咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 11 篇 期刊文献

馆藏范围

  • 1,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 984 篇 工学
    • 837 篇 计算机科学与技术...
    • 486 篇 软件工程
    • 252 篇 电气工程
    • 204 篇 信息与通信工程
    • 179 篇 控制科学与工程
    • 133 篇 仪器科学与技术
    • 61 篇 生物工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 机械工程
    • 46 篇 交通运输工程
    • 46 篇 生物医学工程(可授...
    • 44 篇 安全科学与工程
    • 34 篇 动力工程及工程热...
    • 33 篇 光学工程
    • 31 篇 石油与天然气工程
  • 285 篇 理学
    • 152 篇 数学
    • 76 篇 生物学
    • 57 篇 物理学
    • 47 篇 系统科学
    • 47 篇 统计学(可授理学、...
    • 34 篇 化学
  • 247 篇 管理学
    • 180 篇 管理科学与工程(可...
    • 98 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 52 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 27 篇 公共卫生与预防医...
    • 21 篇 药学(可授医学、理...
  • 28 篇 法学
    • 20 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 11 篇 教育学
  • 9 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 71 篇 data acquisition
  • 41 篇 intelligent syst...
  • 36 篇 real-time system...
  • 33 篇 data mining
  • 29 篇 internet of thin...
  • 27 篇 cloud computing
  • 25 篇 neural networks
  • 23 篇 data models
  • 22 篇 computational mo...
  • 19 篇 conferences
  • 19 篇 wireless sensor ...
  • 18 篇 big data
  • 18 篇 control systems
  • 17 篇 monitoring
  • 17 篇 machine learning
  • 17 篇 artificial intel...
  • 16 篇 three-dimensiona...
  • 15 篇 deep learning
  • 14 篇 computer archite...
  • 14 篇 intelligent netw...

机构

  • 8 篇 ternopil natl ec...
  • 5 篇 china electric p...
  • 5 篇 faculty of telec...
  • 4 篇 institute of rel...
  • 4 篇 3-30-1 wajiro-hi...
  • 3 篇 beijing key labo...
  • 3 篇 peking univ sch ...
  • 3 篇 misr internation...
  • 3 篇 ternopil nationa...
  • 3 篇 chitkara univers...
  • 3 篇 state grid corpo...
  • 3 篇 hubei univ techn...
  • 3 篇 national institu...
  • 3 篇 national institu...
  • 3 篇 peking univ sch ...
  • 3 篇 department of co...
  • 2 篇 csg power dispat...
  • 2 篇 school of inform...
  • 2 篇 yellow sea fishe...
  • 2 篇 lebanese america...

作者

  • 13 篇 sachenko anatoli...
  • 11 篇 kochan volodymyr
  • 10 篇 axel sikora
  • 9 篇 sachenko anatoly
  • 9 篇 turchenko iryna
  • 8 篇 lendyuk taras
  • 7 篇 turchenko volody...
  • 6 篇 rippa sergey
  • 6 篇 sachenko svitlan...
  • 6 篇 manolova agata
  • 6 篇 agata manolova
  • 5 篇 krasimir tonchev
  • 5 篇 kochan r.
  • 5 篇 golovko vladimir
  • 5 篇 drozd oleksandr
  • 5 篇 tonchev krasimir
  • 4 篇 vasylkiv nadiia
  • 4 篇 madani kurosh
  • 4 篇 wang ping
  • 4 篇 sachenko a.

语言

  • 1,137 篇 英文
  • 109 篇 其他
  • 2 篇 中文
检索条件"任意字段=3rd IEEE Intelligent Data Acquisition and Advanced Computing Systems"
1248 条 记 录,以下是541-550 订阅
排序:
Wireless IoT-Based Intrusion Detection Using LIDAR in the Context of intelligent Border Surveillance System  3rd
Wireless IoT-Based Intrusion Detection Using LIDAR in the Co...
收藏 引用
3rd International Conference on Smart computing and Informatics, SCI 2018
作者: Segireddy, Sravani Koneru, Suvarna Vani HyderabadTelangana500008 India Department of Computer Science and Engineering VR Siddhartha Engineering College VijayawadaAndhra Pradesh520007 India
Patrolling borders of India has become a tedious and risky task for military and para-military personnel in order to control Intrusions. With the advancements in wireless IoT (Internet of Things) technology, it has be... 详细信息
来源: 评论
Enhance computing performance through deep learning and blockchain integration for public health problems  37
Enhance computing performance through deep learning and bloc...
收藏 引用
37th International Conference on Biomedical Engineering, IBIOMED 2020
作者: Purnomo, Mauridhi H Fahruzi, Iman Anggraeni, Wiwik Dept of Electrical Engineering Dept of Computer Engineering Faculty of Intelligent Electrical and Informatics Technology Institut Teknologi Sepuluh Nopember Surabaya Indonesia Dept of Electrical Engineering Dept of Information Systems Faculty of Intelligent Electrical and Informatics Technology Institut Teknologi Sepuluh Nopember Surabaya Indonesia
Blockchain is one of the most phenomenal innovations and becomes an attraction to be widely implemented in public health. Blockchain manages and accesses various data sets distributed across all users. It requires too... 详细信息
来源: 评论
Digital data Convertion Using Content Addressable Memory  10
Digital Data Convertion Using Content Addressable Memory
收藏 引用
10th ieee International Conference on intelligent data acquisition and advanced computing systems - Technology and Applications (IDAACS)
作者: Kokosinski, Zbigniew Cracow Univ Technol Ul Warszawska 24 PL-31155 Krakow Poland
In this paper a novel digital data conversion scheme is proposed that may be applied in analog or digital data acquisition systems. In this scheme possible input redundancy of combinational logic circuit is eliminated... 详细信息
来源: 评论
data Piecewise Linear Approximation for Bearings Degradation Monitoring  10
Data Piecewise Linear Approximation for Bearings Degradation...
收藏 引用
10th ieee International Conference on intelligent data acquisition and advanced computing systems - Technology and Applications (IDAACS)
作者: Huang, Fei Sava, Alexandre Adjallah, Kondo H. Wang, Zhouhang Univ Lorraine Lab Concept Optimisat & Modelisat Syst LCOMS EA 7306 F-57000 Metz France Huaiyin Inst Technol 1 Meicheng Rd Huaian 223003 Jiangsu Peoples R China
In this paper, we propose a method based on piecewise linear approximation (PLA) with segmented projection error (SPE) to reveal the underlying correlation structures and approximate multivariate time series. Based on... 详细信息
来源: 评论
Insider threat detection using deep learning: A review  3
Insider threat detection using deep learning: A review
收藏 引用
3rd International Conference on intelligent Sustainable systems, ICISS 2020
作者: Raut, Madhu Dhavale, Sunita Singh, Amarjit Mehra, Atul Defence Institute of Advanced Technology Pune India Persistent Systems Pune India National Critical Information Infrastructure Protection Centre Mumbai India
A plethora of research is available for detecting and mitigating threats that occur across the organization's boundaries. However, Insider Threat Detection has only recently entered the limelight. It turns out to ... 详细信息
来源: 评论
3D Virtual Biomimetic Network: a Topology for Resilient intelligent Wireless Sensor Networks  10
3D Virtual Biomimetic Network: a Topology for Resilient Inte...
收藏 引用
10th ieee International Conference on intelligent data acquisition and advanced computing systems - Technology and Applications (IDAACS)
作者: Ahmed, Yousif E. E. Adjallah, Kondo H. Amin, Magdi B. M. Univ Gezira Wad Madani Sudan Univ Lorraine Metz France Univ Khartoum Khartoum Sudan
Wireless data communication has a key role in any updated information technology-based project. Mobility, flexibility, scalability, and easy-to-install are the main features of wireless data acquisition systems. While... 详细信息
来源: 评论
New Quantum Secret Sharing Protocol Using Entangled Qutrits  10
New Quantum Secret Sharing Protocol Using Entangled Qutrits
收藏 引用
10th ieee International Conference on intelligent data acquisition and advanced computing systems - Technology and Applications (IDAACS)
作者: Vasiliu, Yevhen Limar, Igor Gancarczyk, Tomasz Karpinski, Mikolaj OS Popov Odessa Natl Acad Telecommun 1 Kuznechna St UA-65029 Odessa Ukraine Engn & Technol Inst Bioengn 26 Mayakskaya Rd UA-67667 Khlebodarskoye Village Odessa Region Ukraine Univ Bielsko Biala 2 Willowa St PL-43309 Bielsko Biala Poland
A new quantum secret sharing protocol based on the ping-pong protocol of quantum secure direct communication is proposed. The pairs of entangled qutrits are used in protocol, which allows an increase in the informatio... 详细信息
来源: 评论
3rd International Conference on Mechatronics and intelligent Robotics, ICMIR 2019
3rd International Conference on Mechatronics and Intelligent...
收藏 引用
3rd International Conference on Mechatronics and intelligent Robotics, ICMIR 2019
The proceedings contain 96 papers. The special focus in this conference is on Mechatronics and intelligent Robotics. The topics include: Research on intelligent Control System of Plate Straightening Based on Knowledge...
来源: 评论
Fuzzy Estimation Method of Information System Providing Part Influence on the Functioning Quality  10
Fuzzy Estimation Method of Information System Providing Part...
收藏 引用
10th ieee International Conference on intelligent data acquisition and advanced computing systems - Technology and Applications (IDAACS)
作者: Vasylkiv, Nadiia Dubchak, Lesia Turchenko, Iryna Ivashchuk, Iryna Savchyshyn, Ruslan Ternopil Natl Econ Univ 3 Peremoha Sq UA-46020 Ternopol Ukraine MagneticOne Grp 11211 Taylor Draper Ln 115 Austin TX 78759 USA
The fuzzy estimation method of the information system providing part influence on the functioning quality is developed. It's based on a fuzzy system, the inputs of which are the states of reliability for software,... 详细信息
来源: 评论
An ANP-GRA-based evaluation model for security features of IoT systems  3rd
An ANP-GRA-based evaluation model for security features of I...
收藏 引用
3rd International Conference on intelligent Communication, Control and Devices, ICICCD 2018
作者: Hinduja, Akshay Pandey, Manju Department of Computer Applications National Institute of Technology Raipur RaipurChhattisgarh India
The world has been experiencing a notable growth on the application of Internet of Things (IoT)-based appliances as IoT has been established as a major component of Information Technology after digital computer, Inter... 详细信息
来源: 评论