咨询与建议

限定检索结果

文献类型

  • 47,429 篇 会议
  • 7,553 篇 期刊文献
  • 324 册 图书

馆藏范围

  • 55,306 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34,190 篇 工学
    • 21,065 篇 计算机科学与技术...
    • 17,522 篇 软件工程
    • 9,465 篇 信息与通信工程
    • 6,309 篇 电子科学与技术(可...
    • 6,118 篇 电气工程
    • 5,729 篇 控制科学与工程
    • 3,117 篇 生物工程
    • 2,633 篇 光学工程
    • 2,623 篇 生物医学工程(可授...
    • 2,281 篇 机械工程
    • 2,273 篇 动力工程及工程热...
    • 2,147 篇 仪器科学与技术
    • 1,679 篇 化学工程与技术
    • 1,257 篇 材料科学与工程(可...
    • 1,145 篇 安全科学与工程
    • 1,072 篇 交通运输工程
  • 17,882 篇 理学
    • 9,425 篇 数学
    • 5,837 篇 物理学
    • 3,394 篇 生物学
    • 3,070 篇 统计学(可授理学、...
    • 2,213 篇 系统科学
    • 1,766 篇 化学
  • 7,302 篇 管理学
    • 4,461 篇 管理科学与工程(可...
    • 3,148 篇 图书情报与档案管...
    • 2,464 篇 工商管理
  • 2,076 篇 医学
    • 1,798 篇 临床医学
    • 1,674 篇 基础医学(可授医学...
    • 1,115 篇 药学(可授医学、理...
  • 1,330 篇 法学
    • 1,090 篇 社会学
  • 917 篇 经济学
    • 916 篇 应用经济学
  • 594 篇 农学
  • 583 篇 教育学
  • 237 篇 文学
  • 149 篇 军事学
  • 51 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 1,343 篇 accuracy
  • 1,231 篇 computational mo...
  • 1,043 篇 feature extracti...
  • 939 篇 training
  • 731 篇 deep learning
  • 719 篇 computer science
  • 682 篇 real-time system...
  • 648 篇 machine learning
  • 619 篇 predictive model...
  • 608 篇 optimization
  • 506 篇 support vector m...
  • 501 篇 internet of thin...
  • 492 篇 computer archite...
  • 492 篇 data models
  • 437 篇 neural networks
  • 422 篇 convolutional ne...
  • 402 篇 wireless sensor ...
  • 395 篇 reliability
  • 394 篇 bandwidth
  • 383 篇 monitoring

机构

  • 169 篇 dept. of electri...
  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 66 篇 università di ca...
  • 62 篇 dept. of electr....
  • 58 篇 dept. of electri...
  • 57 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of electri...
  • 52 篇 school of automa...
  • 51 篇 leiden universit...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 39 篇 dept. of compute...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 77 篇 kalekin o.
  • 66 篇 huang f.
  • 65 篇 díaz a.f.
  • 54 篇 boumaaza j.
  • 52 篇 kulikovskiy v.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.
  • 37 篇 androulakis g.
  • 37 篇 coleiro a.
  • 34 篇 de palma m.
  • 34 篇 khatun a.
  • 33 篇 eirini eleni tsi...

语言

  • 52,425 篇 英文
  • 1,972 篇 其他
  • 649 篇 中文
  • 211 篇 朝鲜文
  • 59 篇 日文
  • 4 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Dept. of Computer and Electrical Engineering and Computer Science"
55306 条 记 录,以下是4991-5000 订阅
排序:
Predictive Modeling of Battery Second-Life Performance Using Support Vector Regression and Voltage Features  2
Predictive Modeling of Battery Second-Life Performance Using...
收藏 引用
2nd International Conference on Advanced Innovations in Smart Cities, ICAISC 2025
作者: Hossian, Md. Ismail Hannan, Nasif Das, Hridoy Rahman Akash, Md. Ashiqur Ashraf, Md Sazid Shufian, Abu American International University Dept. of Electrical and Electronic Engineering Dhaka Bangladesh Dhaka Bangladesh Texas Tech University Dept. of Electrical and Computer Engineering LubbockTX United States Lamar University Dept. of Electrical and Computer Engineering BeaumontTX United States
Extensively used in electric vehicles (EVs), lithium-ion (Li-ion) batteries, undergo significant degradation after several charge-discharge cycles, leading to their retirement from high-demand applications. However, t... 详细信息
来源: 评论
Implementing Secure Key Management and Distribution in Cloud Environment  2
Implementing Secure Key Management and Distribution in Cloud...
收藏 引用
2nd IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2023
作者: Lamsal, Aman Paul, Aniket Buchade, Amar Nalavade, Jagannath Bidwe, Ranjeet MIT Art Design and Technology University Dept. of Computer Science and Engineering Pune India Vishwakarma Institute of Information Technology Pune Savitribai Phule Pune University Pune India Department of Computer Engineering Pune India
Key management is considered as an essential aspect of securing cloud-based systems and data. As more organizations move their operations to cloud, the need for secure and efficient key management solutions becomes in... 详细信息
来源: 评论
FA-Net: A Fuzzy Attention-aided Deep Neural Network for Pneumonia Detection in Chest X-Rays
arXiv
收藏 引用
arXiv 2024年
作者: Roy, Ayush Bhattacharjee, Anurag Oliva, Diego Ramos-Soto, Oscar Alvarez-Padilla, Francisco J. Sarkar, Ram Dept. of Electrical Engineering Jadavpur University Kolkata India Dept. of Computer Science and Engineering Kalinga Institute of Industrial Technology Bhubaneswar India Universidad de Guadalajara CUCEI Guadalajara Mexico Dept. of Computer Science and Engineering Jadavpur University Kolkata India
Pneumonia is a respiratory infection caused by bacteria, fungi, or viruses. It affects many people, particularly those in developing or underdeveloped nations with high pollution levels, unhygienic living conditions, ... 详细信息
来源: 评论
Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC Applications
Bringing DNS Service to 5G Edge for Reduced Latencies in mMT...
收藏 引用
IEEE International Conference on Industrial Technology (ICIT)
作者: Ricardo Harrilal-Parchment Diana Pineda Kemal Akkaya Abdullah Aydeger Alexander Perez-Pons Dept. of Electrical and Computer Engineering Florida International University Miami FL USA Dept. of Electrical Engineering and Computer Science Florida Institute of Technology Melbourne FL USA
5G brings many improvements to cellular networks in terms of performance, such as lower latency, improved network efficiency, and higher throughput, making it an attractive candidate for many applications. One such do...
来源: 评论
A/B Testing and Audience Creation for Effective Digital Marketing: Evidences from Facebook Analytics  6
A/B Testing and Audience Creation for Effective Digital Mark...
收藏 引用
6th International Conference on Information Systems and computer Networks, ISCON 2023
作者: Singh, Nripendra Jaiswal, Anand Singh, Prakhar Sharma, Dilip Kr. PennWest University Dept. of Management and Marketing Clarion United States New Delhi Institute of Management Dept. of Operations and Scm Delhi India PennWest University Computer Information Science Department Clarion United States GLA University Dept. of Computer Engineering and Applications Mathura India
Digital marketers use a number of strategies, including custom audiences, lookalike audiences, ad creative, and A/B testing, to organize and enhance how they present advertisements to consumers. The purpose of this re... 详细信息
来源: 评论
Lyapunov-based Resilient Secondary Synchronization Strategy of AC Microgrids Under Exponentially Energy-Unbounded FDI Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Rajabinezhad, Mohamadamin Shams, Nesa Ali Khan, Asad Beg, Omar A. Zuo, Shan Dept. of Electrical and Computer Engineering University of Connecticut StorrsCT United States Dept. of Electrical and Computer Engineering University of Texas at San Antonio San AntonioTX United States Dept. of Electrical and Computer Engineering University of Texas Permian Basin OdessaTX United States
This article presents fully distributed Lyapunov-based attack-resilient secondary control strategies for islanded inverter-based AC microgrids, designed to counter a broad spectrum of energy-unbounded False Data Injec... 详细信息
来源: 评论
Literature Survey on Design and Analysis of Microstrip Patch Antenna for Wireless Application
Literature Survey on Design and Analysis of Microstrip Patch...
收藏 引用
2024 Asia Pacific Conference on Innovation in Technology, APCIT 2024
作者: Pushpanjali, J. Ezhilarasan, K. Satheesha, T.Y. CMR University India Bangalore Institute of Technology India CMR University School of Engineering and Technology Dept. of ECE Bengaluru India REVA University School of Computer Science and Engineering Bengaluru India
The rapid evolution of wireless communication technologies necessitates the continuous enhancement of antenna systems to meet the growing demands for compactness, flexibility, and multifunctionality. Among the myriad ... 详细信息
来源: 评论
Robust Bagging and Boosting Models for MQTT IoT Intrusion Detection Systems  10
Robust Bagging and Boosting Models for MQTT IoT Intrusion De...
收藏 引用
10th International Conference on Platform Technology and Service, PlatCon 2024
作者: Le, Thi-Thu-Huong Yun, Jiwon Kim, Jaehyun Adiputra, Andro Aprila Kim, Howon Blockchain Platform Research Center Pusan National University Busan Korea Republic of Dept. of Computer Science&Engineering Pusan National University Busan Korea Republic of
The proliferation of MQTT-based Internet of Things (IoT) networks introduces significant security challenges exacerbated by the imbalance between normal and attack data distributions. This paper proposes a robust appr... 详细信息
来源: 评论
CMax-SLAM: Event-based Rotational-Motion Bundle Adjustment and SLAM System using Contrast Maximization
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Shuang Gallego, Guillermo The Dept. of Electrical Engineering and Computer Science TU Berlin Berlin Germany Excellence Cluster Berlin Germany
Event cameras are bio-inspired visual sensors that capture pixel-wise intensity changes and output asynchronous event streams. They show great potential over conventional cameras to handle challenging scenarios in rob... 详细信息
来源: 评论
Quantum Error Correction Based Entanglement Routing in Socially-Aware Quantum Networks
Quantum Error Correction Based Entanglement Routing in Socia...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Huang, Shao-Min Chien, Ming-Huang Wen, Ting-Yuan Wang, Qian-Jing Kuo, Jian-Jhih National Chung Cheng University Dept. of Computer Science and Information Engineering Chiayi Taiwan Academia Sinica Research Center for Information Technology Innovation Taipei City Taiwan
Quantum teleportation enables high-security communications via quantum entanglement. However, decoherence, signal decay, and environmental interference may cause imperfect entangled pairs with low fidelity. Such entan...
来源: 评论