咨询与建议

限定检索结果

文献类型

  • 17,933 篇 会议
  • 272 册 图书
  • 116 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 18,321 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 10,194 篇 工学
    • 7,355 篇 计算机科学与技术...
    • 4,389 篇 软件工程
    • 3,503 篇 信息与通信工程
    • 2,691 篇 控制科学与工程
    • 2,632 篇 电气工程
    • 1,030 篇 电子科学与技术(可...
    • 803 篇 机械工程
    • 741 篇 动力工程及工程热...
    • 567 篇 仪器科学与技术
    • 561 篇 生物工程
    • 529 篇 交通运输工程
    • 520 篇 生物医学工程(可授...
    • 448 篇 网络空间安全
    • 433 篇 安全科学与工程
    • 367 篇 环境科学与工程(可...
    • 362 篇 光学工程
    • 326 篇 石油与天然气工程
  • 2,758 篇 理学
    • 1,206 篇 数学
    • 833 篇 物理学
    • 626 篇 生物学
    • 368 篇 系统科学
    • 306 篇 统计学(可授理学、...
  • 2,198 篇 管理学
    • 1,696 篇 管理科学与工程(可...
    • 791 篇 工商管理
    • 666 篇 图书情报与档案管...
  • 639 篇 医学
    • 466 篇 临床医学
    • 422 篇 基础医学(可授医学...
    • 389 篇 公共卫生与预防医...
  • 462 篇 法学
    • 393 篇 社会学
  • 298 篇 经济学
    • 297 篇 应用经济学
  • 221 篇 农学
  • 214 篇 教育学
  • 136 篇 文学
  • 59 篇 军事学
  • 5 篇 艺术学

主题

  • 1,088 篇 cloud computing
  • 663 篇 wireless communi...
  • 612 篇 internet of thin...
  • 507 篇 real-time system...
  • 444 篇 computer archite...
  • 439 篇 control systems
  • 414 篇 protocols
  • 390 篇 wireless sensor ...
  • 387 篇 computational mo...
  • 363 篇 mobile communica...
  • 337 篇 monitoring
  • 309 篇 access control
  • 306 篇 security
  • 276 篇 reliability
  • 266 篇 traffic control
  • 265 篇 deep learning
  • 262 篇 throughput
  • 261 篇 accuracy
  • 245 篇 mobile computing
  • 233 篇 communication sy...

机构

  • 62 篇 lovely professio...
  • 32 篇 maharishi school...
  • 31 篇 department of co...
  • 26 篇 chitkara univers...
  • 23 篇 chitkara centre ...
  • 23 篇 the islamic univ...
  • 23 篇 jaipur national ...
  • 18 篇 department of co...
  • 18 篇 college of compu...
  • 18 篇 dept. of electro...
  • 16 篇 department of co...
  • 16 篇 department of co...
  • 15 篇 beijing jiaotong...
  • 14 篇 college of medic...
  • 14 篇 mlr institute of...
  • 14 篇 department of co...
  • 14 篇 department of co...
  • 13 篇 faculty of manuf...
  • 13 篇 department of co...
  • 12 篇 chitkara univers...

作者

  • 50 篇 manjunath t.c.
  • 34 篇 singh bhim
  • 15 篇 tomforde sven
  • 15 篇 leonard barolli
  • 13 篇 tai-hoon kim
  • 11 篇 geyong min
  • 10 篇 stamatescu grigo...
  • 10 篇 mugica francisco
  • 9 篇 ramachandran mut...
  • 9 篇 li yang
  • 9 篇 li li
  • 9 篇 chang victor
  • 9 篇 rajkumar buyya
  • 9 篇 tripty singh
  • 8 篇 ramesh s.
  • 8 篇 ajay kumar
  • 8 篇 amit joshi
  • 8 篇 m.m. hafizur rah...
  • 8 篇 leymann frank
  • 8 篇 evjola spaho

语言

  • 17,645 篇 英文
  • 488 篇 其他
  • 211 篇 中文
  • 4 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Advanced Communication Control and Computing Technologies*"
18322 条 记 录,以下是51-60 订阅
排序:
A Greedy Dynamic Task Offloading and Service Management in V2V Networks  11
A Greedy Dynamic Task Offloading and Service Management in V...
收藏 引用
11th international conference on Vehicle Technology and Intelligent Transport Systems, VEHITS 2025
作者: Xing, Hanyang Chengdu China
This paper introduces an advanced framework for optimizing task offloading and service caching in Vehicle-to-Vehicle (V2V) communication networks. The proposed approach leverages a greedy algorithm to address key chal... 详细信息
来源: 评论
A Framework for Real-Time Monitoring of Power Consumption of Distributed Calculation on Computational Cluster
A Framework for Real-Time Monitoring of Power Consumption of...
收藏 引用
15th international conference on Cloud computing and Services Science, CLOSER 2025
作者: Krechowicz, Adam Faculty of Electrical Engineering Automatic Control and Computer Science Kielce University of Technology al. 1000-lecia PP 7 Kielce Poland
This paper proposes a framework for real-time monitoring of the power consumption of distributed calculation on the nodes of the cluster. The framework allows to visualize and analyze the provider results based on the... 详细信息
来源: 评论
A Comprehensive Analysis of Deep Learning Techniques for Wheat Yellow Rust Disease Detection and Classification  3
A Comprehensive Analysis of Deep Learning Techniques for Whe...
收藏 引用
3rd international conference on Intelligent Data communication technologies and Internet of Things, IDCIoT 2025
作者: Mishra, Komal Kaur, Kawaljit University Institute of Computing Chandigarh University Punjab India
Puccinia striiformis f. sp. tritici, the pathogen responsible for yellow rust in wheat, poses a significant threat to global wheat manufacture, causing substantial economic and agricultural losses. The timely and prec... 详细信息
来源: 评论
AI-based Pneumonia Detection using a Deep Context Axial Reverse Capsule Neural Network with Sea-Horse Optimizer  3
AI-based Pneumonia Detection using a Deep Context Axial Reve...
收藏 引用
3rd international conference on Intelligent Data communication technologies and Internet of Things, IDCIoT 2025
作者: Mohideen AbdulKader, M. Tuteja, Ankush Joshi, Darsh Tholath, Joshua Bobby Department of Computing Technologies School of Computing SRM Institute of Science and Technology Kattankulathur Tamilnadu Chengalpattu India
Pneumonia detection with AI uses advanced deep learning algorithms for identifying the patterns in the chest X-ray images which makes diagnosis faster and efficient for physicians. AI-powered radiography improved the ... 详细信息
来源: 评论
Hive Destruction Protocol: An Automated Defense System Utilizing YOLO Human Recognition and Real-Time GPS Tracking  3
Hive Destruction Protocol: An Automated Defense System Utili...
收藏 引用
3rd international conference on Intelligent and Innovative technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Vyshak, T.M. Gaayana, G.R. Sarala, T. Dept. of Electronics and Communication Engineering Bnm Institute of Technology Affiliated to Vtu Bengaluru India
The Hive Destruction Protocol (HDP) introduces a cutting-edge automated border defense system that enhances security operations through advanced human recognition using YOLO, precise GPS tracking, and coordinated dron... 详细信息
来源: 评论
A Sensor-Driven Automated Hydroponic System for Optimized Plant Growth in Diverse Environments  3
A Sensor-Driven Automated Hydroponic System for Optimized Pl...
收藏 引用
3rd international conference on Intelligent and Innovative technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Joshitha, C. Ranga, Bobba Pandu Reddy, Bandi Harshini Nitin Koneru Lakshmaiah Education Foundation Department of Electronics and Communication Engineering Telangana Hyderabad500075 India
This research paper presents the design and implementation of an automated hydroponic system capable of managing both closed and open setups in indoor and outdoor environments. The system integrates sensors and microc... 详细信息
来源: 评论
Generating Accessibility: Using AI to Improve Higher Education for the Visually Impaired  17
Generating Accessibility: Using AI to Improve Higher Educati...
收藏 引用
17th international conference on Computer Supported Education, CSEDU 2025
作者: Schauer, Sophie Simbeck, Katharina Schüßler, Leon School of Computing Communication and Business HTW University of Applied Sciences Berlin Wilhelminenhofstraße Berlin Germany
Visually impaired students face many obstacles in higher education, including access to adapted course material. While accessibility is a legal requirement in many countries, its implementation is linked to practical ... 详细信息
来源: 评论
Enhancing Smart Grid Security with Quantum Cryptography: A BB84-based Framework  3
Enhancing Smart Grid Security with Quantum Cryptography: A B...
收藏 引用
3rd international conference on Intelligent Data communication technologies and Internet of Things, IDCIoT 2025
作者: Garg, Shail Gayatri, Yerukola Surya Kausthub, A. Rajagopal, Shinu M. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
The study investigates how quantum cryptography can be employed to improve security in smart grid communication networks. Attempting to use the BB84 QKD protocol, it allows secure creation and management of those cryp... 详细信息
来源: 评论
Research on dynamic network security detection technology based on SDN  4
Research on dynamic network security detection technology ba...
收藏 引用
4th international conference on Network communication and Information Security, ICNCIS 2024
作者: Zhao, Kai Beijing Polytechnic Beijing100176 China
Traditional network architecture can no longer meet the development needs of technologies such as cloud computing and big data. SDN network architecture has the characteristics of high openness and programmability, wh... 详细信息
来源: 评论
Blockchain based File Storage and File Sharing System with Time-Restricted Access using InterPlanetary File System  3
Blockchain based File Storage and File Sharing System with T...
收藏 引用
3rd international conference on Intelligent Data communication technologies and Internet of Things, IDCIoT 2025
作者: Venkat Prashanth, M. Hemesh Verma, K. Chauhan, Jaykishor Prasad Rajagopal, Shinu M. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bangalore India
This paper presents a file storage and sharing system implemented using IPFS Pinata, *** and Hardhat which offer decentralized, effective, and secure access to digital assets. This system also enables the ability to u... 详细信息
来源: 评论