咨询与建议

限定检索结果

文献类型

  • 18,580 篇 会议
  • 112 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 18,708 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,017 篇 工学
    • 9,566 篇 计算机科学与技术...
    • 5,496 篇 软件工程
    • 3,078 篇 电气工程
    • 2,938 篇 控制科学与工程
    • 2,517 篇 信息与通信工程
    • 956 篇 仪器科学与技术
    • 932 篇 交通运输工程
    • 931 篇 机械工程
    • 642 篇 生物工程
    • 630 篇 电子科学与技术(可...
    • 556 篇 动力工程及工程热...
    • 541 篇 生物医学工程(可授...
    • 484 篇 安全科学与工程
    • 389 篇 石油与天然气工程
    • 388 篇 网络空间安全
    • 259 篇 光学工程
  • 2,998 篇 管理学
    • 2,257 篇 管理科学与工程(可...
    • 1,132 篇 图书情报与档案管...
    • 866 篇 工商管理
  • 2,958 篇 理学
    • 1,520 篇 数学
    • 790 篇 生物学
    • 506 篇 统计学(可授理学、...
    • 485 篇 物理学
    • 393 篇 系统科学
    • 391 篇 化学
  • 620 篇 医学
    • 509 篇 临床医学
    • 444 篇 基础医学(可授医学...
    • 263 篇 公共卫生与预防医...
  • 328 篇 法学
    • 272 篇 社会学
  • 279 篇 经济学
    • 274 篇 应用经济学
  • 172 篇 教育学
  • 150 篇 农学
  • 33 篇 文学
  • 31 篇 军事学
  • 12 篇 艺术学

主题

  • 1,144 篇 data acquisition
  • 762 篇 data mining
  • 572 篇 real-time system...
  • 567 篇 data models
  • 444 篇 intelligent syst...
  • 420 篇 conferences
  • 420 篇 big data
  • 407 篇 cloud computing
  • 375 篇 internet of thin...
  • 360 篇 computational mo...
  • 346 篇 monitoring
  • 321 篇 computer archite...
  • 319 篇 sensor systems
  • 308 篇 machine learning
  • 306 篇 control systems
  • 304 篇 training
  • 302 篇 deep learning
  • 298 篇 feature extracti...
  • 287 篇 robot sensing sy...
  • 284 篇 neural networks

机构

  • 49 篇 university of ch...
  • 42 篇 lviv polytechnic...
  • 30 篇 hubei key labora...
  • 25 篇 school of comput...
  • 20 篇 west ukrainian n...
  • 18 篇 beijing key labo...
  • 17 篇 shenzhen institu...
  • 17 篇 chitkara univers...
  • 16 篇 university of el...
  • 15 篇 school of comput...
  • 15 篇 institute of aut...
  • 14 篇 faculty of compu...
  • 14 篇 school of artifi...
  • 14 篇 shenzhen institu...
  • 14 篇 peng cheng labor...
  • 13 篇 ieee
  • 13 篇 college of compu...
  • 12 篇 key laboratory o...
  • 12 篇 beijing univ pos...
  • 12 篇 yeshwantrao chav...

作者

  • 25 篇 anatoliy sachenk...
  • 22 篇 wu xinyu
  • 18 篇 anatoly sachenko
  • 16 篇 a. sachenko
  • 16 篇 liu yang
  • 16 篇 xiong gang
  • 15 篇 chen chen
  • 13 篇 sachenko anatoli...
  • 12 篇 xinyu wu
  • 12 篇 li yang
  • 12 篇 yang yang
  • 11 篇 zhang tao
  • 11 篇 wang lei
  • 11 篇 li peng
  • 11 篇 li li
  • 11 篇 kurosh madani
  • 11 篇 sachenko a.
  • 11 篇 wu bin
  • 11 篇 iryna turchenko
  • 11 篇 golovko vladimir

语言

  • 18,147 篇 英文
  • 494 篇 其他
  • 81 篇 中文
  • 2 篇 西班牙文
检索条件"任意字段=IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems"
18708 条 记 录,以下是811-820 订阅
排序:
A Hybrid Programming Course recommendation system using Fuzzy Logic and xDeepFM
A Hybrid Programming Course recommendation system using Fuzz...
收藏 引用
2023 international conference on intelligent systems, advanced computing and Communication, ISACC 2023
作者: Ghosh, Subhasish Bgc Trust University Bangladesh Department of Computer Science and Engineering Chittagong Bangladesh
The choice of courses is crucial to a student's career achievement. Different courses offered by various academic institutions need the students to browse the course outline in the current educational environment ... 详细信息
来源: 评论
IoT Architecture for Electricity Distribution Considering data Fusion and intelligent Decision Making  5
IoT Architecture for Electricity Distribution Considering Da...
收藏 引用
5th ieee international conference on Power, intelligent computing and systems, ICPICS 2023
作者: Bao, Shandong Xu, Kun Zheng, Lihua Shan, Yongze Liu, Yihao Li, Lingcong State Grid Heilongjiang Electric Power Co. Ltd. Mudanjiang Power Supply Company Mudanjiang China Northeastern Electric Power University Jilin China
Distribution Internet of Things is the embodiment of the application of power Internet of things in the field of distribution. This paper proposes a distribution Internet of Things architecture that combines data fusi... 详细信息
来源: 评论
AI2DS: advanced Deep Autoencoder-Driven Method for intelligent Network Intrusion Detection systems  4
AI2DS: Advanced Deep Autoencoder-Driven Method for Intellige...
收藏 引用
4th ieee international conference on Artificial Intelligence in Cybersecurity, ICAIC 2025
作者: Rahman, Md Habibur Martinez, Leo Mishra, Avdesh Nijim, Mais Goyal, Ayush Hicks, David Texas A&M University-Kingsville Department of Electrical Engineering and Computer Science KingsvilleTX78363 United States
Network security is a growing concern as digital infrastructure expands, and traditional measures struggle against modern cyber threats. With the increasing complexity of attacks, there is a need for more adaptive and... 详细信息
来源: 评论
advanced Distribution System State Estimation Techniques: A Review  1
Advanced Distribution System State Estimation Techniques: A ...
收藏 引用
1st ieee international conference on Smart and Sustainable Developments in Electrical Engineering, SSDEE 2025
作者: Ankam, Sruthi Basetti, Vedik Sen, Sachidananda SR University Dept. of E.E.E. Warangal India
This study provides an outline of Distribution System State Estimation (DSSE), a technique introduced by Fred Schweppes in 1970. Since then, SE has been crucial in managing and controlling electric transmission operat... 详细信息
来源: 评论
Visualization of data Cubes for Anomaly Detection in Network Traffic data Streams  11
Visualization of Data Cubes for Anomaly Detection in Network...
收藏 引用
11th ieee international conference on intelligent data acquisition and advanced computing systems - Technology and Applications (IDAACS)
作者: Ahlers, Volker Laue, Tim Wellermann, Nils Heine, Felix Univ Appl Sci & Arts Hannover Hannover Germany
For anomaly-based intrusion detection in computer networks, data cubes can be used for building a model of the normal behavior of each cell. During inference an anomaly score is calculated based on the deviation of ce... 详细信息
来源: 评论
A Smart Home Design with intelligent Patient Monitoring Features by Using Internet of Things (IoT) Enabled Communication Technology
A Smart Home Design with Intelligent Patient Monitoring Feat...
收藏 引用
2024 international conference on Innovative computing, intelligent Communication and Smart Electrical systems, ICSES 2024
作者: Prince, P. Rajabhushanam, C. Department of Computer Science and Engineering Tamil Nadu Chennai India
The integration of Internet of Things (IoT) technology into smart home systems has revolutionized patient monitoring by providing real-time health insights and automated environmental adjustments. This study focuses o... 详细信息
来源: 评论
The Application of Internet of Things Technology in intelligent Wind Power Grid  4
The Application of Internet of Things Technology in Intellig...
收藏 引用
4th international conference on Energy Engineering and Power systems, EEPS 2024
作者: Xu, Jianuo Lappeenranta University of Technology Lappeenranta53850 Finland
With the rapid development of Internet of Things technology, people can integrate the Internet of Things in more and more work scenarios, making work simpler and more intelligent. For wind power generation technology,... 详细信息
来源: 评论
Multi-Objective Optimization on Stealthy False data Injection Attack in Smart Power Transmission Grid
Multi-Objective Optimization on Stealthy False Data Injectio...
收藏 引用
2023 international conference on Networks, Communications and intelligent computing, NCIC 2023
作者: Ye, Tong Zhou, Boyang Nie, Yinghui Zhu, Zhen Zhejiang Lab China Zhejiang Lab UCAS HIAS China
In smart power transmission grids, the existing energy management systems (EMSes) unprecedentedly faces the stealthy false data injection attack (SFDI), where an adversary aims to compromise the optimal power flow ana... 详细信息
来源: 评论
Novel Dual-Encryption and Compression Strategy: AES and Fernet for Secure Multimedia Transmission  5
Novel Dual-Encryption and Compression Strategy: AES and Fern...
收藏 引用
5th international conference on IoT Based Control Networks and intelligent systems, ICICNIS 2024
作者: Zala, Dhruvi Karansinh Akram Khan, Mohammad Madhav University Faculty of Engineering and Technology Rajasthan 307026 India
The increasing variety of multimedia data types, such as text, images, and audio, has necessitated advanced data encryption techniques to ensure secure transmission and storage. Traditional encryption methods, includi... 详细信息
来源: 评论
Research on Network Security Protection System Based on Fusion of Computer Big data Technology  5
Research on Network Security Protection System Based on Fusi...
收藏 引用
5th ieee international conference on Power, intelligent computing and systems, ICPICS 2023
作者: Xuxi, Yin Information Engineering College Guangzhou Huashang Vocational College Guangzhou China
In this paper, a set of intelligent detection system for complex network intrusion data is designed. The system stores complex network traffic that is difficult to determine to the Hadoop data warehouse of the distrib... 详细信息
来源: 评论