咨询与建议

限定检索结果

文献类型

  • 10,428 篇 会议
  • 37 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 10,483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,600 篇 工学
    • 5,342 篇 计算机科学与技术...
    • 4,297 篇 软件工程
    • 2,795 篇 信息与通信工程
    • 1,206 篇 控制科学与工程
    • 1,005 篇 电气工程
    • 872 篇 电子科学与技术(可...
    • 666 篇 机械工程
    • 647 篇 生物工程
    • 600 篇 生物医学工程(可授...
    • 561 篇 仪器科学与技术
    • 498 篇 动力工程及工程热...
    • 420 篇 网络空间安全
    • 363 篇 光学工程
    • 338 篇 安全科学与工程
    • 325 篇 交通运输工程
    • 311 篇 化学工程与技术
  • 2,730 篇 理学
    • 1,356 篇 数学
    • 706 篇 生物学
    • 646 篇 物理学
    • 493 篇 统计学(可授理学、...
    • 298 篇 系统科学
    • 289 篇 化学
  • 2,083 篇 管理学
    • 1,399 篇 管理科学与工程(可...
    • 872 篇 图书情报与档案管...
    • 625 篇 工商管理
  • 543 篇 医学
    • 480 篇 临床医学
    • 451 篇 基础医学(可授医学...
    • 274 篇 药学(可授医学、理...
  • 335 篇 法学
    • 259 篇 社会学
  • 329 篇 经济学
    • 325 篇 应用经济学
  • 239 篇 农学
  • 134 篇 教育学
  • 68 篇 文学
  • 67 篇 军事学
  • 47 篇 艺术学
  • 4 篇 历史学
  • 1 篇 哲学

主题

  • 319 篇 internet of thin...
  • 239 篇 data mining
  • 202 篇 wireless sensor ...
  • 201 篇 big data
  • 189 篇 deep learning
  • 189 篇 wireless communi...
  • 188 篇 accuracy
  • 174 篇 feature extracti...
  • 169 篇 real-time system...
  • 165 篇 machine learning
  • 147 篇 support vector m...
  • 142 篇 monitoring
  • 110 篇 training
  • 103 篇 predictive model...
  • 100 篇 security
  • 98 篇 computational mo...
  • 92 篇 cloud computing
  • 92 篇 data models
  • 91 篇 authentication
  • 90 篇 protocols

机构

  • 75 篇 chitkara univers...
  • 62 篇 the islamic univ...
  • 44 篇 chitkara centre ...
  • 42 篇 centre of resear...
  • 29 篇 the islamic univ...
  • 28 篇 griet bachupally...
  • 27 篇 school of transp...
  • 27 篇 department of co...
  • 23 篇 gla university d...
  • 20 篇 the university o...
  • 20 篇 department of bi...
  • 20 篇 al-farahidi univ...
  • 19 篇 uruk university ...
  • 19 篇 jaipur national ...
  • 19 篇 school of electr...
  • 18 篇 mazaya universit...
  • 18 篇 sri venkateshwar...
  • 18 篇 graphic era deem...
  • 17 篇 school of inform...
  • 17 篇 department of el...

作者

  • 19 篇 shivashankar
  • 16 篇 wang wei
  • 12 篇 srinivasan c.
  • 12 篇 yang yang
  • 12 篇 patil harshal
  • 11 篇 gill kanwarparta...
  • 11 篇 murugan s.
  • 10 篇 zhang yan
  • 10 篇 alabdeli haider
  • 10 篇 zhao li
  • 9 篇 li li
  • 9 篇 kavitha m.
  • 9 篇 aziz sumair
  • 9 篇 biqing li
  • 9 篇 li bo
  • 9 篇 chhabra gunjan
  • 9 篇 al-jawahry hassa...
  • 8 篇 pareek piyush ku...
  • 8 篇 liu yang
  • 8 篇 liu xin

语言

  • 9,753 篇 英文
  • 616 篇 其他
  • 128 篇 中文
检索条件"任意字段=2nd International Conference on Data Engineering and Communication Technology, ICDECT 2017"
10483 条 记 录,以下是4991-5000 订阅
排序:
Coded BPSK OFDM-FSO over strong turbulence channel  2
Coded BPSK OFDM-FSO over strong turbulence channel
收藏 引用
2nd international conference on Advances in Big data, Computing and data communication Systems, icABCD 2019
作者: Ajewole, Bukola D. Odeyemi, Kehinde O. Owolawi, Pius A. Srivastava, Viranjay M. Department of Electronics Engineering Howard College University of KwaZulu-Natal KwaZulu-Natal Durban South Africa Department of Electrical and Electronics Engineering University of Ibaadan Nigeria Department of Computer System Engineering Tshwane University of Technology Pretoria South Africa
Free space optical (FSO) communication has become a research area of interest in the domain of optical communication in recent years. However, atmospheric turbulence plays a significant role in degrading its performan... 详细信息
来源: 评论
Energy-Efficient Virtual Machines Dynamic Integration for Robotics  2nd
Energy-Efficient Virtual Machines Dynamic Integration for Ro...
收藏 引用
2nd EAI international conference on Robotic Sensor Networks, ROSENET 2018
作者: Wen, Haoyu Zhou, Sheng Wang, Zie Wang, Ranran Lu, Jianmin School of Information and Safety Engineering Zhongnan University of Economics and Law Wuhan China
The rapid development of cloud computing technology has brought a lot of energy consumption. However, the utilization rate of resources such as data center CPUs is often less than half. Therefore, if the virtual machi... 详细信息
来源: 评论
Effect of Dropout and Batch Normalization in Siamese Network for Face Recognition  2nd
Effect of Dropout and Batch Normalization in Siamese Network...
收藏 引用
2nd international conference on Innovative Computing and communication, ICICC 2019
作者: Chakraborty, Nilagnik Dan, Anirban Chakraborty, Amit Neogy, Sarmistha Department of Computer Science & Engineering Government College of Engineering & Ceramic Technology Kolkata India Department of Computer Science & Engineering Jadavpur University Kolkata India
The paper focuses on maximizing feature extraction and classification using one-shot learning (meta-learning). The present work discusses how to maximize the performance of the Siamese Neural Network using various reg... 详细信息
来源: 评论
Underwater acoustic target classification based on LOFAR spectrum and convolutional neural network  2020
Underwater acoustic target classification based on LOFAR spe...
收藏 引用
2nd international conference on Artificial Intelligence and Advanced Manufacture, AIAM 2020
作者: Yin, Xiaohan Sun, Xiaodong Liu, Peishun Wang, Liang Tang, Ruichun College of Information Science and Engineering Ocean University of China Qingdao China
The underwater acoustic target classification task has always been an important research direction of acoustic recognition and classification. The acoustic classification models include traditional models such as Gaus... 详细信息
来源: 评论
Big data techniques: Today and tomorrow  2nd
Big data techniques: Today and tomorrow
收藏 引用
2nd international conference on communication and Computing systems, ICCCS 2018
作者: Khatana, Priyanka Soni, Yashvardhan Department of Information Technology Dronacharya College of Engineering GurugramHaryana India Department of Computer Science Engineering Dronacharya College of Engineering. GurugramHaryana India
This paper is written before doing any practical work on the above topic. It is based on the research done on the topic-"Big data Techniques: Today and Tomorrow". Big data refers to a large dataset which is ... 详细信息
来源: 评论
Discussion on problems and solutions in hardware implementation of algorithms for a car-type autonomous vehicle  2nd
Discussion on problems and solutions in hardware implementat...
收藏 引用
2nd international conference on data engineering and communication technology, icdect 2017
作者: Walambe, Rahee Nikte, Shreyas Joshi, Vrunda Ambike, Abhishek Pitke, Nimish Ghole, Mukund Symbiosis Institute of Technology Pune India PVG’s College of Engineering and Technology Pune India
The self-driving cars will bring fundamental change in the transportation industry. Many hazardous situations like land-mine detection, war zones, nuclear decommissioning highlights the need of autonavigation in open ... 详细信息
来源: 评论
Research on Performance Optimization of Web Application System based on JAVA EE  2
Research on Performance Optimization of Web Application Syst...
收藏 引用
2019 2nd international Symposium on Big data and Applied Statistics, ISBDAS 2019
作者: Cai, Zengyu Li, Jingxiao Zhang, Jianwei School of Computer and Communication Engineering Zhengzhou University of Light Industry Henan Key Laboratory of Food Safety Data Intelligence Zhengzhou China Software Engineering College Zhengzhou University of Light Industry Henan Key Laboratory of Food Safety Data Intelligence Zhengzhou China
With the development of informatization, the Web application system is being used by more and more enterprises and institutions. With the increase of the user group, the concurrent visits are increasing, which leads t... 详细信息
来源: 评论
1D CNN based network intrusion detection with normalization on imbalanced data  2
1D CNN based network intrusion detection with normalization ...
收藏 引用
2nd international conference on Artificial Intelligence in Information and communication, ICAIIC 2020
作者: Azizjon, Meliboev Jumabek, Alikhanov Kim, Wooseong Gachon University Dept. of Computer Engineering SeongNam Korea Republic of Inha University Dept. of Computer and Information Engineering Incheon Korea Republic of
Intrusion detection system (IDS) plays an essential role in computer networks protecting computing resources and data from outside attacks. Recent IDS faces challenges improving flexibility and efficiency of the IDS f... 详细信息
来源: 评论
Sentence similarity estimation for text summarization using deep learning  2nd
Sentence similarity estimation for text summarization using ...
收藏 引用
2nd international conference on data engineering and communication technology, icdect 2017
作者: Abujar, Sheikh Hasan, Mahmudul Hossain, Syed Akhter Department of Computer Science and Engineering Daffodil International University Dhanomondi Dhaka1205 Bangladesh Department of Computer Science and Engineering Comilla University Comilla3506 Bangladesh
One of the key challenges of natural language processing (NLP) is to identify the meaning of any text. Text summarization is one of the most challenging applications in the field of NLP where appropriate analysis is n... 详细信息
来源: 评论
Big data and hadoop: A review  2nd
Big data and hadoop: A review
收藏 引用
2nd international conference on communication and Computing systems, ICCCS 2018
作者: Kaur, Maninder Goel, Megha Department of Information and Technology Dronacharya College of Engineering Gurgaon India Department of Computer Science and Engineering Dronacharya College of Engineering GurgaonHaryana India
This Now days information is increasing day by day thanks to the employment of social networking sites, advancement within the technology. The growing desires of knowledge is resolved by victimization massive informat... 详细信息
来源: 评论