咨询与建议

限定检索结果

文献类型

  • 438,516 篇 会议
  • 2,864 篇 期刊文献
  • 2,589 册 图书
  • 3 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 443,972 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 259,006 篇 工学
    • 178,786 篇 计算机科学与技术...
    • 145,181 篇 软件工程
    • 62,244 篇 信息与通信工程
    • 40,824 篇 控制科学与工程
    • 33,430 篇 电气工程
    • 29,323 篇 电子科学与技术(可...
    • 26,899 篇 机械工程
    • 25,797 篇 生物工程
    • 21,175 篇 生物医学工程(可授...
    • 16,967 篇 光学工程
    • 16,361 篇 仪器科学与技术
    • 15,299 篇 动力工程及工程热...
    • 14,019 篇 化学工程与技术
    • 11,583 篇 安全科学与工程
    • 10,521 篇 交通运输工程
    • 10,020 篇 材料科学与工程(可...
  • 115,545 篇 理学
    • 60,082 篇 数学
    • 31,605 篇 物理学
    • 27,654 篇 生物学
    • 18,050 篇 统计学(可授理学、...
    • 13,152 篇 化学
    • 13,024 篇 系统科学
  • 69,591 篇 管理学
    • 45,908 篇 管理科学与工程(可...
    • 27,423 篇 图书情报与档案管...
    • 21,454 篇 工商管理
  • 17,790 篇 医学
    • 15,248 篇 临床医学
    • 14,507 篇 基础医学(可授医学...
    • 9,344 篇 药学(可授医学、理...
  • 11,227 篇 法学
    • 8,985 篇 社会学
  • 9,306 篇 教育学
  • 9,181 篇 经济学
    • 9,100 篇 应用经济学
  • 6,724 篇 农学
  • 3,650 篇 文学
  • 1,378 篇 军事学
  • 1,271 篇 艺术学
  • 45 篇 哲学
  • 29 篇 历史学

主题

  • 12,877 篇 accuracy
  • 12,342 篇 computational mo...
  • 12,282 篇 feature extracti...
  • 9,847 篇 training
  • 9,427 篇 computer science
  • 9,279 篇 computer archite...
  • 8,770 篇 deep learning
  • 6,745 篇 real-time system...
  • 6,585 篇 machine learning
  • 6,557 篇 predictive model...
  • 6,428 篇 support vector m...
  • 6,171 篇 data mining
  • 6,068 篇 convolutional ne...
  • 5,644 篇 neural networks
  • 5,503 篇 data models
  • 5,355 篇 internet of thin...
  • 5,141 篇 monitoring
  • 5,071 篇 optimization
  • 5,031 篇 information tech...
  • 4,951 篇 computer vision

机构

  • 2,253 篇 chitkara univers...
  • 1,320 篇 school of comput...
  • 859 篇 school of comput...
  • 760 篇 school of electr...
  • 605 篇 lovely professio...
  • 553 篇 college of compu...
  • 535 篇 school of comput...
  • 520 篇 maharishi school...
  • 513 篇 college of compu...
  • 507 篇 school of comput...
  • 495 篇 department of co...
  • 488 篇 department of co...
  • 366 篇 school of comput...
  • 362 篇 school of comput...
  • 357 篇 school of comput...
  • 337 篇 the islamic univ...
  • 328 篇 school of comput...
  • 298 篇 department of el...
  • 287 篇 computer science...
  • 279 篇 department of el...

作者

  • 273 篇 wang wei
  • 239 篇 vinay kukreja
  • 235 篇 kukreja vinay
  • 209 篇 china
  • 207 篇 yang yang
  • 203 篇 li wei
  • 193 篇 liu yang
  • 173 篇 zhang wei
  • 168 篇 li li
  • 168 篇 wei wang
  • 160 篇 yang liu
  • 149 篇 wang lei
  • 142 篇 zhang yu
  • 135 篇 wei zhang
  • 130 篇 zhang lei
  • 127 篇 li yang
  • 114 篇 liu wei
  • 106 篇 lei wang
  • 103 篇 mengchu zhou
  • 98 篇 li yan

语言

  • 422,381 篇 英文
  • 17,871 篇 其他
  • 4,666 篇 中文
  • 21 篇 俄文
  • 16 篇 法文
  • 14 篇 土耳其文
  • 10 篇 西班牙文
  • 6 篇 乌克兰文
  • 5 篇 德文
  • 3 篇 葡萄牙文
检索条件"任意字段=International Conference on Computer Engineering and Technology"
443973 条 记 录,以下是1361-1370 订阅
排序:
IOTA's Market Dynamics and Future Impacts  3
IOTA's Market Dynamics and Future Impacts
收藏 引用
3rd international conference for Innovation in technology, INOCON 2024
作者: Kumar, Amit Sharma, Neha Aggarwal, Priyanshi Singh, Mukesh Aluvala, Srinivas Jain, Anuj Kumar Chitkara University Chitkara University Institute of Engineering and Technology Punjab Rajpura India Graphic Era Hill University Computer Science & Engineering Uttarakhand Dehradun248002 India Graphic Era Deemed to Be University Computer Science & Engineering Uttarakhand Dehradun248002 India Sr University School of Computer Science & Artificial Intelligence Warangal India
This research examines the crucial necessity for a thorough comprehension of the IOTA cryptocurrency and its market dynamics. This analysis examines the price trends and trade volume, which are essential factors for i... 详细信息
来源: 评论
Voltage Uprate of Transmission Lines: Motivation, Benefits, Considerations and Case Studies  4
Voltage Uprate of Transmission Lines: Motivation, Benefits, ...
收藏 引用
4th international conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2024
作者: Mbuli, Nhlanhla College of Science Engineering and Technology Florida Campus University of South Africa Department of Electrical Engineering Roodepoort1709 South Africa
As load and generators are connected to the power system, constraints to the transmission of power can arise. Voltage uprating of transmission lines involves raising the operating voltage of an existing transmission l... 详细信息
来源: 评论
AI-Driven Decision Support Systems for Project Management in Automobile engineering  1
AI-Driven Decision Support Systems for Project Management in...
收藏 引用
1st international conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Vasudevan, M. Kumar, B. Senthil Deevi, Durga Praveen More, Amrita Baid Huddar, Vikrant Turdialiev, Mukhammad Ali School of Management Hindustan Institute of Technology & Science Tamil Nadu Chennai India Hindustan Institute of Technology & Science Department of School of Management Tamil Nadu Chennai India O2 Technologies Inc CA United States Medi-Caps University Department of Management Studies Madhya Pradesh Indore India Mumbai University Department of Management Studies India Tashkent state university of law Department of Private International Law Tashkent Uzbekistan
The integration of artificial intelligence in project management with revolutionize engineering processes like automobile. The present study explores the impact of artificial intelligence in decision support system to... 详细信息
来源: 评论
Comparative Analysis of Real-Time Multi-Person Pose Detection in Electrical Industrial Safety Scenarios Using YOLOv8-Pose and OpenPose  4
Comparative Analysis of Real-Time Multi-Person Pose Detectio...
收藏 引用
4th IEEE international conference on Electronic Communications, Internet of Things and Big Data, ICEIB 2024
作者: Tsai, Shang-Te Wu, Zong-Rong Lin, Pin-Hsuan Chen, Chin-Hsiung Chien, Wei Chang, Yu-Cheng School of Art and Design Sanming University Fujian365004 China National Yunlin University of Science and Technology Department of Technical and Vocational Program in Artificial Intelligence Yunlin Taiwan National Central University Department of Business Administration Taoyuan Taiwan Commercial Industrial Vocational Senior High School Department of Electrical Engineering New Taipei Municipal Tamsui New Taipei Taiwan Lunghwa University of Science and Technology Department of Computer Information and Network Engineering Taoyuan Taiwan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei Taiwan
We reviewed the application of modern technology for rapid and accurate multi-person real-time pose detection in the hazardous field of electrical engineering. We focused on two leading pose detection technologies: YO... 详细信息
来源: 评论
Privacy-Preserving Social Network Clustering Using Differential Privacy
Privacy-Preserving Social Network Clustering Using Different...
收藏 引用
2024 international conference on Smart Systems for Electrical, Electronics, Communication and computer engineering, ICSSEEC 2024
作者: Sathiyapriya, K. Aravindhan, R. Kavin Kireshvanth, B. Ranganathan, Yadav Hardik, P. PSG College of Technology Department of Computer Science and Engineering Coimbatore India
In the contemporary landscape of online social networks, preserving users' privacy while applying clustering techniques is a pivotal concern. This paper explores the integration of differential privacy into social... 详细信息
来源: 评论
A Comprehensive Study of Plant Disease Detection Through Image Processing and Machine Learning  2
A Comprehensive Study of Plant Disease Detection Through Ima...
收藏 引用
2nd IEEE international conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Pachori, Madan Kant, Shashi Surya, Anupma Kumar, Manish Greater Noida Institute of Technology Computer Science and Engineering Greater Noida India Sharda University Computer Science and Engineering Greater Noida India JECRC University Computer Science and Engineering Jaipur India
Agriculturalists can greatly benefit from techniques that forecast the kinds of illnesses that plants will encounter during their lives. This article provides information on these methods through a thorough survey tha... 详细信息
来源: 评论
An In-Depth Examination of Cybersecurity: Unveiling Contemporary Trends and Recent Advancements in the World of Cyber Threats  2
An In-Depth Examination of Cybersecurity: Unveiling Contempo...
收藏 引用
2nd international conference on Cyber Resilience, ICCR 2024
作者: Alhasan, Waseem Wannous, Muhammad Abualkishik, Abedallah Al Nasar, Mohammad Rustom Ali, Liaqat Al-Zoubi, Hani School Of Computer Science And Informatics De Montfort University Dubai Dubai United Arab Emirates Higher Colleges Of Technology Al Ain United Arab Emirates American University In The Emirates Dubai United Arab Emirates Academic City Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates College Of Engineering Mutah University Department Of Computer Engineering Jordan
The virtual realm now serves as the primary stage for a wide variety of global interactions spanning economic, industrial, cultural, social and governmental exchanges, between people, non-governmental agencies and gov... 详细信息
来源: 评论
Innovative Data Encryption Techniques using AI for Wireless Sensor Actuator Network Security  2
Innovative Data Encryption Techniques using AI for Wireless ...
收藏 引用
2nd international conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Dharmateja, M. Rama, Prabha K.P. Asha, N. Nithya, P. Lalitha, S. Manojkumar, P. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Arunai Engineering College Department of Computer Science and Engineering Tamil Nadu Tiruvannamalai India Bannari Amman Institute of Technology Department of Electrical and Electronics Engineering Tamil Nadu Sathyamangalam India
Wireless Sensor Actuator Networks (WSANs) are sensitive to cyber threats due to present static encryption techniques. Adaptive security methods are required in WSAN settings to reduce evolving dangers and maintain dat... 详细信息
来源: 评论
Assessment of Machine Translation in Addressing Communication Barriers on the Perception of College Students  7
Assessment of Machine Translation in Addressing Communicatio...
收藏 引用
7th IEEE international conference on computer and Communication engineering technology, CCET 2024
作者: Sedilla, Raymond B. Beley, Rafael Joseph T. Gamboa, John Jeremie D. Liu, Bon Pin M. Mariano, Jules Samonte, Mary Jane C. School of Information Technology Mapua University Manila Philippines
As tools powered by Artificial Intelligence (AI) continue to advance, more specifically large language models, as they continue to develop improvements in machine translation. 59.9% of the student respondents say they... 详细信息
来源: 评论
Permissioned Blockchain Security Pqfabric from Quantum and Classical Attacks  1
Permissioned Blockchain Security Pqfabric from Quantum and C...
收藏 引用
1st international conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Tamilarasi, C. Bhavadrarani, K. Kittappa, Thiagarajan Subashini, N. Anitha, V. Vimalraj, E. B.S.Abdur Rahman Crescent Institute of Science & Technology Department of Computer Science and Engineering Chennai India V.S.B. Engineering College Department of Computer Science and Engineering Karur India Rajalakshmi Institute of Technology Department of Mathematics Chennai600124 India Sathyabama Institute of Science and Technology Department of Mathematics Chennai600119 India Panimalar Engineering College Department of CSE Poonamallee Chennai600123 India School of Computing Mohan Babu University Andhra Pradesh Tirupati India
Old style cryptographic techniques are genuinely compromised by the development of quantum computing, which requires the formation of safety ideal models that are impervious to quantum mistakes. A new permissioned blo... 详细信息
来源: 评论