咨询与建议

限定检索结果

文献类型

  • 2,646 篇 会议
  • 2,041 篇 期刊文献
  • 64 册 图书

馆藏范围

  • 4,751 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,652 篇 工学
    • 1,326 篇 计算机科学与技术...
    • 1,014 篇 软件工程
    • 729 篇 信息与通信工程
    • 620 篇 电气工程
    • 616 篇 电子科学与技术(可...
    • 468 篇 控制科学与工程
    • 283 篇 生物医学工程(可授...
    • 253 篇 生物工程
    • 249 篇 光学工程
    • 239 篇 仪器科学与技术
    • 222 篇 化学工程与技术
    • 214 篇 核科学与技术
    • 209 篇 机械工程
    • 208 篇 动力工程及工程热...
    • 139 篇 材料科学与工程(可...
    • 128 篇 网络空间安全
    • 100 篇 安全科学与工程
    • 93 篇 交通运输工程
  • 1,922 篇 理学
    • 1,140 篇 物理学
    • 620 篇 数学
    • 285 篇 生物学
    • 272 篇 化学
    • 186 篇 统计学(可授理学、...
    • 136 篇 系统科学
  • 513 篇 管理学
    • 373 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 275 篇 医学
    • 220 篇 临床医学
    • 179 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 73 篇 经济学
  • 65 篇 法学
  • 39 篇 教育学
  • 39 篇 农学
  • 11 篇 文学
  • 11 篇 军事学
  • 4 篇 艺术学

主题

  • 158 篇 hadron colliders
  • 107 篇 accuracy
  • 95 篇 deep learning
  • 91 篇 artificial intel...
  • 89 篇 internet of thin...
  • 87 篇 feature extracti...
  • 84 篇 optimization
  • 84 篇 machine learning
  • 76 篇 real-time system...
  • 60 篇 higgs bosons
  • 60 篇 predictive model...
  • 52 篇 computational mo...
  • 48 篇 training
  • 45 篇 w & z bosons
  • 44 篇 wireless sensor ...
  • 41 篇 computational in...
  • 41 篇 mathematical mod...
  • 41 篇 convolutional ne...
  • 40 篇 costs
  • 40 篇 security

机构

  • 432 篇 department of ph...
  • 399 篇 cavendish labora...
  • 274 篇 department for p...
  • 269 篇 infn e laborator...
  • 263 篇 west university ...
  • 258 篇 oliver lodge lab...
  • 245 篇 physikalisches i...
  • 234 篇 institute of phy...
  • 226 篇 institute of phy...
  • 224 篇 yerevan physics ...
  • 224 篇 school of physic...
  • 223 篇 department of mo...
  • 218 篇 infn sezione di ...
  • 217 篇 faculty of scien...
  • 213 篇 department of ph...
  • 213 篇 infn sezione di ...
  • 209 篇 irfu cea univers...
  • 208 篇 department of ph...
  • 193 篇 department of ph...
  • 193 篇 kirchhoff-instit...

作者

  • 185 篇 m. lu
  • 161 篇 c. alexa
  • 157 篇 j. m. izen
  • 156 篇 g. bella
  • 156 篇 c. amelung
  • 154 篇 d. calvet
  • 153 篇 j. strandberg
  • 148 篇 n. orlando
  • 140 篇 y. tayalati
  • 137 篇 g. spigo
  • 135 篇 v. chiarella
  • 132 篇 f. siegert
  • 131 篇 b. konya
  • 129 篇 s. veneziano
  • 128 篇 a. dimitrievska
  • 127 篇 f. deliot
  • 123 篇 y. abulaiti
  • 122 篇 r. ströhmer
  • 121 篇 a. grummer
  • 120 篇 t. pham

语言

  • 4,531 篇 英文
  • 170 篇 其他
  • 34 篇 中文
  • 14 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
检索条件"机构=Faculty of Electronics and Computer Technology and Engineering"
4751 条 记 录,以下是1-10 订阅
排序:
Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 299-307页
作者: Xu Yang Hongyan Xing Xinyuan Ji Wei Xu Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and Technology Department of Electrical and Computer Engineering University of Alberta Systems Research Institute Polish Academy of Sciences Department of Computer Engineering Faculty of Engineering and Natural Sciences Istinye University
Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information ... 详细信息
来源: 评论
Impact of Different Integration Times on Distributions of Rain Rates for Predictions of Rain Attenuation
收藏 引用
Progress in Electromagnetics Research C 2025年 154卷 229-238页
作者: Hassan, Mohammad Rofiqul Rafiqul, Islam Md. Habaebi, Mohamed Hadi Suriza, Ahmad Zabidi Badron, Khairayu Budalal, Asma Ali Mahfuz, Md. Mahmudul Hasan Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Jalan Gombak Kuala Lumpur53100 Malaysia College of Electrical and Electronics Technology Benghazi Libya Department of Electrical and Computer Engineering Concordia University Canada
All wireless communication systems are moving towards higher and higher frequencies day by day which are severely attenuated by rains in outdoor environment. To design a reliable RF system, an accurate prediction meth...
来源: 评论
Secured IIoT against trust deficit - A flexi cryptic approach
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5625-5652页
作者: Padmapriya, V.M. Thenmozhi, K. Hemalatha, M. Thanikaiselvan, V. Lakshmi, C. Chidambaram, Nithya Rengarajan, Amirtharajan Department of Computer Sciences Marquette University MilwaukeeWI53233 United States School of Electrical & Electronics Engineering SASTRA Deemed University Thanjavur613401 India Department of Electrical and Computer Engineering Faculty of Engineering King Abdulaziz University Jeddah22254 Saudi Arabia School of Electronics Engineering Vellore Institute of Technology Vellore632014 India
This research allows the secure surveillance approach for the Internet of Things (IoT) methodology to be developed by integrating wireless signalling and image encryption strategy. Since the Cloud Service Telco (CST) ... 详细信息
来源: 评论
Enhancing the efficiency of lung cancer screening: predictive models utilizing deep learning from CT scans
收藏 引用
Neural Computing and Applications 2025年 1-19页
作者: Tawfeek, Medhat A. Alrashdi, Ibrahim Alruwaili, Madallah Shaban, Warda M. Talaat, Fatma M. Department of Computer Science Faculty of Computers and Information Menoufia University Shebin Elkom32511 Egypt Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Computer Engineering and Networks College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Communication and Electronics Engineering Nile Higher Institute for Engineering and Technology Mansoura Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh Egypt Faculty of Computer Science and Engineering New Mansoura University Gamasa35712 Egypt
Lung cancer is the most lethal form of cancer. This paper introduces a novel framework to discern and classify pulmonary disorders such as pneumonia, tuberculosis, and lung cancer by analyzing conventional X-ray and C... 详细信息
来源: 评论
Development and Investigation of Vision System for a Small-Sized Mobile Humanoid Robot in a Smart Environment
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 29-43页
作者: Abu-Jassar, Amer Tahseen Attar, Hani Amer, Ayman Lyashenko, Vyacheslav Yevsieiev, Vladyslav Solyman, Ahmed Department of Computer Science College of Information Technology Amman Arab University Amman11937 Jordan Faculty of Engineering Zarqa University Zarqa2000 Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia Department of Media Systems and Technology Kharkiv National University of Radio Electronics Kharkiv61166 Ukraine Department of Electrical and Electronics Engineering Faculty of Engineering and Architecture Nişantaşı University Istanbul34398 Turkey
The conducted research aims to develop a computer vision system for a small-sized mobile humanoid robot. The decentralization of the servomotor control and the computer vision systems is investigated based on the hard... 详细信息
来源: 评论
Artificial Intelligence-Based Secured Smart Mirror Control Systems with Enhanced Vehicle and Signboard Detection  11th
Artificial Intelligence-Based Secured Smart Mirror Control S...
收藏 引用
11th EAI International Conference on Advancement of Science and technology, ICAST 2023
作者: Sanjay, S. Nithish Soorya, S.S. Vengatesh, R. Prakasam, P. Annamalai, Pushparaghavan School of Electronics Engineering Vellore Institute of Technology Vellore India Faculty of Electrical and Computer Engineering Bahirdar University Bahir Dar Ethiopia
Vehicle accidents have a significant impact on society, and they have a number of detrimental repercussions on individuals, families, and communities. Vehicles are an essential part of everyone’s daily lives in the m... 详细信息
来源: 评论
Software design and FPGA implementation of optimized medical image fusion techniques
收藏 引用
Multimedia Tools and Applications 2025年 1-31页
作者: Elshazly, E.A. El-Shafai, Walid El-Hoseny, Heba El-Rabaie, El-Sayed M Zahran, O. Abdelwahab, Safey A. S. El-Halawany, M.M. Fikry, R.M. Elaraby, S.M. Faragallah, Osama S. Mohamed, Wael A. Mahmoud, Korany R. Abd El-Samie, Fathi E. Cairo Egypt Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Faculty of Computer Studies Arab Open University 11681 Riyadh Saudi Arabia Department of Information Technology College of Computers and Information Technology Taif University 11099 Taif21944 Saudi Arabia Department of Electrical Engineering Faculty of Engineering Benha University Benha Egypt Electronics and Communications Engineering Department Faculty of Engineering Helwan University Helwan Egypt Giza Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Nowadays, medical image fusion plays a crucial role in enhancing the diagnosis accuracy and the clinical decision-making process in various healthcare applications. This research work presents a comprehensive stu... 详细信息
来源: 评论
Securing MIMO Wiretap Channel With Learning-Based Friendly Jamming Under Imperfect CSI
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16009-16022页
作者: Minh Tuan, Bui Nguyen, Diep N. Linh Trung, Nguyen Nguyen, Van-Dinh Van Huynh, Nguyen Thai Hoang, Dinh Krunz, Marwan Dutkiewicz, Eryk University of Technology Sydney School of Electrical and Data Engineering SydneyNSW2007 Australia University of Engineering and Technology Vietnam National University Faculty of Electronics and Telecommunications Hanoi100000 Viet Nam College of Engineering and Computer Science VinUniversity Hanoi100000 Viet Nam University of Liverpool Department of Electrical Engineering and Electronics LiverpoolL69 3GJ United Kingdom The University of Arizona Department of Electrical and Computer Engineering TucsonAZ85721 United States
Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state i... 详细信息
来源: 评论
Cumulative histogram as a feature selection technique for anomaly detection
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10095-10107页
作者: Nassar, Mostafa Salama, Rania A. Saleeb, Adel A. El-bahnasawy, Nirmeen A. Ahmed, Hossam Eldin H. Abd El-Samie, Fathi E. Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Information Technology Faculty of Computers and Information Suez University Suez Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh11671 Saudi Arabia
The enhancement of Intrusion Detection Systems (IDS) is required to ensure protection of network resources and services. This is a hot research topic, especially in the presence of advanced intrusions and at... 详细信息
来源: 评论
Coverage Probability of EH-enabled LoRa networks - A Deep Learning Approach
EAI Endorsed Transactions on Industrial Networks and Intelli...
收藏 引用
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 2025年 第2期12卷 1-11页
作者: Nguyen, Thi-Tuyet-Hai Hung, Tran Cong Son, Nguyen Hong Hanh, Tan Duy, Tran Trung Tu, Lam-Thanh Faculty of Information Technology Posts and Telecommunications Institute of Technology Viet Nam School of Computer Science & Engineering Saigon International University Ho Chi Minh City Viet Nam Faculty of Telecommunications Posts and Telecommunications Institute of Technology Viet Nam Communication and Signal Processing Research Group Faculty of Electrical and Electronics Engineering Ton Duc Thang University Ho Chi Minh City Viet Nam
The performance of energy harvesting (EH)-enabled long-range (LoRa) networks is analyzed in this work. Specifically, we employ deep learning (DL) to estimate the coverage probability (Pcov) of the considered networks.... 详细信息
来源: 评论