咨询与建议

限定检索结果

文献类型

  • 46,044 篇 会议
  • 22,793 篇 期刊文献
  • 602 册 图书

馆藏范围

  • 69,439 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 39,033 篇 工学
    • 20,693 篇 计算机科学与技术...
    • 16,419 篇 软件工程
    • 10,345 篇 信息与通信工程
    • 7,993 篇 电气工程
    • 7,858 篇 电子科学与技术(可...
    • 7,650 篇 控制科学与工程
    • 3,325 篇 生物工程
    • 3,129 篇 光学工程
    • 3,069 篇 机械工程
    • 2,701 篇 动力工程及工程热...
    • 2,591 篇 仪器科学与技术
    • 2,556 篇 生物医学工程(可授...
    • 1,983 篇 材料科学与工程(可...
    • 1,875 篇 化学工程与技术
    • 1,163 篇 交通运输工程
    • 1,101 篇 安全科学与工程
  • 22,454 篇 理学
    • 11,045 篇 数学
    • 8,085 篇 物理学
    • 3,753 篇 统计学(可授理学、...
    • 3,737 篇 生物学
    • 3,602 篇 系统科学
    • 2,058 篇 化学
  • 7,695 篇 管理学
    • 5,266 篇 管理科学与工程(可...
    • 2,671 篇 图书情报与档案管...
    • 2,634 篇 工商管理
  • 2,451 篇 医学
    • 2,066 篇 临床医学
    • 1,772 篇 基础医学(可授医学...
    • 1,048 篇 药学(可授医学、理...
  • 1,402 篇 法学
    • 1,195 篇 社会学
  • 1,001 篇 经济学
    • 994 篇 应用经济学
  • 553 篇 农学
  • 523 篇 教育学
  • 274 篇 文学
  • 167 篇 军事学
  • 89 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 1,370 篇 control systems
  • 1,149 篇 computational mo...
  • 1,071 篇 computer science
  • 922 篇 feature extracti...
  • 887 篇 bandwidth
  • 821 篇 optimization
  • 761 篇 systems engineer...
  • 750 篇 laboratories
  • 732 篇 costs
  • 730 篇 wireless communi...
  • 726 篇 robustness
  • 723 篇 neural networks
  • 702 篇 deep learning
  • 698 篇 accuracy
  • 694 篇 machine learning
  • 677 篇 switches
  • 673 篇 wireless sensor ...
  • 662 篇 educational inst...
  • 634 篇 computer archite...
  • 625 篇 algorithm design...

机构

  • 511 篇 department of el...
  • 314 篇 department of el...
  • 209 篇 department of el...
  • 162 篇 electrical compu...
  • 133 篇 department of el...
  • 131 篇 ieee
  • 113 篇 department of co...
  • 102 篇 department of sy...
  • 98 篇 department of ph...
  • 96 篇 institute of inf...
  • 96 篇 faculty of scien...
  • 93 篇 faculté des scie...
  • 93 篇 departamento de ...
  • 92 篇 national mobile ...
  • 87 篇 department of ph...
  • 86 篇 department of ph...
  • 77 篇 department of ph...
  • 73 篇 center for power...
  • 72 篇 department of el...
  • 72 篇 centre de calcul...

作者

  • 182 篇 niyato dusit
  • 90 篇 han zhu
  • 85 篇 f. buehrer
  • 85 篇 a. t. law
  • 85 篇 c. alexa
  • 85 篇 j. m. izen
  • 85 篇 s. veneziano
  • 85 篇 d. di valentino
  • 85 篇 g. bella
  • 85 篇 j. strandberg
  • 85 篇 d. calvet
  • 85 篇 c. amelung
  • 85 篇 n. orlando
  • 85 篇 c. gumpert
  • 85 篇 h. a. gordon
  • 85 篇 y. tayalati
  • 85 篇 g. spigo
  • 85 篇 v. chiarella
  • 85 篇 f. siegert
  • 84 篇 a. antonov

语言

  • 65,614 篇 英文
  • 2,860 篇 其他
  • 870 篇 中文
  • 76 篇 日文
  • 16 篇 德文
  • 7 篇 法文
  • 5 篇 朝鲜文
  • 5 篇 葡萄牙文
  • 3 篇 西班牙文
  • 3 篇 俄文
  • 3 篇 土耳其文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
检索条件"机构=Department of Systems and Information Engineering and Electrical and Computer Engineering"
69439 条 记 录,以下是301-310 订阅
排序:
Development of an Automated Service Level Agreement Negotiation Framework for SaaS Cloud E-Marketplace
Development of an Automated Service Level Agreement Negotiat...
收藏 引用
2024 International Conference on Science, engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Nnaji, Uche Azubuike, Ezenw Oke Adetiba, Emmanuel Akinola, Damola Department of Computer & Information Sciences Ota Nigeria Covenant University Department of Computer & Information Sciences Ota Nigeria Department of Electrical & Information Engineering Ota Nigeria
With the increasing number of Software-as-a-Service (SaaS) users, catering to their diverse needs while ensuring Quality of Service (QoS) has become imperative. Although SaaS providers regularly introduce new applicat... 详细信息
来源: 评论
Human Gait Recognition for Biometrics Application Based on Deep Learning Fusion Assisted Framework
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 357-374页
作者: Ch Avais Hanif Muhammad Ali Mughal Muhammad Attique Khan Nouf Abdullah Almujally Taerang Kim Jae-Hyuk Cha Department of Electrical Engineering HITEC UniversityTaxila47080Pakistan Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Department of Computer Science HITEC UniversityTaxila47080Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Hanyang UniversitySeoul04763Korea
The demand for a non-contact biometric approach for candidate identification has grown over the past ten *** on the most important biometric application,human gait analysis is a significant research topic in computer ... 详细信息
来源: 评论
Coot Optimization with Deep Learning-Based False Data Injection Attack Recognition
收藏 引用
computer systems Science & engineering 2023年 第7期46卷 255-271页
作者: T.Satyanarayana Murthy P.Udayakumar Fayadh Alenezi E.Laxmi Lydia Mohamad Khairi Ishak Department of Information Technology Chaitanya Bharathi Institute of TechnologyHyderabadTelanganaIndia Department of Computer Science and Engineering Aditya Engineering CollegeSurampalemAndhra PradeshIndia Department of Electrical Engineering College of EngineeringJouf UniversitySaudi Arabia Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India School of Electrical and Electronic Engineering Universiti Sains MalaysiaNibong Tebal14300Malaysia
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)*** security issues directly result from inappropriate security management protocols and their implementation by IoT ga... 详细信息
来源: 评论
Enhancing Automated Android Application Security through Hybrid Static and Dynamic Analysis Techniques  6
Enhancing Automated Android Application Security through Hyb...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Manukulasooriya, G.E. Munasingha, R.S.I. Fernando, Harinda Uthpali, H.K.I. Yeshani, A.V.S.H. Siriwardana, Deemantha Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The rapid growth of mobile applications has led to serious security challenges, resulting in vulnerabilities. Automation in security testing methods is becoming popular, with the Automated Vulnerability Detection meth... 详细信息
来源: 评论
Cyber Induced Harmonic Instability of Inverter-Based Renewable Generators  24
Cyber Induced Harmonic Instability of Inverter-Based Renewab...
收藏 引用
24th EEEIC International Conference on Environment and electrical engineering and 8th I and CPS Industrial and Commercial Power systems Europe, EEEIC/I and CPS Europe 2024
作者: Zadsar, Masoud Vavdareh, Masoud Babaei Ghafouri, Mohsen Ameli, Amir Concordia University Department of Information and Systems Engineering Montreal Canada Lakehead University Department of Electrical Engineering Thunder Bay Canada
Extensive integration of inverter-based resources (IBRs) has introduced stability challenges to power grids due to their low-inertia nature and grid-following control configuration. To address these challenges, recent... 详细信息
来源: 评论
High-Throughput Key Switching Accelerator for Homomorphic Encryption
High-Throughput Key Switching Accelerator for Homomorphic En...
收藏 引用
2023 International Conference on IC Design and Technology, ICICDT 2023
作者: Wang, Zeyu Ikeda, Makoto The University of Tokyo Department of Electrical Engineering and Information Systems Japan
We propose an ASIC architecture for key switching in RNS-CKKS Homomorphic Encryption scheme. With the pipeline design, the frequent RAM access is avoided and high throughput is achieved. This key switching design is a... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Educational Data Analysis using Generative AI
Educational Data Analysis using Generative AI
收藏 引用
2024 Joint of International Conference on Learning Analytics and Knowledge Workshops, LAK-WS 2024
作者: Berr, Abdul Leelaluk, Sukrit Tang, Cheng Chen, Li Okubo, Fumiya Shimada, Atsushi Department of Electrical Engineering and Computer Science Kyushu University Japan Graduate School of Information Science and Electrical Engineering Kyushu University Japan
With the advent of generative artificial intelligence (AI), the scope of data analysis, prediction of performances, real-time feedback, etc. in learning analytics has widened. The purpose of this study is to explore t... 详细信息
来源: 评论
Neural Reactivity to Haptics: Virtual Tasks Versus Physical Tasks
收藏 引用
IEEE Sensors Journal 2024年 第7期24卷 11817-11828页
作者: Liu, Yi-Hung Vaitheeshwari, R. Yeh, Shih-Ching Wu, Eric Hsiao-Kuang Institute of Electrical and Control Engineering National Yang Ming Chiao Tung University Hsinchu300093 Taiwan National Central University Department of Computer Science and Information Engineering Taoyuan320 Taiwan
This study investigates the effectiveness of haptic feedback in hand rehabilitation exercises, within both virtual reality (VR) and real-world settings, to enhance upper limb functionality in post-stroke recovery. We ... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论