咨询与建议

限定检索结果

文献类型

  • 29,608 篇 会议
  • 20,361 篇 期刊文献
  • 503 册 图书

馆藏范围

  • 50,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31,035 篇 工学
    • 18,275 篇 计算机科学与技术...
    • 14,736 篇 软件工程
    • 8,018 篇 信息与通信工程
    • 5,663 篇 电气工程
    • 5,652 篇 电子科学与技术(可...
    • 5,380 篇 控制科学与工程
    • 3,594 篇 生物工程
    • 3,169 篇 光学工程
    • 2,868 篇 生物医学工程(可授...
    • 2,117 篇 机械工程
    • 2,099 篇 动力工程及工程热...
    • 1,933 篇 化学工程与技术
    • 1,864 篇 仪器科学与技术
    • 1,849 篇 材料科学与工程(可...
    • 1,091 篇 交通运输工程
    • 1,052 篇 网络空间安全
  • 18,823 篇 理学
    • 8,833 篇 数学
    • 6,990 篇 物理学
    • 4,051 篇 生物学
    • 3,239 篇 统计学(可授理学、...
    • 2,260 篇 系统科学
    • 2,210 篇 化学
  • 6,946 篇 管理学
    • 4,591 篇 管理科学与工程(可...
    • 2,535 篇 图书情报与档案管...
    • 2,283 篇 工商管理
  • 2,976 篇 医学
    • 2,389 篇 临床医学
    • 2,135 篇 基础医学(可授医学...
    • 1,265 篇 公共卫生与预防医...
    • 1,265 篇 药学(可授医学、理...
  • 1,425 篇 法学
    • 1,232 篇 社会学
  • 841 篇 经济学
  • 538 篇 农学
  • 477 篇 教育学
  • 261 篇 文学
  • 101 篇 军事学
  • 55 篇 艺术学
  • 7 篇 哲学
  • 6 篇 历史学

主题

  • 1,190 篇 accuracy
  • 1,110 篇 deep learning
  • 1,069 篇 computer science
  • 889 篇 computational mo...
  • 878 篇 machine learning
  • 755 篇 training
  • 750 篇 feature extracti...
  • 662 篇 internet of thin...
  • 566 篇 optimization
  • 554 篇 real-time system...
  • 513 篇 predictive model...
  • 476 篇 artificial intel...
  • 457 篇 convolutional ne...
  • 424 篇 support vector m...
  • 398 篇 data models
  • 374 篇 neural networks
  • 351 篇 robustness
  • 338 篇 analytical model...
  • 334 篇 wireless sensor ...
  • 333 篇 reinforcement le...

机构

  • 617 篇 department of el...
  • 185 篇 department of co...
  • 155 篇 school of electr...
  • 129 篇 school of automa...
  • 128 篇 school of comput...
  • 118 篇 department of co...
  • 115 篇 school of electr...
  • 115 篇 school of electr...
  • 110 篇 school of comput...
  • 109 篇 college of compu...
  • 106 篇 department of ph...
  • 105 篇 department of co...
  • 104 篇 faculty of scien...
  • 101 篇 departamento de ...
  • 100 篇 faculté des scie...
  • 98 篇 school of comput...
  • 93 篇 department of ph...
  • 93 篇 department of ph...
  • 91 篇 north-west unive...
  • 89 篇 department of ph...

作者

  • 323 篇 niyato dusit
  • 116 篇 han zhu
  • 95 篇 ferrara g.
  • 94 篇 ardid m.
  • 93 篇 calvo d.
  • 92 篇 chen a.
  • 91 篇 c. alexa
  • 90 篇 j. m. izen
  • 90 篇 s. veneziano
  • 90 篇 g. bella
  • 90 篇 d. calvet
  • 90 篇 c. amelung
  • 90 篇 y. tayalati
  • 89 篇 j. strandberg
  • 89 篇 n. orlando
  • 89 篇 g. spigo
  • 89 篇 v. chiarella
  • 89 篇 f. siegert
  • 88 篇 f. buehrer
  • 88 篇 a. t. law

语言

  • 46,184 篇 英文
  • 3,775 篇 其他
  • 496 篇 中文
  • 32 篇 日文
  • 10 篇 德文
  • 8 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Engineering Department of Computer Science and Electrical Engineering"
50472 条 记 录,以下是1181-1190 订阅
排序:
Speaker Identification Using CNN-LSTM Model on RAVDESS Dataset: A Deep Learning Approach  4
Speaker Identification Using CNN-LSTM Model on RAVDESS Datas...
收藏 引用
4th International Conference on Intelligent Technologies, CONIT 2024
作者: Suryamritha, M. Balaji, Varshini Kannan, Srinidhi Murali, K. Amrita School of Computing Department of Computer Science and Engineering Bengaluru India Department of Mathematics Amrita Vishwa Vidyapeetham India
Speaker identification is used for identifying an individual based on their voice. Signal processing and deep neural networks are used for feature extraction. This paper presents a method that combines CNN and LSTM fo... 详细信息
来源: 评论
Design Method for Q-Enhanced Reconfigurable Bandpass Filters With High Selectivity, Large Bandwidth Variable Range, and Large Dynamic Range
收藏 引用
IEEE Transactions on Microwave Theory and Techniques 2024年 第11期72卷 6387-6400页
作者: Chen, Ziyuan Li, Kun Liu, Yuanan Chi, Pei-Ling Yang, Tao University of Electronic Science and Technology of China School of Electronic Science and Engineering Sichuan Chengdu610054 China Beijing University of Posts and Telecommunications School of Electronic Engineering Beijing100876 China National Yang Ming Chiao Tung University Department of Electrical and Computer Engineering Hsinchu300 Taiwan
A design method of generating multiple transmission zeros (TZs) is proposed by introducing feeding-forward transconductance amplifiers for the cascaded Q-enhanced reconfigurable bandpass filters (BPFs) in this article... 详细信息
来源: 评论
A Data-Driven Approach based on Dynamic Mode Decomposition for Efficient Encoding of Dynamic Light Fields
A Data-Driven Approach based on Dynamic Mode Decomposition f...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Ravishankar, Joshitha Khaidem, Sally Sharma, Mansi Indian Institute of Technology Madras Department of Electrical Engineering India Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Coimbatore India
Dynamic light fields provide a richer, more realistic 3D representation of a moving scene. However, this leads to higher data rates since excess storage and transmission requirements are needed. We propose a novel app... 详细信息
来源: 评论
New Delay Doppler Communication Paradigm in 6G Era:A Survey of Orthogonal Time Frequency Space(OTFS)
收藏 引用
China Communications 2023年 第6期20卷 1-25页
作者: Weijie Yuan Shuangyang Li Zhiqiang Wei Yuanhao Cui Jiamo Jiang Haijun Zhang Pingzhi Fan Department of Electronic and Electrical Engineering Southern University of Science and TechnologyShenzhenChina Faculty of Electrical Engineering and Computer Science Technical University of BerlinBerlinGermany School of Mathematics and Statistics Xi’an Jiaotong UniversityXi’anChina Department of Communication Engineering Beijing University of Posts and TelecommunicationsBeijingChina China Academy of Information and Communications Technology BeijingChina School of Computer and Communication Engineering University of Science and Technology BeijingBeijingChina School of Information Science and Technology Southwest Jiaotong UniversityChengduChina
In the 6G era,Space-Air-Ground Integrated Network(SAGIN)are anticipated to deliver global coverage,necessitating support for a diverse array of emerging applications in high-mobility,hostile *** such conditions,conven... 详细信息
来源: 评论
A Deep Learning Based Induced GNSS Spoof Detection Framework
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2024年 2卷 457-478页
作者: Iqbal, Asif Aman, Muhammad Naveed Sikdar, Biplab National University of Singapore Department of Electrical and Computer Engineering Cluny Road 117583 Singapore University of Nebraska-Lincoln School of Computing LincolnNE68523 United States
The Global Navigation Satellite System (GNSS) plays a crucial role in critical infrastructure by delivering precise timing and positional data. Nonetheless, the civilian segment of the GNSS remains susceptible to vari... 详细信息
来源: 评论
An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2024年 第1期15卷 1165-1186页
作者: Ali, Rifaqat Pal, Arup Kumar Kumari, Saru Sangaiah, Arun Kumar Li, Xiong Wu, Fan Dhanbad826004 India Department of Mathematics Ch. Charan Singh University Uttar Pradesh Meerut250004 India School of Computing Science and Engineering VIT University Vellore Tamil Nadu632014 India School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Department of Computer Science and Engineering Xiamen Institute of Technology Xiamen361021 China
With the rapid growth of wireless medical sensor networks (WMSNs) based healthcare applications, protecting both the privacy and security from illegitimate users, are major concern issues since patient’s precise info... 详细信息
来源: 评论
SMARTGOV: Strategic Management of Assets for Resilient and Transparent Government Operations  9
SMARTGOV: Strategic Management of Assets for Resilient and T...
收藏 引用
9th International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2024
作者: Chauhan, Naman Atri, Pranshul Tomar, Riya Kumar, Aman Chauhan, Chhavi Kumar, Kaitala Charan Sophiya, E. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India School of Computer Science University of Petroleum and Energy Studies Dehradun India Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Mechanical Engineering Chennai India
In this age, we introduce an application that aims to revolutionize the management of government buildings. With a commitment, to supporting Digital India initiative, proposed project addresses the changing needs of g... 详细信息
来源: 评论
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1180-1189页
作者: Xin Liu Liang Zheng Sumi Helal Weishan Zhang Chunfu Jia Jiehan Zhou College of Computer Science and Technology China University of Petroleum(East China)QingdaoChina School of Computing Lancaster University UK Nankai University TianjinChina Information Technology and Electrical Engineering University of OuluFinland
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection *** DDoS attack defence strategies deploy only to a certain type of devices in the at... 详细信息
来源: 评论
Blockchain-based crowdsourcing for human intelligence tasks with dual fairness
收藏 引用
Blockchain(Research and Applications) 2024年 第4期5卷 1-13页
作者: Yihuai Liang Yan Li Byeong-Seok Shin School of Information Science and Technology Southwest Jiaotong UniversityChengdu 611756China Department of Electrical and Computer Engineering Inha UniversityIncheon 22212Republic of Korea
Human intelligence tasks(HITs),such as labeling images for machine learning,are widely utilized for crowdsourcing human *** crowdsourcing platforms face challenges of a single point of failure and a lack of service **... 详细信息
来源: 评论
Transferable and Robust Dynamic Adversarial Attack Against Object Detection Models
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16171-16180页
作者: Wang, Xinxin Chen, Jing Zhang, Zijun He, Kun Wu, Zongru Du, Ruiying Li, Qiao Liu, Gongshen Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Shanghai Jiao Tong University Department of Electronic Information and Electrical Engineering Shanghai201100 China
Object detection models have been widely deployed in physical world applications, and they are vulnerable to adversarial attacks. However, most adversarial attacks are implemented in a glass box setting, and under ide... 详细信息
来源: 评论