咨询与建议

限定检索结果

文献类型

  • 1,896 篇 会议
  • 1,807 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,761 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,304 篇 工学
    • 1,413 篇 计算机科学与技术...
    • 1,139 篇 软件工程
    • 637 篇 信息与通信工程
    • 466 篇 控制科学与工程
    • 388 篇 电气工程
    • 321 篇 电子科学与技术(可...
    • 249 篇 生物工程
    • 195 篇 生物医学工程(可授...
    • 176 篇 光学工程
    • 175 篇 机械工程
    • 129 篇 动力工程及工程热...
    • 112 篇 仪器科学与技术
    • 97 篇 交通运输工程
    • 93 篇 安全科学与工程
    • 89 篇 材料科学与工程(可...
    • 69 篇 化学工程与技术
  • 1,421 篇 理学
    • 708 篇 数学
    • 479 篇 物理学
    • 277 篇 统计学(可授理学、...
    • 273 篇 生物学
    • 224 篇 系统科学
    • 78 篇 化学
  • 556 篇 管理学
    • 382 篇 管理科学与工程(可...
    • 215 篇 工商管理
    • 190 篇 图书情报与档案管...
  • 206 篇 医学
    • 178 篇 临床医学
    • 143 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 102 篇 法学
    • 93 篇 社会学
  • 68 篇 经济学
    • 68 篇 应用经济学
  • 34 篇 教育学
  • 21 篇 农学
  • 10 篇 军事学
  • 6 篇 文学
  • 5 篇 艺术学

主题

  • 86 篇 computer science
  • 66 篇 deep learning
  • 64 篇 machine learning
  • 61 篇 laboratories
  • 59 篇 artificial intel...
  • 57 篇 feature extracti...
  • 54 篇 computational mo...
  • 53 篇 information syst...
  • 53 篇 optimization
  • 44 篇 internet of thin...
  • 43 篇 reinforcement le...
  • 41 篇 throughput
  • 41 篇 control systems
  • 40 篇 data mining
  • 39 篇 accuracy
  • 38 篇 wireless communi...
  • 36 篇 costs
  • 35 篇 wireless sensor ...
  • 35 篇 training
  • 34 篇 routing

机构

  • 100 篇 department of ph...
  • 100 篇 faculty of scien...
  • 100 篇 departamento de ...
  • 99 篇 department for p...
  • 99 篇 department of ph...
  • 98 篇 dipartimento di ...
  • 97 篇 yerevan physics ...
  • 96 篇 kirchhoff-instit...
  • 96 篇 graduate school ...
  • 95 篇 institute of phy...
  • 94 篇 faculté des scie...
  • 94 篇 institute of phy...
  • 93 篇 department of ph...
  • 92 篇 centre de calcul...
  • 91 篇 institut für ast...
  • 89 篇 physikalisches i...
  • 87 篇 fakultät für phy...
  • 86 篇 department of ph...
  • 86 篇 department of ph...
  • 86 篇 department of ph...

作者

  • 86 篇 f. buehrer
  • 86 篇 a. t. law
  • 86 篇 c. alexa
  • 86 篇 j. m. izen
  • 86 篇 s. veneziano
  • 86 篇 d. di valentino
  • 86 篇 g. bella
  • 86 篇 j. strandberg
  • 86 篇 d. calvet
  • 86 篇 c. amelung
  • 86 篇 n. orlando
  • 86 篇 c. gumpert
  • 86 篇 h. a. gordon
  • 86 篇 y. tayalati
  • 86 篇 g. spigo
  • 86 篇 v. chiarella
  • 86 篇 f. siegert
  • 86 篇 a. c. könig
  • 86 篇 a. dimitrievska
  • 86 篇 f. deliot

语言

  • 3,128 篇 英文
  • 589 篇 其他
  • 44 篇 中文
  • 5 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Departments of Electrical and Systems Engineering and Computer and Information Science"
3761 条 记 录,以下是181-190 订阅
排序:
Multidimensional Voronoi Constellations vs. Short Blocklength Probabilistic Shaping: A Comparison for Multilevel Coding Approach
Multidimensional Voronoi Constellations vs. Short Blocklengt...
收藏 引用
2024 Asia Communications and Photonics Conference, ACP 2024 and International Conference on information Photonics and Optical Communications, IPOC 2024
作者: Sheng, Yajie Chen, Bin Lei, Yi Deng, Jingxin Xu, Jiwei Fu, Mengfan Zhuge, Qunbi Li, Shen Department of Computer Science and Information Engineering Hefei University of Technology Hefei China State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China Department of Electrical and Computer Engineering Université Laval Québec Canada
Performance of concatenated multilevel coding with probabilistic shaping (PS) and Voronoi constellations (VCs) is analysed over AWGN channel. Numerical results show that VCs provide up to 1.3 dB SNR gains over PS-QAM ... 详细信息
来源: 评论
User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUN
User-Centric Security and Privacy Threats in Connected Vehic...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Stingelova, Beata Thrakl, Clemens Thaddaus Wronska, Laura Jedrej-Szymankiewicz, Sandra Khan, Sajjad Svetinovic, Davor Vienna University of Economics and Business Information Systems and Operations Management Vienna Austria Khalifa University Center for Cyber-Physical Systems Electrical Engineering and Computer Science Abu Dhabi United Arab Emirates
The increasing equipment of cars with smart systems and their networking with other devices is leading to a growing network of connected vehicles. Connected cars are Internet of Things (IoT) devices that communicate b... 详细信息
来源: 评论
Week Ahead Electricity Power and Price Forecasting Using Improved DenseNet-121 Method
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4249-4265页
作者: Muhammad Irfan Ali Raza Faisal Althobiani Nasir Ayub Muhammad Idrees Zain Ali Kashif Rizwan Abdullah Saeed Alwadie Saleh Mohammed Ghonaim Hesham Abdushkour Saifur Rahman Omar Alshorman Samar Alqhtani Electrical Engineering Department College of EngineeringNajran University Saudi ArabiaNajran61441Saudi Arabia Department of Computer Science COMSATS University IslamabadWah Campus22060Pakistan Faculty of Maritime Studies King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Federal Urdu University of ArtsScience and TechnologyIslamabad44000Pakistan School of Electrical Engineering and Computer Science National University of Science and TechnologyIslamabad44000Pakistan Department of Computer Science and Engineering University of Engineering and TechnologyNarowal CampusLahore54000Pakistan Department of Electrical Engineering HITEC UniversityTaxila47080Pakistan College of Computer Science and Information Systems Najran UniversityNajran61441Saudi Arabia
In the Smart Grid(SG)residential environment,consumers change their power consumption routine according to the price and incentives announced by the utility,which causes the prices to deviate from the initial ***,elec... 详细信息
来源: 评论
Safeguarding Healthcare: A Comprehensive Threat Analysis of Clinical Decision Support systems
Safeguarding Healthcare: A Comprehensive Threat Analysis of ...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Hamel, Aleksandra Ursula Charlotte Zarcu, Bogdan-Cristian Csenteri, Andras-Gergely Pfliegler, Tamara Khan, Sajjad Svetinovic, Davor Vienna University of Economics and Business Information Systems and Operations Management Vienna Austria Khalifa University Center for Cyber-Physical Systems Electrical Engineering and Computer Science Abu Dhabi United Arab Emirates
Using digital data gathering and analytics in healthcare brings benefits and risks to patients and practitioners. Smart Health information systems, such as Clinical Decision Support systems (CDSSs), consolidate data f... 详细信息
来源: 评论
Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis
Cyber Vulnerabilities in Blockchain Electronic Health Record...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Brkic, Marija Dinu, Horia-Stefan Mirkovic, Alida Sabirovic, Alma Khan, Sajjad Svetinovic, Davor Vienna University of Economics and Business Information Systems and Operations Management Vienna Austria Center for Cyber-Physical Systems Electrical Engineering and Computer Science Khalifa University Abu Dhabi United Arab Emirates
The rapid evolution of information systems and the surge in data generation and dissemination have fostered the emergence of Electronic Health Records (EHRs). Specifically, blockchain-enabled EHRs are revolutionizing ... 详细信息
来源: 评论
Blockchain CBDC Security Threats Using STRIDE  5
Blockchain CBDC Security Threats Using STRIDE
收藏 引用
5th International Conference on Blockchain Computing and Applications, BCCA 2023
作者: Hans, Jaqueline Khan, Sajjad Svetinovic, Davor Information Systems and Operations Management Vienna University of Economics and Business Vienna Austria Center for Cyber-Physical Systems Electrical Engineering and Computer Science Khalifa University Abu Dhabi United Arab Emirates
In strategic response to the increasing threats from crypto payment systems, cryptocurrencies, and stablecoins, central banks globally are contemplating the introduction of their digital currencies, termed Central Ban... 详细信息
来源: 评论
Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture
Threat Modeling for ML-based Topology Prediction in Vehicula...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Doan, Hong Hanh Paul, Audri Adhyas Zeindlinger, Harald Zhang, Yiheng Khan, Sajjad Svetinovic, Davor Vienna University of Economics and Business Information Systems and Operations Management Vienna Austria Center for Cyber-Physical Systems Electrical Engineering and Computer Science Khalifa University Abu Dhabi United Arab Emirates
The Internet of Vehicles (IoV), a network that interlinks vehicles, infrastructure, and assorted entities, serves as a cornerstone for intelligent transportation systems and the emergence of smart cities. Within this ... 详细信息
来源: 评论
Improving Graph Machine Learning Performance Through Feature Augmentation Based on Network Control Theory  32
Improving Graph Machine Learning Performance Through Feature...
收藏 引用
32nd Mediterranean Conference on Control and Automation, MED 2024
作者: Said, Anwar Ahmad, Obaid Ullah Abbas, Waseem Shabbir, Mudassir Koutsoukos, Xenofon Vanderbilt University Computer Science Department NashvilleTN United States University of Texas at Dallas Electrical Engineering Department RichardsonTX75080 United States University of Texas at Dallas Systems Engineering Department RichardsonTX United States Information Technology University Computer Science Department Lahore Pakistan
Network control theory (NCT) offers a robust analytical framework for understanding the influence of network topology on dynamic behaviors, enabling researchers to decipher how certain patterns of external control mea... 详细信息
来源: 评论
Distributed Optimization with Finite Bit Adaptive Quantization for Efficient Communication and Precision Enhancement  63
Distributed Optimization with Finite Bit Adaptive Quantizati...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Rikos, Apostolos I. Jiang, Wei Charalambous, Themistoklis Johansson, Karl H. Artificial Intelligence Thrust of the Information Hub Guangzhou China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Clear Water Bay Hong Kong Aalto University School of Electrical Engineering Department of Electrical Engineering and Automation Espoo Finland University of Cyprus School of Engineering Department of Electrical and Computer Engineering Nicosia1678 Cyprus Kth Royal Institute of Technology Division of Decision and Control Systems StockholmSE-100 44 Sweden
In realistic distributed optimization scenarios, individual nodes possess only partial information and communicate over bandwidth constrained channels. For this reason, the development of efficient distributed algorit... 详细信息
来源: 评论
Innovative Data Encryption Techniques using AI for Wireless Sensor Actuator Network Security  2
Innovative Data Encryption Techniques using AI for Wireless ...
收藏 引用
2nd International Conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Dharmateja, M. Rama, Prabha K.P. Asha, N. Nithya, P. Lalitha, S. Manojkumar, P. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Arunai Engineering College Department of Computer Science and Engineering Tamil Nadu Tiruvannamalai India Bannari Amman Institute of Technology Department of Electrical and Electronics Engineering Tamil Nadu Sathyamangalam India
Wireless Sensor Actuator Networks (WSANs) are sensitive to cyber threats due to present static encryption techniques. Adaptive security methods are required in WSAN settings to reduce evolving dangers and maintain dat... 详细信息
来源: 评论