咨询与建议

限定检索结果

文献类型

  • 11,572 篇 会议
  • 132 册 图书
  • 109 篇 期刊文献

馆藏范围

  • 11,813 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 7,907 篇 工学
    • 6,214 篇 计算机科学与技术...
    • 4,548 篇 软件工程
    • 2,119 篇 信息与通信工程
    • 993 篇 控制科学与工程
    • 823 篇 电气工程
    • 760 篇 生物工程
    • 516 篇 机械工程
    • 509 篇 电子科学与技术(可...
    • 507 篇 生物医学工程(可授...
    • 395 篇 光学工程
    • 375 篇 安全科学与工程
    • 360 篇 动力工程及工程热...
    • 353 篇 仪器科学与技术
    • 327 篇 交通运输工程
    • 301 篇 化学工程与技术
    • 262 篇 网络空间安全
    • 243 篇 环境科学与工程(可...
  • 3,235 篇 理学
    • 1,813 篇 数学
    • 842 篇 生物学
    • 675 篇 物理学
    • 532 篇 统计学(可授理学、...
    • 325 篇 系统科学
    • 288 篇 化学
  • 2,397 篇 管理学
    • 1,408 篇 管理科学与工程(可...
    • 1,195 篇 图书情报与档案管...
    • 824 篇 工商管理
  • 495 篇 医学
    • 434 篇 临床医学
    • 419 篇 基础医学(可授医学...
  • 360 篇 法学
    • 296 篇 社会学
  • 282 篇 经济学
    • 278 篇 应用经济学
  • 211 篇 教育学
  • 209 篇 农学
  • 66 篇 艺术学
  • 42 篇 文学
  • 34 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 595 篇 cloud computing
  • 276 篇 computational mo...
  • 241 篇 accuracy
  • 226 篇 information tech...
  • 204 篇 deep learning
  • 190 篇 global positioni...
  • 189 篇 feature extracti...
  • 187 篇 internet of thin...
  • 177 篇 real-time system...
  • 166 篇 machine learning
  • 150 篇 computer archite...
  • 150 篇 data mining
  • 148 篇 security
  • 136 篇 optimization
  • 132 篇 big data
  • 127 篇 predictive model...
  • 127 篇 ubiquitous compu...
  • 114 篇 information syst...
  • 113 篇 wireless sensor ...
  • 112 篇 support vector m...

机构

  • 41 篇 al-farahidi univ...
  • 39 篇 faculty of compu...
  • 34 篇 university of ch...
  • 31 篇 school of comput...
  • 27 篇 department of in...
  • 27 篇 department of co...
  • 26 篇 faculty of infor...
  • 23 篇 the islamic univ...
  • 23 篇 institute of com...
  • 19 篇 school of inform...
  • 19 篇 chitkara centre ...
  • 18 篇 chitkara univers...
  • 18 篇 department of in...
  • 17 篇 school of comput...
  • 16 篇 college of techn...
  • 16 篇 sri sairam engin...
  • 16 篇 state key labora...
  • 15 篇 school of inform...
  • 15 篇 beijing universi...
  • 14 篇 college of infor...

作者

  • 35 篇 china
  • 20 篇 liu yang
  • 18 篇 dhabliya dharmes...
  • 18 篇 dharmesh dhabliy...
  • 17 篇 yang yang
  • 13 篇 li yang
  • 13 篇 wang wei
  • 12 篇 li li
  • 11 篇 wang hui
  • 10 篇 zhang lei
  • 9 篇 haungs a.
  • 9 篇 fürst p.
  • 9 篇 fan k.l.
  • 9 篇 bourbeau e.
  • 9 篇 fritz a.
  • 9 篇 halve l.
  • 9 篇 de clercq c.
  • 9 篇 böttcher j.
  • 9 篇 ha minh m.
  • 9 篇 günther c.

语言

  • 11,496 篇 英文
  • 283 篇 其他
  • 83 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"任意字段=4th International Multi-Conference on Computing in the Global Information Technology"
11813 条 记 录,以下是131-140 订阅
排序:
Enhancing Object Detection Robustness in Adverse Weather Conditions  4
Enhancing Object Detection Robustness in Adverse Weather Con...
收藏 引用
4th international conference on Evolutionary computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Yacoob, Shaik Kumar, D. Phani Harshitha, G.G.S. Teja, V.Y. Sai Veni, C.H. Satya Reddy, K. Mahidhar Department of Computer Science and Engineering Godavari Global University Rajahmahendravaram533296 India Department of Computer Science and Engineering Godavari Institute of Engineering & Technology Rajahmahendravaram533896 India
Fundamental applications in autonomous cars, robots, and surveillance systems include object detection for safety reasons such as recognizing vehicles, pedestrians, trees, street poles, and buildings. However, one of ... 详细信息
来源: 评论
Classification-Based Machine Learning For Detection of DDoS Attack In Cloud computing
Classification-Based Machine Learning For Detection of DDoS ...
收藏 引用
computing and information technology (ICCIT-1441), 2020 international conference on
作者: Amenah Naji D Alazmi Yasser Obaid Alharbi College of Computer Science and Engineering University of Hail Hail Saudi Arabia
the proliferation of cloud computing has marked a pivotal shift in the delivery of information technology (IT) services, offering enhanced scalability and operational efficiency through on-demand access to remote data... 详细信息
来源: 评论
A Fuzzy-Based System for Water pH and Conductivity Level Management
A Fuzzy-Based System for Water pH and Conductivity Level Man...
收藏 引用
computing and information technology (ICCIT-1441), 2020 international conference on
作者: Jafar Alyaseen Eid Albalawi Department of Computer Science College of Computer Science and Information Technology King Faisal University AlHofuf Saudi Arabia
Maintaining pH, conductivity, and water tank levels is essential for water quality in industrial heat transfer applications. Traditional Proportional-Integral-Derivative (PID) controllers may struggle to manage nonlin... 详细信息
来源: 评论
Enhancing Automated Requirement Analysis in Agile Environments through Visualization Tools
Enhancing Automated Requirement Analysis in Agile Environmen...
收藏 引用
computing and information technology (ICCIT-1441), 2020 international conference on
作者: Nawaf Alrabighi Mohammad M. Alqahtani Dept. of Computer Science and Artificail Intelligence University of Jeddah Jeddah Kingdom of Saudi Arabia
Agile methodologies have profoundly transformed project execution paradigms, prioritizing iterative development, adaptability, and extensive stakeholder collaboration. However, accurately defining and verifying projec... 详细信息
来源: 评论
Research on Quantitative Security Assessment Model of computing Power Services  25
Research on Quantitative Security Assessment Model of Comput...
收藏 引用
Proceedings of the 2025 4th international conference on Big Data, information and Computer Network
作者: Guo Yu Jing Ai Ai Gu Mengtao Han The Ministry of Industry and Information Technology Key Laboratory of Performance and Reliability Testing and Evaluation for Basic Software and Hardware The Fifth Electronics Research Institute of the Ministry of Industry and Information Technology of P.R. CHINA Guangzhou Guangdong China
With the accelerated growth of the global demand for computing power, computing power services (CPSs) have emerged as the times require and are becoming a brand-new form of business delivery. Meanwhile, there are secu... 详细信息
来源: 评论
HMM Based Approach for Arabic Word Segmentation
HMM Based Approach for Arabic Word Segmentation
收藏 引用
computing and information technology (ICCIT-1441), 2020 international conference on
作者: Ayoub Kadim Dept. of Computer Science Faculty of Applied Sciences A-M IMIS Research Laboratory Ibn Zohr University Morocco
Word decomposition or segmentation is one of the first stages of Natural Language Processing, particularly written language. It aims to find the decomposition of each compound word into its sub-elements. However, give... 详细信息
来源: 评论
Hierarchical Quantum Classification  4th
Hierarchical Quantum Classification
收藏 引用
4th international conference on Emerging Trends and Technologies on Intelligent Systems, ETTIS 2024
作者: Gohel, Prashant Joshi, Manjunath HCL Technologies Karnataka Bengaluru India Dhirubhai Ambani Institute of Information and Communication Technology Gujarat Gandhinagar India
Quantum computing in machine learning gives us a new tool to address few complex problems in the domain of artificial intelligence (AI). In this work, we use the hybrid, i.e., a combination of quantum and classical Qu... 详细信息
来源: 评论
Optimization-based Techniques Prediction Model in Determining Employee Turnover  4
Optimization-based Techniques Prediction Model in Determinin...
收藏 引用
4th international conference on Evolutionary computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Bustillo, James Cloyd M. Department of Information System Agusan Del sur State College of Agriculture and Technology Bunawan Philippines
Employee turnover is a vital challenge for organizations, often resulting in high financial and operational costs. Traditional methods of turnover prediction have been limited in their ability to capture the complexit... 详细信息
来源: 评论
Design of Network Security Situation Assessment Algorithm Based on Artificial Intelligence  14th
Design of Network Security Situation Assessment Algorithm Ba...
收藏 引用
14th international conference on Frontier computing, FC 2024
作者: Yang, Hao Jin, Yang Li, Haosheng Yun, Kai Bao, Jian State Grid Xinjiang Electric Power Co. LTD. Information and Telecommunication Company Urumqi China
With the rapid development of information technology, the issue of network security has become increasingly prominent, and has become an important factor affecting national security, enterprise development and even pe... 详细信息
来源: 评论
CSRP Protocol for High Accuracy Performance in Wireless Sensor Networks
CSRP Protocol for High Accuracy Performance in Wireless Sens...
收藏 引用
computing and information technology (ICCIT-1441), 2020 international conference on
作者: Ahmed Subhi Abdalkafor Salah A. Aliesawi College of Computer Science and Information Technology University of Anbar Anbar Iraq
In recent years, Wireless Sensor Network (WSN) has played a broad role in many vital applications that are used to monitor environmental and physical events. One of the major issues in WSN is the overlapping region of... 详细信息
来源: 评论