咨询与建议

限定检索结果

文献类型

  • 6,192 篇 会议
  • 56 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 6,250 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,822 篇 工学
    • 3,815 篇 计算机科学与技术...
    • 1,705 篇 电气工程
    • 1,695 篇 信息与通信工程
    • 1,446 篇 软件工程
    • 684 篇 控制科学与工程
    • 365 篇 动力工程及工程热...
    • 311 篇 机械工程
    • 273 篇 测绘科学与技术
    • 261 篇 电子科学与技术(可...
    • 255 篇 仪器科学与技术
    • 132 篇 安全科学与工程
    • 108 篇 交通运输工程
    • 107 篇 石油与天然气工程
    • 102 篇 网络空间安全
    • 95 篇 生物工程
    • 93 篇 材料科学与工程(可...
    • 81 篇 化学工程与技术
    • 81 篇 生物医学工程(可授...
    • 75 篇 建筑学
  • 877 篇 理学
    • 463 篇 数学
    • 194 篇 物理学
    • 123 篇 化学
    • 122 篇 系统科学
    • 111 篇 生物学
    • 107 篇 统计学(可授理学、...
  • 602 篇 管理学
    • 462 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 172 篇 工商管理
  • 132 篇 医学
    • 109 篇 临床医学
    • 68 篇 基础医学(可授医学...
  • 69 篇 法学
  • 63 篇 经济学
  • 40 篇 农学
  • 22 篇 军事学
  • 15 篇 艺术学
  • 12 篇 教育学
  • 6 篇 文学

主题

  • 1,077 篇 wireless sensor ...
  • 181 篇 sensor systems
  • 163 篇 wireless communi...
  • 161 篇 distributed comp...
  • 152 篇 sensor nodes
  • 150 篇 internet of thin...
  • 146 篇 sensors
  • 140 篇 cloud computing
  • 136 篇 monitoring
  • 135 篇 wireless sensor ...
  • 129 篇 protocols
  • 119 篇 sensor networks
  • 103 篇 energy consumpti...
  • 103 篇 security
  • 102 篇 routing
  • 92 篇 real-time system...
  • 88 篇 energy efficienc...
  • 86 篇 computer archite...
  • 77 篇 routing protocol...
  • 76 篇 robot sensing sy...

机构

  • 15 篇 isme - school of...
  • 14 篇 jiangsu high tec...
  • 10 篇 chitkara centre ...
  • 9 篇 chitkara univers...
  • 9 篇 centre of resear...
  • 8 篇 henan univ inst ...
  • 8 篇 department of co...
  • 8 篇 beijing univ pos...
  • 8 篇 beijing universi...
  • 8 篇 institute of com...
  • 7 篇 nanjing univ pos...
  • 7 篇 department of co...
  • 7 篇 suny stony brook...
  • 7 篇 univ virginia de...
  • 6 篇 nanjing universi...
  • 6 篇 nanjing univ sta...
  • 6 篇 state grid corpo...
  • 6 篇 beijing univ pos...
  • 6 篇 missouri univ sc...
  • 6 篇 changan univ sch...

作者

  • 15 篇 han zhijie
  • 13 篇 stankovic john a...
  • 13 篇 yang yang
  • 13 篇 barolli leonard
  • 12 篇 wang wei
  • 12 篇 wang cong
  • 11 篇 nikoletseas soti...
  • 10 篇 dustdar schahram
  • 10 篇 abdelzaher tarek
  • 10 篇 kakuda yoshiaki
  • 9 篇 rinner bernhard
  • 9 篇 wehrle klaus
  • 9 篇 wu jie
  • 9 篇 wolf lars
  • 9 篇 voigt thiemo
  • 9 篇 cong wang
  • 8 篇 bar-noy amotz
  • 8 篇 vassiliou vasos
  • 8 篇 kulau ulf
  • 8 篇 landsiedel olaf

语言

  • 6,094 篇 英文
  • 132 篇 其他
  • 27 篇 中文
检索条件"任意字段=4th IEEE International Conference on Distributed Computing in Sensor Systems"
6250 条 记 录,以下是501-510 订阅
排序:
Comparative E-Voting Security Evaluation: Multi-Modal Authentication Approaches  6
Comparative E-Voting Security Evaluation: Multi-Modal Authen...
收藏 引用
6th international conference on Blockchain computing and Applications, BCCA 2024
作者: Ahmadieh, Elsi El Madhoun, Nour Lebanese University Faculty of Technology Department Communications and Computer Networks Engineering Beirut Lebanon LISITE Laboratory ISEP 10 Rue de Vanves Issy-les-Moulineaux92130 France Sorbonne Université CNRS LIP6 4 place Jussieu Paris75005 France
the decentralized, distributed ledger, a fundamental aspect of blockchain technology, plays a pivotal role in various sectors, including electronic voting (e-voting) systems. When considering e-voting, the significanc... 详细信息
来源: 评论
Research on Control Strategy of distributed Drive Electric Vehicle Based on Driving Intent Recognition  4
Research on Control Strategy of Distributed Drive Electric V...
收藏 引用
4th international conference on Advanced Electrical and Energy systems, AEES 2023
作者: Shidong, Xia Jinfu, Wang Changhai, Yao FAW-Volkswagen Automotive Co. Ltd Development Department Changchun China
Aiming at the problem that the different driving modes of the four motors of distributed drive electric vehicles affect the vehicle energy consumption, the driver driving intention recognition mechanism based on fuzzy... 详细信息
来源: 评论
BioDSSL: A Domain Specific sensor Language for Global, distributed, Biometric Identification systems  12
BioDSSL: A Domain Specific Sensor Language for Global, Distr...
收藏 引用
12th ieee international conference on Intelligent systems, IS 2024
作者: Hofer, Philipp Roland, Michael Mayrhofer, René Johannes Kepler University Linz Institute of Networks and Security Linz Austria
With biometric identification systems becoming increasingly ubiquitous, their complexity is escalating due to the integration of diverse sensors and modalities, aimed at minimizing error rates. the current paradigm fo... 详细信息
来源: 评论
PC-BNA: Parallel Convolution Binary Neural Network Accelerator  24
PC-BNA: Parallel Convolution Binary Neural Network Accelerat...
收藏 引用
24th ieee international conference on High Performance computing and Communications, 8th ieee international conference on Data Science and systems, 20th ieee international conference on Smart City and 8th ieee international conference on Dependability in sensor, Cloud and Big Data systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Liu, Haihui Zhang, Yuang Zheng, Xiangwei Yu, Mengxin An, Baoxu Liu, Xiaojie School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan China
Binary neural network (BNN) is widely used in speech recognition, image processing and other fields to save memory and speed up computing. However, the accuracy of the existing binarization scheme in the realistic dat... 详细信息
来源: 评论
Hybrid Multi-Hop Data Transfer Modelling in Wireless sensor Network for Bridge Structural Health Monitoring System  4
Hybrid Multi-Hop Data Transfer Modelling in Wireless Sensor ...
收藏 引用
4th international conference on Intelligent Cybernetics Technology and Applications, ICICyTA 2024
作者: Furqoon, Naufal Sayyid Putra, Seno Adi Setyorini School of Computing Telkom University Bandung Indonesia School of Industrial and System Engineering Telkom University Bandung Indonesia
Static itinerary planning is a commonly employed multi-hop itinerary planning method in wireless sensor networks (WSN) due to its commendable energy efficiency and ability to minimize overhead. However, this approach ... 详细信息
来源: 评论
Improved Droop Voltage Control Strategy Considering the Access of Energy Storage and distributed Generation  4
Improved Droop Voltage Control Strategy Considering the Acce...
收藏 引用
4th international conference on Advanced Electrical and Energy systems, AEES 2023
作者: Zheng, Gang Nan, Yu Wu, Yafei Shen, Jie Han, Yunhao Wu, Jiwei State Grid Henan Electric Power Company Kaifeng Power Supply Company Kaifeng China Shanghai Electric Power University College of Electrical Engineering Shanghai China
Owing to the difference of capacity and initial state of charge (SOC) for the multi-group energy storage units, as well as the different line resistance, the SOC of the energy storage unit cannot be equalized under th... 详细信息
来源: 评论
Improved algorithm of thermal image target detection based on Yolo v4  23
Improved algorithm of thermal image target detection based o...
收藏 引用
23rd ieee international conference on High Performance computing and Communications, 7th ieee international conference on Data Science and systems, 19th ieee international conference on Smart City and 7th ieee international conference on Dependability in sensor, Cloud and Big Data systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Dong, Min Dang, Jia Sun, Gangcan Xue, Qi School of Information Engineering Zhengzhou University Zhengzhou City China Henan Institute of Advanced Technology Zhengzhou University Zhengzhou City China
As people have higher requirements for object detection accuracy and adaptability, this research proposes a single-stage algorithm for thermal image target detection based on Yolo v4. the algorithm combines the visibl... 详细信息
来源: 评论
MnemoSys: A Conditional Probability Estimation Protocol for Blockchain Audited Reputation Management  4
MnemoSys: A Conditional Probability Estimation Protocol for ...
收藏 引用
ieee 4th international conference on Trust, Privacy and Security in Intelligent systems, and Applications (ieee TPS-ISA)
作者: Rouhana, Daniel Lundquist, Peyton Andersen, Tim Dagher, Gaby G. Washington State Univ Dept Comp Sci Pullman WA 99164 USA Boise State Univ Dept Comp Sci Boise ID 83725 USA
Reputation systems have been one method of solving the unique challenges that face distributed networks of independent operators. Fundamentally, historical performance must be considered in a way that attempts to pred... 详细信息
来源: 评论
Integral AI-based planning for management of WSNs in military operations  35
Integral AI-based planning for management of WSNs in militar...
收藏 引用
35th ieee international conference on Tools with Artificial Intelligence (ICTAI)
作者: Caballero, J. Perez-Mon, Olaya R-Moreno, Maria D. de Oliveira Filho, Julio Univ Alcala ISG Alcala De Henares Spain TNO The Hague Netherlands Univ Alcala Alcala De Henares Spain TNO IAS The Hague Netherlands
Military tactical scenarios have been shifting to more often consider combat situations in urban environments. threats in these environments are generally more dynamic in nature, imposing new requirements on sensors a... 详细信息
来源: 评论
Intrusion Detection in Wireless sensor Networks using Hybrid Deep Belief Networks and Harris Hawks Optimizer  4
Intrusion Detection in Wireless Sensor Networks using Hybrid...
收藏 引用
4th international conference on Electronics and Sustainable Communication systems, ICESC 2023
作者: Vikas Daund, Ramesh Pandharinath Kumar, Davinder Charan, Piyush Ingilela, Ravi Shireesh Kumar Rastogi, Ravi Iimt University School of Computer Science and Applications Uttar Pradesh O-Pocket Ganganagar Meerut India Snd College of Engineering and Research Centre Yeola Department of Computer Engineering Maharashtra India Micron Technology Telangana Hyderabad India Manav Rachna University Department of Electronics and Communication Engineering Haryana Faridabad India Audisankara College of Engineering and Technology Department of CSE Andhra Pradesh India Nielit Uttar Pradesh Gorakhpur India
A substantial amount of nodes equipped with sensors make up a wireless sensor network that collects and sends data to a base station. the wireless sensor networks, subsequently, face a number of security vulnerabiliti... 详细信息
来源: 评论