咨询与建议

限定检索结果

文献类型

  • 10,428 篇 会议
  • 37 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 10,483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,600 篇 工学
    • 5,342 篇 计算机科学与技术...
    • 4,297 篇 软件工程
    • 2,795 篇 信息与通信工程
    • 1,206 篇 控制科学与工程
    • 1,005 篇 电气工程
    • 872 篇 电子科学与技术(可...
    • 666 篇 机械工程
    • 647 篇 生物工程
    • 600 篇 生物医学工程(可授...
    • 561 篇 仪器科学与技术
    • 498 篇 动力工程及工程热...
    • 420 篇 网络空间安全
    • 363 篇 光学工程
    • 338 篇 安全科学与工程
    • 325 篇 交通运输工程
    • 311 篇 化学工程与技术
  • 2,730 篇 理学
    • 1,356 篇 数学
    • 706 篇 生物学
    • 646 篇 物理学
    • 493 篇 统计学(可授理学、...
    • 298 篇 系统科学
    • 289 篇 化学
  • 2,083 篇 管理学
    • 1,399 篇 管理科学与工程(可...
    • 872 篇 图书情报与档案管...
    • 625 篇 工商管理
  • 543 篇 医学
    • 480 篇 临床医学
    • 451 篇 基础医学(可授医学...
    • 274 篇 药学(可授医学、理...
  • 335 篇 法学
    • 259 篇 社会学
  • 329 篇 经济学
    • 325 篇 应用经济学
  • 239 篇 农学
  • 134 篇 教育学
  • 68 篇 文学
  • 67 篇 军事学
  • 47 篇 艺术学
  • 4 篇 历史学
  • 1 篇 哲学

主题

  • 319 篇 internet of thin...
  • 239 篇 data mining
  • 202 篇 wireless sensor ...
  • 201 篇 big data
  • 189 篇 deep learning
  • 189 篇 wireless communi...
  • 188 篇 accuracy
  • 174 篇 feature extracti...
  • 169 篇 real-time system...
  • 165 篇 machine learning
  • 147 篇 support vector m...
  • 142 篇 monitoring
  • 110 篇 training
  • 103 篇 predictive model...
  • 100 篇 security
  • 98 篇 computational mo...
  • 92 篇 cloud computing
  • 92 篇 data models
  • 91 篇 authentication
  • 90 篇 protocols

机构

  • 75 篇 chitkara univers...
  • 62 篇 the islamic univ...
  • 44 篇 chitkara centre ...
  • 42 篇 centre of resear...
  • 29 篇 the islamic univ...
  • 28 篇 griet bachupally...
  • 27 篇 school of transp...
  • 27 篇 department of co...
  • 23 篇 gla university d...
  • 20 篇 the university o...
  • 20 篇 department of bi...
  • 20 篇 al-farahidi univ...
  • 19 篇 uruk university ...
  • 19 篇 jaipur national ...
  • 19 篇 school of electr...
  • 18 篇 mazaya universit...
  • 18 篇 sri venkateshwar...
  • 18 篇 graphic era deem...
  • 17 篇 school of inform...
  • 17 篇 department of el...

作者

  • 19 篇 shivashankar
  • 16 篇 wang wei
  • 12 篇 srinivasan c.
  • 12 篇 yang yang
  • 12 篇 patil harshal
  • 11 篇 gill kanwarparta...
  • 11 篇 murugan s.
  • 10 篇 zhang yan
  • 10 篇 alabdeli haider
  • 10 篇 zhao li
  • 9 篇 li li
  • 9 篇 kavitha m.
  • 9 篇 aziz sumair
  • 9 篇 biqing li
  • 9 篇 li bo
  • 9 篇 chhabra gunjan
  • 9 篇 al-jawahry hassa...
  • 8 篇 pareek piyush ku...
  • 8 篇 liu yang
  • 8 篇 liu xin

语言

  • 9,753 篇 英文
  • 616 篇 其他
  • 128 篇 中文
检索条件"任意字段=2nd International Conference on Data Engineering and Communication Technology, ICDECT 2017"
10483 条 记 录,以下是61-70 订阅
排序:
Development of a Grid-Connected Microinverter Based on the Integration of the CUK Converter with a Switchgear Structure  2
Development of a Grid-Connected Microinverter Based on the I...
收藏 引用
2nd international conference on Intelligent data communication Technologies and Internet of Things, IDCIoT 2024
作者: Subhamathi, A.S.F. Anuradha, T. Suganya, A.V. Shanthi, K. Umamaheswari, P. Jose Anand, A. Department of Electrical and Electronics Engineering Karpagam Academy of Higher Education Tamilnadu Coimbatore641021 Department of Electrical and Electronics Engineering KCG College of Technology Tamil Nadu Chennai600097 India Department of Electrical and Electronics Engineering Sri Muthukumaran Institute of Technology Kanchipuram Chennai600069 Department of Computer Science and Business Systems Veltechmultech Dr Rangarajan Dr Sakunthala Engineering College Tamil Nadu Chennai600062 India Department of Electronics and Communication Engineering KCG College of Technology Karapakkam Chennai600 097
The main focus of this research work is on designing the dimensions of the proposed DC-DC and DC-AC converters. Since it is an unprecedented DC-DC converter, it is important to enable the DC-DC converter to enable sim... 详细信息
来源: 评论
data Security in communication using Blockchain and Key Based Protocols  2
Data Security in Communication using Blockchain and Key Base...
收藏 引用
2nd IEEE international conference on IoT, communication and Automation technology, ICICAT 2024
作者: Prabakaran, S. Harinivaash, K. Prasad, R. Kaviyan, J. Rabin, D. V.S.B. Engineering College Department of Computer Science and Engineering Karur India
The development of global communication networks depends on satellite communication. Due to its lower stability and reach, satellite communication networks have garnered a lot of attention recently as a means of reduc... 详细信息
来源: 评论
A Secure Encryption Method for Computer Network communication data based on Improved Ant Colony Optimization Algorithm  2
A Secure Encryption Method for Computer Network Communicatio...
收藏 引用
2nd IEEE international conference on Integrated Intelligence and communication Systems, ICIICS 2024
作者: Xiao, Dongsheng Department of Network Technology Software Engineering Institute of Guangzhou Guangdong Guangzhou China
At present, ant colony algorithm is widely used in computer network communication data security encryption methods, but traditional ant colony algorithm is limited by update mechanism and heuristic function, resulting... 详细信息
来源: 评论
Smart Trap Detecting the Whitefly Pest using Deep Neural Networks  2
Smart Trap Detecting the Whitefly Pest using Deep Neural Net...
收藏 引用
2nd international conference on Intelligent data communication Technologies and Internet of Things, IDCIoT 2024
作者: Deepika, Manenalli Kavitha, P. Zareen, Afshan Parikh, Swapnil Patil, Harshal Natravan, L. Potti Sreeramulu Chalavadhi Mallikarjuna Rao College of Engineering and Technology Department of Computer Science and Engineering Andhra Pradesh Vijayawada520012 India CMR Institute of Technology Department of Computer Science and Engineering Karnataka Bengaluru560037 India BGS Institute of Technology Department of Computer Science and Engineering Karnataka 571418 India Parul Institute of Engineering and Technology Department of Computer Science and Engineering Parul University Gujarat 391760 India Maharashtra Pune412115 India Saveetha School of Engineering Department of Mechanical Engrineering SIMATS Tamil Nadu Chennai602105 India
This study analyzes the suitability of using convolutional neural network designs for detecting the whitefly pest in different agricultural contexts. The goal of this research work is to develop a smart trap suitable ... 详细信息
来源: 评论
Reducing the communication Overhead in Novel data Sharing Algorithm in Cloud data Storage over Triple data Encryption Standard Algorithm  2
Reducing the Communication Overhead in Novel Data Sharing Al...
收藏 引用
2nd IEEE international conference on Advances in Information technology, ICAIT 2024
作者: Kalyani, Kanaparthi Thangaraj, S. John Justin Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Tamil Nadu Chennai India
While storing data in the cloud using the Triple data Encryption Standard Algorithm, we can cut down on communication overhead by using the Novel data Sharing *** order to test the algorithms, we import the data and t... 详细信息
来源: 评论
Energy-efficient edge based intrusion detection system using machine learning  2
Energy-efficient edge based intrusion detection system using...
收藏 引用
2nd international conference on Computational Intelligence, communication technology and Networking, CICTN 2025
作者: Sonker, Sanjay Kumar Kumar, Ashish Kumar, Manoj Kamini Agrawal, Prem Prakash Devi, Poonam Dept. CSA School of Engineering and Technology Sharda University Greater Noida India Dept. CSE School of Engineering and Technology Sharda University Greater Noida India Dept. CSE Government Girls Polytechnic Tilhar Shahjahanpur India
Edge based computing's primary goal is to enhance network performance by storing and processing data in proximity to the end user. However, the rapid development of edge computing often overlooks security risks in... 详细信息
来源: 评论
Adaptable Machine Learning Methods for a Twitter Followee Recommendation System  2
Adaptable Machine Learning Methods for a Twitter Followee Re...
收藏 引用
2nd IEEE international conference on IoT, communication and Automation technology, ICICAT 2024
作者: Yadav, Sandeep Srivastav, Shashank Buddha Institute of Technology Computer Science and Engineering Department Gorakhpur India
Recommender systems for social networking have recently used machine learning (ML) methods. This paper describes a multi-agent system that simulates a Twitter recommender system to give users a list of helpful suggest... 详细信息
来源: 评论
Implementation of Artificial Intelligence in Medical Electronic communication technology  2
Implementation of Artificial Intelligence in Medical Electro...
收藏 引用
2nd international conference Computational and Characterization Techniques in engineering and Sciences, IC3TES 2024
作者: Sravanthi, Gurram Kumar, Chinthapula Vinay Sampoorna, Bandi Lavanya, Ryakam Kumari, Mulakala Sirin Imtyaz Ahmed, Mohammed Cmr Technical Campus Department of Ece Hyderabad India Telangana Hyderabad India Cmr College of Engineering & Technology Department of Ece Telangana Hyderabad India Technical Test Lead Infosys Department of Ece Canada Technical Test Lead Infosys Department of Ece India
Artificial intelligence techniques in communications engineering to address the issue of high frame error rate is suggested in this research. An attempt to improve the safety of the Internet of Things' wireless co... 详细信息
来源: 评论
Enhanced Security Measures for Image Privacy: Encryption Perspectives  2
Enhanced Security Measures for Image Privacy: Encryption Per...
收藏 引用
2nd international conference on Intelligent data communication Technologies and Internet of Things, IDCIoT 2024
作者: Omshith, R. Balaji, Vemisetti Pavan Rahul, Rayapudi Venkata Kumaran, U. Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
A key technology in information security, picture encryption is intended to safeguard the integrity and confidentiality of digital photographs. Using a variety of cryptographic techniques and algorithms, the original ... 详细信息
来源: 评论
IoT Based Speed Control and Accident Avoidance Using Black Box  2
IoT Based Speed Control and Accident Avoidance Using Black B...
收藏 引用
2nd IEEE international conference on IoT, communication and Automation technology, ICICAT 2024
作者: Suganya, R. Sindhu, K. Varshini, V. Nidharshana, B. Siva Prabha, S. V.S.B. Engineering College Department of Computer Science and Engineering Karur India
The system employs various sensors and advanced algorithms to lessen traffic hazards. Onboard sensors like GPS, accelerometers, gyroscopes, and proximity sensors track vehicle data in real-time. This data is analyzed ... 详细信息
来源: 评论