咨询与建议

限定检索结果

文献类型

  • 4,679 篇 会议
  • 224 册 图书
  • 32 篇 期刊文献

馆藏范围

  • 4,935 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,847 篇 工学
    • 3,367 篇 计算机科学与技术...
    • 2,593 篇 软件工程
    • 1,038 篇 信息与通信工程
    • 535 篇 控制科学与工程
    • 478 篇 电气工程
    • 379 篇 生物工程
    • 347 篇 动力工程及工程热...
    • 310 篇 生物医学工程(可授...
    • 275 篇 电子科学与技术(可...
    • 241 篇 机械工程
    • 218 篇 仪器科学与技术
    • 210 篇 环境科学与工程(可...
    • 202 篇 安全科学与工程
    • 151 篇 交通运输工程
    • 149 篇 网络空间安全
  • 1,427 篇 理学
    • 673 篇 数学
    • 408 篇 生物学
    • 250 篇 物理学
    • 204 篇 统计学(可授理学、...
    • 170 篇 大气科学
    • 149 篇 系统科学
    • 136 篇 化学
  • 1,069 篇 管理学
    • 793 篇 管理科学与工程(可...
    • 493 篇 工商管理
    • 357 篇 图书情报与档案管...
  • 309 篇 医学
    • 286 篇 临床医学
    • 279 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
    • 151 篇 药学(可授医学、理...
  • 202 篇 法学
  • 176 篇 经济学
    • 176 篇 应用经济学
  • 82 篇 农学
  • 65 篇 教育学
  • 10 篇 军事学
  • 8 篇 文学
  • 2 篇 艺术学

主题

  • 581 篇 cloud computing
  • 292 篇 internet of thin...
  • 128 篇 computer communi...
  • 97 篇 artificial intel...
  • 96 篇 edge computing
  • 93 篇 information syst...
  • 86 篇 fog computing
  • 78 篇 big data
  • 77 篇 software enginee...
  • 73 篇 cryptography
  • 61 篇 machine learning
  • 59 篇 servers
  • 55 篇 blockchain
  • 54 篇 cloud security
  • 53 篇 monitoring
  • 48 篇 algorithm analys...
  • 45 篇 virtual machine
  • 44 篇 security
  • 44 篇 cloud storage
  • 42 篇 quality of servi...

机构

  • 22 篇 sternberg astron...
  • 19 篇 institute for nu...
  • 15 篇 service de physi...
  • 13 篇 center for astro...
  • 13 篇 department of ph...
  • 13 篇 department of ph...
  • 13 篇 the graduate sch...
  • 13 篇 graduate school ...
  • 13 篇 department of ph...
  • 13 篇 graduate school ...
  • 13 篇 department of ph...
  • 13 篇 institute of par...
  • 13 篇 information engi...
  • 13 篇 academic assembl...
  • 13 篇 department of ph...
  • 13 篇 interdisciplinar...
  • 13 篇 faculty of engin...
  • 13 篇 graduate school ...
  • 13 篇 ceico institute ...
  • 13 篇 department of ph...

作者

  • 24 篇 jui c.c.h.
  • 24 篇 oshima a.
  • 24 篇 tsuda r.
  • 24 篇 kim j.h.
  • 24 篇 bergman d.r.
  • 24 篇 allen m.
  • 24 篇 matsuyama t.
  • 24 篇 wong t.
  • 24 篇 ishii t.
  • 24 篇 kim s.w.
  • 24 篇 takamura m.
  • 24 篇 yashiro k.
  • 24 篇 kadota k.
  • 24 篇 mayta r.
  • 24 篇 ozawa s.
  • 24 篇 ikeda d.
  • 24 篇 belz j.w.
  • 24 篇 kasami s.
  • 24 篇 tameda y.
  • 24 篇 rodriguez d.c.

语言

  • 4,263 篇 英文
  • 654 篇 其他
  • 20 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=Proceedings of the 2019 International Communication Engineering and Cloud Computing Conference"
4935 条 记 录,以下是431-440 订阅
排序:
Lightweight Fog Attention Graph Convolutional Network for Secure Data Aggregation Mechanism to Fog based cloud Assisted IoT Network  8
Lightweight Fog Attention Graph Convolutional Network for Se...
收藏 引用
8th international conference on I-SMAC (IoT in Social, Mobile, Analytics and cloud), I-SMAC 2024
作者: Akilesh Kumar, S. Hariharan, P. Sukhel Ahamed, N. Gokilavani, S. Karpagam Academy of Higher Education Department of Artificial Intelligence and Data Science Coimbatore India Karpagam Academy of Higher Education Department of Computer Science and Engineering Coimbatore India
Ever Increasing demand of cloud computing paradigm has resulted in widespread development and deployment of multiple fog nodes to cloud assisted internet of things networks as it is highly capable of providing the use... 详细信息
来源: 评论
Breaking Down communication Barriers: Real-Time Sign Language Recognition Using CNN & Flask-Based API
Breaking Down Communication Barriers: Real-Time Sign Languag...
收藏 引用
2023 international conference on Circuit Power and computing Technologies, ICCPCT 2023
作者: Nekkanti, Lakshmi Bhavani Priyanga, A. Posonia, A. Mary Mayan, J. Albert Sathyabama Institute of Science and Technology Computer Science and Engineering Chennai India
The involvement of an interpreter is sometimes necessary when attempting to communicate with a person who is deaf or hard of hearing. Real-time recognition of sign language system is presented that use image processin... 详细信息
来源: 评论
YOLOv8-Powered Multi-Object Detection for Safety Helmets and Number Plates in Real-Time Surveillance Systems  5
YOLOv8-Powered Multi-Object Detection for Safety Helmets and...
收藏 引用
5th IEEE international conference on communication, computing and Industry 6.0, C2I6 2024
作者: Pramila, S. Anil, D. Sirisha, O. New Horizon College of Engineering Bengaluru India Uvce Bangalore University Department of Cse Bengaluru India G.Pulla Reddy Engineering College Department of Computer Science and Business Systems Kurnool India
This paper presents a real-time object detection system using the latest YOLOv8 model to enhance traffic monitoring and safety enforcement. The model was trained to detect helmets, riders and number plates in diverse ... 详细信息
来源: 评论
A High-Performance Data Verification Mechanism in Blockchain-Based IoT Systems  21
A High-Performance Data Verification Mechanism in Blockchain...
收藏 引用
21st IEEE international Symposium on Parallel and Distributed Processing with Applications, 13th IEEE international conference on Big Data and cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and communications, ISPA/BDcloud/SocialCom/SustainCom 2023
作者: Zhang, Jingyu Zhou, Pian Sun, Yongtao Luo, Lailong Changsha University of Science and Technology School of Computer and Communication Engineering Changsha China National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory School of Systems Engineering Changsha China
With the rapid development of the distributed network and communication, the Internet of Things (IoT) systems have been applied to all walks of life. Blockchain technology is one of the most popular research fields re... 详细信息
来源: 评论
A Stratified Approach to Monitoring cloud Services  2
A Stratified Approach to Monitoring Cloud Services
收藏 引用
2nd IEEE international conference on Advances in computing, communication and Applied Informatics, ACCAI 2023
作者: Smitha, G.V. Pavithra, B. Noushad, Izin Joshi, Rahul Vats, Ujjwal Dayananda Sagar College of Engineering Affiliated to Vtu Department of Masters in Computer Applications Karnataka Bangalore560078 India
cloud services have become an essential part of modern computing, providing on-demand access to computing resources and services over the internet. However, ensuring the reliability and performance of cloud services i... 详细信息
来源: 评论
Comparitive Analysis on Neural Networks based on their performance in Pneumonia Detection  13
Comparitive Analysis on Neural Networks based on their perfo...
收藏 引用
13th international conference on cloud computing, Data Science and engineering, Confluence 2023
作者: Puri, Naman Munjal, Geetika Amity School of Engineering and Technology Department of Computer Science Engineering Noida India
Pneumonia has been a concerning issue worldwide. This infectious disease has a higher mortality rate than Covid-19. More than two million individuals lost their lives in 2019 out of which almost 600,000 were infants l... 详细信息
来源: 评论
An Aggregation Protocol Resisting Collusion Attacks in the Internet of Vehicles Environment  10
An Aggregation Protocol Resisting Collusion Attacks in the I...
收藏 引用
10th IEEE international conference on Cyber Security and cloud computing and 9th IEEE international conference on Edge computing and Scalable cloud, CScloud-EdgeCom 2023
作者: Xu, Zisang Zhang, Ruirui Huang, Peng Xu, Jianbo Changsha University of Science and Technology Computer and Communication Engineer Institute Changsha China Hunan University of Science and Technology School of Computer science and Engineering Xiangtan China
In the Internet of Vehicles(IoV) based on federated learning, the vehicle avoids the server from collecting sensitive data of users by uploading model parameters. However, after research, it is found that the model pa... 详细信息
来源: 评论
Row-wise Hamming Code for Memory Applications  5
Row-wise Hamming Code for Memory Applications
收藏 引用
5th international conference on Electronics and Sustainable communication Systems, ICESC 2024
作者: Nakul, K.S. Reddy, M. Krishna Chaitanya Abhiram, Paturi Vinodhini, M. Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Electronics and Communication Engineering Bengaluru India
The increasing vulnerability of memory devices to errors due to smaller transistor sizes, larger densities, and lower operating voltages raises the demand for efficient Error Correcting Codes (ECC) in memory systems i... 详细信息
来源: 评论
Metaheuristic Algorithm Implementation for PV Array Reconfiguration under Realistic Moving cloud Condition
Metaheuristic Algorithm Implementation for PV Array Reconfig...
收藏 引用
2023 IEEE international conference on Device Intelligence, computing and communication Technologies, DICCT 2023
作者: Kapur, Mridul Mahal, Agamdeep Singh Kumar, Priyanshu Pathak, Diwaker Manisha Gaur, Prerna Netaji Subhas University of Technology Formerly Nsit University of Delhi Instrumentation and Control Engineering Department New Delhi110078 India Teerthanker Mahaveer University Faculty of Engineering Department of Electrical Engineering UP Moradabad244001 India Netaji Subhas University of Technology Instrumentation and Control Engineering Department New Delhi110078 India
Partial shading imposes a major issue while generating power using solar photovoltaics (SPV) and consequences in the formation of hot spots and manifold peaks in the power-voltage (P-V) curve of the SPV arrays. As a r... 详细信息
来源: 评论
Blockchain based Roaming fraud prevention using LSTM model in 4G LTE Network  13
Blockchain based Roaming fraud prevention using LSTM model i...
收藏 引用
13th international conference on cloud computing, Data Science and engineering, Confluence 2023
作者: Yamuna, S. Sakthi, U. Sai Priya, G. Shanmuga Sendhilkumar, K.S. Sri Venkateswara College of Engineering Department of Computer Science and Engineering Chennai India Meenaskshi Sundarajan Engineering College Department of Computer Science and Engineering Chennai India R.M.D Engineering College Department of Computer Science and Engineering Chennai India Vit University Vellore Department of Computer Science and Engineering India
Fraud and Identity Theft constitute for huge financial loss to the telecom industry and telecom fraud accounts for a major cause of revenue loss. Among them, roaming fraud has the highest impact over network service p... 详细信息
来源: 评论