咨询与建议

限定检索结果

文献类型

  • 79,868 篇 会议
  • 2,045 册 图书
  • 852 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 82,771 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 48,411 篇 工学
    • 37,956 篇 计算机科学与技术...
    • 27,176 篇 软件工程
    • 15,909 篇 信息与通信工程
    • 6,868 篇 控制科学与工程
    • 5,572 篇 电气工程
    • 4,392 篇 生物工程
    • 4,140 篇 电子科学与技术(可...
    • 3,335 篇 生物医学工程(可授...
    • 3,260 篇 机械工程
    • 2,776 篇 网络空间安全
    • 2,735 篇 仪器科学与技术
    • 2,520 篇 动力工程及工程热...
    • 2,204 篇 安全科学与工程
    • 2,030 篇 光学工程
    • 1,738 篇 交通运输工程
    • 1,622 篇 化学工程与技术
  • 17,762 篇 理学
    • 9,064 篇 数学
    • 4,783 篇 生物学
    • 4,093 篇 物理学
    • 2,879 篇 统计学(可授理学、...
    • 2,185 篇 系统科学
    • 1,873 篇 化学
  • 14,033 篇 管理学
    • 8,630 篇 管理科学与工程(可...
    • 6,558 篇 图书情报与档案管...
    • 4,356 篇 工商管理
  • 3,506 篇 医学
    • 2,799 篇 临床医学
    • 2,708 篇 基础医学(可授医学...
    • 1,888 篇 公共卫生与预防医...
  • 2,751 篇 法学
    • 2,254 篇 社会学
  • 1,699 篇 经济学
    • 1,620 篇 应用经济学
  • 1,323 篇 教育学
  • 1,271 篇 农学
  • 650 篇 文学
  • 263 篇 军事学
  • 97 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 3,552 篇 cloud computing
  • 2,628 篇 mobile communica...
  • 2,496 篇 wireless communi...
  • 2,249 篇 computational mo...
  • 2,023 篇 internet of thin...
  • 1,882 篇 mobile computing
  • 1,869 篇 wireless sensor ...
  • 1,779 篇 accuracy
  • 1,575 篇 protocols
  • 1,429 篇 security
  • 1,405 篇 real-time system...
  • 1,368 篇 feature extracti...
  • 1,367 篇 servers
  • 1,350 篇 computer archite...
  • 1,344 篇 deep learning
  • 1,203 篇 machine learning
  • 1,186 篇 training
  • 1,172 篇 information tech...
  • 1,159 篇 artificial intel...
  • 1,121 篇 routing

机构

  • 342 篇 department of co...
  • 298 篇 maharishi school...
  • 223 篇 chitkara univers...
  • 173 篇 department of co...
  • 166 篇 school of comput...
  • 125 篇 shenyang institu...
  • 119 篇 maharishi school...
  • 102 篇 university of ch...
  • 76 篇 centre of interd...
  • 74 篇 department of la...
  • 69 篇 centre of resear...
  • 67 篇 karnataka bangal...
  • 64 篇 department of el...
  • 63 篇 department of in...
  • 62 篇 chitkara univers...
  • 60 篇 department of el...
  • 59 篇 lovely professio...
  • 53 篇 school of inform...
  • 52 篇 computer science...
  • 52 篇 state key labora...

作者

  • 104 篇 leonard barolli
  • 39 篇 wang lei
  • 35 篇 li yang
  • 33 篇 jui c.c.h.
  • 33 篇 oshima a.
  • 33 篇 tsuda r.
  • 33 篇 kim j.h.
  • 33 篇 bergman d.r.
  • 32 篇 wang jing
  • 32 篇 allen m.
  • 31 篇 zhang lei
  • 27 篇 yingsong li
  • 27 篇 u. qasim
  • 27 篇 malik bader alaz...
  • 27 篇 fatos xhafa
  • 25 篇 zhang tao
  • 25 篇 jian wang
  • 23 篇 sudeep tanwar
  • 22 篇 li peng
  • 22 篇 kumar ajay

语言

  • 80,502 篇 英文
  • 1,656 篇 其他
  • 731 篇 中文
  • 5 篇 阿拉伯文
  • 3 篇 法文
  • 3 篇 俄文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Advances in Information Communication Technology and Computing"
82771 条 记 录,以下是261-270 订阅
排序:
A Quantum Approach for Text based Steganography  15
A Quantum Approach for Text based Steganography
收藏 引用
15th international conference on advances in computing, Control, and Telecommunication Technologies, ACT 2024
作者: Naik, Darsana A. Pallavi, N. Keerthi, P. Rai, Abhinav Kumar Jha, Adarsh Kumar Bindal, Avaneesh Chauhan, Shubhi Singh M S Ramaiah Institute of Technology Department of Computer Science and Engineering Bangalore India Impact Institute of Technology Department of Computer Science and Engineering Bangalore India
In or daily lives, maintaining the security of sensitive information has proven to be very difficult. communications sent frequently through a communication channel like the Internet may catch the attention of cracker... 详细信息
来源: 评论
Algorithmic Analysis and Implementation Strategies For Targeted Advertising on Diverse Social Media Platform  15
Algorithmic Analysis and Implementation Strategies For Targe...
收藏 引用
15th international conference on computing communication and Networking Technologies, ICCCNT 2024
作者: Mahato, Binayak Kumar Agarwal, Shweta Kumar, Rajnish Paswan, Abhinav Mandal, Amar Kumar Thakur, Prince Chandigarh University Information Technology Mohali India Chandigarh University Department of Cse Mohali India
In this paper, we analyze the current state of targeted advertising on various social media platforms using algorithmic analysis and implementing strategies. Social media plays an increasingly important role in modern... 详细信息
来源: 评论
Health Care Data Mining using Intelligent Classification Techniques  5
Health Care Data Mining using Intelligent Classification Tec...
收藏 引用
5th IEEE international conference on advances in computing, communication Control and Networking, ICAC3N 2023
作者: Antil, Jyoti Rishi, Rahul Sharma, Sonia Yadav, Rajkumar University Institute Of Engineering And Technology Mdu Dept. Of Computer Science Engineering Hrayana Rohtak India University Institute Of Engineering And Technology Mdu Dept. Of Electronic And Communication Engineering Hrayana Rohtak India
Classification models can be learned from complicated multivariate temporal data and this is a topic we investigate in electronic health record systems. The difficulty is to come up with a collection of attributes tha... 详细信息
来源: 评论
A Review on NFC for Secure Transaction its Fundamental Challenges and Future Directions
A Review on NFC for Secure Transaction its Fundamental Chall...
收藏 引用
2024 international conference on advances in computing Research on Science Engineering and technology, ACROSET 2024
作者: Gupta, Kartik Bhanodia, Praveen Sethi, Kamal Kumar Rajput, Shivshankar Patidar, Mukesh Iyer, Vignesh Hariharan Acropolis Institute of Technology and Research Department of Computer Science & Engg. Indore India Independent Researcher Pune India
Near-Field communication (NFC) payment solutions are contactless payment solutions which harness the short-range communication capabilities and existing RFID infrastructure. The increasing availability of NFC enabled ... 详细信息
来源: 评论
Exploring the Intersection of VLSI and Embedded Systems: Technological Advancements and Future Applications  2
Exploring the Intersection of VLSI and Embedded Systems: Tec...
收藏 引用
2nd international conference on advances in Computation, communication and information technology, ICAICCIT 2024
作者: Pandi, V. Samuthira James, Aaron S. Jaishika, S. Shobana, D. Priya, Lakshmi J. Pattunnarajam, P. Centre for Advanced Wireless Integrated Technology Chennai Institute of Technology Tamil Nadu Chennai India Electrical and Electronics Section Department of Engineering & Technology University of Technology and Applied Sciences Ibri Oman Department of Information Technology Sri Sairam Institute of Technology Sai Leo Nagar West Tambaram Chennai India Department of Mechatronics Engineering Rajalakshmi Engineering College Chennai India Department of ECE Saveetha Engineering College Chennai India Department of ECE Sri Venkateswara College of Engineering Sriperumbudur India
In this study, we look at the present and future of embedded systems as well as VLSI (Very Large Scale Integration) technology to see how the two work together. In particular, very large scale integration (VLSI) techn... 详细信息
来源: 评论
An exploratory study on how release management practices minimize the impact factors affecting software releases  3
An exploratory study on how release management practices min...
收藏 引用
3rd international conference on advances in Electrical, computing, communication and Sustainable Technologies, ICAECT 2023
作者: Raja Vennakandla, Charan Sai Riaz, Sadia Chowdhury, Anish Roy Business Administration SP Jain School of Global Management Sydney Australia Information Technology SP Jain School of Global Management Sydney Australia
Software delivery is always challenging without any issues. During this process of software delivery, release management team plays a significant role in planning, communication, coordination, and implementation. This... 详细信息
来源: 评论
Fraud Detection in Credit Card through the Machine Learning Algorithms  1
Fraud Detection in Credit Card through the Machine Learning ...
收藏 引用
1st IEEE international conference on advances in computing, communication and Networking, ICAC2N 2024
作者: Kummarikuta, Sandhya Muppagowni, Ganesh Karthik Patam, Keerthi Pennera, Mounika Patimeedi, Upendra Harshith Reddy, Poreddy Chandra Mohan Babu University School of Computing Dept. AIandML Tirupati India GITAM University-Bengaluru Campus GITAM School of Technology Department of CSE Bengaluru India Sree Vidyanikethan Engineering College Dept. Computer Science and Engineering Tirupati India
The threat of credit card fraud is high and so there should be efficient ways to combat it. The research is being employed to focus on how to enhance credit card fraud detection, machine learning methodologies can be ... 详细信息
来源: 评论
Efficiency and Effectiveness in Police Services using an E-Management Solution  1
Efficiency and Effectiveness in Police Services using an E-M...
收藏 引用
1st IEEE international conference on advances in Electronics, communication, computing and Intelligent information Systems, ICAECIS 2023
作者: Sharma, Vartika Gowda, Nikitha P N Parnika, N.H. Nireeksha, R. Harshitha, S.K. Vidyavardhaka College of Engineering Information Science and Engineering Mysuru India
In modern world of technology, Security of data and crime-free environment improves the quality of life. The crime records stored in the database can be hacked or breached so an effective solution should be adapted th... 详细信息
来源: 评论
Revolutionizing Rice Quality Control: MobileNetV2 for Grain Classification  2
Revolutionizing Rice Quality Control: MobileNetV2 for Grain ...
收藏 引用
2nd international conference on advances in Computation, communication and information technology, ICAICCIT 2024
作者: Garg, Dushyant Gill, Kanwarpartap Singh Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
The classification of rice grains is a crucial aspect of the agricultural sector, particularly in light of challenges such as grain variability, limited computing resources, and the need for real-time processing. Main... 详细信息
来源: 评论
Proxy-Based Re-Encryption Design for the IoT Ecosystem  2
Proxy-Based Re-Encryption Design for the IoT Ecosystem
收藏 引用
2nd IEEE international conference on advances in computing, communication and Applied Informatics, ACCAI 2023
作者: Srikanth, Kandula Rajesh, Pathuri Guna Prasad, Nallapaneni Durga Asmathulla, Mohammed Reddy, Thallapureddy Praveen Kumar Seshadri Rao Gudlavalleru Engineering College Department of Information Technology Andhra Pradesh India
Protect data in transit with a proxy-based re-encryption solution designed specifically for the Internet of Things ecosystem's needs. Because of identity-based encryption and proxy re-encryption can safely outsour... 详细信息
来源: 评论