咨询与建议

限定检索结果

文献类型

  • 2,743 篇 会议
  • 2,204 篇 期刊文献
  • 66 册 图书

馆藏范围

  • 5,013 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,811 篇 工学
    • 1,472 篇 计算机科学与技术...
    • 1,165 篇 软件工程
    • 758 篇 信息与通信工程
    • 590 篇 电子科学与技术(可...
    • 586 篇 电气工程
    • 545 篇 控制科学与工程
    • 299 篇 生物医学工程(可授...
    • 281 篇 生物工程
    • 249 篇 光学工程
    • 230 篇 化学工程与技术
    • 226 篇 动力工程及工程热...
    • 216 篇 仪器科学与技术
    • 212 篇 核科学与技术
    • 199 篇 机械工程
    • 152 篇 材料科学与工程(可...
    • 131 篇 网络空间安全
    • 106 篇 安全科学与工程
  • 2,068 篇 理学
    • 1,155 篇 物理学
    • 723 篇 数学
    • 320 篇 生物学
    • 271 篇 化学
    • 235 篇 统计学(可授理学、...
    • 166 篇 系统科学
  • 570 篇 管理学
    • 394 篇 管理科学与工程(可...
    • 196 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 285 篇 医学
    • 229 篇 临床医学
    • 206 篇 基础医学(可授医学...
    • 136 篇 药学(可授医学、理...
    • 110 篇 公共卫生与预防医...
  • 76 篇 法学
  • 73 篇 经济学
  • 40 篇 教育学
  • 39 篇 农学
  • 11 篇 文学
  • 9 篇 军事学
  • 6 篇 艺术学

主题

  • 158 篇 hadron colliders
  • 104 篇 deep learning
  • 104 篇 accuracy
  • 94 篇 optimization
  • 94 篇 machine learning
  • 93 篇 artificial intel...
  • 92 篇 feature extracti...
  • 86 篇 internet of thin...
  • 72 篇 real-time system...
  • 62 篇 computational mo...
  • 60 篇 higgs bosons
  • 57 篇 predictive model...
  • 55 篇 computer science
  • 51 篇 convolutional ne...
  • 49 篇 monitoring
  • 47 篇 wireless communi...
  • 47 篇 wireless sensor ...
  • 47 篇 training
  • 45 篇 w & z bosons
  • 44 篇 security

机构

  • 434 篇 department of ph...
  • 404 篇 cavendish labora...
  • 276 篇 department for p...
  • 270 篇 infn e laborator...
  • 262 篇 west university ...
  • 260 篇 oliver lodge lab...
  • 245 篇 physikalisches i...
  • 235 篇 institute of phy...
  • 227 篇 institute of phy...
  • 225 篇 school of physic...
  • 224 篇 department of mo...
  • 221 篇 yerevan physics ...
  • 216 篇 faculty of scien...
  • 216 篇 infn sezione di ...
  • 214 篇 department of ph...
  • 212 篇 irfu cea univers...
  • 210 篇 department of ph...
  • 210 篇 infn sezione di ...
  • 193 篇 kirchhoff-instit...
  • 192 篇 department of ph...

作者

  • 185 篇 m. lu
  • 161 篇 c. alexa
  • 157 篇 j. m. izen
  • 156 篇 g. bella
  • 156 篇 c. amelung
  • 154 篇 d. calvet
  • 153 篇 j. strandberg
  • 148 篇 n. orlando
  • 140 篇 y. tayalati
  • 137 篇 g. spigo
  • 135 篇 v. chiarella
  • 132 篇 f. siegert
  • 131 篇 b. konya
  • 129 篇 s. veneziano
  • 128 篇 a. dimitrievska
  • 127 篇 f. deliot
  • 123 篇 y. abulaiti
  • 122 篇 r. ströhmer
  • 121 篇 a. grummer
  • 120 篇 m. rijssenbeek

语言

  • 4,674 篇 英文
  • 293 篇 其他
  • 31 篇 中文
  • 9 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Faculty of Electronics and Computer Science Engineering"
5013 条 记 录,以下是41-50 订阅
排序:
CYBERSECURITY ASSESSMENT AND CERTIFICATION OF CRITICAL INFRASTRUCTURES
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and computer science 2024年 第4期86卷 151-166页
作者: Bogdan, Ioana Corina Simion, Emil Faculty of Electrical Engineering and Computer Science Department of Electronics and Computers "Transilvania" University of Brasov & CiTi Brasov Romania Department of Mathematical Methods and Models National University of Science and Technology POLITEHNICA Bucharest & CiTi Bucharest Romania
Cybersecurity is a field that unifies concepts from various fundamental areas: mathematics, physics, computer science, electronics, sociology, and management. This field is challenging for government authorities, acad... 详细信息
来源: 评论
Shadow Extraction and Elimination of Moving Vehicles for Tracking Vehicles
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2009-2030页
作者: Kalpesh Jadav Vishal Sorathiya Walid El-Shafai Torki Altameem Moustafa HAly Vipul Vekariya Kawsar Ahmed Francis MBui Department of Electronics&Communication Engineering Faculty of Engineering and TechnologyParul Institute of Engineering and TechnologyParul UniversityVadodaraGujarat391760India Department Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Community CollegeKing Saud UniversityRiyadh11362Saudi Arabia Electronics and Communications Engineering Department College of Engineering and TechnologyArab Academy for ScienceTechnology and Maritime TransportAlexandria1029Egypt Department of Computer Engineering Faculty of Engineering and TechnologyParul Institute of Engineering and TechnologyParul UniversityVadodaraGujarat391760India Department of Electrical and Computer Engineering University of Saskatchewan57 Campus DriveSaskatoonSK S7N5A9Canada
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking *** shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a hi... 详细信息
来源: 评论
Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4791-4812页
作者: Ahmad Yahiya Ahmad Bani Ahmad Jafar Alzubi Sophers James Vincent Omollo Nyangaresi Chanthirasekaran Kutralakani Anguraju Krishnan Department of Accounting and Finance Faculty of BusinessMiddle East UniversityAmman11831Jordan Faculty of Engineering Al-Balqa Applied UniversitySalt19117Jordan Department of Mathematics Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo210-40601Kenya Department of Electronics and Communication Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India Department of Electronics and Communication Engineering Saveetha Engineering College(Autonomous)Chennai602105India Department of Computer Science and Engineering Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basi... 详细信息
来源: 评论
Review On the Techniques Used for Detection of Fabric Defects Using AI  1
Review On the Techniques Used for Detection of Fabric Defect...
收藏 引用
1st IEEE International Conference on Advances in electronics, Communication, Computing and Intelligent Information Systems, ICAECIS 2023
作者: Batra, Isheeta Prasad, S A Hari Arvind, K.S. Faculty of Engineering & Technology Department of Computer Science and Engineering Karnataka India Faculty of Engineering & Technology Department of Electronics and Communication Engineering Karnataka India
The garment industry is the second-most polluting industry after oil. These mass-produced clothes if rejected are dumped and have an enormous impact on the environment. Therefore, to save the cost post production it i... 详细信息
来源: 评论
Dipper Throated Algorithm for Feature Selection and Classification in Electrocardiogram
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1469-1482页
作者: Doaa Sami Khafaga Amel Ali Alhussan Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mohamed Saber El-Sayed M.El-kenawy Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Electronics and Communications Engineering Department Faculty of EngineeringDelta University for Science and TechnologyMansouraEgypt Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt
Arrhythmia has been classified using a variety of *** of the dynamic nature of electrocardiogram(ECG)data,traditional handcrafted approaches are difficult to execute,making the machine learning(ML)solutions more *** w... 详细信息
来源: 评论
Toward Optimal Periodic Crowd Tracking via Unmanned Aerial Vehicle
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 233-263页
作者: Khalil Chebil Skander Htiouech Mahdi Khemakhem Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlKharj11942Saudi Arabia Data Engineering and Semantics Research Unit Faculty of Sciences of SfaxUniversity of SfaxSfaxTunisia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Mathematics and Business Intelligence College of Electronics and Telecommunications Engineering of SfaxUniversity of SfaxSfaxTunisia
Crowd management and analysis(CMA)systems have gained a lot of interest in the vulgarization of unmanned aerial vehicles(UAVs)*** tracking using UAVs is among the most important services provided by a *** this paper,w... 详细信息
来源: 评论
High-Performance Flow Classification of Big Data Using Hybrid CPU-GPU Clusters of Cloud Environments
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 1118-1137页
作者: Azam Fazel-Najafabadi Mahdi Abbasi Hani H.Attar Ayman Amer Amir Taherkordi Azad Shokrollahi Mohammad R.Khosravi Ahmed A.Solyman Department of Computer Engineering Faculty of EngineeringBu-Ali Sina UniversityHamedan ***Iran Department of Energy Engineering Zarqa UniversityZarqa 13132Jordan Department of Informatics University of OsloOslo 0316Norway Department of Computer Science MalmöUniversityMalmö20506Sweden Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 261100China Department of Electrical and Electronics Engineering NişantaşıUniversityIstanbul 34481742Türkiye
The network switches in the data plane of Software Defined Networking (SDN) are empowered by an elementary process, in which enormous number of packets which resemble big volumes of data are classified into specific f... 详细信息
来源: 评论
A Hypergraph Matching-Based Subchannel Allocation for Multi-Platoon's Communications
收藏 引用
IEEE Access 2023年 11卷 139345-139365页
作者: Huang, Chung-Ming Lam, Dan-Nguyen Dao, Duy-Tuan National Cheng Kung University Department of Computer Science and Information Engineering Tainan70101 Taiwan The University of Danang-University of Science and Technology Faculty of Electronics and Telecommunications Engineering Da Nang50000 Viet Nam
In a platoon communication scenario, the Platoon Leader (PL) vehicle interacts with the gNodeB (gNB) to obtain some assigned radio resources and then the obtained radio resources are allocated to the PL vehicle and it... 详细信息
来源: 评论
On the Application of Inexact Computation for Low Power SHA-256
On the Application of Inexact Computation for Low Power SHA-...
收藏 引用
2023 Workshop on electronics Communication engineering, WECE 2023
作者: Ismail, Ahmed Shaaban Shalaby, Ahmed Abu-Elyazeed, Mohamed Fathy Electronics and Electrical Communications Dept Faculty of Engineering Cairo University Cairo Egypt Computer Science Dept. Faculty of Computer and Artificial Intelligence Benha University Benha Egypt
The adoption of IoT has raised concerns about security as life-threatening attacks become more common. To address this, ultra-lightweight secure SoCs become a demand to ensure trusted operation in the presence of untr... 详细信息
来源: 评论
Cross-Layer Distributed Attack Detection Model for the IoT
收藏 引用
International Journal of Ambient Computing and Intelligence 2022年 第1期13卷 1-17页
作者: Ahmed, Hassan I. Nasr, Abdurrahman A. Abdel-Mageid, Salah M. Aslan, Heba K. Informatics Department Electronics Research Institute Cairo Egypt Computer Engineering Faculty of Engineering Al-Azhar University Cairo Egypt Computer Engineering Department College of Computer Science and Engineering Taibah University Saudi Arabia Center of Informatics Science Faculty of Information Technology and Computer Science Nile University Egypt
The security of IoT that is based on layered approaches has shortcomings such as the redundancy, inflexibility, and inefficiently of security solutions. There are many harmful attacks in IoT networks such as DoS and D... 详细信息
来源: 评论