咨询与建议

限定检索结果

文献类型

  • 3,980 篇 会议
  • 157 册 图书
  • 148 篇 期刊文献

馆藏范围

  • 4,285 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,527 篇 工学
    • 2,060 篇 计算机科学与技术...
    • 1,571 篇 软件工程
    • 676 篇 信息与通信工程
    • 341 篇 电气工程
    • 341 篇 控制科学与工程
    • 269 篇 生物工程
    • 210 篇 电子科学与技术(可...
    • 207 篇 生物医学工程(可授...
    • 154 篇 机械工程
    • 140 篇 安全科学与工程
    • 131 篇 光学工程
    • 129 篇 动力工程及工程热...
    • 109 篇 交通运输工程
    • 104 篇 网络空间安全
    • 98 篇 化学工程与技术
  • 966 篇 理学
    • 459 篇 数学
    • 279 篇 生物学
    • 272 篇 物理学
    • 152 篇 统计学(可授理学、...
    • 108 篇 化学
    • 95 篇 系统科学
  • 708 篇 管理学
    • 445 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 253 篇 工商管理
  • 217 篇 医学
    • 176 篇 临床医学
    • 172 篇 基础医学(可授医学...
    • 113 篇 公共卫生与预防医...
  • 166 篇 法学
    • 122 篇 社会学
  • 118 篇 经济学
    • 118 篇 应用经济学
  • 87 篇 教育学
    • 86 篇 教育学
  • 49 篇 农学
  • 23 篇 文学
  • 20 篇 军事学
  • 2 篇 艺术学

主题

  • 188 篇 market research
  • 132 篇 computer archite...
  • 127 篇 artificial intel...
  • 125 篇 machine learning
  • 120 篇 computational mo...
  • 116 篇 internet of thin...
  • 110 篇 deep learning
  • 101 篇 computer science
  • 94 篇 technological in...
  • 93 篇 accuracy
  • 93 篇 training
  • 89 篇 data mining
  • 87 篇 feature extracti...
  • 81 篇 security
  • 78 篇 cloud computing
  • 67 篇 real-time system...
  • 66 篇 predictive model...
  • 63 篇 application soft...
  • 62 篇 computer vision
  • 61 篇 wireless sensor ...

机构

  • 65 篇 lovely professio...
  • 46 篇 medical instrume...
  • 45 篇 department of me...
  • 45 篇 technical comput...
  • 42 篇 institute of aer...
  • 37 篇 computer technol...
  • 30 篇 computer enginee...
  • 24 篇 national univers...
  • 21 篇 department of co...
  • 21 篇 college of techn...
  • 21 篇 department of co...
  • 17 篇 information and ...
  • 16 篇 school of electr...
  • 16 篇 department of co...
  • 15 篇 lloyd institute ...
  • 14 篇 department of co...
  • 13 篇 institute of aer...
  • 13 篇 knowledge park i...
  • 12 篇 department of co...
  • 12 篇 department of co...

作者

  • 15 篇 jamil akhtar
  • 15 篇 tsai chun-wei
  • 12 篇 irfan khan
  • 12 篇 noor hanoon haro...
  • 12 篇 hameed alaa ali
  • 11 篇 bhushan bharat
  • 10 篇 taha raad al-sha...
  • 10 篇 israa abed jawad
  • 10 篇 de-shuang huang
  • 9 篇 chun-wei tsai
  • 9 篇 sajad ali zearah
  • 9 篇 ginni nijhawan
  • 9 篇 b rajalakshmi
  • 9 篇 raaid alubady
  • 8 篇 abdul rauf
  • 8 篇 laith fouad
  • 8 篇 ibrahem ahmed
  • 8 篇 praveen
  • 8 篇 mohammed ayad al...
  • 8 篇 aqeel ali

语言

  • 3,519 篇 英文
  • 747 篇 其他
  • 68 篇 中文
  • 1 篇 法文
检索条件"任意字段=National Conference on Emerging Trends and Applications in Computer Science"
4285 条 记 录,以下是81-90 订阅
排序:
A Bibliometric Analysis of Location-Based Social Networks and applications: Research trends and Future Challenges  1
收藏 引用
23rd Wuhan International conference on E-business (WHICEB)
作者: Liu, Lin Yao, Xiaoyu Anhui Agr Univ Coll Resources & Environm 130 Changjiangxilu Hefei Anhui Peoples R China Univ Sci & Technol China Sch Management Jinzhai Rd 96 Hefei Anhui Peoples R China
Location-based social networks (LBSN) have undergone rapid development over the past decade, garnering extensive attention from scholars in various research domains. However, the current status and overarching trends ... 详细信息
来源: 评论
Image Processing: Unlocking the Secrets of Visual Information  2
Image Processing: Unlocking the Secrets of Visual Informatio...
收藏 引用
2nd IEEE International conference on trends in Quantum Computing and emerging Business Technologies, TQCEBT 2024
作者: Lavanya, D. Bhushan, Kavi Kant, Gur Sharan Sountharraj, A.C. Srivastav, Akanksha Begum, M. Sharmila Sri Venkateswara College of Engineering Computer Science and Engineering Department Andhra Pradesh Tirupati India Ccs University Sir Chhotu Ram Institute of Engg. & Technology Department of Computer Science U.P Meerut India Dr. Ngp Art's and Science College Department of Computer Science with Data Analytics Coimbatore-48 India Tula's Institute Department of Computer Science and Engineering Dehradun India Maharaja Institute of Technology Department of Computer Science Mysore India
In the age of image processing, the hidden ability can be encoded with visual information that is not only observed but also painstakingly carried out;in this way, the complex secrets that are encoded in each pixel ha... 详细信息
来源: 评论
Two-Pronged Intrusion Detection System for MANET
Two-Pronged Intrusion Detection System for MANET
收藏 引用
2024 IEEE International conference on emerging Technologies in computer science for Interdisciplinary applications, ICETCS 2024
作者: Rajan, Nandana Vamsi Kiran, M. Vigneshwari, K. Jaiswal, Sameeksha Nithya, B. National Institute of Technology Department of Computer Science and Engineering Trichy India
Mobile Ad hoc Networks (MANETs) provide a flexible wireless infrastructure for various applications. Still, their decentralized and dynamic nature makes them susceptible to security threats. The topology of a MANET ch... 详细信息
来源: 评论
emerging trends in AI-Powered IoT: Innovations, Key Challenges, and Future Directions
Emerging Trends in AI-Powered IoT: Innovations, Key Challeng...
收藏 引用
2025 IEEE SoutheastCon, SoutheastCon 2025
作者: Abdelraouf, Hussien Abouyoussef, Mahmoud Fouda, Mostafa M. Fadlullah, Zubair Md Ibrahem, Mohamed I. School of Computer and Cyber Sciences Augusta University AugustaGA30912 United States North Carlina A&T State University Department of Computer Systems Technology GreensboroNC27411 United States Idaho State University Department of Electrical and Computer Engineering PocatelloID83209 United States Western University Department of Computer Science LondonON Canada
This survey provides a comprehensive overview of recent emerging technologies in artificial intelligence (AI) applied to the Internet of Things (IoT), highlighting their significance and applications across various do... 详细信息
来源: 评论
Tracing the Progression: Networking applications From Conventional Methods to Incremental AI/ML Integration
Tracing the Progression: Networking Applications From Conven...
收藏 引用
2024 International conference on Communication, computer sciences and Engineering, IC3SE 2024
作者: Singh, Sushma Rawat, Varsha Sharma, Dolly Amity University Department Of Computer Science & Engineering Uttar Pradesh Noida India
The swift progression of networking technologies and the escalating intricacy of contemporary network environments have stimulated a burgeoning interest in utilizing advanced techniques to tackle various networking hu... 详细信息
来源: 评论
Price Comparison Using Web Scraping and Machine Learning  1
Price Comparison Using Web Scraping and Machine Learning
收藏 引用
1st International conference on computer science and emerging Technologies, CSET 2023
作者: Singh, Neelam Rana, Aryan Chaudhary, Anmol Graphic Era University Department of Computer Science and Engineering Dehradun India Graphic Era University Department of Computer Applications Dehradun India
This work aims to create a robust and user-friendly web scraping-based price comparison system tailored for e-commerce websites. By leveraging advanced web scraping techniques, the system extracts and processes produc... 详细信息
来源: 评论
Artificial Neural Network-Based Steganography: Techniques, applications, and Challenges  3rd
Artificial Neural Network-Based Steganography: Techniques, A...
收藏 引用
3rd International conference on emerging trends in Expert applications and Security, ICE-TEAS 2024
作者: Rajput, Prashant Vaisla, Kunwar Toyesh Singh Department of Computer Science Amramali Institute of Management and Computer Applications Shiksha Nagar Lamachaur Uttarakhand Haldwani India Uttarakhand Pauri India
This paper aims to the understanding and advancement of ANN-based steganography by providing a comprehensive overview of its techniques, applications, and challenges in modern secure communication systems and digital ... 详细信息
来源: 评论
A Review of Blockchain based Decentralised Authentication Solutions and their improvement through Metamask  2
A Review of Blockchain based Decentralised Authentication So...
收藏 引用
2nd International conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Khan, Andleeb Nand, Parma Bhushan, Bharat Hameed, Alaa Ali Jamil, Akhtar Sharda School of Engineering & Technology Department of Computer Science & Engineering Greater Noida India Istinye University Department of Computer Engineering Istanbul Turkey National University of Computer and Emerging Sciences Department of Computer Science Islamabad Pakistan
With the advancing technology, it becomes difficult to cope up with novel trends and configurations. Similarly, it is difficult to secure the systems against each emerging threat. With this the loopholes in convention... 详细信息
来源: 评论
Impact of White-Box Adversarial Attacks on Convolutional Neural Networks  4
Impact of White-Box Adversarial Attacks on Convolutional Neu...
收藏 引用
4th International conference on emerging trends in Networks and computer Communications, ETNCC 2024
作者: Podder, Rakesh Ghosh, Sudipto Colorado State University Department of Computer Science Fort CollinsCO80523 United States
Autonomous vehicle navigation and healthcare diagnostics are among the many fields where the reliability and security of machine learning models for image data are critical. We conduct a comprehensive investigation in... 详细信息
来源: 评论
Block Chain Technology: Anomaly Detection in Bitcoin Using RFMLPAlgorithm  4
Block Chain Technology: Anomaly Detection in Bitcoin Using R...
收藏 引用
4th International conference on emerging trends in Networks and computer Communications, ETNCC 2024
作者: Elangovan, V.R. Revathi, S. Nusrat Jabeen, T. Obaid, Ahmed J. Kumar, Rahul SRM Institute of Science and Technology Kattankulathur Faculty of Science and Humanities Department of Computer Applications Chennai India City University Faculty Cybersecurity Ajman United Arab Emirates University of Kufa College Al-Ayen University Computer Science and Mathematics Department of Computer Technical Engineering Technical Engineering Thi-Qar Iraq Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR Institute of Technology and Sciences Andhra Pradesh Guntur India
Block chain technology has been used in many different fields, including banking, logistics, healthcare, and government. However, billions have been lost to cyber attacks on block chain apps in the last several years.... 详细信息
来源: 评论