咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 6 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 278 篇 工学
    • 255 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 77 篇 信息与通信工程
    • 29 篇 电气工程
    • 23 篇 控制科学与工程
    • 18 篇 生物工程
    • 14 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 8 篇 仪器科学与技术
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 建筑学
    • 5 篇 光学工程
  • 72 篇 理学
    • 34 篇 数学
    • 19 篇 生物学
    • 11 篇 系统科学
    • 10 篇 大气科学
    • 9 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 化学
  • 58 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 24 篇 工商管理
    • 22 篇 图书情报与档案管...
  • 19 篇 法学
    • 16 篇 法学
  • 11 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 6 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 57 篇 cloud computing
  • 45 篇 internet of thin...
  • 31 篇 internet
  • 21 篇 distributed comp...
  • 15 篇 grid computing
  • 13 篇 computer archite...
  • 13 篇 blockchain
  • 12 篇 distributed comp...
  • 10 篇 big data
  • 10 篇 servers
  • 10 篇 protocols
  • 10 篇 computer network...
  • 9 篇 peer to peer com...
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 security
  • 9 篇 fog computing
  • 8 篇 scalability
  • 8 篇 wireless sensor ...
  • 8 篇 denial-of-servic...

机构

  • 6 篇 hainan universit...
  • 4 篇 chitkara univers...
  • 3 篇 school of human ...
  • 3 篇 state key labora...
  • 2 篇 department of ma...
  • 2 篇 srm institute of...
  • 2 篇 china academy of...
  • 2 篇 college of compu...
  • 2 篇 artificial intel...
  • 2 篇 computer science...
  • 2 篇 kpr institute of...
  • 2 篇 department of co...
  • 2 篇 dept. of compute...
  • 2 篇 shanwei institut...
  • 2 篇 college of elect...
  • 2 篇 electronics & co...
  • 2 篇 bennett universi...
  • 2 篇 zhengzhou univer...
  • 2 篇 school of comput...
  • 2 篇 computer science...

作者

  • 6 篇 ye jun
  • 3 篇 ahmad yasmin
  • 3 篇 kaur nikita
  • 3 篇 xinlin zhang
  • 2 篇 xiaodong yan
  • 2 篇 bellini pierfran...
  • 2 篇 yang yi
  • 2 篇 xiangdong yin
  • 2 篇 maya rosalinda
  • 2 篇 nesi paolo
  • 2 篇 jyotsna c.
  • 2 篇 shivashankar
  • 2 篇 jin jin
  • 2 篇 lalem farid
  • 2 篇 bruno ivan
  • 2 篇 jun ni
  • 2 篇 abouzarjomehri
  • 2 篇 huimin xu
  • 2 篇 liu li
  • 2 篇 bounceur ahcene

语言

  • 382 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"任意字段=2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005"
386 条 记 录,以下是121-130 订阅
排序:
6g access network for intelligent internet of healthcare things: Opportunity, challenges, and research directions  2nd
6g access network for intelligent internet of healthcare thi...
收藏 引用
2nd international conference on Trends in Computational and Cognitive Engineering, TCCE 2020
作者: Kaiser, M. Shamim Zenia, Nusrat Tabassum, Fariha Mamun, Shamim Al Rahman, M. Arifur Islam, Md. Shahidul Mahmud, Mufti Institute of Information Technology Jahangirngar University Savar Dhaka1342 Bangladesh Department of EECE Military Institute of Science and Technology Dhaka Bangladesh Department of Physics Jahangirngar University Savar Dhaka1342 Bangladesh Department of Computer Science Nottingham Trent University NottinghamNG11 8NS United Kingdom
The internet of Healthcare Things (IoHT) demands massive and smart connectivity, huge bandwidth, lower latency with ultra-high data rate and better quality of healthcare experience. Unlike the 5G wireless network, the... 详细信息
来源: 评论
Research on Power Universal Service Access Gateway Based on Blockchain  2nd
Research on Power Universal Service Access Gateway Based on ...
收藏 引用
2nd international conference on Big Data and Security, ICBDS 2020
作者: Wanyan, Shao-peng Jia, Peng Zhang, Xiao-yuan NARI Group Corporation State Grid Electric Power Research Institute Nanjing China
With the development of power internet of things and energy internet, the traditional centralized access authentication method of power internet of things terminal is difficult to meet the application needs. At presen... 详细信息
来源: 评论
Shared Access Control Models for Big Data: A Perspective Study and Analysis
Shared Access Control Models for Big Data: A Perspective Stu...
收藏 引用
2nd international conference on Intelligent computing, Information and Control Systems, ICICCS 2020
作者: Vijayalakshmi, K. Jayalakshmi, V. Arignar Anna Government Arts College Vels Institute of Science Technology and Advanced Studies Cheyyar Chennai India School of Computing Sciences Vels Institute of Science Technology and Advanced Studies VISTAS Chennai India
With the rapid development of information technology and the internet, the data owners can avail of the cloud storage to store their vast amounts of data. Data and all resources are outsourced and distributed to make ... 详细信息
来源: 评论
IoT/IoE Smart Health Care System using Fog computing Features  2
IoT/IoE Smart Health Care System using Fog Computing Feature...
收藏 引用
2nd Annual international conference on Information and Sciences, AiCIS 2020
作者: Talal, Rawia Suleiman, Abdulbarry Raouf Nineveh University Computer and Information Eng. Dept. Mosul Iraq
A competent and structured approach to improve the health and well-being of humanity is provided by the internet of everything technology. One of the practical ways to provide healthcare services based on IoE is to mo... 详细信息
来源: 评论
DDoS Detection Using Information Gain Feature Selection and Random Forest Classifier
DDoS Detection Using Information Gain Feature Selection and ...
收藏 引用
Intelligent Cybernetics technology & Applications (ICICyTA), international conference on
作者: Satria Mandala Alvien Ihsan Ramadhan Maya Rosalinda Salim M. Zaki Edgar Weippl Human Centric (HUMIC) Engineering & School of Computing Telkom University Bandung Indonesia Human Centric (HUMIC) Engineering Telkom University Bandung Indonesia Department of Computer Science Dijlah University College Baghdad Iraq Faculty of Computer Science University of Vienna Vienna Austria
Advances in technology and the rapid development of the internet have created more opportunities for hackers to obtain information and data, creating the need to protect more and more information and data. Network vul... 详细信息
来源: 评论
Blockchain-Based Autonomous Peer to Peer Information Interaction System in Financial Audit  2nd
Blockchain-Based Autonomous Peer to Peer Information Interac...
收藏 引用
2nd international conference on Security with Intelligent computing and Big-data Services (SICBS)
作者: Zhuo, Yu Dong Aiqiang Yong, Yan Beijing China Power Informat Technol Co Ltd Beijing 100192 Peoples R China Elect Power Co Elect Power Res Inst State Grid Zhejiang Hangzhou 310009 Zhejiang Peoples R China
The current distributed energy internet financial audit has problems in information sharing and lacks an efficient peer-to-peer security transmission strategy. Facing the problems of financial auditing in distributed ... 详细信息
来源: 评论
Vibration Normalization Processing for Fault Diagnostics under Varying Conditions  2021
Vibration Normalization Processing for Fault Diagnostics und...
收藏 引用
2nd international conference on computing and Data Science, CONF-CDS 2021
作者: Zhang, Yan Xiao, Xiangsu Hu, Xiaolin Xing, Bin Huang, Qingqing Key Laboratory of Industrial Internet of Things and Networked Control Ministry of Education Chongqing University of Posts and Telecommunications Chongqing China School of Automation Chongqing University of Posts and Telecommunications Chongqing China Chongqing Innovation Center of Industrial Big-Data Co. Ltd Chongqing China
Mechanicel vibration signal under varying conditions shows time-varying characteristics, which results in the incomparability of vibration features that corresponding to different machine states, also increases the di... 详细信息
来源: 评论
The Factor of Availability Facilities at Home and Compulsive internet Use among Primary School Students  2
The Factor of Availability Facilities at Home and Compulsive...
收藏 引用
2nd Joint international conference on Emerging computing technology and Sports, JICETS 2019
作者: Kaur, Nikita Ahmad, Yasmin Ahmad, Yasmin School of Human Development and Technocommunication Universiti Malaysia Perlis Arau Perlis02600 Malaysia School of Human Development and Technocommunication Universiti Malaysia Perlis Arau Perlis02600 Malaysia
This study was conducted with the aim to identify the relationship availability facilities at home with compulsive internet use among primary school student in Taiping Perak. This study use quantitative method. The qu... 详细信息
来源: 评论
Compulsive internet Use among Students in Primary School: The Role of Parenting Monitoring  2
Compulsive Internet Use among Students in Primary School: Th...
收藏 引用
2nd Joint international conference on Emerging computing technology and Sports, JICETS 2019
作者: Kaur, Nikita Ahmad, Yasmin Ahmad, Yasmin School of Human Development and Technocommunication Universiti Malaysia Perlis Arau Perlis02600 Malaysia School of Human Development and Technocommunication Universiti Malaysia Perlis Arau Perlis02600 Malaysia
This study was conducted with the aim to identify the relationship between parenting monitoring factor with compulsive internet use among primary school student in Taiping Perak. This study use quantitative method. Th... 详细信息
来源: 评论
The Relationship between Socializing Activity and Compulsive internet Use among Students in Primary School  2
The Relationship between Socializing Activity and Compulsive...
收藏 引用
2nd Joint international conference on Emerging computing technology and Sports, JICETS 2019
作者: Kaur, Nikita Ahmad, Yasmin School of Human Development and Technocommunication Universiti Malaysia Perlis Arau Perlis02600 Malaysia School of Human Development and Technocommunication Universiti Malaysia Perlis Arau Perlis02600 Malaysia
This study was conducted with the aim to identify the relationship between socializing activities factor with compulsive internet use among primary school student in Taiping Perak. This study use quantitative method. ... 详细信息
来源: 评论