咨询与建议

限定检索结果

文献类型

  • 10,428 篇 会议
  • 37 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 10,483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,600 篇 工学
    • 5,342 篇 计算机科学与技术...
    • 4,297 篇 软件工程
    • 2,795 篇 信息与通信工程
    • 1,206 篇 控制科学与工程
    • 1,005 篇 电气工程
    • 872 篇 电子科学与技术(可...
    • 666 篇 机械工程
    • 647 篇 生物工程
    • 600 篇 生物医学工程(可授...
    • 561 篇 仪器科学与技术
    • 498 篇 动力工程及工程热...
    • 420 篇 网络空间安全
    • 363 篇 光学工程
    • 338 篇 安全科学与工程
    • 325 篇 交通运输工程
    • 311 篇 化学工程与技术
  • 2,730 篇 理学
    • 1,356 篇 数学
    • 706 篇 生物学
    • 646 篇 物理学
    • 493 篇 统计学(可授理学、...
    • 298 篇 系统科学
    • 289 篇 化学
  • 2,083 篇 管理学
    • 1,399 篇 管理科学与工程(可...
    • 872 篇 图书情报与档案管...
    • 625 篇 工商管理
  • 543 篇 医学
    • 480 篇 临床医学
    • 451 篇 基础医学(可授医学...
    • 274 篇 药学(可授医学、理...
  • 335 篇 法学
    • 259 篇 社会学
  • 329 篇 经济学
    • 325 篇 应用经济学
  • 239 篇 农学
  • 134 篇 教育学
  • 68 篇 文学
  • 67 篇 军事学
  • 47 篇 艺术学
  • 4 篇 历史学
  • 1 篇 哲学

主题

  • 319 篇 internet of thin...
  • 239 篇 data mining
  • 202 篇 wireless sensor ...
  • 201 篇 big data
  • 189 篇 deep learning
  • 189 篇 wireless communi...
  • 188 篇 accuracy
  • 174 篇 feature extracti...
  • 169 篇 real-time system...
  • 165 篇 machine learning
  • 147 篇 support vector m...
  • 142 篇 monitoring
  • 110 篇 training
  • 103 篇 predictive model...
  • 100 篇 security
  • 98 篇 computational mo...
  • 92 篇 cloud computing
  • 92 篇 data models
  • 91 篇 authentication
  • 90 篇 protocols

机构

  • 75 篇 chitkara univers...
  • 62 篇 the islamic univ...
  • 44 篇 chitkara centre ...
  • 42 篇 centre of resear...
  • 29 篇 the islamic univ...
  • 28 篇 griet bachupally...
  • 27 篇 school of transp...
  • 27 篇 department of co...
  • 23 篇 gla university d...
  • 20 篇 the university o...
  • 20 篇 department of bi...
  • 20 篇 al-farahidi univ...
  • 19 篇 uruk university ...
  • 19 篇 jaipur national ...
  • 19 篇 school of electr...
  • 18 篇 mazaya universit...
  • 18 篇 sri venkateshwar...
  • 18 篇 graphic era deem...
  • 17 篇 school of inform...
  • 17 篇 department of el...

作者

  • 19 篇 shivashankar
  • 16 篇 wang wei
  • 12 篇 srinivasan c.
  • 12 篇 yang yang
  • 12 篇 patil harshal
  • 11 篇 gill kanwarparta...
  • 11 篇 murugan s.
  • 10 篇 zhang yan
  • 10 篇 alabdeli haider
  • 10 篇 zhao li
  • 9 篇 li li
  • 9 篇 kavitha m.
  • 9 篇 aziz sumair
  • 9 篇 biqing li
  • 9 篇 li bo
  • 9 篇 chhabra gunjan
  • 9 篇 al-jawahry hassa...
  • 8 篇 pareek piyush ku...
  • 8 篇 liu yang
  • 8 篇 liu xin

语言

  • 9,753 篇 英文
  • 616 篇 其他
  • 128 篇 中文
检索条件"任意字段=2nd International Conference on Data Engineering and Communication Technology, ICDECT 2017"
10483 条 记 录,以下是51-60 订阅
排序:
Conceptualization of a Cardiac Monitoring System via Bluetooth communication Protocol to Mobile Devices  2
Conceptualization of a Cardiac Monitoring System via Bluetoo...
收藏 引用
2nd international conference on Intelligent data communication Technologies and Internet of Things, IDCIoT 2024
作者: Karuppiah, Santhi Anuradha, T. Sivachandar, K. Thyla, B. Dhivya, D. Jose Anand, A. Vel Tech High Tech Dr. Rangarajan Department of Computer Science and Engineering Dr Sakunthala Engineering College AvadiTamil Nadu Chennai India KCG College of Technology Department of Electrical and Electronics Engineering Karapakkam Tamil Nadu Chennai600097 India RMK College of Engineering and Technology Department of Electronics and Communication Engineering Puduvoyal Tamilnadu Thiruvallur601206 India KCG College of Technology Department of Electronics and Communication Engineering Karapakkam Chennai600097 India Veltechmultech Dr Rangarajan Dr Sakunthala Engineering College Department of AIDS Avadi Tamil Nadu Chennai600062 India
The widespread use of mobile devices around the world ends up making the subject interesting for the development of new research in the most diverse areas. One of them is medicine, in which eHealth can be mentioned, w... 详细信息
来源: 评论
Password-Based Authenticated Key Exchange for Cloud Storage from RLWE  24
Password-Based Authenticated Key Exchange for Cloud Storage ...
收藏 引用
2nd international conference on Electronics, Computers and communication technology, CECCT 2024
作者: Xie, Gang Xu, Chunxiang Jiang, Changsong Han, Yu Dong, Xinfeng School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu China University of Electronic Science and Technology of China Huzhou China School of Computer Science and Engineering and Technology of China University of Electronic Science and Technology of China Sichuan Chengdu China China and National Key Laboratory of Security Communication Sichuan Chengdu China
Cloud storage enables users to store, retrieve, and share large amounts of data in a flexible and convenient way. To guarantee only authorized users can access the data, authenticated key exchange is a feasible soluti... 详细信息
来源: 评论
GANs for Synthetic Environmental data Generation (Air Quality) for Low-Resource Regions  2
GANs for Synthetic Environmental Data Generation (Air Qualit...
收藏 引用
2nd international conference on Advances in Computation, communication and Information technology, ICAICCIT 2024
作者: Verma, Seema Jain, Neha Mahapatra, Madhumita Setia, Sonia Sachdeva, Vrinda Kumar, Manoj Dept. of Computer Science & Engineering Delhi Technical campus Uttar Pradesh Greater Noida India Dept. of Computer Science & Engineering Sharda University Uttar Pradesh Greater Noida India Dept. of Computer Science & Engineering G.L Bajaj Institute of Technology and Management Uttar Pradesh Greater Noida India Uttar Pradesh Ghaziabad India
Due to the significant expenses and logistical difficulties involved in deploying monitoring equipment, many areas, especially those in developing nations, lack adequate environmental data. This work presents a novel ... 详细信息
来源: 评论
Federated Learning for Cybersecurity: A Promising Frontier  2
Federated Learning for Cybersecurity: A Promising Frontier
收藏 引用
2nd IEEE international conference on IoT, communication and Automation technology, ICICAT 2024
作者: Ananya, G. Bindu Madhavi, V. Murthy, Monisha Guruprasad, N. Global Academy of Technology Dept. of Computer Science and Engineering Karnataka Bengaluru India Buddha Institute of Technology Computer Science and Engineering Uttar Pradesh Gorakhpur India
In today's world, Artificial Intelligence and Machine Learning are transforming many industries, but they rely on huge amounts of data leading to privacy issues. A better alternative is Federated learning. Federat... 详细信息
来源: 评论
Transparent AI Solutions for Parkinson's Disease Diagnosis and Monitoring: A Multimodal Deep Learning Approach  2
Transparent AI Solutions for Parkinson's Disease Diagnosis a...
收藏 引用
2nd international conference on Computational Intelligence, communication technology and Networking, CICTN 2025
作者: Praveena, S.G. Hussaian Basha, C.H. Senthilkumar, S. Muthaiyan, R. Dinesh, E. Senthilkumar, S. Kavitha, M. Department of Electronics and Communication Engineering E.G.S. Pillay Engineering College Tamil Nadu Nagapattinam611002 India Department of Electrical and Electronics Engineering SR University Telangana Hanumakonda506371 India Department of Electronics and Communication Engineering University College of Engineering Tamil Nadu Thirukkuvalai610204 India Department of Electronics and Communication Engineering M. Kumarasamy College of Engineering Tamil Nadu Karur639113 India Dhaanish Ahamed Institute of Technology Tamil Nadu Coimbatore641105 India
Parkinson's disease (PD) diagnosis remains challenging due to the variability in motor and non-motor symptoms. While deep learning (DL) models show promise in improving diagnostic accuracy, their "black box&q... 详细信息
来源: 评论
Signal Processing Techniques for Enhanced Wireless Network Performance  2
Signal Processing Techniques for Enhanced Wireless Network P...
收藏 引用
2nd international conference on Advances in Computation, communication and Information technology, ICAICCIT 2024
作者: Nirmala, G. Haripriya, M.P. Shaik, Mohammed Rizwan Vijayalakshmi, S. Martis, Jason Elroy Babu, M. Dinesh Department of Computer Science and Engineering R.M.D. Engineering College Chennai India Karnataka Bengaluru India Department of Electrical & Electronics Engineering College of Engineering& Computer Science Jazan University Jazan Saudi Arabia Department of ECE R.M.K. Engineering College Chennai India Department of ISE NMAM Institute of Technology Nitte Deemed to be University Karnataka Mangaluru India Department of Mechanical Engineering Rajalakshmi Institute of Technology Chennai India
With increasing complexity and data rates of wireless communication networks, an effective signal processing technique is significantly required. Memoryless predistortion techniques undoubtedly help to minimise nonlin... 详细信息
来源: 评论
Predictive Model for Student Career Success Using Blockchain technology and Machine learning  2
Predictive Model for Student Career Success Using Blockchain...
收藏 引用
2nd international conference on Computational Intelligence, communication technology and Networking, CICTN 2025
作者: Aggarwal, Mansi Vyas, Vaibhav Department of Computer Science Banasthali Vidyapith Rajasthan India Department of Computer Science and Engineering- AIML ABES Engineering College UP Ghaziabad India
Using blockchain for student career prediction offers key benefits, including enhanced data security and privacy through encryption and immutability, ensuring personal information protection. It provides transparency ... 详细信息
来源: 评论
Rule and Encryption based Secure Routing for Internet of Vehicle Networks  2
Rule and Encryption based Secure Routing for Internet of Veh...
收藏 引用
2nd IEEE international conference on Networking and communications, ICNWC 2024
作者: Anand, M. Muthurajkumar, S. Selvi, M. Thangaramya, K. Svn, Santhosh Kumar Kannan, A. Anna University Madras Institute of Technolog Department of Computer Technology Chennai India Vellore Institute of Technology School of Computer Science and Engineering Vellore India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
The Internet of Vehicles (IoV) has become one challenging communication technology in the current internet world. IoV enables real-time data exchange between vehicles, road infrastructures, and mobile communication de... 详细信息
来源: 评论
Performance Comparison of Object Detection Neural Network Models Based on Accuracy and Latency  2
Performance Comparison of Object Detection Neural Network Mo...
收藏 引用
2nd international conference on Intelligent data communication Technologies and Internet of Things, IDCIoT 2024
作者: Gomathy, B. Sengottaiyan, N. Aarthi, K. Thirumoorthy, P. Tamizharasu, K. Kalyanasundaram, P. Dr.NGP Institute of Technology Dept of Computer Science and Business Systems Tamilnadu Coimbatore India Alliance College of Engineering and Design Alliance University Faculty of Science and Technology Karnataka Anekal562106 India Kongu Engineering College Department of ECE Erode Tamilnadu Perundurai638 060 India Nandha Engineering College Department of CSE Erode Perundurai638 052 India KSR Institute for Engineering and Technology Tiruchengode Department of CSE 637215 India
Aim: The purpose of this study is to compare the object detection performance of You Only Look Once V4 (YOLOv4) and Single Shot Multibox Detector (SSD) algorithms with respect to metrics like accuracy and latency. Mat... 详细信息
来源: 评论
Detecting Anomalies in IoT Sensor data with Robust Principal Component Analysis (RPCA)  2
Detecting Anomalies in IoT Sensor Data with Robust Principal...
收藏 引用
2nd IEEE international conference on IoT, communication and Automation technology, ICICAT 2024
作者: Sharma, Kamal Sravanthi, Jajimoggala Chinna Maddileti, B.K. Sivakami, S. Alzubaidi, Laith H. Mary Reeja, Y. GLA University Department of Mechanical Engineering Mathura India GRIET Bachupally Department of CSE Telangana Hyderabad India CMR College of Engineering & Technology Department of CSE India New Prince Shri Bhavani College of Engineering and Technology Department of ECE Tamil Nadu Chennai600073 India College of Technical Engineering Department of Computers Techniques Engineering The Islamic University Najaf Iraq Electronics and Communication Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India
This work studies the use of RPCA in IoT sensor data for anomaly detection. However, due to the fact that IoT data is complex, high-dimensional, noisy, and frequently has a dynamic pattern, it is hard to employ regula... 详细信息
来源: 评论