咨询与建议

限定检索结果

文献类型

  • 88,685 篇 会议
  • 235 篇 期刊文献
  • 118 册 图书

馆藏范围

  • 89,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,560 篇 工学
    • 38,447 篇 计算机科学与技术...
    • 31,335 篇 软件工程
    • 13,107 篇 信息与通信工程
    • 10,782 篇 控制科学与工程
    • 8,468 篇 电气工程
    • 5,597 篇 电子科学与技术(可...
    • 5,031 篇 生物工程
    • 4,272 篇 机械工程
    • 4,058 篇 生物医学工程(可授...
    • 3,094 篇 动力工程及工程热...
    • 3,056 篇 仪器科学与技术
    • 2,777 篇 光学工程
    • 2,671 篇 安全科学与工程
    • 2,487 篇 交通运输工程
    • 1,678 篇 化学工程与技术
    • 1,671 篇 网络空间安全
  • 21,743 篇 理学
    • 11,692 篇 数学
    • 5,327 篇 生物学
    • 5,005 篇 物理学
    • 3,658 篇 统计学(可授理学、...
    • 3,645 篇 系统科学
    • 1,882 篇 化学
  • 13,940 篇 管理学
    • 9,382 篇 管理科学与工程(可...
    • 5,824 篇 图书情报与档案管...
    • 4,602 篇 工商管理
  • 3,483 篇 医学
    • 2,780 篇 临床医学
    • 2,653 篇 基础医学(可授医学...
    • 1,566 篇 药学(可授医学、理...
  • 2,113 篇 法学
    • 1,679 篇 社会学
  • 1,690 篇 经济学
    • 1,682 篇 应用经济学
  • 1,085 篇 农学
  • 1,061 篇 教育学
  • 338 篇 文学
  • 207 篇 军事学
  • 132 篇 艺术学
  • 1 篇 哲学

主题

  • 3,165 篇 computer archite...
  • 2,773 篇 computer science
  • 2,492 篇 computational mo...
  • 2,298 篇 feature extracti...
  • 2,252 篇 control systems
  • 1,968 篇 real-time system...
  • 1,663 篇 training
  • 1,618 篇 application soft...
  • 1,604 篇 accuracy
  • 1,537 篇 conferences
  • 1,491 篇 hardware
  • 1,250 篇 neural networks
  • 1,228 篇 data mining
  • 1,186 篇 costs
  • 1,158 篇 robot sensing sy...
  • 1,132 篇 monitoring
  • 1,129 篇 testing
  • 1,101 篇 protocols
  • 1,100 篇 computer vision
  • 1,099 篇 robustness

机构

  • 148 篇 school of comput...
  • 140 篇 school of comput...
  • 120 篇 department of el...
  • 118 篇 school of comput...
  • 82 篇 school of comput...
  • 67 篇 institute of inf...
  • 64 篇 college of compu...
  • 61 篇 school of automa...
  • 60 篇 chitkara univers...
  • 55 篇 department of sy...
  • 54 篇 department of co...
  • 52 篇 department of el...
  • 52 篇 school of electr...
  • 49 篇 ieee
  • 48 篇 department of el...
  • 46 篇 college of compu...
  • 46 篇 department of el...
  • 46 篇 department of el...
  • 45 篇 department of el...
  • 44 篇 school of comput...

作者

  • 35 篇 lei wang
  • 34 篇 zhang tao
  • 34 篇 wang jing
  • 33 篇 zhang lei
  • 31 篇 li yang
  • 28 篇 jun wang
  • 26 篇 wang lei
  • 25 篇 yu wang
  • 24 篇 li xin
  • 24 篇 ning xi
  • 23 篇 rui wang
  • 22 篇 sudeep tanwar
  • 21 篇 weiming shen
  • 21 篇 li peng
  • 20 篇 dhabaleswar k. p...
  • 20 篇 chengkuo lee
  • 19 篇 hisao ishibuchi
  • 19 篇 xiao liu
  • 19 篇 hui wang
  • 19 篇 yang bo

语言

  • 86,470 篇 英文
  • 2,130 篇 其他
  • 461 篇 中文
  • 14 篇 土耳其文
  • 6 篇 西班牙文
  • 5 篇 俄文
  • 2 篇 法文
  • 1 篇 葡萄牙文
检索条件"任意字段=IEEE International Conference and Workshops on Engineering of Computer Based Systems"
89038 条 记 录,以下是201-210 订阅
排序:
Blockchain Integration for Robust Intellectual Property Protection in New Product Development (NPD)  3
Blockchain Integration for Robust Intellectual Property Prot...
收藏 引用
3rd international conference on Electronics and Renewable systems, ICEARS 2025
作者: Chinnasamy, P. Subashini, B. Nijanthan, Nijanthan Madasamy Raja, G. Swetha, Devulapally Sreenivasulu Reddy, L. School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India School of Computing Srmist Department of Data Science and Business Systems Kattankulathur India Paavai Engineering College Tamilnadu Namakkal India Paavai Engineering College Tamilnadu Namakkal India Vaagdevi Engineering College Dept. of Computer Science and Engineering Warangal Dist. Telangana Bolli Kunta506005 India School of Advanced Sciences Kalasalingam Academy of Research and Education Department of Mathematics Tamilnadu Krishnankoil India
The rapid advancement of Blockchain technology has led to its widespread application in several domains of digital activities, such as e-government concerns and monetary security. This article presents a smart contrac... 详细信息
来源: 评论
Enhancing Peer-to-Peer Network Security using 3D Convolutional Autoencoder based Anomaly Detection  1
Enhancing Peer-to-Peer Network Security using 3D Convolution...
收藏 引用
1st international conference on Intelligent systems and Computational Networks, ICISCN 2025
作者: Rana Veer Samara Sihman Bharattej, R. Ajznblasm, Zaid Satish, E.G. Adlin Sylvia, A. Devi, M. Saint Leo University Department of Computer Science FL United States The Islamic University of Al Diwaniyah College of Technical Engineering Department of Computers Techniques Engineering Al Diwaniyah Iraq Nitte Meenakshi Institute of Technology Department of Computer Science and Engineering Bengaluru India Dhanalakshmi Srinivasan College of Engineering and Technology Department of Computer Science and Engineering Mamallapuram India New Prince Shri Bhavani College of Engineering and Technology Department of Electrical and Electronics Engineering Chennai India
In this era, Peer-to-Peer (P2P) networks have developed as a revolutionized network for data distribution and alternate to traditional client-server network. The features of P2P networks allow a distributed group of u... 详细信息
来源: 评论
Development of EEG-based Prosthetic Limb for Paraplegic and Quadriplegic Patients  2
Development of EEG-Based Prosthetic Limb for Paraplegic and ...
收藏 引用
2nd international conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Devi, Chelli N. Krishnamoorthi, Raja Nayak, Sumit Kalasalingam Academy of Research and Education Department of Biomedical Engineering Krishnankoil India International Relations Kalasalingam Academy of Research and Education Krishnankoil India Kalasalingam Academy of Research and Education Krishnankoil India
Paraplegic and quadriplegic patients and amputees face severe difficulties in performing their daily activities. A viable and effective solution for this is the development of prosthetic limbs that enable them to carr... 详细信息
来源: 评论
Deep Defense: A Hybrid LSTM-ANN Architecture for Intelligent Intrusion Detection System  2
Deep Defense: A Hybrid LSTM-ANN Architecture for Intelligent...
收藏 引用
2nd international conference on Computational Intelligence, Communication Technology and Networking, CICTN 2025
作者: Shadeja, Mohit Singh, Shashwat Prakash, Ayushi Dept. of Computer Science and Engineering Ajay Kumar Garg Engineering College Uttar Pradesh Ghaziabad India
The rapidly evolving cyber threat landscape requires innovative and adaptive intrusion detection solutions. Traditional signature-based intrusion detection systems, despite their high accuracy, are inherently inflexib... 详细信息
来源: 评论
Predicting Stock Prices with K-Nearest Neighbors using Moving Average Techniques  1
Predicting Stock Prices with K-Nearest Neighbors using Movin...
收藏 引用
1st international conference on Intelligent systems and Computational Networks, ICISCN 2025
作者: Yuvaraj, S. Chenni Kumaran, J. Kajendran, K. Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India Panimalar Engineering College Department of Computer Science and Engineering Chennai India
This research analyzes the effectiveness of the K-Nearest Neighbors algorithm combined with moving average techniques, Five-day and Ten-day Exponential Moving Averages, specifically EMA-5 and EMA-10, to predict stock ... 详细信息
来源: 评论
Application of OOSEM Method in Requirements Analysis of System Security engineering  5
Application of OOSEM Method in Requirements Analysis of Syst...
收藏 引用
5th international conference on Advances in Electrical, Electronics and Computing Technology, EECT 2025
作者: Xin, Chenliang Zhou, Yanzhang Jiang, Ning Ding, Guohui Shenyang Aircraft Design and Research Institute Aviation Industry Corporation of China Shenyang China School of Computer Shenyang Aerospace University Shenyang China
OOSEM (Object-Oriented systems engineering Method) is a MBSE(Model-based systems engineering) method. OOSEM is scenario-driven and it can analyze the requirements from system-level to component-level. As a selected MB... 详细信息
来源: 评论
AI-Powered Face Authentication System for Web and Native Apps  2
AI-Powered Face Authentication System for Web and Native App...
收藏 引用
2nd international conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Roy, Monideepa Datta, Sujoy Khan, Muhit Paroi, Methu Hasan, Mehedi School of Computer Engineering KIIT University Bhubaneswar India
In a period where security breaches and password-related issues are prevalent, the demand for more secure and user-friendly authentication methods has become paramount. This paper introduces a novel approach to web ap... 详细信息
来源: 评论
Building Secure and Decentralized Survey Methodology: A Comprehensive Solution with FIDO2 Authentication and Fluree  14
Building Secure and Decentralized Survey Methodology: A Comp...
收藏 引用
14th ieee international conference on Communication systems and Network Technologies, CSNT 2025
作者: Balachandher, Jawahar Dongre, Chandana Bhattacharyya, Somanshu Hunashikatti, Rohit Sarasvathi, V. Department of Computer Science and Engineering PES University Karnataka Bangalore India
Traditional survey systems struggle with data immutability, privacy protection, and reliable storage. These limitations compromise transparency, security, and data integrity. This paper proposes a decentralized and se... 详细信息
来源: 评论
Securing Wireless and Optical Networks: Advanced Strategies for Network and Information Security in Modern Communication systems
Securing Wireless and Optical Networks: Advanced Strategies ...
收藏 引用
2025 ieee international conference on Computational, Communication and Information Technology, ICCCIT 2025
作者: Dhasmana, Gulshan Sharma, Vishal Boob, Nandini Shirish Aravind, K. Reddy, R. Akhilesh Yadav, Kanchan Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Lovely Professional University Phagwara India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamilnadu Chennai India New Horizon College of Engineering Department of Electronics and Communication Engineering Bangalore India MLR Institute of Technology Department of CSE-AI&ML Telangana Hyderabad India GLA University Department of Electrical Engineering Mathura India
In the era of rapidly changing communication systems, securing wireless and optical networks has become of essence to protect sensitive data and ensure operation. This study addresses network and information security ... 详细信息
来源: 评论
Development and Analysis of a High-Efficiency T-Type Inverter based 3.7 kW Wireless EV Charging Applications
Development and Analysis of a High-Efficiency T-Type Inverte...
收藏 引用
2025 ieee international Students' conference on Electrical, Electronics and computer Science, SCEECS 2025
作者: Venugopal, R. Balaji, C. Shanmugam, Yuvaraja Srm Institute of Science and Technology Dept. of Electrical and Electronics Engineering Tamil Nadu Chennai603203 India Vignan's Foundation for Science Technology and Research Department of Eee Andhra Pradesh Vadlamudi522213 India
This paper presents the design and performance analysis of a T-type inverter optimized for wireless charging applications in electric vehicle (EV) batteries, aiming to enhance efficiency and reduce power losses. Tradi... 详细信息
来源: 评论