咨询与建议

限定检索结果

文献类型

  • 10,428 篇 会议
  • 37 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 10,483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,600 篇 工学
    • 5,342 篇 计算机科学与技术...
    • 4,297 篇 软件工程
    • 2,795 篇 信息与通信工程
    • 1,206 篇 控制科学与工程
    • 1,005 篇 电气工程
    • 872 篇 电子科学与技术(可...
    • 666 篇 机械工程
    • 647 篇 生物工程
    • 600 篇 生物医学工程(可授...
    • 561 篇 仪器科学与技术
    • 498 篇 动力工程及工程热...
    • 420 篇 网络空间安全
    • 363 篇 光学工程
    • 338 篇 安全科学与工程
    • 325 篇 交通运输工程
    • 311 篇 化学工程与技术
  • 2,730 篇 理学
    • 1,356 篇 数学
    • 706 篇 生物学
    • 646 篇 物理学
    • 493 篇 统计学(可授理学、...
    • 298 篇 系统科学
    • 289 篇 化学
  • 2,083 篇 管理学
    • 1,399 篇 管理科学与工程(可...
    • 872 篇 图书情报与档案管...
    • 625 篇 工商管理
  • 543 篇 医学
    • 480 篇 临床医学
    • 451 篇 基础医学(可授医学...
    • 274 篇 药学(可授医学、理...
  • 335 篇 法学
    • 259 篇 社会学
  • 329 篇 经济学
    • 325 篇 应用经济学
  • 239 篇 农学
  • 134 篇 教育学
  • 68 篇 文学
  • 67 篇 军事学
  • 47 篇 艺术学
  • 4 篇 历史学
  • 1 篇 哲学

主题

  • 319 篇 internet of thin...
  • 239 篇 data mining
  • 202 篇 wireless sensor ...
  • 201 篇 big data
  • 189 篇 deep learning
  • 189 篇 wireless communi...
  • 188 篇 accuracy
  • 174 篇 feature extracti...
  • 169 篇 real-time system...
  • 165 篇 machine learning
  • 147 篇 support vector m...
  • 142 篇 monitoring
  • 110 篇 training
  • 103 篇 predictive model...
  • 100 篇 security
  • 98 篇 computational mo...
  • 92 篇 cloud computing
  • 92 篇 data models
  • 91 篇 authentication
  • 90 篇 protocols

机构

  • 75 篇 chitkara univers...
  • 62 篇 the islamic univ...
  • 44 篇 chitkara centre ...
  • 42 篇 centre of resear...
  • 29 篇 the islamic univ...
  • 28 篇 griet bachupally...
  • 27 篇 school of transp...
  • 27 篇 department of co...
  • 23 篇 gla university d...
  • 20 篇 the university o...
  • 20 篇 department of bi...
  • 20 篇 al-farahidi univ...
  • 19 篇 uruk university ...
  • 19 篇 jaipur national ...
  • 19 篇 school of electr...
  • 18 篇 mazaya universit...
  • 18 篇 sri venkateshwar...
  • 18 篇 graphic era deem...
  • 17 篇 school of inform...
  • 17 篇 department of el...

作者

  • 19 篇 shivashankar
  • 16 篇 wang wei
  • 12 篇 srinivasan c.
  • 12 篇 yang yang
  • 12 篇 patil harshal
  • 11 篇 gill kanwarparta...
  • 11 篇 murugan s.
  • 10 篇 zhang yan
  • 10 篇 alabdeli haider
  • 10 篇 zhao li
  • 9 篇 li li
  • 9 篇 kavitha m.
  • 9 篇 aziz sumair
  • 9 篇 biqing li
  • 9 篇 li bo
  • 9 篇 chhabra gunjan
  • 9 篇 al-jawahry hassa...
  • 8 篇 pareek piyush ku...
  • 8 篇 liu yang
  • 8 篇 liu xin

语言

  • 9,753 篇 英文
  • 616 篇 其他
  • 128 篇 中文
检索条件"任意字段=2nd International Conference on Data Engineering and Communication Technology, ICDECT 2017"
10483 条 记 录,以下是11-20 订阅
排序:
Enhancement of data Security using Edge-Preserving Image Interpolation for Reversible data Hiding  2
Enhancement of Data Security using Edge-Preserving Image Int...
收藏 引用
2nd IEEE international conference on IoT, communication and Automation technology, ICICAT 2024
作者: Pandey, Supriya Pandey, Shrawan Kumar Tripathi, Abhinandan Buddha Institute of Technology Department of Computer Science & Engineering Gorakhpur India
The proliferation of online data, video, and audio transfer over the internet has made Reversible data Hiding (RDH) a significant area of research. However, embedding data into an image can be challenging as it can ca... 详细信息
来源: 评论
Crafting a Machine Learning Model for Discerning Synthetic and Authentic Images  2
Crafting a Machine Learning Model for Discerning Synthetic a...
收藏 引用
2nd international conference on Advances in Computation, communication and Information technology, ICAICCIT 2024
作者: Shah, Misha Jaiswal, Gautam Sharma, Dolly Amity School of Engineering and Technology Amity University Noida India Department of Computer Science and Engineering Amity University Noida India
This paper shows the development of a Convolutional Neural Network (CNN) model with an attention mechanism and data augmentation for discerning synthetic and authentic images. Given the increase in AI-generated conten... 详细信息
来源: 评论
Optimised data Encryption and Search Efficiency Framework Using Memory Modules for IoT Applications  2
Optimised Data Encryption and Search Efficiency Framework Us...
收藏 引用
2nd international conference on Computational Intelligence, communication technology and Networking, CICTN 2025
作者: Gakhar, Suket Kulkarni, Soham Sunil Kumar, Anant Sharma, Vipin Kumar Arora, Sneha Department of Computer Science and Engineering Kurukshetra University Kurukshetra India Department of Computer Science University of California Irvine Irvine United States Department of Computer Science and Engineering Manipal Institute of Technology Manipal India Department of Electronics and Communication Engineering Lovely Professional University Phagwara India
The proliferation of IoT devices necessitates secure and efficient mechanisms for data encryption and retrieval. This paper presents an optimized framework that leverages AES encryption integrated with memory modules ... 详细信息
来源: 评论
A Weight based Approach for Optimization in Cloud Computing  2
A Weight based Approach for Optimization in Cloud Computing
收藏 引用
2nd international conference on Intelligent data communication Technologies and Internet of Things, IDCIoT 2024
作者: Sudalaimuthu, T. Hindustan Institute of Technology and Science Department of Computer Science and Engineering Chennai India
Optimization plays a vital role in cloud computing. The process of optimization can be effectively implemented using replica replacement and scheduling policy. The major challenge in virtualization is equal sharing of... 详细信息
来源: 评论
Challenges Approaches and Methodologies in data Integration : A Review  2
Challenges Approaches and Methodologies in Data Integration ...
收藏 引用
2nd IEEE international conference on IoT, communication and Automation technology, ICICAT 2024
作者: Badrinath, Priya Deepak, G. PES University Department of CSE Bangalore560085 India Dayanandasagar College of Engineering Department of CSE India
As the rise in the usage of the internet, the amount of data created and consumed is also increasing. These data are represented in many ways and are found hard to integrate. The data can be a structured, or an unstru... 详细信息
来源: 评论
High Degree Dependency Study of Ensemble Models in Credit Card Fraud Analysis  2
High Degree Dependency Study of Ensemble Models in Credit Ca...
收藏 引用
2nd international conference on Computational Intelligence, communication technology and Networking, CICTN 2025
作者: Rani, Shalini Tiwari, Mayank Tyagi, Shiva Department of Computer Science and Engineering Ajay Kumar Garg Engineering College Ghaziabad India
Credit card fraud detection is an increasingly critical issue due to the growth of digital transactions and the sophistication of fraudulent activities. This study proposes a hybrid framework combining Graph Neural Ne... 详细信息
来源: 评论
A Contemporary Review of Interpolation-based Reversible data Hiding  2
A Contemporary Review of Interpolation-based Reversible Data...
收藏 引用
2nd IEEE international conference on IoT, communication and Automation technology, ICICAT 2024
作者: Pandey, Supriya Pandey, Shrawan Kumar Tripathi, Abhinandan Buddha Institute of Technology Department of Computer Science & Engineering Gorakhpur India
Reversible data hiding (RDH) has become a critical topic in modern information security, as it allows for secure communication by embedding secret data into a cover medium. Importantly, RDH also ensures that the hidde... 详细信息
来源: 评论
Smart Farm Management Using Machine Learning  2
Smart Farm Management Using Machine Learning
收藏 引用
2nd IEEE international conference on IoT, communication and Automation technology, ICICAT 2024
作者: Prabakaran, S. Dharun, T. Gowsik, H. Anu Prakash, K. Kirubakaran, K. V.S.B. Engineering College Department of Computer Science and Engineering India
This article describes the integration of machine learning (ML) with smart agriculture management to improve agriculture through data-driven insights and automation. Machine learning algorithms analyze data from a var... 详细信息
来源: 评论
Artificial Intelligence Enabled Cognitive Computing for AlN/β-Ga2O3 HEMT  2
Artificial Intelligence Enabled Cognitive Computing for AlN/...
收藏 引用
2nd international conference on Computational Intelligence, communication technology and Networking, CICTN 2025
作者: Verma, Yogesh Kumar Bhatia, Kamal Khushboo Bhanot, Aastha Roy, Trijeeta Sinha, Supriya Laksh School of Electronics and Electrical Engineering Lovely Professional University Jalandhar India School of Computer Science and Engineering Lovely Professional University Jalandhar India
HEMT devices have potential to handle the fast processing in applications such as real-time diagnostics utilizing the artificial-intelligence (AI) enhanced abilities. Along-with this HEMT devices can be extensively us... 详细信息
来源: 评论
Implementation of Temperature and Moisture Controller in Poultry Using IoT  2
Implementation of Temperature and Moisture Controller in Pou...
收藏 引用
2nd international conference on Intelligent data communication Technologies and Internet of Things, IDCIoT 2024
作者: Lizzy Nesa Bagyam, M. Jegan, S. Rajasekar, S. Vembu, T. Vishwabarathi, S. Kongu Engineering College Electronics and Instrumentation Engineering Erode India
In modern poultry farming, the integration of IoT technology addresses the critical factor of temperature and moisture control for optimal bird growth and health. Sensors strategically placed in poultry houses collect... 详细信息
来源: 评论