astana IT University Astana010000 Kazakhstan School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610054 China Department of Computational and Data Science Astana IT University Astana010000 Kazakhstan
Unmanned aerial vehicles (UAVs) are widely used in situations with uncertain and risky areas lacking network coverage. In natural disasters, timely delivery of first aid supplies is crucial. Current UAVs face risks su... 详细信息
来源: 评论
Improving Imbalanced Data Classification Through Integrated Data-Level and Algorithm-Level Techniques  6
Improving Imbalanced Data Classification Through Integrated ...
收藏 引用
6th International Conference on Contemporary Computing and informatics, IC3I 2023
作者: El Hajjami, Salma Amelal, Hicham El-Hajjami, Abdelkarim Kaushik, Keshav Khan, Inam Ullah Ibn Zohr University Faculty of Science LabSIV Department of Computer Science Agadir Morocco INP-ENSEEIHT University of Toulouse Department of Computer Science and Telecommunications France School of Computer Sciences University of Petroleum and Energy Studies Uttarakhand Dehradun India Department of Electronic Engineering Isra University Pakistan
Imbalanced class distribution is common issue in machine learning and data mining. It affects various applications like fraud detection, medical diagnosis, and network intrusion detection. The mentioned problem occurs... 详细信息
来源: 评论