咨询与建议

限定检索结果

文献类型

  • 3,291 篇 会议
  • 2,380 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 5,712 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,300 篇 工学
    • 1,715 篇 计算机科学与技术...
    • 1,388 篇 软件工程
    • 880 篇 信息与通信工程
    • 798 篇 电子科学与技术(可...
    • 730 篇 电气工程
    • 502 篇 控制科学与工程
    • 330 篇 生物工程
    • 316 篇 光学工程
    • 310 篇 生物医学工程(可授...
    • 274 篇 机械工程
    • 265 篇 化学工程与技术
    • 247 篇 仪器科学与技术
    • 241 篇 动力工程及工程热...
    • 179 篇 材料科学与工程(可...
    • 105 篇 交通运输工程
    • 96 篇 安全科学与工程
    • 92 篇 网络空间安全
  • 2,143 篇 理学
    • 1,042 篇 物理学
    • 856 篇 数学
    • 371 篇 生物学
    • 268 篇 统计学(可授理学、...
    • 265 篇 化学
    • 185 篇 系统科学
  • 640 篇 管理学
    • 428 篇 管理科学与工程(可...
    • 225 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 285 篇 医学
    • 243 篇 临床医学
    • 187 篇 基础医学(可授医学...
    • 120 篇 药学(可授医学、理...
    • 97 篇 公共卫生与预防医...
  • 88 篇 经济学
  • 88 篇 法学
  • 46 篇 农学
  • 45 篇 教育学
  • 15 篇 文学
  • 10 篇 军事学
  • 8 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 93 篇 deep learning
  • 81 篇 feature extracti...
  • 81 篇 accuracy
  • 81 篇 training
  • 67 篇 bandwidth
  • 64 篇 optimization
  • 63 篇 computational mo...
  • 63 篇 artificial intel...
  • 60 篇 machine learning
  • 59 篇 internet of thin...
  • 58 篇 simulation
  • 58 篇 wireless communi...
  • 57 篇 neural networks
  • 57 篇 control systems
  • 56 篇 mathematical mod...
  • 54 篇 switches
  • 50 篇 convolutional ne...
  • 46 篇 predictive model...
  • 45 篇 monitoring
  • 45 篇 real-time system...

机构

  • 248 篇 university of ch...
  • 242 篇 iccub universita...
  • 240 篇 infn sezione di ...
  • 237 篇 department of ph...
  • 233 篇 infn sezione di ...
  • 226 篇 horia hulubei na...
  • 225 篇 universiteit maa...
  • 224 篇 physics and micr...
  • 221 篇 h.h. wills physi...
  • 219 篇 van swinderen in...
  • 218 篇 school of physic...
  • 216 篇 cavendish labora...
  • 207 篇 infn sezione di ...
  • 198 篇 infn sezione di ...
  • 179 篇 department of ph...
  • 175 篇 imperial college...
  • 167 篇 massachusetts in...
  • 158 篇 stfc rutherford ...
  • 154 篇 institute of par...
  • 152 篇 university of ci...

作者

  • 156 篇 beiter a.
  • 152 篇 barter w.
  • 152 篇 brundu d.
  • 152 篇 bellee v.
  • 130 篇 bobulska d.
  • 127 篇 aliouche z.
  • 127 篇 blake t.
  • 125 篇 bowcock t.j.v.
  • 125 篇 borsato m.
  • 125 篇 betancourt c.
  • 124 篇 belin s.
  • 123 篇 cali s.
  • 120 篇 afsharnia h.
  • 120 篇 boelhauve j.a.
  • 120 篇 amato s.
  • 119 篇 casse g.
  • 118 篇 baryshnikov f.
  • 116 篇 birch m.
  • 116 篇 capelli s.
  • 116 篇 boettcher t.

语言

  • 5,030 篇 英文
  • 594 篇 其他
  • 72 篇 中文
  • 15 篇 日文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Electronic Engineering and Computer Engineering"
5712 条 记 录,以下是261-270 订阅
排序:
Modified SPICE-Compatible Model Integrating NBTI and Self-Heating Effects for VDMOS Transistors
Modified SPICE-Compatible Model Integrating NBTI and Self-He...
收藏 引用
Electrical, electronic and Computing engineering (IcETRAN), International Conference on
作者: Miloš Marjanović Sandra Veljković Nikola Mitrović Emilija Źivanović Aleksandar Gavrić Danijel Danković Department of Microelectronics Faculty of Electronic Engineering Niš Serbia Department of Computer Science Faculty of Electronic Engineering Niš Serbia
This paper describes a modified SPICE-compatible VDMOS transistor model that includes NBT and self-heating effects. A complete circuit diagram of the transistor is given, which includes the electrical part of the circ... 详细信息
来源: 评论
Utilization of HEVC ChaCha20-Based Selective Encryption for Secure Telehealth Video Conferencing
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 831-845页
作者: Osama S.Faragallah Ahmed I.Sallam Hala S.El-sayed Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Electrical Engineering Faculty of EngineeringMenoufia UniversityShebin El-Kom32511Egypt
Coronavirus(COVID-19)is a contagious disease that causes exceptional effect on healthcare organizationsworldwide with dangerous impact on medical services within the *** of the fast spread of COVID-19,the healthcare f... 详细信息
来源: 评论
Model and Computation of traffic Resilience  23
Model and Computation of traffic Resilience
收藏 引用
24th International Conference on computer Systems and Technologies, CompSysTech 2023
作者: Rothkrantz, Leon Faculty of Electronic Engineering Mathematics and Computer Science Delft University of Technology Netherlands and Faculty of Transportation Sciences Czech Technical University in Prague Czech Republic
At many times we observed disturbances of traffic flow on highways. This may be caused by traffic accidents, bad weather conditions, road maintenance or rush hours. The Road Traffic Management takes many rules and reg... 详细信息
来源: 评论
Secret Key Optimization for Secure Speech Communications
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3025-3037页
作者: Osama S.Faragallah Mahmoud Farouk Hala S.El-Sayed Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf 32952Egypt Department of Electrical Engineering Faculty of EngineeringMenoufia UniversityShebin El-Kom 32511Egypt
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and secur... 详细信息
来源: 评论
A Hybrid-Logic Scheme for High-Performance and Low-Power Decoders in 7nm Process  17
A Hybrid-Logic Scheme for High-Performance and Low-Power Dec...
收藏 引用
17th IEEE International Conference on Solid-State and Integrated Circuit Technology, ICSICT 2024
作者: Xia, Donghao Zhang, Yuejun Xu, Mengfan Wen, Liang Guo, Yiting Ningbo University Faculty of Electrical Engineering and Computer Science Zhejiang315211 China China Coast Guard Academy Department of Electronic Technology Ningbo315211 China
Advancing memory circuitry has heightened the performance criteria for memory in diverse chip applications. Decoders, serving as peripheral circuits to memory devices, have be a prominent area of academic interest. Th... 详细信息
来源: 评论
Automatic Stop Line Violations Detection using Histogram of Oriented Gradients and Support Vector Machine  5
Automatic Stop Line Violations Detection using Histogram of ...
收藏 引用
5th International Conference on Information and Communications Technology, ICOIACT 2022
作者: Larasati, Dwira K. Setyawan, Iwan Febrianto, Andreas A. Satya Wacana Christian University Faculty of Electronic and Computer Engineering Salatiga Indonesia
This research presents an automatic system for the detection of stop line violations. Stop line violation is defined as a condition in which a vehicle does not appropriately stop behind a stop line. This research uses... 详细信息
来源: 评论
Secure 3D Directional Modulation Using Subarrays Based on Planar Frequency Diverse Array with Nonuniform Frequency Offsets
收藏 引用
IEEE Transactions on Communications 2024年 第6期73卷 4017-4032页
作者: You, Byungha Lee, In-Ho Jung, Haejoon Duong, Trung Q. Shin, Hyundong Kyung Hee University Department Of Electronics And Information Convergence Engineering Yongin-si17104 Korea Republic of Hankyong National University School Of Electronic And Electrical Engineering Anseong17579 Korea Republic of Memorial University Faculty Of Engineering And Applied Science St. John'sNLA1C 5S7 Canada Queen's University Belfast School Of Electronics Electrical Engineering And Computer Science BelfastBT7 1NN United Kingdom Kyung Hee University Department Of Electronic Engineering Yongin17104 Korea Republic of
Physical-layer security (PLS) is a new paradigm for secure communication without requiring secret key exchange and management. Moreover, PLS with frequency diverse subarray (FDSA) can better control information leakag... 详细信息
来源: 评论
Area Recognition Based on Grid Structure for Rice Paddy Monitoring Using Wireless Sensor Network  8
Area Recognition Based on Grid Structure for Rice Paddy Moni...
收藏 引用
8th International Conference on Information Technology, Information Systems and Electrical engineering, ICITISEE 2024
作者: Marpaung, Bambang Haryanto Nasution, Benny Benyamin Tulus Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia Electronic Engineering at State Polytechnic of Medan Politeknik Negeri Medan Medan Indonesia
In the era of precision agriculture, effective and efficient monitoring of rice paddy fields is vital for optimizing crop yield and ensuring environmental sustainability. This study presents a novel approach utilizing... 详细信息
来源: 评论
Traffic Congestion Control with Emergency Awareness and Optimized Communication Infrastructure using Reinforcement Learning and Non-Dominated Sorting Genetic Algorithm
收藏 引用
IEEE Access 2025年
作者: Al-Heety, Othman S. Zakaria, Zahriladha Abu-Khadrah, Ahmed Ismail, Mahamod Shakir, Mohammed Mudhafar Alani, Sameer Alsariera, Hussein Faculty of Electronic and Computer Engineering Durian Tunggal Malaysia Al-Balqa Applied University College of Engineering Technology Department of Electrical Engineering Amman Jordan Universiti Kebangsaan Malaysia UKM Bangi Department of Electrical Electronic and System Engineering Selangor Malaysia Faculty of Engineering and Electronic Engineering Batu Pahat Malaysia University of Anbar Computer Center Anbar5543 Iraq
Urban centers are grappling with increasing traffic congestion, which hampers mobility and reduces the effectiveness of emergency responses. Current traffic management systems struggle to dynamically prioritize emerge... 详细信息
来源: 评论
Face Recognition and Face Spoofing Detector for Attendance System  5
Face Recognition and Face Spoofing Detector for Attendance S...
收藏 引用
5th International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2022
作者: Marutotamtama, Jane Chrestella Setyawan, Iwan Handoko Satya Wacana Christian University Faculty of Electronic and Computer Engineering Salatiga Indonesia
Improving technology in the field of education will greatly help teachers and students in various ways, one of which is attendance. An attendance system generally leaks security and verification which may lead to frau... 详细信息
来源: 评论