咨询与建议

限定检索结果

文献类型

  • 3,252 篇 会议
  • 2,400 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 5,696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,280 篇 工学
    • 1,714 篇 计算机科学与技术...
    • 1,382 篇 软件工程
    • 887 篇 信息与通信工程
    • 793 篇 电子科学与技术(可...
    • 747 篇 电气工程
    • 495 篇 控制科学与工程
    • 332 篇 生物工程
    • 319 篇 光学工程
    • 309 篇 生物医学工程(可授...
    • 275 篇 机械工程
    • 271 篇 化学工程与技术
    • 248 篇 仪器科学与技术
    • 245 篇 动力工程及工程热...
    • 180 篇 材料科学与工程(可...
    • 102 篇 交通运输工程
    • 98 篇 安全科学与工程
    • 92 篇 网络空间安全
  • 2,161 篇 理学
    • 1,055 篇 物理学
    • 846 篇 数学
    • 375 篇 生物学
    • 272 篇 化学
    • 261 篇 统计学(可授理学、...
    • 187 篇 系统科学
  • 641 篇 管理学
    • 428 篇 管理科学与工程(可...
    • 224 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 287 篇 医学
    • 245 篇 临床医学
    • 191 篇 基础医学(可授医学...
    • 120 篇 药学(可授医学、理...
    • 98 篇 公共卫生与预防医...
  • 89 篇 法学
  • 88 篇 经济学
  • 46 篇 教育学
  • 43 篇 农学
  • 15 篇 文学
  • 10 篇 军事学
  • 8 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 90 篇 deep learning
  • 84 篇 training
  • 82 篇 feature extracti...
  • 78 篇 accuracy
  • 67 篇 bandwidth
  • 66 篇 optimization
  • 63 篇 computational mo...
  • 62 篇 machine learning
  • 62 篇 artificial intel...
  • 58 篇 internet of thin...
  • 58 篇 simulation
  • 57 篇 wireless communi...
  • 57 篇 control systems
  • 54 篇 neural networks
  • 54 篇 mathematical mod...
  • 52 篇 switches
  • 50 篇 convolutional ne...
  • 45 篇 hadrons
  • 45 篇 monitoring
  • 45 篇 predictive model...

机构

  • 253 篇 university of ch...
  • 242 篇 iccub universita...
  • 240 篇 infn sezione di ...
  • 237 篇 department of ph...
  • 235 篇 infn sezione di ...
  • 227 篇 horia hulubei na...
  • 225 篇 universiteit maa...
  • 224 篇 physics and micr...
  • 222 篇 h.h. wills physi...
  • 221 篇 van swinderen in...
  • 215 篇 school of physic...
  • 213 篇 cavendish labora...
  • 207 篇 infn sezione di ...
  • 202 篇 infn sezione di ...
  • 186 篇 department of ph...
  • 173 篇 imperial college...
  • 167 篇 massachusetts in...
  • 156 篇 stfc rutherford ...
  • 149 篇 university of ci...
  • 148 篇 university of ma...

作者

  • 155 篇 beiter a.
  • 151 篇 barter w.
  • 151 篇 brundu d.
  • 151 篇 bellee v.
  • 128 篇 bobulska d.
  • 126 篇 blake t.
  • 125 篇 aliouche z.
  • 125 篇 borsato m.
  • 124 篇 betancourt c.
  • 124 篇 belin s.
  • 123 篇 bowcock t.j.v.
  • 121 篇 cali s.
  • 121 篇 amato s.
  • 120 篇 afsharnia h.
  • 119 篇 boelhauve j.a.
  • 118 篇 casse g.
  • 118 篇 baryshnikov f.
  • 116 篇 birch m.
  • 115 篇 capelli s.
  • 114 篇 boettcher t.

语言

  • 5,435 篇 英文
  • 177 篇 其他
  • 68 篇 中文
  • 15 篇 日文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Electronic and Computer Engineering"
5696 条 记 录,以下是1-10 订阅
排序:
Drug–target interactions prediction based on similarity graph features extraction and deep learning
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4303-4322页
作者: Torkey, Hanaa El-Behery, Heba Attia, Abdel-Fattah El-Fishawy, Nawal Computer Science and Engineering Department Faculty of Electronic Engineering Menoufia University Menouf Egypt Department of Computer Science and Engineering Faculty of Engineering Kafrelsheikh University Kafrelsheikh Egypt Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia
Identifying drug–target interactions (DTIs) is a critical step in both drug repositioning. The labor-intensive, time-consuming, and costly nature of classic DTI laboratory studies makes it imperative to create effici... 详细信息
来源: 评论
Secure speech coding using chaotic shift keying for encryption combined with error recovery
收藏 引用
Multimedia Tools and Applications 2025年 第7期84卷 3893-3927页
作者: Boumaraf, Messaouda Merazka, Fatiha LISIC Laboratory Telecommunications Department Electronic and Computer Engineering Faculty USTHB University Algiers Algeria LISIC Laboratory Telecommunications Department Electrical Engineering Faculty USTHB University Algiers Algeria
This paper presents a speech encryption algorithm utilizing chaotic shift keying alongside error recovery techniques for the G.722.2 codec. The algorithm employs chaotic data interleaving on speech inter-frames to rep... 详细信息
来源: 评论
Evolutionary recurrent neural network based on equilibrium optimization method for cloud-edge resource management in internet of things
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4957-4969页
作者: Ebrahimi Mood, Sepehr Rouhbakhsh, Adel Souri, Alireza Department of Computer Science Yazd University Yazd Iran Department of Computer Engineering Faculty of Engineering Haliç University Istanbul34060 Turkey School of Electrical and Electronic Engineering Shandong University of Technology Zibo255000 China
Cloud computing is an emerging field in information technology, enabling users to access a shared pool of computing resources. Despite its potential, cloud technology presents various challenges, with one of the most ... 详细信息
来源: 评论
Neuroadaptive Containment Control for Nonlinear Multiagent Systems With Input Saturation: An Event-Triggered Communication Approach
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3163-3173页
作者: Wang, Xin Zhang, Sen Li, Huaqing Zhang, Wei Li, Hongyi Huang, Tingwen Southwest University College of Electronic and Information Engineering Chongqing400715 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
In this article, a neuroadaptive event-triggered containment control strategy combined with the dynamic surface control (DSC) approach is proposed for nonlinear multiagent systems (MASs) with input saturation. Based o... 详细信息
来源: 评论
A comprehensive analysis of real-time video anomaly detection methods for human and vehicular movement
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7519-7564页
作者: Pathirannahalage, Iroshan Jayasooriya, Vidura Samarabandu, Jagath Subasinghe, Akila Department of Electrical and Electronic Engineering Faculty of Engineering University of Sri Jayewardenepura Gangodawila Nugegoda10250 Sri Lanka Department of Electrical and Computer Engineering Faculty of Engineering Western University LondonONN6A 3K7 Canada
The ubiquitous integration of computer vision technologies has revolutionised various application domains, ranging from agriculture and transportation to healthcare and the military. In this context, real-time anomaly... 详细信息
来源: 评论
Hybrid lightweight encryption for IoT: integrating chaotic key generators with Feistel and substitution-permutation networks for secure 3DV transmission
收藏 引用
Multimedia Tools and Applications 2025年 1-47页
作者: El-Shafai, Walid Mesrega, Ahmed K. Ahmed, Hossam Eldin H. Elbahnasawy, Nirmeen A. El-Samie, Fathi E. Abd Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Deptartment of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Computer Science and Engineering Faculty of Electronic Engineering Menoufia University Menouf Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o... 详细信息
来源: 评论
A Fully LTPS-TFT-Based Bi-Directional Biomedical Interface Circuit for Large-Area Healthcare Applications
IEEE Journal on Flexible Electronics
收藏 引用
IEEE Journal on Flexible electronics 2025年 第12期3卷 526-532页
作者: Zhang, Hanbo Lou, Yuqing Zhang, Zhihang Li, Yongfu Rokhan, Fakhrul Wang, Guoxing Zhao, Jian Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai200240 China Universiti Putra Malaysia Faculty of Engineering Department of Computer and Communication System Engineering Selangor Serdang43400 Malaysia
This paper proposed a fully LTPS-TFT-based bi-directional biomedical pixel interface with integrated a high linearity stimulator and a high-performance bio-potential sensing front-end circuit to amplify and digitize b... 详细信息
来源: 评论
Enabling Ultralow-Latency Services with Ubiquitous Mobility by Means of a Compact Network Architecture
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4858-4873页
作者: Cai, Guiliang Wu, Qiang Wang, Ran Zhi, Lianyi Fu, Xiaoming Zhang, Hongke Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Faculty of Mathematics and Computer Science University of G¨oettingen Germany School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China
With the rapid development of emerging services such as cellular vehicle-to-everything and immersive video service, network connections have further evolved from tangible physical connections to intangible virtual con... 详细信息
来源: 评论
Comparison of Classical and Deep Learning-Based Feature Representations for Age-Related Macular Degeneration  5th
Comparison of Classical and Deep Learning-Based Feature Re...
收藏 引用
5th International Conference on Medical Imaging and computer Aided Diagnosis, MICAD 2024
作者: Sinichi, Parsa Bernabeu, Miguel O. Javidi, Malihe Department of Computer Engineering Faculty of Electronic and Computer Engineering Quchan University of Technology Quchan Iran Centre for Medical Informatics University of Edinburgh Edinburgh United Kingdom
Age-related Macular Degeneration (AMD) is a leading cause of visual impairment among the elderly worldwide. This study compares deep learning-based and classical feature extraction methods for AMD classification using... 详细信息
来源: 评论
Exploiting Multi-Level Data Uncertainty for Japanese-Chinese Neural Machine Translation
收藏 引用
IEICE Transactions on Information and Systems 2025年 第5期E108.D卷 440-443页
作者: Li, Zezhong Ma, Jianjun Ren, Fuji Faculty of Computer Science Zhejiang University of Water Resources and Electric Power China Faculty of Foreign Languages Dalian University of Technology China College of Computer Science and Engineering The Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China China
The performance of Neural Machine Translation (NMT) heavily depends on the severity of data uncertainty existing in the training examples. In terms of its causes, data uncertainty can be categorized into intrinsic and... 详细信息
来源: 评论