咨询与建议

限定检索结果

文献类型

  • 4,261 篇 会议
  • 2,306 篇 期刊文献
  • 70 册 图书

馆藏范围

  • 6,637 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,781 篇 工学
    • 2,355 篇 计算机科学与技术...
    • 1,928 篇 软件工程
    • 1,005 篇 信息与通信工程
    • 645 篇 控制科学与工程
    • 540 篇 电气工程
    • 523 篇 生物医学工程(可授...
    • 517 篇 电子科学与技术(可...
    • 489 篇 生物工程
    • 384 篇 光学工程
    • 283 篇 机械工程
    • 249 篇 仪器科学与技术
    • 203 篇 动力工程及工程热...
    • 165 篇 化学工程与技术
    • 142 篇 材料科学与工程(可...
    • 137 篇 交通运输工程
    • 127 篇 安全科学与工程
  • 2,382 篇 理学
    • 1,127 篇 数学
    • 855 篇 物理学
    • 556 篇 生物学
    • 398 篇 统计学(可授理学、...
    • 309 篇 系统科学
    • 192 篇 化学
  • 876 篇 管理学
    • 525 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 287 篇 工商管理
  • 448 篇 医学
    • 385 篇 临床医学
    • 361 篇 基础医学(可授医学...
    • 224 篇 药学(可授医学、理...
    • 169 篇 公共卫生与预防医...
  • 170 篇 法学
    • 144 篇 社会学
  • 101 篇 经济学
  • 67 篇 教育学
  • 63 篇 农学
  • 26 篇 文学
  • 11 篇 军事学
  • 11 篇 艺术学
  • 2 篇 哲学

主题

  • 180 篇 informatics
  • 115 篇 computational mo...
  • 110 篇 optimization
  • 109 篇 feature extracti...
  • 108 篇 machine learning
  • 101 篇 training
  • 97 篇 image segmentati...
  • 93 篇 accuracy
  • 92 篇 data mining
  • 79 篇 monitoring
  • 75 篇 internet of thin...
  • 74 篇 computer archite...
  • 73 篇 deep learning
  • 68 篇 artificial intel...
  • 67 篇 bandwidth
  • 66 篇 educational inst...
  • 65 篇 mathematical mod...
  • 63 篇 databases
  • 62 篇 support vector m...
  • 62 篇 vectors

机构

  • 151 篇 yerevan physics ...
  • 99 篇 faculty of scien...
  • 99 篇 department for p...
  • 99 篇 department of ph...
  • 98 篇 department of ph...
  • 98 篇 departamento de ...
  • 98 篇 dipartimento di ...
  • 93 篇 kirchhoff-instit...
  • 92 篇 faculté des scie...
  • 92 篇 graduate school ...
  • 91 篇 centre de calcul...
  • 90 篇 institute of phy...
  • 89 篇 department of ph...
  • 87 篇 department of ph...
  • 85 篇 department of ph...
  • 85 篇 department of ph...
  • 85 篇 institut für ast...
  • 82 篇 fakultät für phy...
  • 81 篇 institute of phy...
  • 78 篇 physikalisches i...

作者

  • 88 篇 c. alexa
  • 87 篇 j. m. izen
  • 87 篇 s. veneziano
  • 86 篇 f. buehrer
  • 86 篇 a. t. law
  • 86 篇 d. di valentino
  • 85 篇 g. bella
  • 85 篇 d. calvet
  • 85 篇 c. amelung
  • 84 篇 j. strandberg
  • 80 篇 n. orlando
  • 80 篇 y. tayalati
  • 80 篇 g. spigo
  • 80 篇 v. chiarella
  • 80 篇 f. siegert
  • 80 篇 a. dimitrievska
  • 80 篇 f. deliot
  • 80 篇 m. klein
  • 80 篇 r. ströhmer
  • 79 篇 c. gumpert

语言

  • 6,387 篇 英文
  • 192 篇 其他
  • 54 篇 中文
  • 5 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Electrical Engineering and Computer Engineering and Informatics"
6637 条 记 录,以下是4781-4790 订阅
排序:
Clinical Feasibility of Coherence-Based Beamforming to Distinguish Solid from Fluid Hypoechoic Breast Masses
Clinical Feasibility of Coherence-Based Beamforming to Disti...
收藏 引用
IEEE Symposium (IUS) Ultrasonics
作者: Alycen Wiacek Eniola Falomo Kelly Myers Ole Marius Hoel Rindal Kelly Fabrega-Foster Susan Harvey Muyinatu A. Lediju Bell Department of Electrical and Computer Engineering Johns Hopkins University Baltimore MD Department of Radiology and Radiological Science Johns Hopkins Medicine Baltimore MD Department of Informatics University of Oslo Oslo Norway Department of Computer Science Johns Hopkins University Baltimore MD
Ultrasound imaging is often used in conjunction with mammography, particularly for patients with dense breast tissue, which causes an increased amount of acoustic clutter, obscuring lesions of interest, and contributi... 详细信息
来源: 评论
Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach
arXiv
收藏 引用
arXiv 2023年
作者: Fang, He Xiao, Zhenlong Wang, Xianbin Xu, Li Hanzo, Lajos The School of Electronic and Information Engineering Soochow University Soochow215301 China The Department of Informatics and Communication Engineering School of Informatics Xiamen University Xiamen361005 China The Department of Electrical and Computer Engineering Western University LondonONN6A 5B9 Canada The College of Computer and Cyber Security The Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350117 China School of Electronics and Computer Science University of Southampton SO17 1BJ United Kingdom
The conventional device authentication of wireless networks usually relies on a security server and centralized process, leading to long latency and risk of single-point of failure. While these challenges might be mit... 详细信息
来源: 评论
Tackling heavy-tailed noise in distributed estimation: Asymptotic performance and tradeoffs
Tackling heavy-tailed noise in distributed estimation: Asymp...
收藏 引用
Telecommunications Forum (TELFOR)
作者: Dragana Bajovic Dusan Jakovetic Soummya Kar Manojlo Vukovic Department of Power Electronic and Communication Engineering Faculty of Technical Sciences University of Novi Sad Department of Mathematics and Informatics Faculty of Sciences University of Novi Sad Department of Electrical and Computer Engineering Carnegie Mellon University Department of Fundamental Sciences Faculty of Technical Sciences University of Novi Sad
We present an algorithm for distributed estimation of an unknown vector parameter θ ∗ ∈ ℝ M in the presence of heavy-tailed observation and communication noises. Heavy-tailed noises frequently appear, e.g., in dense... 详细信息
来源: 评论
Extended PD+I fuzzy logic controllers with self-tuning capability
Extended PD+I fuzzy logic controllers with self-tuning capab...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: F. C. Teng A. Lotfi A. C. Tsoi Department of Electrical & Computer Engineering Polytechnic University of Puerto Rico San Juan Puerto Rico School of Computing & Informatics Nottingham Trent University Nottingham UK Hong Kong Baptist University Hong Kong China
In this paper, we propose two controllers which extend the original PD+I fuzzy logic controller to treat the plant with time varying nonlinear dynamics. The adaptation ability of the first self tuning PD+I fuzzy logic... 详细信息
来源: 评论
Implicit Neural Representation in Medical Imaging: A Comparative Survey
arXiv
收藏 引用
arXiv 2023年
作者: Molaei, Amirali Aminimehr, Amirhossein Tavakoli, Armin Kazerouni, Amirhossein Azad, Bobby Azad, Reza Merhof, Dorit School of Computer Engineering Iran University of Science and Technology Tehran Iran School of Electrical Engineering Iran University of Science and Technology Tehran Iran South Dakota State University BrookingsSD United States Faculty of Electrical Engineering and Information Technology RWTH Aachen University Aachen Germany Institute of Image Analysis and Computer Vision Faculty of Informatics and Data Science University of Regensburg Regensburg Germany Fraunhofer Institute for Digital Medicine MEVIS Bremen Germany
Implicit neural representations (INRs) have gained prominence as a powerful paradigm in scene reconstruction and computer graphics, demonstrating remarkable results. By utilizing neural networks to parameterize data t... 详细信息
来源: 评论
A new way of generating grid-scroll chaos and its application to biometric authentication
A new way of generating grid-scroll chaos and its applicatio...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: F. Han X. Yu J. Hu Faculty of Informatics and Communication Central Queensland University Rockhampton QLD Australia School of Electrical and Computer Engineering Royal Melbourne Institute of Technology Melbourne VIC Australia School of Computer Science and Information Technology Royal Melbourne Institute of Technology Melbourne VIC Australia
A new circuit design is proposed for generating grid-scroll chaos in the phase plane by using a second-order linear system with a control of double-hysteresis series. The double-hysteresis series is constructed in a s... 详细信息
来源: 评论
Decomposed and Distributed Modulation to Achieve Secure Transmission
Decomposed and Distributed Modulation to Achieve Secure Tran...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Zhao Li Siwei Le Jie Chen Kang G. Shin Riku Jäntti Zheng Yan Jia Liu School of Cyber Engineering Xidian University Xi'an China Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor USA Department of Communications and Networking Aalto University Espoo Finland Center for Strategic Cyber Resilience Research and Development National Institute of Informatics Tokyo Japan
Due to the broadcast nature of wireless transmissions, they are exposed to all surrounding entities and thus vulnerable to eavesdropping. To counter this vulnerability, we propose a new physical-layer secure transmiss...
来源: 评论
Handwritten and Machine Printed Text Separation in Document Images Using the Bag of Visual Words Paradigm
Handwritten and Machine Printed Text Separation in Document ...
收藏 引用
International Workshop on Frontiers in Handwriting Recognition
作者: Konstantinos Zagoris Ioannis Pratikakis Apostolos Antonacopoulos Basilis Gatos Nikos Papamarkos Pattern Recognition and Image Analysis (PRImA) Research Laboratory School of Computing Science and Engineering University of Salford Greater Manchester UK Department of Electrical and Computer Engineering Democritus University of Thrace Xanthi Greece Institute of Informatics and Telecommunications National Center for Scientific Research Demokritos Athens Greece
In a number of types of documents, ranging from forms to archive documents and books with annotations, machine printed and handwritten text may be present in the same document image, giving rise to significant issues ... 详细信息
来源: 评论
Hybrid machine learning model of extreme learning machine radial basis function for breast cancer detection and diagnosis;A multilayer fuzzy expert system
arXiv
收藏 引用
arXiv 2019年
作者: Mojrian, Sanaz Pinter, Gergo Joloudari, Javad Hassannataj Felde, Imre Nabipour, Narjes Nadai, Laszlo Mosavi, Amir Department of Information Technology Mazandaran Uni. of Science and Technology Babol Iran John von Neumann Faculty of Informatics Obuda University Budapest Hungary Electrical and Computer Engineering Faculty University of Birjand Birjand Iran Kalman Kando Faculty of Electrical Engineering Obuda University Budapest Hungary Institute of Research and Development Duy Tan University Da Nang550000 Viet Nam Kalman Kando Faculty of Electrical Engineering Budapest Hungary
Mammography is often used as the most common laboratory method for the detection of breast cancer, yet associated with the high cost and many side effects. Machine learning prediction as an alternative method has show... 详细信息
来源: 评论
An efficient approximate algorithm for delay-cost-constrained QoS routing
An efficient approximate algorithm for delay-cost-constraine...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Gang Feng K. Makki N. Pissinou C. Douligeris Department of Electrical and Computer Engineering University of Miami Coral Gables FL USA Center for Engineering and Applied science Telecommunication Information technology Florida International University Miami FL USA Florida International University Miami FL USA Department of Informatics University of Piraeus Piraeus Greece
The problem of finding a path with two additive constraints is called a multi-constrained path (MCP) problem in the literature. In this paper, we explore the MCP problem based on the idea of single mixed weight. Given... 详细信息
来源: 评论