咨询与建议

限定检索结果

文献类型

  • 22,544 篇 会议
  • 8,542 篇 期刊文献
  • 275 册 图书

馆藏范围

  • 31,361 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 17,655 篇 工学
    • 10,090 篇 计算机科学与技术...
    • 8,022 篇 软件工程
    • 5,403 篇 信息与通信工程
    • 4,120 篇 电子科学与技术(可...
    • 3,724 篇 电气工程
    • 3,072 篇 控制科学与工程
    • 1,979 篇 光学工程
    • 1,841 篇 生物工程
    • 1,703 篇 生物医学工程(可授...
    • 1,444 篇 动力工程及工程热...
    • 1,397 篇 机械工程
    • 1,383 篇 仪器科学与技术
    • 1,265 篇 化学工程与技术
    • 1,173 篇 材料科学与工程(可...
    • 921 篇 网络空间安全
    • 826 篇 安全科学与工程
    • 716 篇 交通运输工程
  • 10,359 篇 理学
    • 4,704 篇 物理学
    • 4,162 篇 数学
    • 2,077 篇 生物学
    • 1,388 篇 统计学(可授理学、...
    • 1,359 篇 化学
    • 880 篇 系统科学
  • 3,846 篇 管理学
    • 2,631 篇 管理科学与工程(可...
    • 1,364 篇 图书情报与档案管...
    • 1,123 篇 工商管理
  • 1,751 篇 医学
    • 1,403 篇 临床医学
    • 1,265 篇 基础医学(可授医学...
    • 815 篇 公共卫生与预防医...
    • 784 篇 药学(可授医学、理...
  • 708 篇 法学
  • 500 篇 经济学
  • 408 篇 农学
  • 178 篇 教育学
  • 148 篇 文学
  • 75 篇 军事学
  • 30 篇 艺术学
  • 2 篇 历史学

主题

  • 1,092 篇 accuracy
  • 822 篇 deep learning
  • 740 篇 feature extracti...
  • 727 篇 internet of thin...
  • 677 篇 real-time system...
  • 500 篇 machine learning
  • 499 篇 computational mo...
  • 474 篇 support vector m...
  • 449 篇 convolutional ne...
  • 433 篇 training
  • 387 篇 predictive model...
  • 385 篇 optimization
  • 340 篇 reliability
  • 301 篇 computer science
  • 292 篇 wireless sensor ...
  • 272 篇 artificial intel...
  • 270 篇 wireless communi...
  • 249 篇 scalability
  • 240 篇 monitoring
  • 238 篇 security

机构

  • 436 篇 department of ph...
  • 371 篇 cavendish labora...
  • 271 篇 infn e laborator...
  • 268 篇 department for p...
  • 265 篇 oliver lodge lab...
  • 245 篇 physikalisches i...
  • 239 篇 west university ...
  • 224 篇 department of mo...
  • 207 篇 faculty of scien...
  • 206 篇 department of ph...
  • 203 篇 department of ph...
  • 201 篇 school of physic...
  • 200 篇 irfu cea univers...
  • 197 篇 infn sezione di ...
  • 192 篇 infn sezione di ...
  • 191 篇 yerevan physics ...
  • 185 篇 infn sezione di ...
  • 184 篇 iccub universita...
  • 180 篇 department of ph...
  • 174 篇 massachusetts in...

作者

  • 185 篇 m. lu
  • 161 篇 c. alexa
  • 156 篇 j. m. izen
  • 153 篇 g. bella
  • 153 篇 d. calvet
  • 153 篇 c. amelung
  • 151 篇 j. strandberg
  • 140 篇 n. orlando
  • 136 篇 y. tayalati
  • 133 篇 g. spigo
  • 132 篇 v. chiarella
  • 130 篇 f. siegert
  • 129 篇 b. konya
  • 128 篇 s. veneziano
  • 125 篇 a. dimitrievska
  • 124 篇 f. deliot
  • 122 篇 r. ströhmer
  • 120 篇 m. rijssenbeek
  • 120 篇 s. jin
  • 120 篇 g. gaudio

语言

  • 26,483 篇 英文
  • 4,463 篇 其他
  • 377 篇 中文
  • 47 篇 日文
  • 10 篇 法文
  • 8 篇 德文
  • 7 篇 朝鲜文
  • 5 篇 阿拉伯文
  • 3 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Electronics and Computer Engineering Technology"
31361 条 记 录,以下是451-460 订阅
排序:
Tensor Factorization for Accurate Anomaly Detection in Dynamic Networks
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年 第3期10卷 439-450页
作者: Li, Xiaocan Wen, Jigang Xie, Kun Xie, Gaogang Liang, Wei Hunan University College of Computer Science Electronics Engineering Changsha410012 China Ministry of Education Key Laboratory of Supercomputing Artificial Intelligence Fusion Computing Changsha410012 China School of Computer Science Engineering Hunan University of Science Technology Xiangtan411199 China Chinese Academy of Sciences Computer Network Information Center Beijing411199 China
Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model ... 详细信息
来源: 评论
Ultra Energy Efficient Reliable and Robust DLJLFET-Based-PUF for IoT Devices  3rd
Ultra Energy Efficient Reliable and Robust DLJLFET-Based-PUF...
收藏 引用
3rd International Conference on Machine Vision and Augmented Intelligence, MAI 2023
作者: Rajan, Chithraja Kumar, Rakesh Panchore, Meena Singh, Jawar School of Computer Science and Engineering Ramdeobaba University Maharashtra Nagpur440013 India Department of Electronics and Communication Engineering National Institute of Technology Patna Bihar800005 India Department of Electronics and Communication Engineering Indian Institute of Technology Patna Patna India
Physically Unclonable Function (PUF) emerged as a prominent hardware security solution for Internet of Things (IoTs) devices. PUFs are also used for generating secret keys for cryptography and for low-cost authenticat... 详细信息
来源: 评论
Optimization for IoT Jobs in Multi-Cloud Computing Environments
Optimization for IoT Jobs in Multi-Cloud Computing Environme...
收藏 引用
2024 IEEE International Conference on Signal Processing and Advance Research in Computing, SPARC 2024
作者: Atre, Anshul Singh, Kamlesh Kumar Chaurasia, Brijesh Kumar Amity University Amity School of Engineering & Technology Department of Computer Science & Engineering UP Lucknow India Amity University Amity School of Engineering & Technology Department of Electronics Communications and Engineering UP Lucknow India Pranveer Singh Institute of Technology Department of Computer Science & Engineering Kanpur India
Effective network communication is essential in the current digital era, and cloud computing (CC) and the Internet of Things (IoT) are significant aspects of daily life. Accelerating and lowering the latency of data t... 详细信息
来源: 评论
An integrated strategy of AEF attribute evaluation for reliable thunderstorm detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 234-245页
作者: Xu Yang Hongyan Xing Xinyuan Ji Xin Su Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of AlbertaEdmonton AB T6G 2R3Canada College of Internet of Things Engineering Hohai UniversityChangzhou 213022China Systems Research Institute Polish Academy of Sciences00-901 WarsawPoland Department of Computer Engineering Faculty of Engineering and Natural SciencesIstinye UniversitySariyer/IstanbulTurkey
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which... 详细信息
来源: 评论
Oversampling-Enhanced Feature Fusion-Based Hybrid ViT-1DCNN Model for Ransomware Cyber Attack Detection
收藏 引用
computer Modeling in engineering & Sciences 2025年 第2期142卷 1667-1695页
作者: Muhammad Armghan Latif Zohaib Mushtaq Saifur Rahman Saad Arif Salim Nasar Faraj Mursal Muhammad Irfan Haris Aziz Department of Computer and Information System Cleveland State UniversityOhio44115USA Department of Electrical Electronics and Computer SystemsCollege of Engineering and TechnologyUniversity of SargodhaSargodha40100Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl Ahsa31982Saudi Arabia Department of Mechanical Industrial and Energy System EngineeringUniversity of SargodhaSargodha40100Pakistan
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural net... 详细信息
来源: 评论
Development of an Ontology-Based Technique for Labeling Land Cover Classes with Minimum Utilization of SAR Features
收藏 引用
SN computer Science 2023年 第6期4卷 731页
作者: Gupta, Shruti Singh, Dharmendra Kumar, Sandeep Computer Science and Engineering and Information Technology Department Jaypee Institute of Information Technology Noida India Electronics and Communication Engineering Department Indian Institute of Technology Roorkee Roorkee India Computer Science and Engineering Department Indian Institute of Technology Roorkee Roorkee India
The availability of satellite imagery to "domain" experts, along with advancements in image processing and analysis techniques, has revolutionized numerous fields, enabling better understanding, planning, an... 详细信息
来源: 评论
A Double Threshold Energy Detection-Based Neural Network for Cognitive Radio Networks
收藏 引用
computer Systems Science & engineering 2023年 第4期45卷 329-342页
作者: Nada M.Elfatih Elmustafa Sayed Ali Maha Abdelhaq Raed Alsaqour Rashid A.Saeed Department of Electrical and Electronics Engineering Red Sea UniversityPort Sudan33311Sudan Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Information Technology College of Computing and InformaticsSaudi Electronic UniversityRiyadh93499Saudi Arabia Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Electronics Engineering Sudan University of Science and TechnologyKhartoum11111Sudan
In cognitive radio networks(CoR),the performance of cooperative spectrum sensing is improved by reducing the overall error rate or maximizing the detection *** optimization methods are usually used to optimize the num... 详细信息
来源: 评论
Cyber intrusion detection using dual interactive Wasserstein generative adversarial network with war strategy optimization in wireless sensor networks
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 19223-19253页
作者: Anusha, N. Tapas Bapu, B.R. S, Selvakumaran Vijayaraj, A. Ramesh Kumar, C. P, Raji Department of IoT School of Computer science and Engineering VIT Tamil Nadu Vellore India Department of Electronics and Communication Engineering S.A.Engineering College Tamil Nadu Chennai India Department of Artificial Intelligence and Data Science Rajalakshmi Institute of Technology Tamil Nadu Chennai India Department of Information Technology R.M.K Engineering College R.S.M Nagar Tamil Nadu Kavaraipettai India Department of Electronics and Communication Engineering Panimalar Engineering College Tamil Nadu Chennai India Department of Electronics and Communication Engineering Saveetha Engineering College Tamil Nadu Chennai India
Wireless sensor network (WSN) is one of the essential components of a multi-hop cyber-physical system comprising many fixed or moving sensors. There are many common attacks in WSN, which can quickly harm a WSN system.... 详细信息
来源: 评论
Adaptive Trajectory Planning in Autonomous Vehicles: A Hierarchical Reinforcement Learning Approach with Soft Actor-Critic  18
Adaptive Trajectory Planning in Autonomous Vehicles: A Hiera...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Sharma, Amit Kumar Choudhary, Amit Chaudhary, Rajat Bhardwaj, Aditya Aslam, Anjum Mohd Sir Chhotu Ram Institute of Engineering and Technology Electronics and Communication Uttar Pradesh Meerut India Kth Royal Institute of Technology Electrical Engineering and Computer Science Stockholm Sweden Bennett University School of Computer Science and Engineering Technology Greater Noida India
This study introduces a methodology enabling automated vehicles to perform lane changes effectively within complex road systems. It emphasizes a hierarchical driver behavior framework that integrates decision-making w... 详细信息
来源: 评论
Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3011-3026页
作者: Amjad Hussain Zahid Muhammad Junaid Arshad Musheer Ahmad Naglaa F.Soliman Walid El-Shafai School of Systems and Technology University of Management and TechnologyLahore54700Pakistan Department of Computer Science University of Engineering and TechnologyLahore54700Pakistan Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chao... 详细信息
来源: 评论