咨询与建议

限定检索结果

文献类型

  • 3,134 篇 会议
  • 1,085 篇 期刊文献
  • 57 册 图书

馆藏范围

  • 4,276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,508 篇 工学
    • 1,721 篇 计算机科学与技术...
    • 1,358 篇 软件工程
    • 1,003 篇 信息与通信工程
    • 522 篇 电子科学与技术(可...
    • 502 篇 控制科学与工程
    • 457 篇 电气工程
    • 329 篇 生物工程
    • 274 篇 光学工程
    • 266 篇 生物医学工程(可授...
    • 239 篇 网络空间安全
    • 236 篇 仪器科学与技术
    • 200 篇 动力工程及工程热...
    • 187 篇 机械工程
    • 181 篇 安全科学与工程
    • 137 篇 交通运输工程
    • 120 篇 化学工程与技术
  • 1,335 篇 理学
    • 635 篇 数学
    • 420 篇 物理学
    • 365 篇 生物学
    • 242 篇 统计学(可授理学、...
    • 188 篇 化学
    • 138 篇 系统科学
  • 708 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 211 篇 工商管理
  • 353 篇 医学
    • 259 篇 临床医学
    • 249 篇 基础医学(可授医学...
    • 211 篇 公共卫生与预防医...
    • 138 篇 药学(可授医学、理...
  • 131 篇 法学
    • 116 篇 社会学
  • 79 篇 经济学
  • 60 篇 农学
  • 31 篇 文学
  • 18 篇 军事学
  • 16 篇 教育学
  • 4 篇 艺术学

主题

  • 195 篇 accuracy
  • 163 篇 deep learning
  • 151 篇 real-time system...
  • 141 篇 internet of thin...
  • 120 篇 feature extracti...
  • 112 篇 machine learning
  • 101 篇 predictive model...
  • 94 篇 computational mo...
  • 86 篇 convolutional ne...
  • 84 篇 artificial intel...
  • 83 篇 security
  • 81 篇 optimization
  • 80 篇 training
  • 78 篇 cloud computing
  • 77 篇 support vector m...
  • 67 篇 wireless communi...
  • 61 篇 neural networks
  • 60 篇 energy efficienc...
  • 59 篇 wireless sensor ...
  • 58 篇 data models

机构

  • 189 篇 maharishi school...
  • 105 篇 maharishi school...
  • 97 篇 department of el...
  • 94 篇 presidency unive...
  • 76 篇 department of el...
  • 59 篇 centre of interd...
  • 56 篇 department of co...
  • 53 篇 department of co...
  • 48 篇 karnataka bangal...
  • 44 篇 department of co...
  • 43 篇 department of co...
  • 42 篇 state key labora...
  • 41 篇 centre of resear...
  • 39 篇 prince shri venk...
  • 38 篇 college of elect...
  • 37 篇 chitkara centre ...
  • 36 篇 maharishi univer...
  • 33 篇 lovely professio...
  • 33 篇 school of electr...
  • 32 篇 school of inform...

作者

  • 42 篇 guo hong
  • 35 篇 r. santhana kris...
  • 25 篇 imoize agbotinam...
  • 22 篇 zhang yichen
  • 21 篇 hanzo lajos
  • 19 篇 dharmesh dhabliy...
  • 19 篇 li deng
  • 19 篇 xiao ding
  • 19 篇 krishnan r. sant...
  • 18 篇 j. relin francis...
  • 18 篇 senthil g.a.
  • 18 篇 girija shankar s...
  • 17 篇 yang shaoshi
  • 17 篇 yu song
  • 17 篇 dhabliya dharmes...
  • 16 篇 gu wenzhe
  • 16 篇 awotunde joseph ...
  • 16 篇 feng botao
  • 16 篇 ding xiao
  • 16 篇 prabha r.

语言

  • 3,300 篇 英文
  • 943 篇 其他
  • 25 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Electronics and Communication Engineering Computer and Information"
4276 条 记 录,以下是561-570 订阅
排序:
Beamforming Design Towards Sum-Rate Maximization for Holographic Active RIS-Aided Uplink Near-Field communications
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 18582-18595页
作者: Singh, Sandeep Singh, Keshav Singh, Sandeep Kumar Shin, Hyundong Duong, Trung Q. Kaohsiung80424 Taiwan National Sun Yat-sen University Institute of Communications Engineering Kaohsiung80424 Taiwan Kyung Hee University Department of Electronic Engineering Gyeonggi-do Yongin-si17104 Korea Republic of Motilal Nehru National Institute of Technology Allahabad Department of Electronics and Communication Engineering Prayagraj India Kyung Hee University Department of Electronics and Information Convergence Engineering Deogyeong-daero Gyeonggi-do Yongin-si1732 Korea Republic of Memorial University Faculty of Engineering and Applied Science St. John'sNLA1C 5S7 Canada Queen's University Belfast School of Electronics Electrical Engineering and Computer Science BelfastBT7 1NN United Kingdom
Holographically-driven active reconfigurable intelligent surface (HARIS), leveraging densely packed sub-wavelength elements, overcomes the limitations of conventional RIS in signal processing, unlocking advanced capab... 详细信息
来源: 评论
Secure Key Management Based Mobile Authentication in Cloud
收藏 引用
computer Systems Science & engineering 2022年 第12期43卷 887-896页
作者: S.Shanmuga Priya D.Yuvaraj T.Satyanarayana Murthy Varghese S.Chooralil S.Navaneetha Krishnan P.Banumathy P.SundaraVadivel Department of Computer Science and Engineering M.I.E.T Engineering CollegeTrichyTamilnaduIndia Department of Computer Science and Engineering Cihan UniversityDuhokKurdistan RegionIraq Department of Computer Science and Engineering Bapatla Engineering CollegeBapatlaAndhra PradeshIndia Department of Computer Science and Engineering Rajagiri School of Engineering and TechnologyKakkanadKeralaIndia Department Electronics and Communication Engineering SACS MAVMM Engineering CollegeMaduraiTamilnaduIndia Department of Information Technology Karaikal Polytechnic CollegeVarichikudy-KaraikalIndia Department of Computer Science and Engineering SACS MAVMM Engineering CollegeMaduraiIndia
Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechan... 详细信息
来源: 评论
Phishing Website Detection using Natural Language Processing  7
Phishing Website Detection using Natural Language Processing
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Mariappan, E. Jean Celia Grace, C. Joe Patrick Gnanaraj, S. Elizabeth Paulsyah, D. Muthukumaran, N. St. Mother Theresa Engineering College Department of Computer Science And Engineering Tamilnadu Tuticorin India Francis Xavier Engineering College Department of Information Technology Tamilnadu Tirunelveli India St. Mother Theresa Engineering College Department of Mechanical Engineering Tamilnadu Tuticorin India Francis Xavier Engineering College Department of Computer Science And Engineering Tamilnadu Tirunelveli India Sri Eswar Engineering College Department of Electronics And Communication Engineering Tamilnadu Coimbatore India
Given the rapid proliferation of online services, there has been a corresponding uptick in nefarious activities aimed at misleading users into unintended actions. The internet, as a platform, has become a fertile grou... 详细信息
来源: 评论
AI-Based Methods to Detect and Counter Cyber Threats in Cloud Environments to Strengthen Cloud Security
AI-Based Methods to Detect and Counter Cyber Threats in Clou...
收藏 引用
2024 International Conference on Electrical, electronics and Computing Technologies, ICEECT 2024
作者: Chaudhary, Diwakar Verma, S.K. Mohan Shrimal, Vijay Madala, Ravikiran Baliyan, Rashi Sathish, M. Noida International University School of Business Management Greater Noida India Chandigarh University Department of Computer Science Engineering Punjab Mohali India University of Cumberlands Department of Information North Carolina Durham United States Rajalakshmi Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India
Traditional cloud security solutions often employ outdated techniques and find it difficult to stay up to date with the ever-evolving cyber threat scenario. Complex attacks may be made against cloud systems since stat... 详细信息
来源: 评论
Cloud resource management using adaptive firefly algorithm and artificial neural network
收藏 引用
International Journal of Cloud Computing 2022年 第5-6期11卷 480-491页
作者: Manigandan, S.K. Manjula, S. Nagaraju, V. Ramya, D. TapasBapu, B.R. Department of Computer Science and Engineering VelTech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College Avadi Chennai India Department of Electronics and Communication Engineering Rajalakshmi Institute of Technology Chennai India Department of Information Technology Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai India Department of Electronics and Communication Engineering S.A. Engineering College Chennai India
Cloud computing can be characterised in basic terms as one of the stages for giving conveyed figuring assets. Registering assets may incorporate capacity, data transfer capacity, memory space, handling components, etc... 详细信息
来源: 评论
Exploring the Quality of Service Impacts of Cloud Computing over Wireless Networks
Exploring the Quality of Service Impacts of Cloud Computing ...
收藏 引用
2024 International Conference on E-Mobility, Power Control and Smart Systems, ICEMPS 2024
作者: Gopal, Santhosh Kumar Mohammed, Abdul Sajid Saddi, Venkata Ramana Jiwani, Nasmin Logeshwaran, J. Sciences CharlotteNC United States School of Computer and Information Sciences University of The Cumberlands KY United States Ace American Insurance Chubb Group RaleighNC United States University of The Cumberlands Dept. of Information Technology WilliamsburgKY United States Sri Eshwar College of Engineering Department of Electronics and Communication Engineering Coimbatore India
Cloud computing is a paradigm that enables users to access statistics and programs through the use of a virtualized infrastructure. As such, it could be leveraged to lessen the prices of strolling an allotted system, ... 详细信息
来源: 评论
Deep Fake Detection Using computer Vision-Based Deep Neural Network with Pairwise Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 2449-2462页
作者: R.Saravana Ram M.Vinoth Kumar Tareq M.Al-shami Mehedi Masud Hanan Aljuaid Mohamed Abouhawwash Department of Electronics and Communication Engineering Anna UniversityUniversity College of EngineeringDindigul624622India Department of Computer Science and Engineering Anna UniversityUniversity College of EngineeringDindigul624622India Department of Mathematics Faculty of ScienceSana’a UniversitySana’a 13509Yemen Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Computer Sciences Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman University(PNU)Riyadh11671Saudi Arabia Department of Mathematics Faculty of ScienceMansoura UniversityMansoura35516Egypt Department of Computational Mathematics Scienceand Engineering(CMSE)Michigan State UniversityEast LansingMI48824USA
Deep learning-based approaches are applied successfully in manyfields such as deepFake identification,big data analysis,voice recognition,and image *** is the combination of deep learning in fake creation,which states c... 详细信息
来源: 评论
A Comprehensive Study on Drones and Big Data for Supply Chain Optimization Using a Novel Approach  1
A Comprehensive Study on Drones and Big Data for Supply Chai...
收藏 引用
1st International Conference on Advanced Computing and Emerging Technologies, ACET 2024
作者: Dankan Gowda, V. Palanikkumar, D. Suganthi, N. Malleswari, A.S. Thapa, Sanjog Tanguturi, Rama Chaithanya Bms Institute of Technology and Management Department of Electronics and Communication Engineering Karnataka Bangalore India Dr Ngp Institute of Technology Department of Computer Science and Engineering Tamilnadu Coimbatore India Dayananda Sagar College of Engineering Department of Electrical and Electronics Engineering Karnataka Bangalore India Aditya College of Engineering and Technology Department of Computer Science & Engineering Andhra Pradesh Surampalem India Lamar University Department of Information System and Analysis BeaumontTX United States Woxsen University School of Business Hyderabad India
This research paper aims to provide qualitative and quantitative insights regarding the application of drones and big data techniques in the SCM field through a new scientific method. The proposed method exploits the ... 详细信息
来源: 评论
Optimized Power Allocation in Downlink NOMA with Imperfect Successive Interference Cancellation
Optimized Power Allocation in Downlink NOMA with Imperfect S...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Soumik Biswas Debasish Bera Department of Electronics and Communication Engineering Indian Institute of Information Technology Kalyani India Department of Computer Science and Engineering Indian Institute of Information Technology Kalyani India
It is expected that physical-layer security will finally thrive to provide an extra layer of defence for a variety of devices in next-generation 6G wireless communication. In this work, physical-layer security using n... 详细信息
来源: 评论
Map Building of Indoor Environment with Sensors using Neural Network
Map Building of Indoor Environment with Sensors using Neural...
收藏 引用
2023 Winter Summit on Smart Computing and Networks, WiSSCoN 2023
作者: Latha Mary, S Angel Ulagapriya, K. Poonguzhali, A. Menaha, R. David, Beaulah Priyadharshini, T.R. Sri Eshwar College of Engineering Department of Computer Science and Business Systems Coimbatore India Vels Institute of Science Technology and Advanced Studies Department of Computer Science and Engineering Chennai India Sri Sairam College of Engineering Department of Electronics and Communication Engineering Bangalore India Sri Eshwar College of Engineering Department of Information Technology Coimbatore India Hindusthan College of Engineering and Technology Department of Information Technology Coimbatore India
The necessity of a blueprint of a building structure is a mandatory requirement for any reconnaissance or rescue operations. In our project, we build a modular system combining sensors related to sonar, laser, micro-w... 详细信息
来源: 评论