咨询与建议

限定检索结果

文献类型

  • 33,988 篇 会议
  • 19,590 篇 期刊文献
  • 535 册 图书

馆藏范围

  • 54,113 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 31,782 篇 工学
    • 17,876 篇 计算机科学与技术...
    • 14,283 篇 软件工程
    • 8,357 篇 信息与通信工程
    • 6,270 篇 电气工程
    • 5,960 篇 电子科学与技术(可...
    • 5,812 篇 控制科学与工程
    • 3,183 篇 生物工程
    • 2,715 篇 光学工程
    • 2,704 篇 机械工程
    • 2,550 篇 生物医学工程(可授...
    • 2,289 篇 仪器科学与技术
    • 2,246 篇 动力工程及工程热...
    • 1,985 篇 化学工程与技术
    • 1,597 篇 材料科学与工程(可...
    • 1,067 篇 交通运输工程
    • 1,009 篇 安全科学与工程
    • 929 篇 网络空间安全
  • 19,323 篇 理学
    • 8,969 篇 数学
    • 7,743 篇 物理学
    • 3,564 篇 生物学
    • 2,903 篇 统计学(可授理学、...
    • 2,376 篇 系统科学
    • 2,093 篇 化学
  • 6,975 篇 管理学
    • 4,652 篇 管理科学与工程(可...
    • 2,559 篇 图书情报与档案管...
    • 2,113 篇 工商管理
  • 2,375 篇 医学
    • 2,024 篇 临床医学
    • 1,723 篇 基础医学(可授医学...
    • 1,093 篇 药学(可授医学、理...
  • 1,143 篇 法学
    • 985 篇 社会学
  • 853 篇 经济学
  • 534 篇 农学
  • 496 篇 教育学
  • 190 篇 文学
  • 117 篇 军事学
  • 68 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 930 篇 feature extracti...
  • 927 篇 accuracy
  • 849 篇 deep learning
  • 771 篇 training
  • 715 篇 machine learning
  • 705 篇 computational mo...
  • 684 篇 optimization
  • 577 篇 internet of thin...
  • 553 篇 computer science
  • 548 篇 information tech...
  • 522 篇 artificial intel...
  • 495 篇 mathematical mod...
  • 445 篇 support vector m...
  • 435 篇 wireless communi...
  • 432 篇 predictive model...
  • 420 篇 neural networks
  • 353 篇 robustness
  • 329 篇 real-time system...
  • 325 篇 control systems
  • 322 篇 simulation

机构

  • 387 篇 infn laboratori ...
  • 346 篇 department of ph...
  • 282 篇 dipartimento di ...
  • 274 篇 yerevan physics ...
  • 273 篇 infn sezione di ...
  • 254 篇 faculty of elect...
  • 251 篇 department of ph...
  • 246 篇 faculty of scien...
  • 242 篇 infn sezione di ...
  • 238 篇 faculté des scie...
  • 237 篇 department of ph...
  • 226 篇 horia hulubei na...
  • 223 篇 departamento de ...
  • 218 篇 indian institute...
  • 213 篇 china institute ...
  • 213 篇 department for p...
  • 211 篇 infn sezione di ...
  • 210 篇 department of ph...
  • 209 篇 department of ph...
  • 203 篇 infn sezione di ...

作者

  • 245 篇 c. alexa
  • 242 篇 j. m. izen
  • 230 篇 g. bella
  • 229 篇 j. strandberg
  • 229 篇 d. calvet
  • 229 篇 c. amelung
  • 218 篇 g. spigo
  • 216 篇 f. siegert
  • 213 篇 a. c. könig
  • 212 篇 h. a. gordon
  • 211 篇 m. klein
  • 209 篇 r. ströhmer
  • 205 篇 h. sakamoto
  • 201 篇 m. rijssenbeek
  • 199 篇 y. tayalati
  • 196 篇 s. jin
  • 194 篇 g. gaudio
  • 184 篇 d. guest
  • 181 篇 s. mohapatra
  • 171 篇 y. nagasaka

语言

  • 51,819 篇 英文
  • 1,583 篇 其他
  • 631 篇 中文
  • 77 篇 日文
  • 15 篇 德文
  • 14 篇 法文
  • 8 篇 朝鲜文
  • 4 篇 荷兰文
  • 4 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
检索条件"机构=Faculty of Electrical Engineering Computer and Information Technology"
54113 条 记 录,以下是91-100 订阅
排序:
Zero-dynamics attack detection based on data association in feedback pathway
Cognitive Robotics
收藏 引用
Cognitive Robotics 2025年 5卷 126-139页
作者: Zhang, Zeyu Li, Hongran Todo, Yuki Division of Electrical Engineering and Computer Science Kanazawa University Ishikawa Kanazawa9201192 Japan School of Computer Engineering Jiangsu Ocean University Jiangsu Lianyungang222005 China Faculty of Electrical Information and Communication Engineering Kanazawa University Ishikawa Kanazawa9201192 Japan
This paper considers the security of non-minimum phase systems, a typical kind of cyber-physical systems. Non-minimum phase systems are characterized by unstable zeros in their transfer functions, making them particul... 详细信息
来源: 评论
Data Augmentation and Random Multi-Model Deep Learning for Data Classification
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5191-5207页
作者: Fatma Harby Adel Thaljaoui Durre Nayab Suliman Aladhadh Salim EL Khediri Rehan Ullah Khan Computer Science Department Future Academy-Higher Future Institute for Specialized Technological StudiesEgypt Department of Computer Systems Engineering Faculty of Electrical and Computer EngineeringUniversity of Engineering and TechnologyPeshawar25120Pakistan Department of Information Technology College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Computer Sciences Faculty of Sciences of GafsaUniversity of GafsaGafsaTunisia
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhance... 详细信息
来源: 评论
Impact of Skin Lesion Segmentation Labeling Errors on Convolutional Neural Networks  66
Impact of Skin Lesion Segmentation Labeling Errors on Convol...
收藏 引用
66th International Symposium ELMAR, ELMAR 2024
作者: Sojo, Robert Bencevic, Marin Habijan, Marija Galic, Irena Josip Juraj Strossmayer University of Osijek Faculty of Electrical Engineering Computer Science and Information Technology Osijek Croatia
Accurate segmentation of skin lesions is critical for dermatological diagnosis and treatment. This study investigates the impact of label errors on the performance of convolutional neural networks in skin lesion segme... 详细信息
来源: 评论
Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing
收藏 引用
Multimedia Tools and Applications 2024年 第18期84卷 1-36页
作者: Al-Aiash, Issa Alquran, Rabee AlJamal, Mahmoud Alsarhan, Ayoub Aljaidi, Mohammad Al-Fraihat, Dimah Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unautho... 详细信息
来源: 评论
Comparison of *** and Spring Boot in Web Development  15
Comparison of *** and Spring Boot in Web Development
收藏 引用
15th International Conference on Electronics, computers and Artificial Intelligence, ECAI 2023
作者: Novac, Ovidiu Constantin Ghiurau, David Novac, Mihaela Cornelia Gordan, Cornelia Emilia Oproescu, Mihai Bujdoso, Gyongyi Mihalca, Vlad Ovidiu University of Oradea Electrical Engineering and Information Technology Faculty Department of Computers and Information Technology Oradea Romania University of Oradea Management in Information Technology Electrical Engineering and Information Technology Faculty Oradea Romania University of Oradea Electrical Engineering and Information Technology Faculty Department of Electrical Engineering Oradea Romania University of Oradea Electrical Engineering and Information Technology Faculty Department of Electronics and Telecommunications Oradea Romania University of Pitesti Faculty of Electronics Communication and Computer Science Department of Electronics Computers and Electrical Engineering Pitesti Romania University of Debrecen Faculty of Informatics Department of Computer Science and Library and Information Science Debrecen Hungary School of Engineering Sciences University of Oradea Electrical Engineering and Information Technology Faculty Oradea Romania
In this paper we present two types of server implementation, we will look at the advantages and disadvantages of each technology. *** server application, built with ***, a single threaded server which will treat the r... 详细信息
来源: 评论
Power System Dynamic Properties after Implementation of PSS and Inertia Decrease
Power System Dynamic Properties after Implementation of PSS ...
收藏 引用
2024 IEEE PES Innovative Smart Grid Technologies Europe Conference, ISGT EUROPE 2024
作者: Kljajić, Ružica Marić, Predrag Josip Juraj Strossmayer University of Osijek Faculty of Electrical Engineering Computer Science and Information Technology Osijek Croatia
Low inertia of the power system combined with low damping impairs the power system's ability to cope with disturbances that can significantly affect system stability. In such a case, in addition to speed or freque... 详细信息
来源: 评论
A survey of video violence detection
收藏 引用
Cyber-Physical Systems 2023年 第1期9卷 1-24页
作者: Yao, Huiling Hu, Xing School of Optical-Electrical Information and Computer Engineering University of Shanghai for Science and Technology Shanghai China
As one of the important applications of intelligent video surveillance, violent behaviour detection (VioBD) plays a crucial role in public security and safety. As a particular type of behaviour recognition, VioBD aims... 详细信息
来源: 评论
Artificial intelligence-inspired comprehensive framework for desertification prediction
International Journal of Cognitive Computing in Engineering
收藏 引用
International Journal of Cognitive Computing in engineering 2025年 6卷 462-476页
作者: Alsubai, Shtwai Mosleh, Mogeeb A.A. Al-Hadhrami, Suheer A. Bhatia, Munish College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Alkharj Saudi Arabia Faculty of Engineering & Computing University of Science & Technology Aden Yemen Faculty of Engineering and Information Technology Taiz Univeristy Taiz Yemen Department of Computer Engineering College of Engineering Al Mukalla Hadhramout Yemen Department of Computer Applications National Institute of Technology Kurukshetra India
Desertification greatly affects land deterioration, farming efficiency, economic growth, and health, especially in Gulf nations. Climate change has worsened desertification, making developmental issues in the area eve... 详细信息
来源: 评论
ESG Investing: A Statistically Valid Approach to Data-Driven Decision Making and the Impact of ESG Factors on Stock Returns and Risk
收藏 引用
IEEE Access 2024年 12卷 69434-69444页
作者: Teja, Kamurthi Ravi Liu, Chuan-Ming National Taipei University of Technology International Program of Electrical Engineering and Computer Science Taipei10608 Taiwan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan
This study examines the impact of environmental, social, and governance (ESG) factors on economic investment from a statistical perspective, aiming to develop a tested investment strategy that capitalizes on the conne... 详细信息
来源: 评论
Energy Harvesting Jammer-Aided Covert Communications in Wireless Multi-Relay IoT Systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17443-17455页
作者: Lv, Hao Yang, Bin Sun, Xiuwen Gao, Chan Gui, Bao Taleb, Tarik School of Computer Science and Technology of Anhui University Hefei230000 China Chuzhou University School of Computer and Information Engineering Chuzhou239000 China Xi'an University of Posts and Telecommunications National Engineering Research Center for Secured Wireless School of Cybersecurity Xi'an710121 China Ruhr University Bochum Faculty of Electrical Engineering and Information Technology Bochum44801 Germany
This paper investigates covert communications in a multi-relay Internet of Things (IoT) system with multiple energy harvesting jammers, where a transmitter (Alice) attempts to covertly transmit confidential messages t... 详细信息
来源: 评论