咨询与建议

限定检索结果

文献类型

  • 3,134 篇 会议
  • 1,096 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 4,289 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,508 篇 工学
    • 1,721 篇 计算机科学与技术...
    • 1,358 篇 软件工程
    • 1,003 篇 信息与通信工程
    • 522 篇 电子科学与技术(可...
    • 502 篇 控制科学与工程
    • 457 篇 电气工程
    • 329 篇 生物工程
    • 274 篇 光学工程
    • 266 篇 生物医学工程(可授...
    • 239 篇 网络空间安全
    • 236 篇 仪器科学与技术
    • 200 篇 动力工程及工程热...
    • 187 篇 机械工程
    • 181 篇 安全科学与工程
    • 137 篇 交通运输工程
    • 120 篇 化学工程与技术
  • 1,335 篇 理学
    • 635 篇 数学
    • 420 篇 物理学
    • 365 篇 生物学
    • 242 篇 统计学(可授理学、...
    • 188 篇 化学
    • 138 篇 系统科学
  • 708 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 211 篇 工商管理
  • 353 篇 医学
    • 259 篇 临床医学
    • 249 篇 基础医学(可授医学...
    • 211 篇 公共卫生与预防医...
    • 138 篇 药学(可授医学、理...
  • 131 篇 法学
    • 116 篇 社会学
  • 79 篇 经济学
  • 60 篇 农学
  • 31 篇 文学
  • 18 篇 军事学
  • 16 篇 教育学
  • 4 篇 艺术学

主题

  • 197 篇 accuracy
  • 163 篇 deep learning
  • 151 篇 real-time system...
  • 141 篇 internet of thin...
  • 120 篇 feature extracti...
  • 112 篇 machine learning
  • 101 篇 predictive model...
  • 94 篇 computational mo...
  • 86 篇 convolutional ne...
  • 85 篇 artificial intel...
  • 83 篇 security
  • 81 篇 optimization
  • 79 篇 training
  • 78 篇 cloud computing
  • 77 篇 support vector m...
  • 67 篇 wireless communi...
  • 61 篇 neural networks
  • 61 篇 energy efficienc...
  • 59 篇 wireless sensor ...
  • 57 篇 data models

机构

  • 188 篇 maharishi school...
  • 107 篇 maharishi school...
  • 97 篇 department of el...
  • 91 篇 presidency unive...
  • 76 篇 department of el...
  • 59 篇 centre of interd...
  • 56 篇 department of co...
  • 53 篇 department of co...
  • 48 篇 karnataka bangal...
  • 44 篇 department of co...
  • 43 篇 department of co...
  • 42 篇 state key labora...
  • 41 篇 centre of resear...
  • 39 篇 prince shri venk...
  • 38 篇 college of elect...
  • 37 篇 chitkara centre ...
  • 36 篇 maharishi univer...
  • 33 篇 lovely professio...
  • 33 篇 school of electr...
  • 32 篇 school of inform...

作者

  • 42 篇 guo hong
  • 35 篇 r. santhana kris...
  • 25 篇 imoize agbotinam...
  • 22 篇 zhang yichen
  • 21 篇 hanzo lajos
  • 21 篇 krishnan r. sant...
  • 19 篇 dharmesh dhabliy...
  • 19 篇 li deng
  • 19 篇 xiao ding
  • 18 篇 j. relin francis...
  • 18 篇 senthil g.a.
  • 17 篇 yang shaoshi
  • 17 篇 yu song
  • 17 篇 dhabliya dharmes...
  • 17 篇 girija shankar s...
  • 17 篇 prabha r.
  • 16 篇 gu wenzhe
  • 16 篇 awotunde joseph ...
  • 16 篇 feng botao
  • 16 篇 ding xiao

语言

  • 3,312 篇 英文
  • 944 篇 其他
  • 25 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Electronics and Communication Engineering Computer and Information"
4289 条 记 录,以下是721-730 订阅
排序:
Parallel and Batch Multiple Replica Auditing Protocol for Edge Computing  21
Parallel and Batch Multiple Replica Auditing Protocol for Ed...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Li, Yi Zheng, Wenying Pandi, Vijayakumar Bhuiyan, Md Zakirul Alam Thamilarasi, C. Nanjing University of Information Science and Technology School of Computer Science Nanjing China Zhejiang Sci-Tech University School of Computer Science and Technology Hangzhou China University College of Engineering Tindivanam Anna University Chennai Department of Computer Science and Engineering Melpakkam India Fordham University Department of Computer and Information Sciences BronxNY United States P.S.V College of Enfgineering and Technoogy Department of Electronics and Communication Engineering Krishnagiri India
The edge computing architecture exposes data transmission and storage to unauthorized access, compromising data integrity. Users typically employ multiple data backups to ensure data reliability and availability, enha... 详细信息
来源: 评论
Answer Type Prediction: Unveiling the Power of Deep Learning Models  2
Answer Type Prediction: Unveiling the Power of Deep Learning...
收藏 引用
2nd IEEE International Conference on Futuristic Technologies, INCOFT 2023
作者: Swathi, B.P. Geetha, M. Shenoy, Manjula Suhas, M.V. Manipal Institute of Technology Manipal Academy of Higher Education Department of Information & Communication Technology Manipal India Manipal Institute of Technology Manipal Academy of Higher Education Department of Computer Science and Engineering Manipal India Manipal Institute of Technology Manipal Academy of Higher Education Department of Electronics and Communication Engineering Manipal India
Answer type prediction plays a crucial role in natural language question answering systems, enabling the generation of relevant SPARQL queries, a query language for retrieving data from RDF databases. This research pa... 详细信息
来源: 评论
Skin Cancer Diagnosis Using High-Performance Deep Learning Architectures  3rd
Skin Cancer Diagnosis Using High-Performance Deep Learning A...
收藏 引用
3rd International Conference on Emergent Converging Technologies and Biomedical Systems, ETBS 2023
作者: Bindhu, A. Ahilan, A. Vallisree, S. Maria Jesi, P. Muthu Kumar, B. Marriwala, Nikhil Kumar Sabr, Aznul Qalid Md Department of Computer Science Infant Jesus College of Arts and Science for Women Tamil Nadu Kanyakumari District Mulagumoodu India Department of Electronics and Communication Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli627152 India Department of Electronics Engineering MIT Campus Anna University Tamil Nadu Chennai India Department of Computer Science and Engineering Loyola Institute of Technology and Science Loyola Nagar KK District Thovalai India School of Computing and Information Technology REVA University Karnataka Kattigenahalli560064 India Department of Electronics and Communication Engineering University Institute of Engineering and Technology Kurukshetra University Kurukshetra Thanesar India Department of Artificial Intelligence FCSIT University in Malaya Kuala Lumpur Malaysia
Skin cancer is one of the dangerous diseases which causes human death. It is originated by the abnormal growth of melanocytic cells. The malignant Skin cancer is also referred by another name as melanoma. The key sour... 详细信息
来源: 评论
Real-Time Driver Drowsiness Detection Using YOLOv8 with Whale Optimization Algorithm
收藏 引用
SAE International Journal of Transportation Safety 2025年 第1期13卷 15-33页
作者: Nandal, Priyanka Pahal, Sudesh Sharma, Tripti Omesh, Omesh Maharaja Surajmal Institute of Technology Department of Computer Science and Engineering India Maharaja Surajmal Institute of Technology Department of Electronics and Communication Engineering India Maharaja Surajmal Institute of Technology Department of Information Technology India
Driver fatigue and drowsiness portray an integral role in the frequency of road accidents. Putting in place policies intended to alert drivers is imperative for averting accidents and saving lives. This work aims to i... 详细信息
来源: 评论
Analyzing the Potential Benefits of Data Mining for Customer Relationship Management  1
Analyzing the Potential Benefits of Data Mining for Customer...
收藏 引用
1st IEEE International Conference on Emerging Research in Computational Science, ICERCS 2023
作者: Aravind, A.R. Katikar, Shilpa M. Acharjya, Kalyan Ezhilarasan, G. Yadav, Surendra Mishra, Abhinav Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai127 India Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Electrical and Electronics Engineering Karnataka Bangalore India Vivekananda Global University Department of Computer Science & Application Jaipur India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India
Data mining for client dating control (CRM) is figuring out patterns and traits in customer records to inform selections about product imparting, pricing, sales, advertising and marketing, and different consumer techn... 详细信息
来源: 评论
Leveraging Deep Autoencoders for Security in Big Data Framework: An Unsupervised Cloud Computing Approach  2
Leveraging Deep Autoencoders for Security in Big Data Framew...
收藏 引用
2nd International Conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Roy, Sourav Nijaguna, G.S. Shankar, Smitha Sharath Adnan, Myasar Mundher Umaeswari, P. Department of Electronics and Communication Engineering Bangalore India S.E.A. College of Engineering and Technology Department of Information Science and Engineering Bangalore India Nitte Meenakshi Institute of Technology Dept of Ece Bengaluru India The Islamic University Najaf Iraq R.M.K. Engineering College Department of Computer Science and Business Systems Tamil Nadu Kavaraipettai India
Abnormalities recognition in bank transaction big data is the number one issue for stability of financial security system. Due to the rate digital transactions are increasing it is vital to have effective ways. Encryp... 详细信息
来源: 评论
Electric Vehicle Charging System Using RFID and IoT for Enhanced User Experience  5
Electric Vehicle Charging System Using RFID and IoT for Enha...
收藏 引用
5th IEEE Middle East and North Africa communications Conference, MENACOMM 2025
作者: Hassain, Md Mehedi Haque Jamil, Injamul Hoque, Md Mahmudul Hasan, Md. Jahid International Islamic University Chittagong Dept. of Electrical and Electronics Engineering Chittagong Bangladesh University of Greenwich Dept. of Computing and Mathematical Sciences London United Kingdom CCN University of Science and Technology Dept. of Computer Science and Engineering Cumilla Bangladesh Comilla University Dept. of Information and Communication Technology Cumilla Bangladesh
Electric vehicles (EVs) are surging in popularity globally, offering a greener and more energy-efficient alternative to traditional cars. Our research aims to develop an RFID based system designed to automate EV charg... 详细信息
来源: 评论
Enhanced Security and Privacy for IoT Based Locker System Operated at Low Frequency Spectrum Using Blockchain  1st
Enhanced Security and Privacy for IoT Based Locker System Op...
收藏 引用
1st International Symposium on Artificial Intelligence, ISAI 2022
作者: Santra, Soumen Sharma, Sweta Deyasi, Arpan Department of Computer Application Techno International Newtown Kolkata700156 India Department of Electronics and Communication Engineering RCC Institute of Information Technology Kolkata700015 India
Conventional locker system faces continuous threat of breaching of data due to phishing scams, which raises high demand of encryption at server’s end. Blockchain based security system provides efficient solution so f... 详细信息
来源: 评论
Inclusion of IoT, ML, and Blockchain Technologies in Next Generation Industry 4.0 Environment
收藏 引用
Materials Today: Proceedings 2023年 80卷 3471-3475页
作者: Shrivastava, Anurag Murali Krishna, K. Lal Rinawa, Moti Soni, Mukesh Ramkumar, Gowtham Jaiswal, Sushma ECE Lakshmi Narain College of Technology and Science Indore India Department of Electronics and Communication Engineering Vignan's Institute of Information Technology Andhra Pradesh Duvvada Visakhapatnam India Department of Mechanical Engineering Government Engineering College Jhalawar Rajasthan India Computer Science & Engineering Department Jagran Lackcity University Bhopal India SRM Institute of Science and Technology Chennai India Koni Bilaspur495009 India
Industry 4.0 is a revolutionizing concept which has a more significant implication to numerous industries of various sectors worldwide. Industry 4.0 acts as a technical catalyst in accelerated growth through systemati... 详细信息
来源: 评论
Customer Churn Prediction Analysis for Retention Using Ensemble Learning  15
Customer Churn Prediction Analysis for Retention Using Ensem...
收藏 引用
15th International Conference on Computing communication and Networking Technologies, ICCCNT 2024
作者: Charanya, J. Sureshkumar, T. Kavitha, V. Nivetha, I. Pradeep, S. Dhamu Ajay, C. Kongu Engineering College Department of Artificial Intelligence Erode Tamil Nadu Perundurai638060 India Department of Information Technology Tamil Nadu Coimbatore641105 India Velalar College of Engineering & Technology Department of Computer Science and Engineering Tamil Nadu Erode638012 India Kongu Engineering College Department of Electronics and Communication Engineering Erode Tamil Nadu Perundurai638060 India
In the 21st century, there is a handful of information on the Internet. It is easy for customers to switch to a competing company in any sector. It is important for a company to retain its existing customers rather th... 详细信息
来源: 评论