咨询与建议

限定检索结果

文献类型

  • 18,465 篇 会议
  • 113 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 18,593 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,933 篇 工学
    • 9,501 篇 计算机科学与技术...
    • 5,441 篇 软件工程
    • 3,065 篇 电气工程
    • 2,918 篇 控制科学与工程
    • 2,503 篇 信息与通信工程
    • 952 篇 仪器科学与技术
    • 926 篇 交通运输工程
    • 923 篇 机械工程
    • 639 篇 生物工程
    • 619 篇 电子科学与技术(可...
    • 551 篇 动力工程及工程热...
    • 536 篇 生物医学工程(可授...
    • 480 篇 安全科学与工程
    • 380 篇 网络空间安全
    • 377 篇 石油与天然气工程
    • 257 篇 光学工程
  • 2,970 篇 管理学
    • 2,240 篇 管理科学与工程(可...
    • 1,119 篇 图书情报与档案管...
    • 855 篇 工商管理
  • 2,929 篇 理学
    • 1,497 篇 数学
    • 783 篇 生物学
    • 500 篇 统计学(可授理学、...
    • 481 篇 物理学
    • 390 篇 系统科学
    • 389 篇 化学
  • 606 篇 医学
    • 502 篇 临床医学
    • 438 篇 基础医学(可授医学...
    • 250 篇 公共卫生与预防医...
  • 325 篇 法学
    • 273 篇 社会学
  • 277 篇 经济学
    • 272 篇 应用经济学
  • 172 篇 教育学
  • 149 篇 农学
  • 32 篇 文学
  • 31 篇 军事学
  • 11 篇 艺术学

主题

  • 1,144 篇 data acquisition
  • 765 篇 data mining
  • 564 篇 data models
  • 560 篇 real-time system...
  • 443 篇 intelligent syst...
  • 424 篇 big data
  • 420 篇 conferences
  • 406 篇 cloud computing
  • 377 篇 internet of thin...
  • 354 篇 computational mo...
  • 343 篇 monitoring
  • 320 篇 computer archite...
  • 318 篇 sensor systems
  • 313 篇 machine learning
  • 306 篇 control systems
  • 303 篇 training
  • 296 篇 feature extracti...
  • 295 篇 deep learning
  • 285 篇 robot sensing sy...
  • 281 篇 neural networks

机构

  • 49 篇 university of ch...
  • 42 篇 lviv polytechnic...
  • 29 篇 hubei key labora...
  • 25 篇 school of comput...
  • 20 篇 west ukrainian n...
  • 18 篇 beijing key labo...
  • 17 篇 shenzhen institu...
  • 17 篇 chitkara univers...
  • 16 篇 university of el...
  • 15 篇 lovely professio...
  • 15 篇 school of comput...
  • 15 篇 institute of aut...
  • 14 篇 faculty of compu...
  • 14 篇 school of artifi...
  • 14 篇 shenzhen institu...
  • 14 篇 peng cheng labor...
  • 13 篇 ieee
  • 13 篇 college of compu...
  • 12 篇 key laboratory o...
  • 12 篇 beijing univ pos...

作者

  • 25 篇 anatoliy sachenk...
  • 22 篇 wu xinyu
  • 18 篇 anatoly sachenko
  • 16 篇 a. sachenko
  • 16 篇 liu yang
  • 16 篇 xiong gang
  • 15 篇 chen chen
  • 14 篇 sachenko anatoli...
  • 12 篇 xinyu wu
  • 12 篇 li yang
  • 12 篇 yang yang
  • 11 篇 zhang tao
  • 11 篇 wang lei
  • 11 篇 li peng
  • 11 篇 li li
  • 11 篇 kurosh madani
  • 11 篇 sachenko a.
  • 11 篇 wu bin
  • 11 篇 iryna turchenko
  • 11 篇 golovko vladimir

语言

  • 18,118 篇 英文
  • 408 篇 其他
  • 81 篇 中文
  • 2 篇 西班牙文
检索条件"任意字段=IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems"
18593 条 记 录,以下是41-50 订阅
排序:
Audit Risk Identification based on Mutual Information with Backpropagation Neural Network  1
Audit Risk Identification based on Mutual Information with B...
收藏 引用
1st international conference on intelligent systems and Computational Networks, ICISCN 2025
作者: Su, Di Tianjin Tianshi College Tianjin China
In recent years, identifying audit risk had become important for maintaining financial transparency and detecting fraud. Instead of focusing solely on risk valuation, there had been an increased demand for advanced au... 详细信息
来源: 评论
Integrating Big data Analytics in Soil Quality Assessment: Techniques, Challenges, and Applications  3
Integrating Big Data Analytics in Soil Quality Assessment: T...
收藏 引用
3rd international conference on intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Mohammed, Shehu Singh, Arun Hanif, Md Abu Lovely Professional University Department of Computer Applications Phagwara India Lovely Professional University Department of Computer Science and Engineering Phagwara India Department of Computer Science 365 5th Ave New YorkNY110016 United States
This review paper investigates the application of Big data analytics, focusing on soil quality assessment, with an emphasis on the innovative benefits offered by modern data-driven techniques for improved soil managem... 详细信息
来源: 评论
Securing the internet of things communication and data transmission by using Blockchain based Architecture  3
Securing the internet of things communication and data trans...
收藏 引用
3rd international conference on intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Sheetal Kumari, Vasantha Badiger, Veena S Presidency College Department of Computer Applications Bengaluru India
Due to the rapid growth of technology usage of Internet of Things devices has revolutionized in multiple domains and areas, but still there are few challenges to address like security and performance issues. Most of t... 详细信息
来源: 评论
AI2DS: advanced Deep Autoencoder-Driven Method for intelligent Network Intrusion Detection systems  4
AI2DS: Advanced Deep Autoencoder-Driven Method for Intellige...
收藏 引用
4th ieee international conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Rahman, Md Habibur Martinez, Leo Mishra, Avdesh Nijim, Mais Goyal, Ayush Hicks, David Texas A&M University-Kingsville Department of Electrical Engineering and Computer Science KingsvilleTX78363 United States
Network security is a growing concern as digital infrastructure expands, and traditional measures struggle against modern cyber threats. With the increasing complexity of attacks, there is a need for more adaptive and... 详细信息
来源: 评论
RFID Door Lock Access Control systems: Trends, Technologies and Applications  3
RFID Door Lock Access Control Systems: Trends, Technologies ...
收藏 引用
3rd international conference on intelligent data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Nair, Adwaith A. Adithyan, R. Unni, Akshara Nalinakshan, Shankar Department of Electrical and Electronics Engineering Amrita Vishwa Vidyapeetham Amritapuri India
Radio Frequency Identification (RFID) door lock systems are at the forefront of modern access control technology, combining security, convenience, and scalability. This paper presents a comprehensive review of RFID-ba... 详细信息
来源: 评论
Explaining Cyber Risks in Transportaion 5.0: A data Driven Approach  4
Explaining Cyber Risks in Transportaion 5.0: A Data Driven A...
收藏 引用
4th ieee international conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Tandan, Binod Vajpayee, Prashant Hossain, Gahangir University of North Texas Dept. of Informtation Science DentonTX United States
The primary objective of the research is to explore the cybersecurity risks associated with AI-enabled intelligent transportation systems (Transportation 5.0) within the context of developing future smart cities. In T... 详细信息
来源: 评论
Efficiency Redefined: Impact of Reducing data acquisition Rate for Optimized TinyML in Resource-Constrained IoT Devices  17
Efficiency Redefined: Impact of Reducing Data Acquisition Ra...
收藏 引用
17th international conference on COMmunication systems and NETworkS, COMSNETS 2025
作者: Saha, Bidyut Samanta, Riya Ghosh, Soumya K. Roy, Ram Babu Indian Institute of Technology Kharagpur India
Tiny Machine Learning (TinyML) enables cost-effective, privacy-focused machine learning inference on micro-controller units (MCUs) connected to sensors. For these resource-limited settings, achieving an optimized desi... 详细信息
来源: 评论
Load balancing promotes effective IoT-based data transfer in Snowflake Storage systems  3
Load balancing promotes effective IoT-based data transfer in...
收藏 引用
3rd international conference on intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Jesupriya, J. Kavitha, M. Deeksha Presidency University India Presidency College Bengaluru India
In networked devices, efficient data transportation is important for guaranteeing dependable and scalable Internet of Things (IoT) infrastructures. For this purpose, in the current work, a dynamic load-balancing mecha... 详细信息
来源: 评论
Privacy Preserving Attribute based Access Control with data Deduplication using RSA-BLAKE3-OCO for Secure Cloud Storage  1
Privacy Preserving Attribute based Access Control with Data ...
收藏 引用
1st international conference on intelligent systems and Computational Networks, ICISCN 2025
作者: Gayathri, G.N. Channakrishnaraju Sri Siddhartha Academy of Higher Education Department of Computer Science and Engineering Tumkur India
Nowadays, cloud storage is one of the popular application models in various fields, where the security and access permission of storage data are widely considered. De-duplication algorithms are designed to mitigate re... 详细信息
来源: 评论
intelligent Rail Sentinel a perspective of Indian Railway
Intelligent Rail Sentinel a perspective of Indian Railway
收藏 引用
2025 ieee international Students' conference on Electrical, Electronics and Computer Science, SCEECS 2025
作者: Limgaokar, Arun D. Hinge, Sharvari S. Vinchu, Yash S. Rane, Vivek S. Patel, Prashant B. Vibhute, Anup Department of Instrumentation Engineering Dr. D.Y. Patil Institute of Technology Maharashtra Pimpri Pune India
The paper presents a PLC and SCADA-based advanced safety system design for railway signaling and interlocking. While the Indian Railway systems are infrequently beset by issues, a solitary mishap over an extended time... 详细信息
来源: 评论