咨询与建议

限定检索结果

文献类型

  • 46,044 篇 会议
  • 22,793 篇 期刊文献
  • 602 册 图书

馆藏范围

  • 69,439 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 39,033 篇 工学
    • 20,693 篇 计算机科学与技术...
    • 16,419 篇 软件工程
    • 10,345 篇 信息与通信工程
    • 7,993 篇 电气工程
    • 7,858 篇 电子科学与技术(可...
    • 7,650 篇 控制科学与工程
    • 3,325 篇 生物工程
    • 3,129 篇 光学工程
    • 3,069 篇 机械工程
    • 2,701 篇 动力工程及工程热...
    • 2,591 篇 仪器科学与技术
    • 2,556 篇 生物医学工程(可授...
    • 1,983 篇 材料科学与工程(可...
    • 1,875 篇 化学工程与技术
    • 1,163 篇 交通运输工程
    • 1,101 篇 安全科学与工程
  • 22,454 篇 理学
    • 11,045 篇 数学
    • 8,085 篇 物理学
    • 3,753 篇 统计学(可授理学、...
    • 3,737 篇 生物学
    • 3,602 篇 系统科学
    • 2,058 篇 化学
  • 7,695 篇 管理学
    • 5,266 篇 管理科学与工程(可...
    • 2,671 篇 图书情报与档案管...
    • 2,634 篇 工商管理
  • 2,451 篇 医学
    • 2,066 篇 临床医学
    • 1,772 篇 基础医学(可授医学...
    • 1,048 篇 药学(可授医学、理...
  • 1,402 篇 法学
    • 1,195 篇 社会学
  • 1,001 篇 经济学
    • 994 篇 应用经济学
  • 553 篇 农学
  • 523 篇 教育学
  • 274 篇 文学
  • 167 篇 军事学
  • 89 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 1,370 篇 control systems
  • 1,149 篇 computational mo...
  • 1,071 篇 computer science
  • 922 篇 feature extracti...
  • 887 篇 bandwidth
  • 821 篇 optimization
  • 761 篇 systems engineer...
  • 750 篇 laboratories
  • 732 篇 costs
  • 730 篇 wireless communi...
  • 726 篇 robustness
  • 723 篇 neural networks
  • 702 篇 deep learning
  • 698 篇 accuracy
  • 694 篇 machine learning
  • 677 篇 switches
  • 673 篇 wireless sensor ...
  • 662 篇 educational inst...
  • 634 篇 computer archite...
  • 625 篇 algorithm design...

机构

  • 511 篇 department of el...
  • 314 篇 department of el...
  • 209 篇 department of el...
  • 162 篇 electrical compu...
  • 133 篇 department of el...
  • 131 篇 ieee
  • 113 篇 department of co...
  • 102 篇 department of sy...
  • 98 篇 department of ph...
  • 96 篇 institute of inf...
  • 96 篇 faculty of scien...
  • 93 篇 faculté des scie...
  • 93 篇 departamento de ...
  • 92 篇 national mobile ...
  • 87 篇 department of ph...
  • 86 篇 department of ph...
  • 77 篇 department of ph...
  • 73 篇 center for power...
  • 72 篇 department of el...
  • 72 篇 centre de calcul...

作者

  • 182 篇 niyato dusit
  • 90 篇 han zhu
  • 85 篇 f. buehrer
  • 85 篇 a. t. law
  • 85 篇 c. alexa
  • 85 篇 j. m. izen
  • 85 篇 s. veneziano
  • 85 篇 d. di valentino
  • 85 篇 g. bella
  • 85 篇 j. strandberg
  • 85 篇 d. calvet
  • 85 篇 c. amelung
  • 85 篇 n. orlando
  • 85 篇 c. gumpert
  • 85 篇 h. a. gordon
  • 85 篇 y. tayalati
  • 85 篇 g. spigo
  • 85 篇 v. chiarella
  • 85 篇 f. siegert
  • 84 篇 a. antonov

语言

  • 65,614 篇 英文
  • 2,860 篇 其他
  • 870 篇 中文
  • 76 篇 日文
  • 16 篇 德文
  • 7 篇 法文
  • 5 篇 朝鲜文
  • 5 篇 葡萄牙文
  • 3 篇 西班牙文
  • 3 篇 俄文
  • 3 篇 土耳其文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
检索条件"机构=Department of Systems and Information Engineering and Electrical and Computer Engineering"
69439 条 记 录,以下是341-350 订阅
排序:
Performance of AI-Empowered Anti-Jamming Communications under Hardware Impairments
Performance of AI-Empowered Anti-Jamming Communications unde...
收藏 引用
2024 IEEE Middle East Conference on Communications and Networking, MECOM 2024
作者: Arif, Muhammad Shahzad Muhaidat, Sami Argyriou, Antonios Sofotasios, Paschalis C. Khalifa University Department of Computer and Information Engineering Abu Dhabi United Arab Emirates Khalifa University KU 6G Center Department of Computer and Information Engineering Abu Dhabi United Arab Emirates Carleton University Department of Systems and Computer Engineering Ottawa Canada University of Thessaly Department of Electrical and Computer Engineering Volos Greece Khalifa University KU C2PS and 6G Center Department of Computer and Information Engineering Abu Dhabi United Arab Emirates Tampere University Department of Electrical Engineering Tampere Finland
The present contribution quantifies the effect of Hardware Imperfections (HWI) on Artificial Intelligence (AI)empowered anti-jamming wireless communication scenarios. To that end, we consider an AI-empowered wireless ... 详细信息
来源: 评论
On Detecting Malicious Code Injection by Monitoring Multi-Level Container Activities  14
On Detecting Malicious Code Injection by Monitoring Multi-Le...
收藏 引用
14th International Conference on Cloud Computing and Services Science, CLOSER 2024
作者: Bhuiyan, Md. Olid Hasan Das, Souvik Majumder, Shafayat Hossain Majumdar, Suryadipta Hossain, Md. Shohrab Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Bangladesh Concordia Institute for Information Systems Engineering Concordia University Canada
In recent years, cloud-native applications have been widely hosted and managed in containerized environments due to their unique benefits, such as being lightweight, portable, and cost-efficient. Their growing popular... 详细信息
来源: 评论
Interference Suppression and Jitter Elimination Ability-Based Adaption Tracking Guidance for Robotic Fishes
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 126-137页
作者: Dongfang Li Jie Huang Rob Law Xin Xu Limin Zhu Edmond Q.Wu IEEE the School of Electrical Engineering and Automation Fuzhou University the Key Laboratory of System Control and Information Processing Ministry of Education the School of Electrical Engineering and Automation Fuzhou University 5G+Industrial Internet Institute Fuzhou University the University of Macau the College of Mechatronics and Automation National University of Defense Technology the School of Mechanical Engineering Shanghai Jiao Tong University the Department of Computer Science and Engineering Shanghai Jiao Tong University
This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance ru... 详细信息
来源: 评论
Fortifying Multi-Agent Architectures in Smart Manufacturing: Leveraging Federated Learning and Blockchain for Security and Resilience  22
Fortifying Multi-Agent Architectures in Smart Manufacturing:...
收藏 引用
22nd IEEE Consumer Communications and Networking Conference, CCNC 2025
作者: Tshakwanda, Petro M. Tsegaye, Henok B. Almaayn, Raddad Devetsikiotis, Michael University of New Mexico Department of Electrical and Computer Engineering United States University of Trento Department of Information Engineering and Computer Science Italy
This work presents a blockchain-based communication architecture for multi-agent smart manufacturing systems, enhanced with federated learning to improve security, data privacy, and scalability. Comparative evaluation... 详细信息
来源: 评论
Deep learning-based human activity recognition using CNN, ConvLSTM, and LRCN
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 259-268页
作者: Uddin, Md. Ashraf Talukder, Md. Alamin Uzzaman, Muhammad Sajib Debnath, Chandan Chanda, Moumita Paul, Souvik Islam, Md. Manowarul Khraisat, Ansam Alazab, Ammar Aryal, Sunil School of Information Technology Deakin University Waurn Ponds Campus Geelong Australia Department of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka Bangladesh Department of Computer Science and Engineering Jagannath University Dhaka Bangladesh Centre for Artificial Intelligence and Optimization Torrens University Australia Department of Electrical and Computer Engineering University of Ottawa Canada
Human activity recognition (HAR) plays a crucial role in assisting the elderly and individuals with vascular dementia by providing support and monitoring for their daily activities. This paper presents a deep learning... 详细信息
来源: 评论
Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
收藏 引用
无人系统(英文) 2024年 第2期12卷 341-358页
作者: Ziqin Chen Guanpu Chen Yiguang Hong Department of Control Science and Engineering and Shanghai Research Institute for Intelligent Autonomous Systems Tongji UniversityShanghaiP.R.China School of Electrical Engineering and Computer Science KTH Royal Institute of TechnologyStockholmSweden
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga... 详细信息
来源: 评论
Surface Functionalized Plasmonic Sensors for Uric Acid Detection With Gold-Graphene Stacked Nanocomposites
收藏 引用
Photonic Sensors 2025年 第1期15卷 122-137页
作者: Olabisi Abdullahi ONIFADE Dinie Dayana MOHAMAD AZRI Muhammad Hafiz ABU BAKAR Mohammed Thamer ALRESHEEDI Eng Khoon NG Mohd Adzir MAHDI Ahmad Shukri MUHAMMAD NOOR Department of Computer and Communication Systems Engineering Faculty of EngineeringUniversiti Putra MalaysiaSerdang 43400Malaysia Wireless and Photonics Research Centre of Excellence Faculty of EngineeringUniversiti Putra MalaysiaSerdang43400Malaysia Department of Electrical Engineering College of EngineeringKing Saud UniversityRiyadh 11421Kingdom of SaudiArabia Department of Engineering University of CambridgeCambridge CB30FAThe United Kingdom Institute of Nanoscience and Nanotechnology(ION2) Universiti Putra MalaysiaSerdang 43400Malaysia
This study presented a surface-functionalized sensor probe using 3-aminopropyltriethoxysilane(APTES)self-assembled monolayers on a Kretschmann-configured plasmonic *** probe featured stacked nanocomposites of gold(via... 详细信息
来源: 评论
Using Combined Knapsack and Shortest Path Problems for Planning Optimal Navigation Paths for Robotic Deliveries  10
Using Combined Knapsack and Shortest Path Problems for Plann...
收藏 引用
10th International Conference on Automation, Robotics, and Applications, ICARA 2024
作者: Voloch, Nadav Zadok, Yair Voloch-Bloch, Noa Hajaj, Maor Meir Ruppin Academic Center Computer Engineering department Emek Hefer Israel Achva Academic College Information Systems department Shikmim Israel Ruppin Academic Center Electrical Engineering department Emek Hefer Israel University of Haifa Information Systems department Haifa Israel
Today., the use of robotic navigational tools is widely used both in academical research and the technological industry., there is a growing need for planning paths of navigation to autonomous machines., robots and tr... 详细信息
来源: 评论
Network-Based Rail Running Band Anomaly Recognition via Recurrent Attention Graphs
收藏 引用
IEEE Transactions on Automation Science and engineering 2025年 22卷 15381-15395页
作者: Ni, Xuefeng Fieguth, Paul W. Ma, Ziji Shi, Bo Liu, Hongli Hunan University College of Electrical and Information Engineering Changsha410012 China University of Waterloo Department of Systems Design Engineering WaterlooONN2L 3G1 Canada The Hong Kong University of Science and Technology Department of Computer Science and Engineering Sai Kung Hong Kong
Anomaly detection for rail running bands, the pattern of wheel-rail contact area, is crucial to analyze composite rail irregularities. This paper presents an all-weather vision-based solution for running-band inspecti... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论