咨询与建议

限定检索结果

文献类型

  • 2,331 篇 会议
  • 1,699 篇 期刊文献
  • 50 册 图书

馆藏范围

  • 4,080 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,291 篇 工学
    • 1,378 篇 计算机科学与技术...
    • 1,063 篇 软件工程
    • 551 篇 信息与通信工程
    • 366 篇 电子科学与技术(可...
    • 350 篇 电气工程
    • 293 篇 控制科学与工程
    • 254 篇 生物医学工程(可授...
    • 231 篇 生物工程
    • 225 篇 光学工程
    • 142 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 135 篇 机械工程
    • 96 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 70 篇 安全科学与工程
  • 1,612 篇 理学
    • 774 篇 物理学
    • 638 篇 数学
    • 282 篇 生物学
    • 211 篇 统计学(可授理学、...
    • 161 篇 化学
    • 158 篇 系统科学
  • 529 篇 管理学
    • 312 篇 管理科学与工程(可...
    • 224 篇 图书情报与档案管...
    • 148 篇 工商管理
  • 300 篇 医学
    • 251 篇 临床医学
    • 194 篇 基础医学(可授医学...
    • 113 篇 药学(可授医学、理...
    • 89 篇 公共卫生与预防医...
  • 93 篇 法学
    • 79 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 45 篇 教育学
  • 41 篇 农学
  • 30 篇 文学
  • 19 篇 军事学
  • 6 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 92 篇 computer science
  • 67 篇 data mining
  • 65 篇 wireless sensor ...
  • 62 篇 machine learning
  • 58 篇 authentication
  • 58 篇 feature extracti...
  • 57 篇 educational inst...
  • 56 篇 computational mo...
  • 56 篇 protocols
  • 54 篇 information tech...
  • 51 篇 deep learning
  • 48 篇 throughput
  • 48 篇 accuracy
  • 47 篇 proton-proton in...
  • 46 篇 monitoring
  • 44 篇 higgs bosons
  • 43 篇 interference
  • 43 篇 artificial intel...
  • 42 篇 optimization
  • 40 篇 application soft...

机构

  • 287 篇 department for p...
  • 286 篇 faculty of scien...
  • 284 篇 department of ph...
  • 281 篇 departamento de ...
  • 278 篇 institute of phy...
  • 277 篇 kirchhoff-instit...
  • 276 篇 department of ph...
  • 276 篇 institute of phy...
  • 268 篇 department of ph...
  • 264 篇 department of ph...
  • 260 篇 faculté des scie...
  • 257 篇 fakultät für phy...
  • 253 篇 instituto de fís...
  • 246 篇 institut für ast...
  • 240 篇 physics departme...
  • 234 篇 yerevan physics ...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 215 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 262 篇 r. ströhmer
  • 262 篇 m. rijssenbeek
  • 262 篇 s. jin
  • 262 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 262 篇 s. guindon
  • 261 篇 a. kaczmarska
  • 260 篇 h. a. gordon
  • 259 篇 h. sakamoto

语言

  • 3,947 篇 英文
  • 77 篇 其他
  • 48 篇 中文
  • 9 篇 日文
  • 3 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Division of Computer and Information Engineering"
4080 条 记 录,以下是1-10 订阅
排序:
Zero-dynamics attack detection based on data association in feedback pathway
收藏 引用
Cognitive Robotics 2025年 5卷 126-139页
作者: Zhang, Zeyu Li, Hongran Todo, Yuki Division of Electrical Engineering and Computer Science Kanazawa University Ishikawa Kanazawa9201192 Japan School of Computer Engineering Jiangsu Ocean University Jiangsu Lianyungang222005 China Faculty of Electrical Information and Communication Engineering Kanazawa University Ishikawa Kanazawa9201192 Japan
This paper considers the security of non-minimum phase systems, a typical kind of cyber-physical systems. Non-minimum phase systems are characterized by unstable zeros in their transfer functions, making them particul... 详细信息
来源: 评论
Buffer and Splitter Insertion for Adiabatic Quantum-Flux-Parametron Circuits
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第3期44卷 975-988页
作者: Fu, Rongliang Wang, Mengmeng Kan, Yirong Chen, Olivia Yoshikawa, Nobuyuki Yu, Bei Ho, Tsung-Yi The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong Yokohama National University Department of Electrical and Computer Engineering Yokohama240-8501 Japan Nara Institute of Science and Technology Division of Information Science Nara630-0192 Japan Kyushu University Department of Advanced Information Technology Fukuoka819-0395 Japan
The extremely low-bit energy characteristic of the adiabatic quantum-flux-parametron (AQFP) circuit makes it a promising candidate for highly energy-efficient computing systems. However, in contrast with conventional ... 详细信息
来源: 评论
FLSN-MVO: Edge Computing and Privacy Protection Based on Federated Learning Siamese Network With Multi-Verse Optimization Algorithm for Industry 5.0
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 3443-3458页
作者: Yin, Shoulin Li, Hang Laghari, Asif Ali Teng, Lin Reddy Gadekallu, Thippa Almadhor, Ahmad Shenyang Normal University Software College Shenyang110034 China Harbin Engineering University School of Information and Communication Engineering Harbin150000 China Lovely Professional University Division of Research and Development Phagwara144411 India Chitkara University Center of Research Impact and Outcome Rajpura140401 India Al Jouf University College of Computer and Information Sciences Department of Computer Engineering and Networks Sakaka72388 Saudi Arabia
With the development of deep learning technology, artificial intelligence has important applications in all aspects of society, but the lack of data has become a vital factor restricting the further evolution of artif... 详细信息
来源: 评论
On Strong Secrecy for Multiple Access Channels With States and Causal CSI
收藏 引用
IEEE Transactions on information Theory 2025年 第4期71卷 3070-3099页
作者: Chen, Yiqi Oechtering, Tobias J. Skoglund, Mikael Luo, Yuan Technical University of Munich Chair of Theoretical Information Technology Munich80333 Germany Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai200240 China KTH Royal Institute of Technology Division of Information Science and Engineering School of Electrical Engineering and Computer Science Stockholm100 44 Sweden Shanghai Key Laboratory of Trusted Data Circulation and Governance and Web3 Shanghai200240 China
Strong secrecy communication over a discrete memoryless state-dependent multiple access channel (SD-MAC) with an external eavesdropper is investigated. The channel is governed by discrete memoryless and i.i.d. channel... 详细信息
来源: 评论
Deep transfer learning technique to detect white blood cell classification in regular clinical practice using histopathological images
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5699-5723页
作者: Davamani, K. Anita Jawahar, Malathy Anbarasi, L. Jani Ravi, Vinayakumar Al Mazroa, Alanoud Robin, C. R. Rene Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Leather Process Technology Division CSIR-Central Leather Research Institute Chennai India School of Computing Science and Engineering Vellore Institute of Technology Vellore India Computer Science and Engineering Sri Sairam Engineering College Sirukalathur India Center for Artificial Intelligence Prince Mohammad Bin Fahd University Khobar Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh11671 Saudi Arabia
Leukemia, a malignant disease characterized by the rapid proliferation of specific types of white blood cells (WBC), has prompted increased interest in leveraging automatic WBC classification system. This study presen... 详细信息
来源: 评论
Safe Model Predictive Control of a Non-Holonomic Mobile Manipulator Under Multiple Constraints using Control Barrier Functions
收藏 引用
IEEE Access 2025年 13卷 76638-76653页
作者: Kashi, Zahra Yadegar, Meysam Meskin, Nader Cassandras, Christos G. Qom University of Technology Electrical and Computer Engineering Qom Iran Qatar University Electrical Engineering Doha Qatar Boston University Division of Systems Engineering Center for Information and Systems Engineering BostonMA02446 United States
This paper introduces a novel control strategy to ensure safety in the navigation of a mobile manipulator comprising a fixed-base manipulator mounted on a mobile platform. The approach initially addresses the trajecto... 详细信息
来源: 评论
Large Language Model Enhanced Particle Swarm Optimization for Hyperparameter Tuning for Deep Learning Models
IEEE Open Journal of the Computer Society
收藏 引用
IEEE Open Journal of the computer Society 2025年 第1期6卷 574-585页
作者: Hameed, Saad Qolomany, Basheer Belhaouari, Samir Brahim Abdallah, Mohamed Qadir, Junaid Al-Fuqaha, Ala Hamad Bin Khalifa University Division of Information and Computing Technology College of Science and Engineering Doha5825 Qatar Howard University Department of Medicine College of Medicine WashingtonDC20059 United States Qatar University Department of Computer Science and Engineering Doha5825 Qatar
Determining the ideal architecture for deep learning models, such as the number of layers and neurons, is a difficult and resource-intensive process that frequently relies on human tuning or computationally costly opt... 详细信息
来源: 评论
Personal data sharing model with legal validity in blockchain-based secure environment  27
Personal data sharing model with legal validity in blockchai...
收藏 引用
27th International Conference on Advanced Communications Technology, ICACT 2025
作者: Shin, Su Jin Shin, Sang Uk Department of Information Security Graduate School Pukyong National University Korea Republic of Division of Computer Engineering and Artificial Intelligence Pukyong National University Korea Republic of
This paper proposes a data sharing model that ensures the legal validity of data provided by individuals as legal evidence within a blockchain environment. The proposed model applies Distributed Pseudo-Random Function... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Invoking an Efficient Deep Learning Approach for Real-Time Detection of False Data Injection Attacks
Invoking an Efficient Deep Learning Approach for Real-Time D...
收藏 引用
2025 IEEE Texas Power and Energy Conference, TPEC 2025
作者: Eddin, Maymouna Ez Massaoudi, Mohamed Abu-Rub, Haitham Shadmand, Mohammad Abdallah, Mohamed Bcgovic, Miroslav Ghrayeb, Ali Texas A&M University at Qatar Department of Electrical and Computer Engineering Doha Qatar Texas A&M University Department of Electrical and Computer Engineering College Station United States Hamad Bin Khalifa University Information and Computing Technology Division Doha Qatar University of Illinois at Chicago Department of Electrical and Computer Engineering Chicago United States
With the increasing complexity of power systems and their vulnerability to cyber-attacks, robust detection mechanisms are crucial for ensuring the grid's transient and steady-state stability and resiliency. This s... 详细信息
来源: 评论