咨询与建议

限定检索结果

文献类型

  • 118,215 篇 会议
  • 54,340 篇 期刊文献
  • 967 册 图书
  • 11 篇 学位论文

馆藏范围

  • 173,532 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 97,859 篇 工学
    • 48,478 篇 计算机科学与技术...
    • 38,227 篇 软件工程
    • 22,548 篇 信息与通信工程
    • 21,938 篇 电子科学与技术(可...
    • 21,503 篇 电气工程
    • 17,108 篇 控制科学与工程
    • 9,687 篇 光学工程
    • 8,715 篇 生物工程
    • 7,395 篇 机械工程
    • 7,096 篇 材料科学与工程(可...
    • 6,999 篇 化学工程与技术
    • 6,938 篇 生物医学工程(可授...
    • 6,752 篇 仪器科学与技术
    • 6,631 篇 动力工程及工程热...
    • 3,008 篇 力学(可授工学、理...
    • 2,673 篇 交通运输工程
    • 2,390 篇 建筑学
  • 59,518 篇 理学
    • 26,481 篇 数学
    • 25,436 篇 物理学
    • 9,742 篇 生物学
    • 8,949 篇 统计学(可授理学、...
    • 7,429 篇 系统科学
    • 7,420 篇 化学
  • 17,091 篇 管理学
    • 11,475 篇 管理科学与工程(可...
    • 6,080 篇 图书情报与档案管...
    • 5,703 篇 工商管理
  • 5,804 篇 医学
    • 4,870 篇 临床医学
    • 4,172 篇 基础医学(可授医学...
    • 2,674 篇 药学(可授医学、理...
  • 3,002 篇 法学
    • 2,597 篇 社会学
  • 2,252 篇 经济学
  • 1,347 篇 教育学
  • 1,238 篇 农学
  • 622 篇 文学
  • 364 篇 军事学
  • 171 篇 艺术学
  • 23 篇 哲学
  • 16 篇 历史学

主题

  • 6,903 篇 computer science
  • 3,309 篇 computational mo...
  • 2,477 篇 bandwidth
  • 2,354 篇 feature extracti...
  • 2,334 篇 control systems
  • 2,066 篇 accuracy
  • 2,045 篇 optimization
  • 2,040 篇 training
  • 1,949 篇 computer archite...
  • 1,933 篇 costs
  • 1,893 篇 hardware
  • 1,884 篇 mathematical mod...
  • 1,863 篇 testing
  • 1,805 篇 switches
  • 1,788 篇 delay
  • 1,765 篇 robustness
  • 1,761 篇 machine learning
  • 1,722 篇 wireless sensor ...
  • 1,632 篇 neural networks
  • 1,622 篇 application soft...

机构

  • 1,461 篇 department of el...
  • 1,237 篇 department of el...
  • 566 篇 school of optica...
  • 472 篇 department of el...
  • 467 篇 department of el...
  • 444 篇 school of electr...
  • 418 篇 school of electr...
  • 404 篇 faculty of elect...
  • 376 篇 school of electr...
  • 328 篇 department of el...
  • 315 篇 school of automa...
  • 313 篇 faculty of elect...
  • 300 篇 department of el...
  • 280 篇 department of el...
  • 274 篇 school of electr...
  • 212 篇 department of el...
  • 204 篇 school of electr...
  • 201 篇 school of electr...
  • 194 篇 ieee
  • 191 篇 school of comput...

作者

  • 340 篇 niyato dusit
  • 199 篇 han zhu
  • 103 篇 g. tonelli
  • 100 篇 d. barney
  • 94 篇 c. hensel
  • 93 篇 l. valencia palo...
  • 91 篇 t. liu
  • 89 篇 a. garcia-bellid...
  • 89 篇 a. steen
  • 88 篇 a. babaev
  • 88 篇 n. cartiglia
  • 87 篇 v. karjavine
  • 87 篇 k.g. shin
  • 85 篇 seung-ki sul
  • 84 篇 n. colino
  • 82 篇 f. moortgat
  • 82 篇 y. chen
  • 79 篇 w. busza
  • 75 篇 b. clerbaux
  • 74 篇 f. buehrer

语言

  • 164,229 篇 英文
  • 7,081 篇 其他
  • 2,082 篇 中文
  • 77 篇 日文
  • 38 篇 朝鲜文
  • 23 篇 德文
  • 12 篇 法文
  • 3 篇 西班牙文
  • 3 篇 斯洛文尼亚文
  • 2 篇 捷克文
  • 2 篇 荷兰文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
检索条件"机构=Schools of Computer Science and Electrical and Computer Engineering"
173533 条 记 录,以下是4991-5000 订阅
排序:
Detection of Malicious URLs using Ensemble learning techniques
Detection of Malicious URLs using Ensemble learning techniqu...
收藏 引用
2023 IEEE Technology and engineering Management Conference - Asia Pacific, TEMSCON-ASPAC 2023
作者: Arjun, D Shashank Samhitha, D Sai Padmavathi, A. Hemprasanna, A. Amrita School of Computing Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Chennai India Amrita School of Computing Department of Electrical and Computer Amrita Vishwa Vidyapeetham Coimbatore India
The growing risk of cyber-attacks and information vulnerability has become a major problem in today's dynamic digital environment. The necessity for strong security solutions is more critical than ever due to the ... 详细信息
来源: 评论
Skeleton-Based Volumetric Parameterizations for Lattice Structures
收藏 引用
computer Modeling in engineering & sciences 2023年 第4期135卷 687-709页
作者: Long Chen Shuxun Liang Nan Yan Xiangqian Yang Baotong Li School of Mechanical Engineering University of Shanghai for Science and TechnologyShanghai200093China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai200093China Key Laboratory of EducationMinistry for Modern Design&Rotor-Bearing System Xi’an Jiaotong UniversityXi’an710049China
Lattice structures with excellent physical properties have attracted great research *** this paper,a novel volume parametric modeling method based on the skeleton model is proposed for the construction of threedimensi... 详细信息
来源: 评论
A Framework for Cyber-Secure Monitoring and Safe Operation of Solar PV Microgrids
A Framework for Cyber-Secure Monitoring and Safe Operation o...
收藏 引用
2024 IEEE Energy Conversion Congress and Exposition, ECCE 2024
作者: Kim, Jaewon Ilic, Marija Xie, Le Massachusetts Institute of Technology Laboratory for Information & Decision Systems CambridgeMA02139 United States Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science CambridgeMA02139 United States Texas A&m University Department of Electrical & Computer Engineering College StationTX77843 United States
In this paper, we introduce a systematic design of an end-to-end cyber-secure monitoring and safe operation framework for solar photovoltaic (PV)-rich microgrids, by focusing on the use of on-line attack detector for ... 详细信息
来源: 评论
Improving Accuracy of Object Detection in Autonomous Drones with Convolutional Neural Networks
Improving Accuracy of Object Detection in Autonomous Drones ...
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information Technology, ICCCIT 2025
作者: Goyal, Himanshu Rai Shrivastava, Anurag Dixit, Krishna Kant Nagpal, Amandeep Reddy, B. Ravali Kumar, Jaysheel Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamilnadu Chennai India GLA Universit Department of Electrical Engineering Mathura India Lovely Professional University Phagwara India MLR Institute of Technology Department of Computer Science and Engineering Telangana Hyderabad India New Horizon College of Engineering Bangalore India
Increasing use of autonomous drones in such areas as agriculture, disaster response and surveillance means that an effective and precise method of object recognition is becoming more important. In this study, we use C... 详细信息
来源: 评论
Improving Stain Invariance of CNNs for Segmentation by Fusing Channel Attention and Domain-Adversarial Training  6
Improving Stain Invariance of CNNs for Segmentation by Fusin...
收藏 引用
6th International Conference on Medical Imaging with Deep Learning, MIDL 2023
作者: Abutalip, Kudaibergen Saeed, Numan Khan, Mustaqeem Saddik, Abdulmotaleb El Computer Vision Department Mohamed Bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates School of Electrical Engineering and Computer Science University of Ottawa Ottawa Canada
Variability in staining protocols, such as different slide preparation techniques, chemicals, and scanner configurations, can result in a diverse set of whole slide images (WSIs). This distribution shift can negativel... 详细信息
来源: 评论
High-quality distractor generation framework for English reading comprehension  5
High-quality distractor generation framework for English rea...
收藏 引用
5th International Academic Exchange Conference on science and Technology Innovation, IAECST 2023
作者: Guo, Zhengrong Wang, Hui Guo, Gongde Fujian Normal University College of Computer and Cyberspace Security Fujian Fuzhou China Queen's University Belfast School of Electronics Electrical Engineering and Computer Science Belfast United Kingdom
Distractors are widely used in tasks such as reading comprehension and subject education. Generating high-quality distractors automatically poses a challenging task. Existing frameworks for generating distractors in t... 详细信息
来源: 评论
Enhanced Adaptive Brain-computer Interface Approach for Intelligent Assistance to Disabled Peoples
收藏 引用
computer Systems science & engineering 2023年 第8期46卷 1355-1369页
作者: Ali Usman Javed Ferzund Ahmad Shaf Muhammad Aamir Samar Alqhtani Khlood M.Mehdar Hanan Talal Halawani Hassan A.Alshamrani Abdullah A.Asiri Muhammad Irfan Department of Computer Science COMSATS University IslamabadSahiwal CampusSahiwal57000Pakistan Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Anatomy Department Medicine CollegeNajran UniversityNajran61441Saudi Arabia Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Radiological Sciences Department College of Applied Medical Sciences and Information SystemsNajran UniversityNajran61441Kingdom of Saudi Arabia Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia
Assistive devices for disabled people with the help of Brain-computer Interaction(BCI)technology are becoming vital bio-medical *** with physical disabilities need some assistive devices to perform their daily *** the... 详细信息
来源: 评论
SLA$^{{\text{2}}}$2P: Self-Supervised Anomaly Detection With Adversarial Perturbation
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2024年 第12期36卷 9282-9293页
作者: Yizhou Wang Can Qin Rongzhe Wei Yi Xu Yue Bai Yun Fu Department of Electrical and Computer Engineering Northeastern University Boston MA USA Georgia Institute of Technology Atlanta GA USA Department of Electrical and Computer Engineering Khoury College of Computer Science Northeastern University Boston MA USA
Anomaly detection is a foundational yet difficult problem in machine learning. In this work, we propose a new and effective framework, dubbed as SLA 2 P, for unsupervised anomaly detection. Following the extraction of... 详细信息
来源: 评论
Guest Editorial: Special Issue on Knowledge-Infused Learning for Computational Social Systems
收藏 引用
IEEE Transactions on Computational Social Systems 2024年 第3期11卷 3045-3048页
作者: Nguyen, Tu Piuri, Vincenzo Rodrigues, Joel Qi, Lianyong Mumtaz, Shahid Lee, Warren Huang-Chen Kennesaw State University Department of Computer Science MariettaGA30060 United States University of Milan MI Milano20122 Italy Piauí Teresina64049-550 Brazil Qufu Normal University School of Computer Science Shandong273165 China Instituto de Telecomunicações Aveiro3810-164 Portugal National Chung Cheng University Department of Communications Engineering & Electrical Engineering Chiayi County621301 Taiwan
This special issue comprises 12 articles, showcasing the latest advances in computational social systems research.
来源: 评论
OFDM with Generalized Cascade Index Modulation for Secure Communications
收藏 引用
China Communications 2024年 第10期21卷 210-225页
作者: Hu Zeng Jin Xiaopin Yao Yudong Chen Fangjiong Wan Dehuan Liu Yun College of Information Science and Technology Zhongkai University of Agriculture and EngineeringGuangzhou 510225China College of Information Engineering China Jiliang UniversityHangzhou 310018China Department Electrical and Computer Engineering Stevens Institute of Technology HobokenNJ 07030USA School of Electronic and Information Engineering South China University of TechnologyGuangzhou 510641China Center for Data Science and Artificial Intelligence Guangdong University of FinanceGuangzhou 510521China
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error *** CIM, at least two different IM operations con... 详细信息
来源: 评论