咨询与建议

限定检索结果

文献类型

  • 1,568 篇 会议
  • 27 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 1,611 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,069 篇 工学
    • 877 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 259 篇 信息与通信工程
    • 189 篇 电气工程
    • 156 篇 控制科学与工程
    • 85 篇 机械工程
    • 78 篇 生物工程
    • 67 篇 动力工程及工程热...
    • 61 篇 交通运输工程
    • 48 篇 电子科学与技术(可...
    • 44 篇 仪器科学与技术
    • 40 篇 生物医学工程(可授...
    • 34 篇 安全科学与工程
    • 30 篇 建筑学
    • 28 篇 土木工程
    • 22 篇 环境科学与工程(可...
    • 21 篇 光学工程
  • 361 篇 理学
    • 213 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 47 篇 系统科学
  • 236 篇 管理学
    • 165 篇 管理科学与工程(可...
    • 94 篇 工商管理
    • 87 篇 图书情报与档案管...
  • 47 篇 法学
    • 35 篇 社会学
  • 34 篇 医学
    • 32 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 28 篇 教育学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 9 篇 农学
  • 5 篇 文学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 71 篇 cloud computing
  • 56 篇 distributed comp...
  • 50 篇 artificial intel...
  • 46 篇 internet of thin...
  • 42 篇 ubiquitous compu...
  • 41 篇 computational mo...
  • 37 篇 intelligent netw...
  • 36 篇 computer archite...
  • 32 篇 computer science
  • 30 篇 edge computing
  • 30 篇 training
  • 28 篇 protocols
  • 26 篇 computer network...
  • 25 篇 big data
  • 25 篇 monitoring
  • 25 篇 blockchain
  • 24 篇 internet
  • 23 篇 machine learning
  • 23 篇 distributed data...
  • 22 篇 costs

机构

  • 16 篇 guangxi key labo...
  • 9 篇 wuzhou univ guan...
  • 8 篇 guangxi colleges...
  • 8 篇 college of compu...
  • 8 篇 faculty of trans...
  • 7 篇 university of sc...
  • 7 篇 school of cyber ...
  • 7 篇 institute of com...
  • 6 篇 huazhong univers...
  • 6 篇 three gorges int...
  • 6 篇 hubei province k...
  • 6 篇 university of ch...
  • 6 篇 changsha univers...
  • 5 篇 department of co...
  • 5 篇 institute of inf...
  • 5 篇 wuzhou univ guan...
  • 4 篇 singapore univer...
  • 4 篇 school of comput...
  • 4 篇 huazhong univers...
  • 4 篇 school of comput...

作者

  • 6 篇 li peng
  • 5 篇 zhang tao
  • 5 篇 wang wei
  • 5 篇 du ronghua
  • 5 篇 li xiaokun
  • 5 篇 hu wei
  • 4 篇 liu qin
  • 4 篇 cheng li
  • 4 篇 guo hui
  • 4 篇 yang yang
  • 4 篇 yukinobu hoshino
  • 4 篇 peng jun
  • 4 篇 wang haoran
  • 4 篇 huang qingming
  • 4 篇 vale zita
  • 4 篇 praca isabel
  • 4 篇 wang yonghao
  • 4 篇 hui guo
  • 4 篇 li xiang
  • 4 篇 jun peng

语言

  • 1,581 篇 英文
  • 28 篇 其他
  • 8 篇 中文
检索条件"任意字段=21st International Conference on Distributed Computing and Intelligent Technology"
1611 条 记 录,以下是1041-1050 订阅
排序:
intelligent Evaluation Method for Urban Public Space in the Big Data Era
Intelligent Evaluation Method for Urban Public Space in the ...
收藏 引用
international conference on Smart Grid and Electrical Automation (ICSGEA)
作者: Jia, Zhuang Nanjing Forestry Univ Nanjing 210037 Jiangsu Peoples R China
One of the key issues in unban public space design is how to establish an evaluation system for its usage. The modernization for urban public space management cannot be achieved without the decision support service by... 详细信息
来源: 评论
Is Open-Source Software Valuable for Software Defect Prediction of Proprietary Software and Vice Versa?  1st
收藏 引用
1st international conference on Soft computing: Theories and Applications, SoCTA 2016
作者: Kakkar, Misha Jain, Sarika Bansal, Abhay Grover, P.S. Department of Computer Science & Engineering Amity University Uttar Pradesh NoidaUttar Pradesh India Amity Institute of Information Technology Amity University Uttar Pradesh NoidaUttar Pradesh India KIIT Group of Colleges Gurugram India
Software Defect Prediction (SDP) models are used to identify the defect prone artifacts in a project to assist testing experts and better resource utilization. It is simple to build a SDP model for a project having hi... 详细信息
来源: 评论
Regression algorithms for efficient detection and prediction of DDoS attacks  3
Regression algorithms for efficient detection and prediction...
收藏 引用
3rd international conference on Applied and Theoretical computing and Communication technology (iCATccT)
作者: Dayanandam, Gudipudi. Reddy, E. Srinivasa Babu, Dasari. Bujji ANUCET Dept CSE Guntur India ANUCET Guntur India QISCET Dept MCA Ongole India
In the ICT era the need of depth investigation and analysis is required on network traffic. The analysis should focus on detecting DDoS attacks. In the 21st century the use of communication or transactions arc complet... 详细信息
来源: 评论
Constrained Power Loss Minimization of DC Microgrid Using Particle Swarm Optimization  1st
Constrained Power Loss Minimization of DC Microgrid Using Pa...
收藏 引用
1st international conference on Data Engineering and Communication technology (ICDECT)
作者: Angalaeswari, S. Jamuna, K. VIT Univ Sch Elect & Elect Engn Chennai Campus Madras Tamil Nadu India
The optimal power flow has been considered as the important issue in the power system network. There are many ways to optimize the power flow out of which power loss minimization and voltage profile improvement are co... 详细信息
来源: 评论
Research on Real Time Processing and intelligent Analysis technology of Power Big Data  2017
Research on Real Time Processing and Intelligent Analysis Te...
收藏 引用
international conference on Big Data and Internet of Things (BDIOT)
作者: Xue, Jiarui Chen, Xiangzhou Ding, Huixia He, Xiao China Univ Min & Technol Beijing 11st Coll Rd Beijing 100089 Peoples R China China Elect Power Res Inst 15th Xiaoyingdong Rd Beijing 100085 Peoples R China ENSEA 6 Ave Ponceau F-95014 Cergy Pontoise France
This paper focuses on the research of all kinds of data in the power grid business system, and carries on the research of intelligent analysis technology. It focuses on breaking the technical difficulties of intellige... 详细信息
来源: 评论
Challenges and Benefits of Deploying Big Data Analytics in the Cloud for Business Intelligence  21
Challenges and Benefits of Deploying Big Data Analytics in t...
收藏 引用
21st international conference on Knowledge - Based and intelligent Information and Engineering Systems (KES)
作者: Balachandran, Bala M. Prasad, Shivika Univ South Pacific Sch Comp Informat & Math Sci Fac FSTE Laucala Campus Suva Fiji
Cloud computing and big data analytics are, without a doubt, two of the most important technologies to enter the mainstream IT industry in recent years. Surprisingly, the two technologies are coming together to delive... 详细信息
来源: 评论
Energy Efficient Cluster Head Selection in Energy-LEACH
Energy Efficient Cluster Head Selection in Energy-LEACH
收藏 引用
international conference on Communication on Networks (COMNET)
作者: Pambhar, Hiral Aghera, Kausa Tada, Naren VVP Engn Coll Rajkot Gujarat India
Wireless sensor network (WSN) is all time researched area as well as new concepts are introduced frequently. Here we will consider the hierarchical clustering routing protocol called LEACH and its variant as E-LEACH (... 详细信息
来源: 评论
distributed Clustering Scheme to Relieving Broadcast storms in Vehicular Ad-Hoc Network  16th
Distributed Clustering Scheme to Relieving Broadcast Storms ...
收藏 引用
16th international conference on Hybrid intelligent Systems (HIS) / 8th World Congress on Nature and Biologically Inspired computing (NaBIC)
作者: Touil, Abdelali Ghadi, Fattehallah Ibn Zohr Univ Dept Comp Sci Lab Engn Sci LabSI Fac Sci BP 8106 Agadir Morocco
Nowadays, intelligent Transportation Systems (ITS) aim to reduce accidents, fuel consumption and roads congestion, for this reason Vehicular Ad-hoc Networks (VANETs) technology as special case of ITS represent the fut... 详细信息
来源: 评论
Implementation of DstC and PSO Algorithm Using CLD to Improve the Performance of MANET  1st
Implementation of DSTC and PSO Algorithm Using CLD to Improv...
收藏 引用
1st international conference on Data Engineering and Communication technology (ICDECT)
作者: Bhale, Sheetal Mishra, Abhilasha Khan, Mazher GS Mandals Marathwada Inst Technol Aurangabad Maharashtra India
Throughput is a valuable parameter for mobile ad hoc network (MANET), it is defined as a number of successfully received packets in a unit interval of time. In wireless communication for the extension of coverage as w... 详细信息
来源: 评论
Issues with DCR and NLSR in Named-Based Routing Protocol  1st
Issues with DCR and NLSR in Named-Based Routing Protocol
收藏 引用
1st international conference on Data Engineering and Communication technology (ICDECT)
作者: Goyal, Rajeev Goyal, Samta Jain Amity Univ Gwalior Madhya Pradesh India
Content-based routing, which is under a category of sophisticated routing protocol, is used to propose a routing protocol that can replace Internet protocol. Content-based routing is used to querying, fetching, and fi... 详细信息
来源: 评论