咨询与建议

限定检索结果

文献类型

  • 513,770 篇 会议
  • 182,881 篇 期刊文献
  • 3,623 册 图书
  • 12 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 700,284 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 381,920 篇 工学
    • 211,232 篇 计算机科学与技术...
    • 168,609 篇 软件工程
    • 91,743 篇 信息与通信工程
    • 75,383 篇 电气工程
    • 74,048 篇 电子科学与技术(可...
    • 63,625 篇 控制科学与工程
    • 36,509 篇 生物工程
    • 33,206 篇 光学工程
    • 29,279 篇 生物医学工程(可授...
    • 27,363 篇 机械工程
    • 24,392 篇 仪器科学与技术
    • 23,844 篇 动力工程及工程热...
    • 22,864 篇 化学工程与技术
    • 22,145 篇 材料科学与工程(可...
    • 11,388 篇 交通运输工程
    • 11,317 篇 安全科学与工程
    • 10,155 篇 力学(可授工学、理...
  • 217,658 篇 理学
    • 102,103 篇 数学
    • 83,765 篇 物理学
    • 40,843 篇 生物学
    • 33,009 篇 统计学(可授理学、...
    • 27,495 篇 系统科学
    • 24,501 篇 化学
  • 77,044 篇 管理学
    • 48,771 篇 管理科学与工程(可...
    • 30,809 篇 图书情报与档案管...
    • 24,282 篇 工商管理
  • 26,512 篇 医学
    • 22,052 篇 临床医学
    • 19,369 篇 基础医学(可授医学...
    • 12,212 篇 药学(可授医学、理...
  • 14,152 篇 法学
    • 11,815 篇 社会学
  • 9,776 篇 经济学
  • 6,644 篇 农学
  • 6,237 篇 教育学
  • 3,150 篇 文学
  • 1,589 篇 军事学
  • 766 篇 艺术学
  • 94 篇 哲学
  • 55 篇 历史学

主题

  • 22,265 篇 computer science
  • 15,474 篇 computational mo...
  • 11,728 篇 accuracy
  • 11,629 篇 feature extracti...
  • 11,579 篇 bandwidth
  • 9,513 篇 control systems
  • 9,509 篇 training
  • 9,484 篇 computer archite...
  • 9,482 篇 costs
  • 9,367 篇 delay
  • 9,319 篇 machine learning
  • 9,310 篇 testing
  • 9,282 篇 hardware
  • 9,000 篇 application soft...
  • 8,997 篇 deep learning
  • 8,784 篇 algorithm design...
  • 8,630 篇 robustness
  • 8,539 篇 mathematical mod...
  • 8,465 篇 switches
  • 8,420 篇 frequency

机构

  • 5,287 篇 department of el...
  • 1,670 篇 department of co...
  • 1,314 篇 department of co...
  • 1,308 篇 ieee
  • 1,288 篇 department of el...
  • 1,277 篇 department of el...
  • 1,146 篇 department of el...
  • 1,080 篇 department of el...
  • 1,018 篇 department of el...
  • 985 篇 department of el...
  • 961 篇 department of ph...
  • 942 篇 cavendish labora...
  • 939 篇 department of el...
  • 806 篇 oliver lodge lab...
  • 803 篇 physikalisches i...
  • 780 篇 department of co...
  • 775 篇 department of el...
  • 771 篇 department of el...
  • 737 篇 university of ch...
  • 702 篇 department of el...

作者

  • 252 篇 j. wang
  • 252 篇 s. chen
  • 242 篇 barter w.
  • 237 篇 niyato dusit
  • 221 篇 blake t.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bellee v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 215 篇 han zhu
  • 208 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 brundu d.
  • 203 篇 beiter a.
  • 200 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 190 篇 c. amelung
  • 189 篇 y. chen
  • 188 篇 g. bella

语言

  • 663,017 篇 英文
  • 28,723 篇 其他
  • 8,369 篇 中文
  • 286 篇 日文
  • 126 篇 朝鲜文
  • 71 篇 德文
  • 44 篇 法文
  • 31 篇 土耳其文
  • 25 篇 斯洛文尼亚文
  • 20 篇 西班牙文
  • 12 篇 葡萄牙文
  • 8 篇 俄文
  • 7 篇 阿拉伯文
  • 6 篇 荷兰文
  • 4 篇 意大利文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Electrical & Computer Engineering and Computer Science Department"
700288 条 记 录,以下是321-330 订阅
排序:
A New Multi Chaos-Based Compression Sensing Image Encryption
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 437-453页
作者: Fadia Ali Khan Jameel Ahmed Suliman A.Alsuhibany Department of Electrical Engineering Riphah International UniversityIslamabad44000Pakistan Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia
The advancements in technology have substantially grown the size of image *** image encryption algorithms have limited capabilities to deal with the emerging challenges in big data,including compression and noise *** ... 详细信息
来源: 评论
Impact of oxymoron features and deep learning techniques in the detection of sarcastic contents
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 9197-9207页
作者: Seethappan, K. Premalatha, K. Department of Computer Science and Engineering University College of Engineering Tamilnadu Ramanathapuram India Department of Computer Science and Engineering Bannari Amman Institute of Technology Tamilnadu Sathyamangalam India
Even though various features have been investigated in the detection of figurative language, oxymoron features have not been considered in the classification of sarcastic content. The main objective of this work is to... 详细信息
来源: 评论
Semi‑supervised contour‑driven broad learning system for autonomous segmentation of concealed prohibited baggage items
收藏 引用
Visual Computing for Industry,Biomedicine,and Art 2024年 第1期7卷 1-18页
作者: Divya Velayudhan Abdelfatah Ahmed Taimur Hassan Muhammad Owais Neha Gour Mohammed Bennamoun Ernesto Damiani Naoufel Werghi Department of Electrical Engineering and Computer Sciences Center for Cyber‑Physical SystemsKhalifa University of Science and TechnologyAbu Dhabi 127788United Arab Emirates Department of Electrical Computer and Biomedical EngineeringAbu Dhabi UniversityAbu Dhabi 59911United Arab Emirates Department of Computer Science and Software Engineering the University of Western AustraliaPerthWA 6009Australia
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,... 详细信息
来源: 评论
Supervised deep learning for content-aware image retargeting with Fourier Convolutions
收藏 引用
Multimedia Tools and Applications 2024年 第36期83卷 83611-83627页
作者: Givkashi, MohammadHossein Naderi, MohammadReza Karimi, Nader Shirani, Shahram Samavi, Shadrokh Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan84156-83111 Iran Department of Electrical and Computer Engineering McMaster University HamiltonONL8S 4L8 Canada Computer Science Department Seattle University SeattleWA98122 United States
Image retargeting aims to alter the size of the image with attention to the contents. One of the main obstacles to training deep learning models for image retargeting is the need for a vast labeled dataset. Labeled da... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3003-3031页
作者: Hira Akhtar Butt Khoula Said Al Harthy Mumtaz Ali Shah Mudassar Hussain Rashid Amin Mujeeb Ur Rehman Department of Computer Science University of Management and TechnologySialkot51040Pakistan Department of Computer Science and Creative Technologies Global College of Engineering and TechnologyMuscat2546Sultanate of Oman Department of Computer Science University of WahWah Cantt47040Pakistan Department of Computer Science and IT University of ChakwalChakwal48800Pakistan
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention... 详细信息
来源: 评论
Enhancing energy efficiency: a protocol assessment in multi-hop mesh-based IOUT networks
收藏 引用
Multimedia Tools and Applications 2024年 第37期83卷 84999-85026页
作者: Sisodia, Ankur Vishnoi, Swati Upadhyay, Sachin Goswami, Jayati Krishna Khenwar, Medha Yadav, Ajay Kumar Department of Computer Engineering and Applications GLA University Mathura India Department of Computer Science and Engineering GL Bajaj Group of Institutions Mathura India Department of Computer Science Banasthali Vidyapith Rajasthan Jaipur India
IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation ... 详细信息
来源: 评论
Efficient Algorithms for Attributed Graph Alignment With Vanishing Edge Correlation
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4556-4580页
作者: Wang, Ziao Wang, Weina Wang, Lele The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada University of Michigan Department of Electrical and Computer Engineering Ann ArborMI48109 United States Carnegie Mellon University Computer Science Department PittsburghPA15213 United States
Graph alignment refers to the task of finding the vertex correspondence between two correlated graphs of n vertices. Extensive study has been done on polynomial time algorithms for the graph alignment problem under th... 详细信息
来源: 评论
Comparison of deep learning algorithms for site detection of false data injection attacks in smart grids
收藏 引用
Energy Informatics 2024年 第1期7卷 71页
作者: Nasir, Qassim Abu Talib, Manar Arshad, Muhammad Arbab Ishak, Tracy Berrim, Romaissa Alsaid, Basma Badway, Youssef Abu Waraga, Omnia Department of Computer Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Science University of Sharjah Sharjah United Arab Emirates Department of Computer Science Iowa State University AmesIA United States Department of Electrical Engineering University of Sharjah Sharjah United Arab Emirates
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these atta... 详细信息
来源: 评论
Microgrids with day-ahead energy forecasting for efficient energy management in smart grids: hybrid CS-RERNN
收藏 引用
Australian Journal of electrical and Electronics engineering 2024年 第3期21卷 213-227页
作者: Shirley, C.P. Pattar, Jagannath Kavitha Rani, P. Saini, Sumit Ranga, Jarabala Elangovan, D. Venkatakrishna Reddy, Ch. Department of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Department of Mechanical Engineering Madanapalle Institute of Technology & Science Madanapalle India Department of M.Tech Computer Science and Engineering Sri Krishna College of Engineering and Technology Coimbatore India Department of Electrical Engineering School of Engineering & Technology Central University of Haryana Mahendergarh India Detartment of Electrical and Electronics Engineering Ramachandra College of Engineering Eluru India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Electrical and Electronics Engineering Chaitanya Bharathi institute of technology Hyderabad India
By integrating smart grid technology with home energy management systems, households can monitor and optimise their energy consumption. This allows for more efficient use of energy resources, reducing waste and loweri... 详细信息
来源: 评论