咨询与建议

限定检索结果

文献类型

  • 1,380 篇 会议
  • 11 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 937 篇 工学
    • 795 篇 计算机科学与技术...
    • 463 篇 软件工程
    • 183 篇 电气工程
    • 109 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 89 篇 动力工程及工程热...
    • 53 篇 机械工程
    • 49 篇 电子科学与技术(可...
    • 45 篇 环境科学与工程(可...
    • 43 篇 生物工程
    • 29 篇 仪器科学与技术
    • 21 篇 石油与天然气工程
    • 21 篇 网络空间安全
    • 19 篇 力学(可授工学、理...
    • 19 篇 建筑学
    • 19 篇 安全科学与工程
    • 18 篇 材料科学与工程(可...
    • 16 篇 土木工程
  • 275 篇 管理学
    • 227 篇 管理科学与工程(可...
    • 96 篇 工商管理
    • 70 篇 图书情报与档案管...
  • 262 篇 理学
    • 156 篇 数学
    • 47 篇 生物学
    • 35 篇 系统科学
    • 33 篇 物理学
    • 30 篇 大气科学
    • 26 篇 统计学(可授理学、...
  • 32 篇 经济学
    • 31 篇 应用经济学
  • 32 篇 法学
    • 22 篇 社会学
  • 19 篇 医学
    • 18 篇 临床医学
  • 11 篇 教育学
  • 8 篇 农学
  • 5 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 248 篇 cloud computing
  • 85 篇 grid computing
  • 50 篇 computational mo...
  • 48 篇 distributed comp...
  • 36 篇 servers
  • 34 篇 parallel computi...
  • 32 篇 quality of servi...
  • 31 篇 resource managem...
  • 30 篇 computer archite...
  • 30 篇 distributed data...
  • 29 篇 big data
  • 23 篇 protocols
  • 22 篇 security
  • 19 篇 monitoring
  • 19 篇 fog computing
  • 18 篇 internet of thin...
  • 18 篇 reliability
  • 18 篇 parallel process...
  • 18 篇 scalability
  • 18 篇 processor schedu...

机构

  • 6 篇 china electric p...
  • 6 篇 the islamic univ...
  • 6 篇 department of co...
  • 6 篇 galgotias univer...
  • 6 篇 school of softwa...
  • 5 篇 school of comput...
  • 4 篇 school of electr...
  • 4 篇 state grid energ...
  • 4 篇 department of la...
  • 4 篇 school of electr...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 school of comput...
  • 4 篇 guangdong engine...
  • 4 篇 chitkara univers...
  • 4 篇 department of co...
  • 3 篇 russian acad sci...
  • 3 篇 department of el...
  • 3 篇 college of mathe...
  • 3 篇 school of electr...

作者

  • 6 篇 rong chunming
  • 5 篇 sukumar nandi
  • 5 篇 hui liu
  • 5 篇 liu hui
  • 5 篇 pabitra mohan kh...
  • 4 篇 zhangxin chen
  • 4 篇 awadhesh kumar s...
  • 4 篇 fatos xhafa
  • 3 篇 mo zeyao
  • 3 篇 yang bo
  • 3 篇 akash punhani
  • 3 篇 jiapeng xiu
  • 3 篇 li zheng
  • 3 篇 kumari k. aruna
  • 3 篇 kun wang
  • 3 篇 kawata shigeo
  • 3 篇 xhafa fatos
  • 3 篇 abramson david
  • 3 篇 yidong cui
  • 3 篇 cristea valentin

语言

  • 1,372 篇 英文
  • 16 篇 其他
  • 15 篇 中文
检索条件"任意字段=2nd International Conference on Parallel, Distributed, Grid and Cloud Computing for Engineering"
1401 条 记 录,以下是161-170 订阅
排序:
Automated Denial of Service Detection Using Moth Flame Optimization With Machine Learning in cloud Environment  2
Automated Denial of Service Detection Using Moth Flame Optim...
收藏 引用
2nd international conference on Smart Technologies and Systems for Next Generation computing, ICSTSN 2023
作者: Thillaivanan, Alagu Wategaonkar, Somnath Raghunath Duraisamy, Suganthi Mishra, Ravi Nagaraj, S. Singh, Kamlesh Shadan College of Engineering and Technology Peerancheru Hyderabad India Electronics and Telecommunication Bharati Vidyapeeth College of Engineering Maharashtra Navi Mumbai India Saveetha College of Liberal Arts and Sciences SIMATS Tamilnadu Chennai India Electronics and Telecommunication Engineering GHRIET Maharashtra Nagpur India Department of Computer Science and Engineering & IT Jain University Karnataka Bengaluru India Department of Computer Science and Engineering Graphic Era Hill University Dehradun Campus Uttarakhand Dehradun India
Denial of Service (DoS) attack detection refers to preventing and detecting malicious attempts to make network resources or services unavailable to its intended users. DoS attacks is been a main concern for organizati... 详细信息
来源: 评论
Improved Secure Communication Based Adhoc Routing in Mobile Network Technology  2
Improved Secure Communication Based Adhoc Routing in Mobile ...
收藏 引用
2nd IEEE international conference on distributed computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Mishra, Saket Chitkara University Institute of Engineering and Technology Punjab India
Fifth-generation (5G) is the future of mobile network technology;the development of 5G mobile services is based on a comprehensive study of mobile services' global trends. 5G is, innovation and support of the impl... 详细信息
来源: 评论
Block Chain and distributed computing Aided with cloud Technology- A Specific Reference to Security Issues of Healthcare Industry  2
Block Chain and Distributed Computing Aided with Cloud Techn...
收藏 引用
2nd IEEE international conference on Advances in computing, Communication and Applied Informatics, ACCAI 2023
作者: Murugamani, Chakravarthi Nadh Singh, Bhaludra R. Pravalika, Kallu Rethvikha Sri, P. Sowmya, Chennuru Sai Reddy, Mankhala Shreya Department of Information Technology Bhoj Reddy Engineering College for Women Telangana Hyderabad59 India Department of Computer Science and Engineering Bhoj Reddy Engineering College for Women Telangana Hyderabad59 India Bhoj Reddy Engineering College for Women Telangana Hyderabad59 India
There has been a significant uptick in the need for user-centric electronic records to save the many characteristics of a patient's medical history as they are recorded at a hospital during treatment and to make t... 详细信息
来源: 评论
A Nonlinear Interval Programming Model based on Fuzzy Neural Networks  2
A Nonlinear Interval Programming Model based on Fuzzy Neural...
收藏 引用
2nd international conference on distributed computing and Optimization Techniques, ICDCOT 2024
作者: Zhu, Jijin Wu, Qinqin Luo, Chan College of Mechanical and Electrical Engineering Guangdong University of Science and Technology Dongguan China Mathematics Teaching and Research Office Dongguan Guangming Primary School Dongguan China
Compared to traditional deterministic problem research methods, interval analysis methods have a larger computational load and longer computational time due to the presence of uncertainty. Therefore, for models with c... 详细信息
来源: 评论
Data-Driven Retention Strategies: Exploring the Efficacy of Composite Deep Learning for Customer Churn Prediction in Telecommunications  2
Data-Driven Retention Strategies: Exploring the Efficacy of ...
收藏 引用
2nd international conference on distributed computing and Optimization Techniques, ICDCOT 2024
作者: Habelalmateen, Mohammed I. Bala Dhandayuthapani, V. Malathy, V. Pramodhini, R. Ramakrishna, D. The Islamic University Najaf Iraq College of Computing and Information Sciences University of Technology and Applied Sciences Shinas Branch Department of It Oman Sr University Department of Ece Warangal India Nitte Meenakshi Institute of Technology Dept of Ece Bengaluru India Electronics and Communication Engineering Department Telangana Hyderabad India
The customer churn, otherwise known as subscriber loss, inclusive among one of the key challenges of the telecommunication industry (TCI). Forecasting churn gives rise to telecoms step-saving retentional strategies, s... 详细信息
来源: 评论
A Decentralized Vehicle-to-Vehicle Energy Trading System Based on Efficient Sharding Services  21
A Decentralized Vehicle-to-Vehicle Energy Trading System Bas...
收藏 引用
21st IEEE international Symposium on parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDcloud/SocialCom/SustainCom 2023
作者: Meng, Kun Sun, Lijun Chen, Xiao Wu, Haiqin Li, Shuaiyong Qingdao University of Science and Technology College of Information Science and Technology Shandong China University of Leicester School of Computing and Mathematical Sciences Leicester United Kingdom Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Key Laboratory of Industrial Internet of Things and Networked Control Ministry of Education Chongqing China
Vehicle-to-vehicle (V2V) energy trading stands as a significant technology, allowing electric vehicles (EVs) to share energy. This balances energy demand and supply, reducing pressure on the power grid. However, two s... 详细信息
来源: 评论
Front end computer configuration design of power monitoring system based on cloud computing access control  2
Front end computer configuration design of power monitoring ...
收藏 引用
2nd international conference on Electronic Information engineering and Computer Technology, EIECT 2022
作者: Chen, Haiguang Zha, Jing Hu, Zhaohui Chen, Shanfeng Yang, Yiyue China Southern Power Grid Digital Grid Research Institute Co. Ltd. Guangzhou China
Aiming at the problem that the current power monitoring system front-end computer has poor access control capability, which leads to the long time-consuming of data sending and receiving, a front-end computer configur... 详细信息
来源: 评论
IoT based Transformer Protection and Load Sharing Automation  2
IoT based Transformer Protection and Load Sharing Automation
收藏 引用
2nd international conference on Applied Artificial Intelligence and computing, ICAAIC 2023
作者: Ragavapriya, R.K. Sakthivel, S. Prasannaa, R.Sharan Sudhir, U. Sri Ramakrishna Engineering College Electrical & Electronics Engineering Coimbatore India
The transformer is a passive component, which steps-up or step-down voltage from the primary to secondary coil and then serves what a load needs. The main aim is to give protection to the transformer under overload co... 详细信息
来源: 评论
Monitoring of Photovoltaic Fed Induction Motor Control using IoT  2
Monitoring of Photovoltaic Fed Induction Motor Control using...
收藏 引用
2nd international conference on Edge computing and Applications, ICECAA 2023
作者: Nandhini, M. Arunsankar, G. Anbu Sujitha, S. Daisylin Venkatasubramanian, R. Sri Sai Ranganathan Engineering College Department of Electrical and Electronics Engineering Tamil Nadu Coimbatore India Gojan School of Business and Technology Department of Electrical and Electronics Engineering Tamil Nadu Chennai India Sri Sairam Institute of Technology Department of Chemistry Tamil Nadu Chennai India New Prince Shri Bhavani College of Engineering and Technology Department of Electrical and Electronics Engineering Tamil Nadu Chennai India
Renewable energy fed motor drives are becoming popular in recent years, and solar photovoltaic (PV) is chosen as the source because of its efficient economic benefits and clean nature. Since the majority of the electr... 详细信息
来源: 评论
Trusted D2D Offloading with Energy Optimization for Workflow Applications in Mobile Edge computing  2
Trusted D2D Offloading with Energy Optimization for Workflow...
收藏 引用
2nd international conference on cloud computing, Big Data Application and Software engineering, CBASE 2023
作者: Fan, Jiabao Qian, Cheng Gong, Zheng Luo, Haoyu South China Normal University School of Computer Science Guangzhou510631 China South China Agricultural University College of Mathematics and Informatics Guangzhou510642 China
Device-to-Device (D2D) offloading is a promising complement to the Device-Edge-cloud hierarchical offloading paradigm, which enables end devices to offload their computational tasks to nearby devices with idle resourc... 详细信息
来源: 评论