咨询与建议

限定检索结果

文献类型

  • 5,784 篇 会议
  • 113 册 图书
  • 32 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,930 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,997 篇 工学
    • 2,300 篇 计算机科学与技术...
    • 1,252 篇 信息与通信工程
    • 1,124 篇 软件工程
    • 791 篇 电气工程
    • 756 篇 控制科学与工程
    • 164 篇 机械工程
    • 158 篇 电子科学与技术(可...
    • 148 篇 动力工程及工程热...
    • 125 篇 网络空间安全
    • 121 篇 生物工程
    • 113 篇 仪器科学与技术
    • 108 篇 生物医学工程(可授...
    • 90 篇 交通运输工程
    • 79 篇 安全科学与工程
    • 61 篇 建筑学
  • 684 篇 理学
    • 378 篇 数学
    • 153 篇 物理学
    • 143 篇 系统科学
    • 136 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 71 篇 化学
  • 542 篇 管理学
    • 435 篇 管理科学与工程(可...
    • 179 篇 工商管理
    • 147 篇 图书情报与档案管...
    • 59 篇 公共管理
  • 171 篇 医学
    • 98 篇 临床医学
    • 98 篇 公共卫生与预防医...
    • 90 篇 基础医学(可授医学...
  • 121 篇 法学
    • 95 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 59 篇 农学
  • 58 篇 文学
  • 25 篇 教育学
  • 20 篇 军事学
  • 1 篇 艺术学

主题

  • 333 篇 control systems
  • 327 篇 social networkin...
  • 271 篇 communication sy...
  • 238 篇 wireless communi...
  • 230 篇 protocols
  • 212 篇 process control
  • 210 篇 traffic control
  • 210 篇 wireless sensor ...
  • 209 篇 computational mo...
  • 187 篇 access control
  • 183 篇 mobile communica...
  • 165 篇 software defined...
  • 158 篇 quality of servi...
  • 149 篇 routing
  • 147 篇 computer archite...
  • 146 篇 bandwidth
  • 141 篇 internet of thin...
  • 139 篇 throughput
  • 133 篇 monitoring
  • 129 篇 security

机构

  • 56 篇 state key labora...
  • 22 篇 chitkara univers...
  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 10 篇 school of inform...
  • 9 篇 the 54th researc...
  • 9 篇 beijing jiaotong...
  • 8 篇 department of au...
  • 8 篇 maharishi school...
  • 8 篇 amrita vishwa vi...
  • 7 篇 delhi technologi...
  • 7 篇 beijing fibrlink...
  • 7 篇 electric power d...
  • 7 篇 technical univer...
  • 7 篇 univ petr & ener...
  • 7 篇 beijing universi...
  • 7 篇 department of el...
  • 7 篇 daffodil interna...
  • 6 篇 amrita vishwa vi...
  • 6 篇 huazhong univers...

作者

  • 27 篇 soman k. p.
  • 17 篇 k.p. soman
  • 14 篇 yang yang
  • 12 篇 singh rajesh
  • 12 篇 soman k.p.
  • 10 篇 geyong min
  • 10 篇 tai-hoon kim
  • 10 篇 leonard barolli
  • 9 篇 vishnu sharma
  • 9 篇 fatos xhafa
  • 9 篇 li jun
  • 8 篇 chen junliang
  • 8 篇 r. ramanathan
  • 8 篇 gehlot anita
  • 7 篇 rashidov aldeniz
  • 7 篇 wang lei
  • 7 篇 huo yonghua
  • 7 篇 jun li
  • 7 篇 cheng bo
  • 7 篇 kumar adesh

语言

  • 5,816 篇 英文
  • 69 篇 其他
  • 46 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Advances in Computing, Communication Control and Networking"
5930 条 记 录,以下是261-270 订阅
排序:
IoT-Enabled Asthma Trackers for Children with KNN for Improved Breathing control  5
IoT-Enabled Asthma Trackers for Children with KNN for Improv...
收藏 引用
5th IEEE international conference on advances in Electrical, computing, communication and Sustainable Technologies, ICAECT 2025
作者: Sathyanathan, P. Balachander, K. Pandey, Pramod Srinivasan, V. Prasanna Ganeshbabu, T.R. Muthulekshmi, M. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Electrical and Electronics Engineering Tamil Nadu Chennai India R.M.K. College of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India Nagpur Campus Maharashtra Pune India R.M.D. Engineering College Department of Information Technology Tamil Nadu Chennai India Department of Electronics and Communication Tamil Nadu Namakkal India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Biomedical Engineering Tamil Nadu Chennai India
Managing asthma in children is a complex task that needs constant vigilance and personalized treatments to get the best potential control. For better respiratory management, an Internet of Things (IoT)-enabled pediatr... 详细信息
来源: 评论
Toxic Chat Detection using Deep Learning  14
Toxic Chat Detection using Deep Learning
收藏 引用
14th international conference on advances in computing, control, and Telecommunication Technologies, ACT 2023
作者: Kaulage, Anant More, Aniket Binnar, Nilesh Narnaware, Paridhi Narote, Atharv Vishwakarma Institute of Technology Department of Computer Engineering Pune India
The value of remaining respectful in an online discussion cannot be emphasised. "Wilful and repetitive harm perpetrated through the medium of electronic messaging" is characterised as cyberbullying. It inclu... 详细信息
来源: 评论
Sustainable Manufacturing in Industry 4.0: Enhancing Safety and Rapid Response in Industrial control Systems with Smart Edge IoT Devices  15
Sustainable Manufacturing in Industry 4.0: Enhancing Safety ...
收藏 引用
15th international conference on computing communication and networking Technologies, ICCCNT 2024
作者: Mathew, Midhya Kakani, Divyam Somaiya Vidyavihar University K J Somaiya College of Engineering Electronics Engineering Department Mumbai400077 India
In this research we delve into the dynamic synergy between sustainable energy and Industry 4.0 within the field of 'Energy and Sustainable Engineering.' It centers on integrating an emergency email generation ... 详细信息
来源: 评论
Efficient Data Transmission using PSO Algorithm in Wireless Sensor Networks  15
Efficient Data Transmission using PSO Algorithm in Wireless ...
收藏 引用
15th international conference on advances in computing, control, and Telecommunication Technologies, ACT 2024
作者: Kalaiselvi, K. Thilak, K.Deepa Devi, K.Lalitha Kumaresan, K. Malathi, M. Faculty of Engineering and technology Department of Networking and communications SRM Institute of science and technology Kattankulathur Tamilnadu Chennai India Department of Computer science and Engineering Sathyabama Institute of Science and Technology India Department of CSE KSR College of Engineering Tiruchengode Tamilnadu Namakkal India Tamilnadu Namakkal India
A Wireless Sensor Network is made up of a large number of small, low-power sensor nodes that are randomly or manually distributed across an uncontrolled target ***, the WSNs' main constraint is the sensor nodes... 详细信息
来源: 评论
Real-Time Threat Detection in Critical Infrastructure with Machine Learning and Industrial control System Data  3
Real-Time Threat Detection in Critical Infrastructure with M...
收藏 引用
3rd international conference on Smart Generation computing, communication and networking, SMART GENCON 2023
作者: Kumar, Atul Sharma, Ishu Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
The present study introduces a framework for the detection of threats in critical infrastructure in real-time. This framework leverages the capabilities of machine learning and utilizes data from Industrial control Sy... 详细信息
来源: 评论
Smart Water Management System: Automated Water Billing with Detection and control of Water Leakage  15
Smart Water Management System: Automated Water Billing with ...
收藏 引用
15th international conference on advances in computing, control, and Telecommunication Technologies, ACT 2024
作者: Ninawe, Swapnil S. Pavithra, G. Manjunath, T.C. Samyama Gunjal, G.H. Department of Electronics & Communication Engineering Dayananda Sagar College of Engineering Karnataka Bangalore India Department of Computer Science & Engineering University Visvesvaraya College of Engineering Bangalore University Bangalore India
Water leakage is an important component of water losses. In addition to raising consumer awareness of their water use, metering is also an important way to identify and locate water leakage. A leakage detection progra... 详细信息
来源: 评论
Computer Vision for Automated Quality Inspection in Manufacturing  3
Computer Vision for Automated Quality Inspection in Manufact...
收藏 引用
international conference on advances in computing, communication and Applied Informatics (ACCAI)
作者: Balakrishna, Kasharaju Tiwari, Vidhika Deshpande, Arati V. Patil, Sunilkumar Rajaram Garg, Ajay Kumar Geetha, B. T. SR Univ Sch Comp Sci & Artificial Intelligence Warangal Andhra Pradesh India DPGITM Dept Mech Engn Gurugram Haryana India VIT Comp Engn Pune Maharashtra India Bharati Vidyapeeths Coll Engn Lavale Pune Dept Mech Engn Pune Maharashtra India Univ Delhi Commerce Delhi India Saveetha Univ SIMATS Saveetha Sch Engn Dept ECE Chennai Tamil Nadu India
The study demonstrates how computer vision systems can enhance icing product quality by improving its thickness, effectiveness, and delicacy against blights. These systems use advanced imaging techniques and machine l... 详细信息
来源: 评论
Design of 32 Bit RISC V Processor  15
Design of 32 Bit RISC V Processor
收藏 引用
15th international conference on computing communication and networking Technologies, ICCCNT 2024
作者: Meeradevi, T. Mohanraj, K. Mourissh, B.M. Santhosh Sivaa, V. Samikannu, Ravi Sasikala, S. Kongu Engineering College Department of ECE Perundurai Erode India International University of Science and Technology Department of Electrical Computer and Telecommunications Engineering Palapye Botswana
This paper presents the design and implementation of a RISC-V processor core with a single-stage architecture, focusing on the execution of the base 32I instruction set. The processor core features a 32-bit address an... 详细信息
来源: 评论
User controlled Routing Exploiting PCEPS and Inter-domain Label Switched Paths  2nd
User Controlled Routing Exploiting PCEPS and Inter-domain La...
收藏 引用
2nd international conference on advances in computing Research-ACR
作者: Boldrini, Leonardo Bachiddu, Matteo Koning, Ralph Grosso, Paola Univ Amsterdam MNS Grp Amsterdam Netherlands Politecn Torino NETGrp Turin Italy SIDN Labs Arnhem Netherlands
The UPIN project tackles the security issue of the Internet at its root, by providing more transparency and control over the network to the end user. Traffic Engineering is required to create paths across multiple dom... 详细信息
来源: 评论
An exploratory study on how release management practices minimize the impact factors affecting software releases  3
An exploratory study on how release management practices min...
收藏 引用
3rd international conference on advances in Electrical, computing, communication and Sustainable Technologies, ICAECT 2023
作者: Raja Vennakandla, Charan Sai Riaz, Sadia Chowdhury, Anish Roy Business Administration SP Jain School of Global Management Sydney Australia Information Technology SP Jain School of Global Management Sydney Australia
Software delivery is always challenging without any issues. During this process of software delivery, release management team plays a significant role in planning, communication, coordination, and implementation. This... 详细信息
来源: 评论