咨询与建议

限定检索结果

文献类型

  • 4,638 篇 会议
  • 61 册 图书
  • 52 篇 期刊文献

馆藏范围

  • 4,751 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,478 篇 工学
    • 2,810 篇 计算机科学与技术...
    • 1,826 篇 软件工程
    • 1,230 篇 信息与通信工程
    • 605 篇 电气工程
    • 521 篇 控制科学与工程
    • 410 篇 电子科学与技术(可...
    • 313 篇 生物工程
    • 217 篇 生物医学工程(可授...
    • 211 篇 动力工程及工程热...
    • 204 篇 仪器科学与技术
    • 193 篇 机械工程
    • 138 篇 环境科学与工程(可...
    • 136 篇 安全科学与工程
    • 127 篇 光学工程
    • 111 篇 化学工程与技术
    • 101 篇 网络空间安全
    • 100 篇 石油与天然气工程
    • 98 篇 交通运输工程
  • 1,184 篇 理学
    • 568 篇 数学
    • 319 篇 生物学
    • 288 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 144 篇 化学
    • 141 篇 系统科学
  • 720 篇 管理学
    • 486 篇 管理科学与工程(可...
    • 286 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 206 篇 医学
    • 188 篇 临床医学
    • 181 篇 基础医学(可授医学...
    • 119 篇 药学(可授医学、理...
  • 104 篇 法学
  • 87 篇 经济学
  • 67 篇 农学
  • 53 篇 教育学
  • 25 篇 文学
  • 19 篇 军事学
  • 8 篇 艺术学

主题

  • 272 篇 cloud computing
  • 117 篇 internet of thin...
  • 113 篇 wireless communi...
  • 102 篇 real-time system...
  • 101 篇 mobile communica...
  • 101 篇 mobile computing
  • 89 篇 wireless sensor ...
  • 74 篇 security
  • 62 篇 protocols
  • 61 篇 computer archite...
  • 60 篇 computational mo...
  • 56 篇 deep learning
  • 56 篇 machine learning
  • 56 篇 accuracy
  • 55 篇 grid computing
  • 55 篇 monitoring
  • 53 篇 authentication
  • 53 篇 computer network...
  • 50 篇 quality of servi...
  • 48 篇 bandwidth

机构

  • 50 篇 school of inform...
  • 12 篇 department of el...
  • 11 篇 chitkara univers...
  • 10 篇 school of comput...
  • 10 篇 department of bi...
  • 10 篇 saveetha univers...
  • 9 篇 college of compu...
  • 9 篇 the islamic univ...
  • 9 篇 institute of com...
  • 9 篇 graphic era deem...
  • 8 篇 symbiosis instit...
  • 8 篇 school of inform...
  • 8 篇 department of el...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 koneru lakshmaia...
  • 7 篇 school of comput...
  • 7 篇 teerthanker maha...
  • 7 篇 university karna...
  • 6 篇 department of el...

作者

  • 10 篇 wang wei
  • 8 篇 gehlot anita
  • 8 篇 ramaraj kottaima...
  • 8 篇 jianxiong li
  • 7 篇 prabhu v.
  • 7 篇 ramesh t.
  • 7 篇 satapathy suresh...
  • 6 篇 nath vijay
  • 6 篇 murugan s.
  • 6 篇 chunxiao tang
  • 6 篇 s. murugan
  • 6 篇 kottaimalai rama...
  • 6 篇 kumar sanjeev
  • 6 篇 nugroho anto sat...
  • 6 篇 miao changyun
  • 6 篇 mannava vishnuva...
  • 6 篇 ma ming
  • 6 篇 gupta mridul
  • 5 篇 jui c.c.h.
  • 5 篇 oshima a.

语言

  • 4,512 篇 英文
  • 202 篇 其他
  • 41 篇 中文
  • 1 篇 法文
检索条件"任意字段=Proceedings of the 2nd International Conference on Autonomic Computing and Communication Systems"
4751 条 记 录,以下是51-60 订阅
排序:
Research on Cloud computing Architecture and Optimization of Human Resource Management System  2
Research on Cloud Computing Architecture and Optimization of...
收藏 引用
2nd IEEE international conference on Integrated Circuits and communication systems, ICICACS 2024
作者: Zhao, Rui Lei, Zhenhua Zhao, Ziyu Zhang, Dongshan University of South China School of Economics Management and Law Hunan Hengyang China Xiamen University Tan Kah Kee College Fujian Xiamen China Chengdu University of Tcm School of Medicine and Life Sciences Sichuan Chengdu China
This paper explores various cloud computing distributed technologies and constructs a SaaS cloud computing architecture for a human resource management system. Each module's functions within the system are detaile... 详细信息
来源: 评论
Brainwave Sensor based Smart Home Controller for Paralysed People  2
Brainwave Sensor based Smart Home Controller for Paralysed P...
收藏 引用
2nd international conference on Sustainable computing and Data communication systems, ICSCDS 2023
作者: Nandagopal, C. Sneha, B. Sriragavi, R. Veeradharshini, R. M.Kumarasamy College of Engineering Electronics and Communication Engineering Karur India
This study shows an electroencephalogram (EEG)-controlled smart home system designed to help the elderly, the crippled, and paralyzed individuals. For those who are paralyzed and experiencing mobility issues, it can b... 详细信息
来源: 评论
Enhancing Security: A Hybrid Encryption Algorithm for Effective Key Generation  2
Enhancing Security: A Hybrid Encryption Algorithm for Effect...
收藏 引用
2nd international conference on Recent Trends in Microelectronics, Automation, computing, and communications systems, ICMACC 2024
作者: Jacob, Jeevan John Kiran, P.S. Shenoy, Jaigovind B Basavaraju, Sagar Amrita School of Computing Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Department of Electronics and Communication Engineering Bengaluru India
The abstract Data security is of most importance, in the present day- the introduction of high-level wireless communication channels has led to generation and transfer of massive amounts of data. Data security must ke... 详细信息
来源: 评论
The Use of Game Theoretic Based Algorithms for Dynamic Resource Allocation in Vehicular Cloud computing systems  2
The Use of Game Theoretic Based Algorithms for Dynamic Resou...
收藏 引用
2nd IEEE international conference on Futuristic Technologies, INCOFT 2023
作者: Singh, Manpreet Chitkara University Institute of Engineering and Technology Chitkara University Centre for Interdisciplinary Research in Business and Technology Punjab India
The broad use of virtualization of hardware, service-oriented architecture, autonomic and utility computing, and the availability of inexpensive processors and storage devices have all contributed to the expansion of ... 详细信息
来源: 评论
Human: Age and Gender Identification Using SFTA and Deep Learning Algorithm  2
Human: Age and Gender Identification Using SFTA and Deep Lea...
收藏 引用
2nd IEEE international conference on Device Intelligence, computing and communication Technologies, DICCT 2024
作者: Upadhyay, Shailja Joshika Malai Magal, B.V. Deepa, A. Sathyabama Institute of Science and Technology Dept. of Computing Science and Engineering Chennai India
Precision in ascertaining the gender and age of individuals stands as a central objective in the development of accessible and intelligent systems. This holistic approach comprises a symbiosis of cutting-edge CNN meth... 详细信息
来源: 评论
Cloud computing in Enhancing the Efficiency and Integration of Alternative Energy systems  2
Cloud Computing in Enhancing the Efficiency and Integration ...
收藏 引用
2nd international conference on Computational Intelligence, communication Technology and Networking, CICTN 2025
作者: Sahoo, Amiya Kumar Prusty, Sucharita Jayasingh, Suvendra Kumar Swain, Asish Kumar Mohanta, Hemanta Kumar Aryan Institute of Engineering and Technology Odisha Bhubaneswar India Institute of Management and Information Technology BPUT Odisha Cuttack India
In response to growing environmental concerns and the need for sustainable development, alternative energy systems have emerged as crucial solutions to the problems associated with fossil fuels. This research focuses ... 详细信息
来源: 评论
Machine Learning Approaches for Predictive Channel State Information in MIMO systems Using LSTM  2
Machine Learning Approaches for Predictive Channel State Inf...
收藏 引用
2nd international conference on Advanced computing and communication Technologies, ICACCTech 2024
作者: Upadhyay, Deepak Sharma, Amulya Gupta, Mridul Devgan, Divyansh Garg, Shobhit Upadhyay, Abhay Graphic Era Hill University Dept. of Computer Science and Engineering Dehradun India Graphic Era deemed to be University Dept. of Computer Science and Engineering Dehradun India Graphic Era deemed to be University Dept. of Electronics and Communication Engineering Dehradun India Graphic Era Deemed to be University Dept. of Management Studies Dehradun India
In this paper, we analyse machine learning models, including Long Short-Term Memory networks, to predict the CSI and evaluate their impact on adaptive transmission in MIMO systems. To achieve this objective, we use si... 详细信息
来源: 评论
A Comprehensive Survey of Image Steganography  2
A Comprehensive Survey of Image Steganography
收藏 引用
2nd international conference on Sustainable computing and Smart systems (ICSCSS)
作者: Kalaiarasi, G. Sudharani, B. Jonnalagadda, Sharon Christiana Battula, Harsha Vardhan Sanagala, Bhavana Vignans Fdn Sci Technol & Res Dept ACSE Guntur Andhra Pradesh India
This research study analyzes the multidimensional landscape of steganography, examining its historical roots, theoretical background, contemporary approaches, and various applications. Beginning with a historical over... 详细信息
来源: 评论
Sign the Voice: An Embedded Software for Voice to Sign Language Translation  2
Sign the Voice: An Embedded Software for Voice to Sign Langu...
收藏 引用
2nd international conference on computing and Data Analytics, ICCDA 2024
作者: Peleo, Donna Lyn C. Patalay, Myra M. Cruz, Jesfer M. Dela Ramirez, Emmanuel A. College of Computing and Information Technologies National University Manila Philippines College of Computing and Information Sciences University of Technology and Applied Sciences Shinas Oman
This qualitative research study entitled Sign the Voice: An Embedded Software for Voice to Sign Language Translation aimed to bridge the communication barriers between hearing teachers and auditory-challenged students... 详细信息
来源: 评论
Research on Security System of Satellite-Ground Integrated Virtual Private Network in 6G  2
Research on Security System of Satellite-Ground Integrated V...
收藏 引用
2nd international conference on computing, communication, Perception and Quantum Technology, CCPQT 2023
作者: Cui, Xiao Gao, Yan National University of Defense Technology College of International Studies Nanjing China
To meet the security requirements of vertical industry applications in the 6G Satellite-Ground Integrated Network (SGIN), an intelligent and integrated security system is established by integrating various functions, ... 详细信息
来源: 评论