咨询与建议

限定检索结果

文献类型

  • 9,078 篇 会议
  • 67 册 图书
  • 19 篇 期刊文献

馆藏范围

  • 9,164 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,518 篇 工学
    • 5,151 篇 计算机科学与技术...
    • 4,403 篇 软件工程
    • 2,178 篇 信息与通信工程
    • 1,268 篇 生物工程
    • 1,078 篇 电气工程
    • 1,001 篇 控制科学与工程
    • 867 篇 生物医学工程(可授...
    • 849 篇 电子科学与技术(可...
    • 640 篇 动力工程及工程热...
    • 490 篇 机械工程
    • 481 篇 光学工程
    • 438 篇 仪器科学与技术
    • 412 篇 安全科学与工程
    • 359 篇 化学工程与技术
    • 310 篇 交通运输工程
  • 3,650 篇 理学
    • 1,605 篇 数学
    • 1,382 篇 生物学
    • 981 篇 物理学
    • 506 篇 统计学(可授理学、...
    • 422 篇 化学
    • 403 篇 系统科学
  • 1,614 篇 管理学
    • 948 篇 管理科学与工程(可...
    • 772 篇 图书情报与档案管...
    • 602 篇 工商管理
  • 738 篇 医学
    • 722 篇 临床医学
    • 700 篇 基础医学(可授医学...
    • 518 篇 药学(可授医学、理...
    • 279 篇 公共卫生与预防医...
  • 395 篇 法学
    • 285 篇 社会学
  • 273 篇 经济学
    • 273 篇 应用经济学
  • 216 篇 农学
  • 83 篇 教育学
  • 43 篇 军事学
  • 5 篇 文学
  • 1 篇 艺术学

主题

  • 371 篇 internet of thin...
  • 350 篇 computational mo...
  • 286 篇 wireless communi...
  • 272 篇 deep learning
  • 248 篇 cloud computing
  • 229 篇 machine learning
  • 184 篇 training
  • 179 篇 support vector m...
  • 152 篇 real-time system...
  • 149 篇 feature extracti...
  • 143 篇 simulation
  • 138 篇 costs
  • 133 篇 predictive model...
  • 131 篇 covid-19
  • 131 篇 neural networks
  • 131 篇 wireless sensor ...
  • 130 篇 computer archite...
  • 123 篇 software
  • 119 篇 machine learning...
  • 100 篇 analytical model...

机构

  • 36 篇 department of co...
  • 36 篇 department of en...
  • 33 篇 graphic era deem...
  • 27 篇 chitkara univers...
  • 27 篇 jaipur national ...
  • 26 篇 teerthanker maha...
  • 25 篇 department of co...
  • 23 篇 school of comput...
  • 19 篇 center for astro...
  • 19 篇 department of ph...
  • 19 篇 department of ph...
  • 19 篇 the graduate sch...
  • 19 篇 department of ph...
  • 19 篇 graduate school ...
  • 19 篇 department of ph...
  • 19 篇 institute of par...
  • 19 篇 information engi...
  • 19 篇 academic assembl...
  • 19 篇 department of ph...
  • 19 篇 interdisciplinar...

作者

  • 21 篇 jui c.c.h.
  • 21 篇 oshima a.
  • 21 篇 tsuda r.
  • 21 篇 kim j.h.
  • 21 篇 bergman d.r.
  • 21 篇 allen m.
  • 21 篇 matsuyama t.
  • 21 篇 wong t.
  • 21 篇 ishii t.
  • 21 篇 kim s.w.
  • 21 篇 takamura m.
  • 21 篇 yashiro k.
  • 21 篇 kadota k.
  • 21 篇 mayta r.
  • 21 篇 ozawa s.
  • 21 篇 belz j.w.
  • 21 篇 kasami s.
  • 21 篇 rodriguez d.c.
  • 21 篇 fujisue k.
  • 21 篇 pshirkov m.s.

语言

  • 9,019 篇 英文
  • 145 篇 其他
  • 4 篇 中文
检索条件"任意字段=2022 International Communication Engineering and Cloud Computing Conference, CECCC 2022"
9164 条 记 录,以下是111-120 订阅
排序:
Research on Media communication Methods in the Context of Intelligent Algorithms
Research on Media Communication Methods in the Context of In...
收藏 引用
2022 international conference on Mathematics, Modeling, and Computer Science, MMCS 2022
作者: Zhang, Yu Guangxi University Guangxi China
After news communication enters the era of big data, algorithms recommendation, cloud computing, big data analysis and other technologies have been widely used in the field of media communication, media communication ... 详细信息
来源: 评论
An IoT-based Optimization scheme on task scheduling for minimizing energy in cloud computing  8
An IoT-based Optimization scheme on task scheduling for mini...
收藏 引用
8th international conference on Advanced computing and communication Systems, ICACCS 2022
作者: Ravi Kumar, D. N. S Kumar, K. Praveen Raju, K. Goutham Gowsalya, S. Balraj, Lavina Kumar Srivastava, Ajeet School of Electrical & Electronics Engineering Sathyabama Institute of Science & Technology Chennai119 India Kakatiya Institute of Technology and Science Department of Information Technology Warangal India St. Joseph College of Engineering Sriperumbudur India Harcourt Butler Technical University Kanpur India
Energy conservation is an important concern in virtualized cloud computing systems since it can have numerous benefits, including lower operating costs, enhancing scheme efficacy, and saving the atmosphere. At the sam... 详细信息
来源: 评论
Power grid key data mining based on edge computing  2
Power grid key data mining based on edge computing
收藏 引用
2nd international conference on cloud computing and Mechatronic engineering, I3CME 2022
作者: Wang, Yuedong Wang, Wei Sun, Yao Niu, Mingzhu Shi, Cheng State Grid Dalian Electric Power Supply Company Liaoning Dalian116001 China
In recent years, with the rapid development of smart grid, the situation of user privacy disclosure and communication channel congestion has also intensified. The integration of edge computing and smart grid makes ful... 详细信息
来源: 评论
A multi-user task offloading strategy in edge computing based on Lyapunov optimization  3
A multi-user task offloading strategy in edge computing base...
收藏 引用
3rd international conference on Computer communication and Network Security, CCNS 2022
作者: Shuxu, Zhao Junwei, Xia School of Electronic and Information Engineering Lanzhou Jiaotong University Gansu Lanzhou730070 China
Based on three tier heterogeneous network, we examine the problem of energy consumption optimization with latency constraints, establishing a hierarchical computing model with multiple layers under heterogeneous netwo... 详细信息
来源: 评论
A quantum computing simulator scheme using MPI technology on cloud platform
A quantum computing simulator scheme using MPI technology on...
收藏 引用
IEEE international conference on Electrical engineering, Big Data and Algorithms (EEBDA)
作者: Huang, Zhiguo Qian, Ling Cai, Dunbo China Mobile Suzhou Software Technol Co Ltd Suzhou 215163 Peoples R China
With the deeply studied of quantum computing by research fellows, the computational complexity and time complexity of quantum algorithms gradually increase. The quantum computing simulator provides an effective platfo... 详细信息
来源: 评论
Near-Source Attack for Isolated Networks with Covert Channel Transmission  10
Near-Source Attack for Isolated Networks with Covert Channel...
收藏 引用
10th IEEE international conference on Cyber Security and cloud computing and 9th IEEE international conference on Edge computing and Scalable cloud, CScloud-EdgeCom 2023
作者: Ruan, Zhiqiang Yang, Yuchen Chen, Lejia Minjiang University College of Computer and Control Engineering Fuzhou China
This paper investigates a new attack method called "near-source attack". It leverages the broadcast frames of the 802.11 protocol to establish a hidden tunnel and bypass physical isolation networks or air-ga... 详细信息
来源: 评论
RI Learning Approach for Improved Workload and Resource Allocation in cloud computing  2
RI Learning Approach for Improved Workload and Resource Allo...
收藏 引用
2nd IEEE international conference on Advanced Technologies in Intelligent Control, Environment, computing and communication engineering, ICATIECE 2022
作者: Ojha, Sunita Navneet Vishnoi, I. Jaipur National University Department of Engineering and Technology Jaipur India Teerthanker Mahaveer University Department of Computing Science and IT Moradabad India
Resource Allocation (RA) in cloud computing is the process of allocating available resources to required cloud applications across a network connection. If resources aren't distributed efficiently, essential servi... 详细信息
来源: 评论
Internet of Things Assisted Blockchain based Secured cloud Data Maintenance Scheme
Internet of Things Assisted Blockchain based Secured Cloud D...
收藏 引用
2022 IEEE international conference on Advances in computing, communication and Applied Informatics, ACCAI 2022
作者: Ali, Ahmed Mudassar Bapu, B R Tapas Partheeban, N. Nagaraju, V. Kumar, N. Jagadish S.A. Engineering College Department of Information Technology Chennai India S.A. Engineering College Department of ECE Chennai India School of Computing Science and Engineering Galgotias University Greater Noida Delhi India Saveetha School of Engineering SIMATS Department of CSE Chennai India Velammal Institute of Technology Department of IT Chennai India
The term 'Internet-of-Things (IoT)' has received a loT of interest nowadays. Blockchain has previously been employed in IoT as a reliable, robust and decentralized way. Furthermore, the present blockchain tech... 详细信息
来源: 评论
Certain Investigation of Various Attacks and Vulnerabilites in IoT and cloud Environment  6
Certain Investigation of Various Attacks and Vulnerabilites ...
收藏 引用
6th international conference on I-SMAC (IoT in Social, Mobile, Analytics and cloud), I-SMAC 2022
作者: Sarmila, K.B. Manisekaran, S.V. Sri Eshwaar College of Engineering Department of Computer Science and Engineering Coimbatore India Anna University Regional Campus Coimbatore Department of Information Technology India
Extensive development in networking and data communication among IoT devices has involved cloud computing in IoT environments to handle the ongoing data processing demands. The accelerated growth and integration of Io... 详细信息
来源: 评论
To design and develop LoRa-based system for remote safety monitoring  10
To design and develop LoRa-based system for remote safety mo...
收藏 引用
10th international conference on Emerging Trends in engineering and Technology - Signal and Information Processing, ICETET-SIP-22 2022
作者: Ingle, Shweta Salankar, Suresh Prasad, Shyam Department of Electronics and Telecommunication Engineering Nagpur India Tecxtra Technologies Pvt. Ltd. Tecxtra Technologies Pvt. Ltd. Nagpur India
Hazardous area, such as coal mines are below the earth surface. Below certain level there are dangerous and flammable gases. Unavailability of any mobile Network makes such area black spot for communication. In this p... 详细信息
来源: 评论