咨询与建议

限定检索结果

文献类型

  • 5,784 篇 会议
  • 113 册 图书
  • 32 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,930 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,997 篇 工学
    • 2,300 篇 计算机科学与技术...
    • 1,252 篇 信息与通信工程
    • 1,124 篇 软件工程
    • 791 篇 电气工程
    • 756 篇 控制科学与工程
    • 164 篇 机械工程
    • 158 篇 电子科学与技术(可...
    • 148 篇 动力工程及工程热...
    • 125 篇 网络空间安全
    • 121 篇 生物工程
    • 113 篇 仪器科学与技术
    • 108 篇 生物医学工程(可授...
    • 90 篇 交通运输工程
    • 79 篇 安全科学与工程
    • 61 篇 建筑学
  • 684 篇 理学
    • 378 篇 数学
    • 153 篇 物理学
    • 143 篇 系统科学
    • 136 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 71 篇 化学
  • 542 篇 管理学
    • 435 篇 管理科学与工程(可...
    • 179 篇 工商管理
    • 147 篇 图书情报与档案管...
    • 59 篇 公共管理
  • 171 篇 医学
    • 98 篇 临床医学
    • 98 篇 公共卫生与预防医...
    • 90 篇 基础医学(可授医学...
  • 121 篇 法学
    • 95 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 59 篇 农学
  • 58 篇 文学
  • 25 篇 教育学
  • 20 篇 军事学
  • 1 篇 艺术学

主题

  • 333 篇 control systems
  • 327 篇 social networkin...
  • 271 篇 communication sy...
  • 238 篇 wireless communi...
  • 230 篇 protocols
  • 212 篇 process control
  • 210 篇 traffic control
  • 210 篇 wireless sensor ...
  • 209 篇 computational mo...
  • 187 篇 access control
  • 183 篇 mobile communica...
  • 165 篇 software defined...
  • 158 篇 quality of servi...
  • 149 篇 routing
  • 147 篇 computer archite...
  • 146 篇 bandwidth
  • 141 篇 internet of thin...
  • 139 篇 throughput
  • 133 篇 monitoring
  • 129 篇 security

机构

  • 56 篇 state key labora...
  • 22 篇 chitkara univers...
  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 10 篇 school of inform...
  • 9 篇 the 54th researc...
  • 9 篇 beijing jiaotong...
  • 8 篇 department of au...
  • 8 篇 maharishi school...
  • 8 篇 amrita vishwa vi...
  • 7 篇 delhi technologi...
  • 7 篇 beijing fibrlink...
  • 7 篇 electric power d...
  • 7 篇 technical univer...
  • 7 篇 univ petr & ener...
  • 7 篇 beijing universi...
  • 7 篇 department of el...
  • 7 篇 daffodil interna...
  • 6 篇 amrita vishwa vi...
  • 6 篇 huazhong univers...

作者

  • 27 篇 soman k. p.
  • 17 篇 k.p. soman
  • 14 篇 yang yang
  • 12 篇 singh rajesh
  • 12 篇 soman k.p.
  • 10 篇 geyong min
  • 10 篇 tai-hoon kim
  • 10 篇 leonard barolli
  • 9 篇 vishnu sharma
  • 9 篇 fatos xhafa
  • 9 篇 li jun
  • 8 篇 chen junliang
  • 8 篇 r. ramanathan
  • 8 篇 gehlot anita
  • 7 篇 rashidov aldeniz
  • 7 篇 wang lei
  • 7 篇 huo yonghua
  • 7 篇 jun li
  • 7 篇 cheng bo
  • 7 篇 kumar adesh

语言

  • 5,816 篇 英文
  • 69 篇 其他
  • 46 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Advances in Computing, Communication Control and Networking"
5930 条 记 录,以下是231-240 订阅
排序:
Advancing Multilingual communication NLP based Translational Speech to Speech Dialogue System for Indian Languages  1
Advancing Multilingual Communication NLP based Translational...
收藏 引用
1st IEEE international conference on Electronics, computing, communication and control Technology, ICECCC 2024
作者: Agarwal, Umansh Gupta, Rishika Saranya, G. School of Computing College of Engineering and Technology SRM Institute of Science and Technology Department of Networking and Communications Tamil Nadu Kattankulathur Chennai603203 India
Today it is more crucial than ever to remove language barriers in the linked world of today. This study compares and contrasts on-demand live translation services with an emphasis on effectiveness and accuracy. It pre... 详细信息
来源: 评论
Detection and Classification of Alcoholic and control Scalp EEG Signals using Discrete Wavelet Transform and Gradient Boosted Tree classifiers  14
Detection and Classification of Alcoholic and Control Scalp ...
收藏 引用
14th international conference on computing communication and networking Technologies, ICCCNT 2023
作者: Korada, Kusuma Kumari Goru, Hema Kumar Medisetty, Pravallika Paladugu, Gnana Deepika Gundu, Janu Mayusha Velagapudi Ramakrishna Siddartha Engineering College Ece Department Vijayawada India
Alcoholism is characterized by an inability to control drinking because of physical and psychological dependence on alcohol. The liver, immune system, brain, heart and other organs of the human body are severely damag... 详细信息
来源: 评论
Distributed Caching control Strategy in Mobile Edge computing: A Mean Field Game Approach  19
Distributed Caching Control Strategy in Mobile Edge Computin...
收藏 引用
19th Annual IEEE international conference on Sensing, communication, and networking (IEEE SECON)
作者: Feng, Hao Guo, Songtao Chen, Chao Jiao, Xianlong Southwest Univ Sch Elect & Informat Engn Chongqing 400715 Peoples R China Chongqing Univ Coll Comp Sci Chongqing 400044 Peoples R China
Mobile edge computing (MEC) is a novel computing paradigm that sinks the computing capacity of cloud servers into edge nodes to reduce network latency. By caching the popular content at small base station (SBS) can re... 详细信息
来源: 评论
Automated Traffic Monitoring control for Improved Visibility On Curve Hilly Road Using Internet-of-Things  14
Automated Traffic Monitoring Control for Improved Visibility...
收藏 引用
14th international conference on computing communication and networking Technologies, ICCCNT 2023
作者: Agrawal, Kriti Jain, Payal Sharma, Sachin Rai Goyal, Himanshu Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India
Traffic management is a frequent problem these days due to the rapid growth of urban population. There are more accidents due to improper traffic management. Accidents happen frequently, especially in hilly areas, but... 详细信息
来源: 评论
Access control and Encryption Techniques during Big Data Accessing Stage  14
Access Control and Encryption Techniques during Big Data Acc...
收藏 引用
14th international conference on computing communication and networking Technologies, ICCCNT 2023
作者: Ahmed, Shoaib Dubey, Aditya Rasool, Akhtar Gyanchandani, Mansi Maulana Azad National Institute of Technology Department of Computer Science and Engineering Bhopal India
Privacy issues and data security are made worse by Big Data's velocity, volume, and variety. Being able to extract information from enormous amounts of data has gained relevance. The amount of data being produced ... 详细信息
来源: 评论
Stochastic Event Detection and Quantization for Catastrophe Prevention  15
Stochastic Event Detection and Quantization for Catastrophe ...
收藏 引用
15th international conference on computing communication and networking Technologies, ICCCNT 2024
作者: Habibi, Mohammad Tennessee State University Department of Mechanical and Manufacturing Engineering NashvilleTN37209 United States
Schools, stadiums, malls, and other locations that are frequented by large volumes of people can be described as Soft Targets and Crowded Places (ST-CPs). The relative lack of comprehensive security measures at these ... 详细信息
来源: 评论
control Method of Dynamic Clustering Network in Wireless Sensor Network  5
Control Method of Dynamic Clustering Network in Wireless Sen...
收藏 引用
5th IEEE international conference on Power, Intelligent computing and Systems, ICPICS 2023
作者: Liu, Hailin Zhang, Chengguang Hu, Bingfu Weifang Engineering Vocational College Department of Information Engineering Shandong Province Qingzhou China
To solve the routing holes in wireless sensor networks caused by high energy consumption of cluster head nodes and shortage of spectrum, a dynamic clustering based method for wireless sensor network networking control... 详细信息
来源: 评论
Intelligent system of labor market regulation based on the evolutionary modeling of employment  4
Intelligent system of labor market regulation based on the e...
收藏 引用
4th international conference on advances in computing, communication control and networking, ICAC3N 2022
作者: Rustamovich, Akhatov Akmal Mekhriddin, Nurmamatov Fayzullo, Nazarov Sabharwal, Munish Samarkand State University Vice-Rector for International Relations Samarkand Uzbekistan Samarkand State University Qahramonovich Faculty of Digital Technologies Samarkand Uzbekistan Samarkand State University Mahmadiyorovich Faculty of Digital Technologies Samarkand Uzbekistan School of Computing Science & Engineering Galgotias University India
Using individual systems to solve an existing problem will allow you to quickly solve the problem for a while. Gap studies conducted on the basis of methods of predictive analysis of the labor market have proposed an ... 详细信息
来源: 评论
Enhancing the Security of Healthcare Data in Cloud computing Environments  2
Enhancing the Security of Healthcare Data in Cloud Computing...
收藏 引用
2nd international conference on Computational Intelligence, communication Technology and networking, CICTN 2025
作者: Sajwan, Himani Kumari, Anjali Chauhan, Garima Kumar, Raj School of Computer Applications Manav Rachna International Institute of Research & Studies Faridabad India
Cloud computing has completely evolved the way health care data is managed, but it also introduces critical security vulnerabilities that can compromise the privacy of patient information and threaten regulatory compl... 详细信息
来源: 评论
Study of K-string Hydraulic Manifold for Optimal control and Efficiency on Fluid Powered Vehicle  15
Study of K-string Hydraulic Manifold for Optimal Control and...
收藏 引用
15th international conference on computing communication and networking Technologies, ICCCNT 2024
作者: Habibi, Mohammad Tennessee State University Department of Mechanical and Manufacturing Engineering NashvilleTN37209 United States
In a world where the pursuit of sustainability and environmental consciousness has taken center stage, the search for cleaner and more efficient means of transportation has never been more critical. This study uses pr... 详细信息
来源: 评论