咨询与建议

限定检索结果

文献类型

  • 47,667 篇 会议
  • 7,704 篇 期刊文献
  • 257 册 图书
  • 1 篇 科技报告

馆藏范围

  • 55,629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33,620 篇 工学
    • 17,090 篇 计算机科学与技术...
    • 13,934 篇 软件工程
    • 9,394 篇 电气工程
    • 9,096 篇 信息与通信工程
    • 8,450 篇 电子科学与技术(可...
    • 6,427 篇 控制科学与工程
    • 3,115 篇 动力工程及工程热...
    • 2,658 篇 光学工程
    • 2,613 篇 机械工程
    • 2,462 篇 生物工程
    • 2,288 篇 仪器科学与技术
    • 2,270 篇 生物医学工程(可授...
    • 1,938 篇 化学工程与技术
    • 1,652 篇 材料科学与工程(可...
    • 1,105 篇 交通运输工程
    • 1,048 篇 力学(可授工学、理...
    • 996 篇 安全科学与工程
  • 18,226 篇 理学
    • 9,199 篇 数学
    • 7,105 篇 物理学
    • 2,754 篇 统计学(可授理学、...
    • 2,677 篇 生物学
    • 2,227 篇 系统科学
    • 1,973 篇 化学
  • 5,940 篇 管理学
    • 4,037 篇 管理科学与工程(可...
    • 2,126 篇 工商管理
    • 2,122 篇 图书情报与档案管...
  • 1,709 篇 医学
    • 1,492 篇 临床医学
    • 1,374 篇 基础医学(可授医学...
    • 933 篇 药学(可授医学、理...
  • 1,034 篇 法学
  • 937 篇 经济学
    • 935 篇 应用经济学
  • 457 篇 农学
  • 454 篇 教育学
  • 198 篇 文学
  • 150 篇 军事学
  • 31 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 1,082 篇 accuracy
  • 890 篇 computational mo...
  • 838 篇 feature extracti...
  • 723 篇 training
  • 656 篇 switches
  • 643 篇 optimization
  • 626 篇 mathematical mod...
  • 600 篇 real-time system...
  • 477 篇 deep learning
  • 476 篇 predictive model...
  • 453 篇 bandwidth
  • 437 篇 machine learning
  • 425 篇 internet of thin...
  • 402 篇 robustness
  • 399 篇 reliability
  • 399 篇 neural networks
  • 399 篇 voltage control
  • 387 篇 monitoring
  • 386 篇 support vector m...
  • 375 篇 wireless communi...

机构

  • 168 篇 dept. of electri...
  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 60 篇 dept. of electr....
  • 58 篇 dept. of electri...
  • 56 篇 school of automa...
  • 52 篇 dept. of electri...
  • 50 篇 dept. of electri...
  • 50 篇 leiden universit...
  • 46 篇 dept. of electri...
  • 46 篇 dept. of electri...
  • 45 篇 dept. of electri...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 40 篇 dept. of electri...
  • 39 篇 dept. of compute...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 chen a.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 74 篇 kalekin o.
  • 64 篇 díaz a.f.
  • 62 篇 huang f.
  • 61 篇 singh bhim
  • 52 篇 kulikovskiy v.
  • 50 篇 boumaaza j.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.
  • 37 篇 androulakis g.
  • 34 篇 de palma m.
  • 34 篇 khatun a.
  • 33 篇 coleiro a.

语言

  • 52,515 篇 英文
  • 1,877 篇 其他
  • 813 篇 中文
  • 334 篇 朝鲜文
  • 107 篇 日文
  • 5 篇 德文
  • 2 篇 西班牙文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Electrical and Computer Engineering and Technology"
55629 条 记 录,以下是301-310 订阅
排序:
IoT Based Poultry Farm Smart Management System
IoT Based Poultry Farm Smart Management System
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Krishnamurthy, K.T. Managuli, Manjunath Malipatil, Sushma Bagyalakshmi, K. Salake, Sudha V. Kadalagi, Pankaja S. Patil, Sheetal B. Bms College of Engineering Vtu Dept. of Electronics & Instrumentation Belagavi India Kls Gogte Institute of Technology Vtu Dept. of Electronics & Communication Belagavi India Amc College of Engineering Vtu Dept. of Computer Science Belagavi India Sri Ranganathar Institute of Engineering & Technology Dept. of Electrical & Electronics Coimbatore India Kls Gogte Institute of Technology Vtu Dept. of Computer Science Belagavi India Sgb Institute of Technology Vtu Dept. of Computer Science Belagavi India
One of the greatest significant and fastest-growing financial sectors of India's agriculture industry at the moment is poultry. Chicken output has been steadily rising globally due to superior manufacturing proces... 详细信息
来源: 评论
The Evolution of Mobile Phone Batteries: From Ni-Cd to Li-ion
The Evolution of Mobile Phone Batteries: From Ni-Cd to Li-io...
收藏 引用
2024 International Conference on Science, technology, engineering and Management, ICSTEM 2024
作者: Manoharan, S. Mahalakshmi, B. Govindaraj, V. Vidyalakshmi, R. Dept. of Electrical and Electronics Engineering JCT College of Engineering and Technology Coimbatore India Dept. of Physics Hindustan College of Engineering and Technology Tamilnadu Coimbatore India Dept. of Electrical and Electronics Engineering Karpagam College of Engineering Tamilnadu Coimbatore India
The evolution of mobile phones has been nothing short of remarkable. The style, functionality, and capabilities of mobile phones have changed significantly over time, from the heavy and pricey gadgets of the 1980s to ... 详细信息
来源: 评论
Decomposition Algorithm for Security-Constrained Unit Commitment with AC Optimal Power Flows
Decomposition Algorithm for Security-Constrained Unit Commit...
收藏 引用
2025 IEEE Texas Power and Energy Conference, TPEC 2025
作者: Renl, Weihang Li, Mingze Fan, Lei Guan, Yongpei University of Florida Dept. of Industrial and Systems Engineering FL United States University of Houston Dept. of Electrical and Computer Engineering TX United States University of Houston Engineering Technology TX United States
This paper presents a comprehensive approach to solving the security-constrained unit commitment with alternating current power flows (SCUC-ACPF) problem in contemporary power systems. We introduce algorithms that dec... 详细信息
来源: 评论
Effects of Mismatch on IC-Equipped Programmable Metasurfaces with Multibeam Functionality
Effects of Mismatch on IC-Equipped Programmable Metasurfaces...
收藏 引用
2023 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting, AP-S/URSI 2023
作者: Kossifos, Kypros M. Georgiou, Julius Antoniades, Marco A. University of Cyprus Dept. of Electrical & Computer Engineering Nicosia Cyprus Toronto Metropolitan University Dept. of Electrical Computer & Biomedical Engineering ON Canada
Integrated circuit (IC) technology can be incorporated in programmable metasurfaces (PMSFs) and reduce their cost and power consumption while increasing their electromagnetic manipulation capabilities. Such improvemen... 详细信息
来源: 评论
Deep Learning Assisted Intelligent Human computer Interaction for Next Generation Internet Applications
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第2期48卷 145-146页
作者: Hasan, Al Mehedi Hwang, Yong Seok Shin, Jungpil Dept. of Computer Science and Engineering Rajshahi University of Engineering and Technology Bangladesh Kwangwoon University Seoul Korea Republic of School of Computer Science and Engineering The University of Aizu Aizuwakamatsu Japan
来源: 评论
Optimizing Renewable Energy Management and Demand Response with Ant Colony Optimization: A Pathway to Enhanced Grid Stability and Efficiency
Optimizing Renewable Energy Management and Demand Response w...
收藏 引用
2025 IEEE Texas Power and Energy Conference, TPEC 2025
作者: Islam, Riadul Kabir, Shaharier Shufian, Abu Rabbi, Md Shahiduzzaman Akteruzzaman, Md Lamar University Dept. of Electrical and Computer Engineering Texas United States American International University-Bangladesh Dept. of Electrical and Electronic Engineering Dhaka Bangladesh Dhaka Bangladesh
The integration of renewable energy sources into the power grid presents significant challenges due to their inherent variability and unpredictability. Efficient management of these sources and the effective implement... 详细信息
来源: 评论
Text-Conditioned Image Synthesis - A Review
Text-Conditioned Image Synthesis - A Review
收藏 引用
2023 IEEE Silchar Subsection Conference, SILCON 2023
作者: Saha, Piyush Ghosh, Sumon Bhandari, Dinabandhu Calcutta Institute of Engineering and Management Dept. of Electrical Engineering Kolkata India Heritage Institute of Technology Dept. of Computer Applications Kolkata India Heritage Institute of Technology Dept. of Computer Science Kolkata India
With the advent of Generative Adversarial Networks and diffusion models, image synthesis conditioned on text description has been an active area of research. Generative Adversarial Networks are a flexible and intuitiv... 详细信息
来源: 评论
Cybersecurity Threat Detection Using Deep Learning and Anomaly Detection Techniques
Cybersecurity Threat Detection Using Deep Learning and Anoma...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Rajendran, T. Mohamed Imtiaz, N. Jagadeesh, K. Sampathkumar, Balaji Rajalakshmi Institute of Technology Department of Computer Science and Engineering Chennai India Nagarjuna College of Engineering and Technology Dept. of Information Science and Engineering Bangalore India Sri Venkateswaraa College of Technology Dept. of Computer Science and Engineering Chennai India Akshaya College of Engineering and Technology Dept. of Computer Science and Engineering Coimbatore India
Through the use of combined deep learning and anomaly detection approaches, this research investigates the area of cybersecurity threat detection. The study proves the framework's extraordinary success in recogniz... 详细信息
来源: 评论
An Overview of Machine Learning Applications in Blockchain for Green Energy Exchanges  33
An Overview of Machine Learning Applications in Blockchain f...
收藏 引用
33rd Southern African Universities Power engineering Conference, SAUPEC 2025
作者: Nemakonde, Pfano Nemangwele, Fhulufhelo Ratshitanga, Mukovhe University of Venda Faculty Science Engineering and Agriculture Dept. of Physics Thohoyandou South Africa Cape Peninsula University of Technology Dept. of Electrical Electronic and Computer Engineering Bellville South Africa
There is an increasing demand for affordable, decentralised and distributed electricity, which is one of the key motivating factors that has incentivised this review article's writing. Industrial 4.0 has been a co... 详细信息
来源: 评论
ML Assisted Web Application Firewall  12
ML Assisted Web Application Firewall
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Kalariya, Pranav Jethva, Manthan Alginahi, Yasser University of Windsor Electrical and Computer Engineering Dept. Windsor Canada Computer Science Dept. Adrian College MI United States
This study presents the development and implementation of a sophisticated Web Application Firewall (WAF) empowered by machine learning techniques to bolster cybersecurity measures. Traditional WAFs primarily rely on r... 详细信息
来源: 评论