咨询与建议

限定检索结果

文献类型

  • 11,623 篇 会议
  • 132 册 图书
  • 110 篇 期刊文献

馆藏范围

  • 11,865 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 7,927 篇 工学
    • 6,218 篇 计算机科学与技术...
    • 4,539 篇 软件工程
    • 2,120 篇 信息与通信工程
    • 1,009 篇 控制科学与工程
    • 833 篇 电气工程
    • 760 篇 生物工程
    • 530 篇 机械工程
    • 515 篇 电子科学与技术(可...
    • 507 篇 生物医学工程(可授...
    • 394 篇 光学工程
    • 378 篇 动力工程及工程热...
    • 374 篇 安全科学与工程
    • 352 篇 仪器科学与技术
    • 326 篇 交通运输工程
    • 319 篇 化学工程与技术
    • 260 篇 网络空间安全
    • 242 篇 环境科学与工程(可...
  • 3,234 篇 理学
    • 1,816 篇 数学
    • 841 篇 生物学
    • 678 篇 物理学
    • 530 篇 统计学(可授理学、...
    • 324 篇 系统科学
    • 288 篇 化学
  • 2,392 篇 管理学
    • 1,404 篇 管理科学与工程(可...
    • 1,193 篇 图书情报与档案管...
    • 822 篇 工商管理
  • 493 篇 医学
    • 432 篇 临床医学
    • 417 篇 基础医学(可授医学...
  • 358 篇 法学
    • 294 篇 社会学
  • 282 篇 经济学
    • 278 篇 应用经济学
  • 211 篇 教育学
  • 208 篇 农学
  • 66 篇 艺术学
  • 42 篇 文学
  • 34 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 592 篇 cloud computing
  • 288 篇 computational mo...
  • 247 篇 accuracy
  • 241 篇 information tech...
  • 206 篇 deep learning
  • 197 篇 feature extracti...
  • 190 篇 global positioni...
  • 187 篇 internet of thin...
  • 179 篇 real-time system...
  • 166 篇 machine learning
  • 154 篇 data mining
  • 151 篇 computer archite...
  • 148 篇 security
  • 141 篇 optimization
  • 132 篇 big data
  • 130 篇 predictive model...
  • 127 篇 ubiquitous compu...
  • 114 篇 information syst...
  • 113 篇 wireless sensor ...
  • 112 篇 support vector m...

机构

  • 41 篇 al-farahidi univ...
  • 39 篇 faculty of compu...
  • 34 篇 university of ch...
  • 31 篇 school of comput...
  • 29 篇 faculty of infor...
  • 27 篇 department of in...
  • 27 篇 department of co...
  • 24 篇 institute of com...
  • 23 篇 the islamic univ...
  • 19 篇 school of inform...
  • 19 篇 chitkara centre ...
  • 18 篇 chitkara univers...
  • 18 篇 department of in...
  • 17 篇 school of comput...
  • 16 篇 college of techn...
  • 16 篇 sri sairam engin...
  • 16 篇 state key labora...
  • 16 篇 beijing universi...
  • 15 篇 school of inform...
  • 14 篇 college of infor...

作者

  • 35 篇 china
  • 20 篇 liu yang
  • 18 篇 dhabliya dharmes...
  • 18 篇 dharmesh dhabliy...
  • 17 篇 yang yang
  • 13 篇 li yang
  • 13 篇 wang wei
  • 12 篇 li li
  • 11 篇 wang hui
  • 10 篇 zhang lei
  • 9 篇 haungs a.
  • 9 篇 fürst p.
  • 9 篇 fan k.l.
  • 9 篇 bourbeau e.
  • 9 篇 fritz a.
  • 9 篇 halve l.
  • 9 篇 de clercq c.
  • 9 篇 böttcher j.
  • 9 篇 ha minh m.
  • 9 篇 günther c.

语言

  • 11,336 篇 英文
  • 495 篇 其他
  • 69 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"任意字段=4th International Multi-Conference on Computing in the Global Information Technology"
11865 条 记 录,以下是161-170 订阅
排序:
Innovative Approaches In Facial Expression Recognition: A Hybrid Deep Learning Perspective  4
Innovative Approaches In Facial Expression Recognition: A Hy...
收藏 引用
4th international conference on Emerging Systems and Intelligent computing, ESIC 2024
作者: Ramachandrapuram, Pavitra Yaramadi, Pravallika Gorikapudi, Keerthi Manukonda, Swarna Lakshmi Panthangi, Amrutha Lakshmi Lakireddy Bali Reddy College of Engineering Information Technology Mylavaram India
the extraction of discriminative spatiotemporal video characteristics from facial expression images in video sequences is a major and demanding problem in facial expression recognition (FER). Applications such as secu... 详细信息
来源: 评论
3D Human Pose Estimation in Spatio-Temporal Based on Graph Convolutional Networks  4
3D Human Pose Estimation in Spatio-Temporal Based on Graph C...
收藏 引用
4th IEEE international conference on information technology, Big Data and Artificial Intelligence, ICIBA 2024
作者: Jiao, Liming Huang, Xin Ma, Lin Ren, Zhaoxin Ding, Wenzhuo Tianjin Normal University College of Computer and Information Engineering Tianjin China
In recent years, 3D human pose estimation has seen rapid development and plays a key role in fields such as human-computer interaction. Currently, the most widely used methods include monocular-based pose estimation a... 详细信息
来源: 评论
Design of task offloading algorithm for mobile edge computing network based on UAV  4
Design of task offloading algorithm for mobile edge computin...
收藏 引用
4th international conference on Neural Networks, information and Communication Engineering, NNICE 2024
作者: Xu, Ling Qian, Keneng Cai, Mingkai Zhang, Ye Hangzhou Dianzi University College of Communication Engineering Hangzhou China Huaxin Consulting Co. Ltd College of Network Information Hangzhou China Huaxin Consulting Co. Ltd College of Mobile Research Hangzhou China Digital Guangdong Network Construction Co. Ltd Intelligent Transportation Networks Center Guangzhou China
this paper optimizes system performance in a UAV-based multi-user mobile edge computing system through joint design of UAV positions, computing service pricing, and user task offloading strategies. the Stackelberg mod... 详细信息
来源: 评论
Study on Cyber-Physical power System fault recovery under collaborative information  4
Study on Cyber-Physical power System fault recovery under co...
收藏 引用
4th IEEE international conference on information technology, Big Data and Artificial Intelligence, ICIBA 2024
作者: Zheng, Siyuan Qiu, Yichuan Xie, Huasen State Grid Zhejiang Electric Power Co. Ltd. Wenzhou Dongtou District Power Supply Company China State Grid Wenzhou Electric Power Company China
In order to recover fault services quickly and effectively, a collaborative recovery model of power communication network after fault is first established in this paper. Based on the two-layer programming method, the ... 详细信息
来源: 评论
Implementing Resource-Aware Scheduling Algorithm for Improving Cost Optimization in Cloud computing  4
Implementing Resource-Aware Scheduling Algorithm for Improvi...
收藏 引用
4th international conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Reddy, Kiran Jagannadha Udayaraju, Pamula Pamaiahgari, Venkata Pradeep Reddy Kumar, V. Dilip Walmart BentonvilleAR United States Srm University Department of Cse AP India Wendys International Llc OH United States SRKR Engineering College Department of CSE India
An uncountable number of computational resources are shared for various applications using a transformative technology called Cloud computing. It is an emerging technology that can offer scalable and on-demand resourc... 详细信息
来源: 评论
Improving System Security: Machine Learning Algorithm-Based Intrusion Detection System  4
Improving System Security: Machine Learning Algorithm-Based ...
收藏 引用
4th international conference on Ubiquitous computing and Intelligent information Systems, ICUIS 2024
作者: Barpute, Jyotsna Vilas Bhargava, Sanjay Mansarovar Global University Faculty of Engineering and Technology Department of Computer Science Bhopal India Dr. D. Y. Patil Institute of Technology Pimpri Pune India
In today's era, computer technology is now required in many areas of our daily lives, including banking, entertainment, education, and communication. System security is crucial in the digital age, and detecting in... 详细信息
来源: 评论
Experimental Study on the Intensity Scintillation Effect of Partially Coherent Light Transmission in Atmospheric Turbulence  4
Experimental Study on the Intensity Scintillation Effect of ...
收藏 引用
4th IEEE international conference on information technology, Big Data and Artificial Intelligence, ICIBA 2024
作者: Li, Qing Deng, Kai Zhang, Ya Ni, Xiaolong Cheng, Xiang Wen, Lianghua Yibin University School of Faculty of Intelligence Manufacturing Yibin China Yibin Vocational & Technical College School of Electronic Information and Artificial Intelligencehe Yibin China Changchun University of Science and Technology National and Local Joint Engineering Research Center of Space Optoelectronics Technology Changchun China
In this article, the scintillation effect of laser beams with different initial coherence in the atmosphere is studied, and the expression of scintillation factor of partially coherent beams in the Gaussian Schell bea... 详细信息
来源: 评论
Classification of Humanitarian Crisis Response through Unimodal multi-Class Textual Classification  4
Classification of Humanitarian Crisis Response Through Unimo...
收藏 引用
4th international conference on Emerging Systems and Intelligent computing, ESIC 2024
作者: Jain, Tarun Gopalani, Dinesh Meena, Yogesh Kumar Malaviya National Institute of Technology Manipal University Jaipur Department of Cse Jaipur India Malaviya National Institute of Technology Department of Cse Jaipur India
In the realm of disaster response it is crucial to emphasize the significant role that social media plays as an immediate and dynamic source of information. In times of both natural and human- created calamities citiz... 详细信息
来源: 评论
Remote Control of Residential Meter Involving E-Billing  4
Remote Control of Residential Meter Involving E-Billing
收藏 引用
4th international conference on Electronic and Electrical Engineering and Intelligent System, ICE3IS 2024
作者: Khan, Sher Dali Alamsyah, Nurwahyu Mufti, Naveed Ul Haq, Qazi Mazhar Mukhtar, Abbas Haq, Muhamad Amirul Malaysia Universitas Muhammadiyah Yogyakarta Information Technology Department Yogyakarta Indonesia UET Mardan Department of Telecommunication Engineering Pakistan Yuan Ze University Department of Computer Science and Engineering and IBPI Taoyuan Taiwan University of Windsor Department of Electrical and Computing Engineering ON Canada Universitas Muhammadiyah Surabaya Computer Science Department Surabaya Indonesia
In electrical energy distribution, losses are a challenging problem, among these losses electricity theft plays a prominent role. Not only Pakistan but many other countries throughout the world face this challenge. th... 详细信息
来源: 评论
Fine-Grained Data Identification Mechanism in Edge computing for Smart Power Grid  4
Fine-Grained Data Identification Mechanism in Edge Computing...
收藏 引用
4th international conference on Energy Engineering and Power Systems, EEPS 2024
作者: Hu, Tianmu Zhang, Ziliang Liu, Bo Wang, Haoxin Jiangsu Electric Power Information Technology Co. Ltd. Nanjing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
this paper investigates how to build efficient and secure data identification in edge computing for smart power grid. the current solutions, such as access control and data labelling, have limitations due to security ... 详细信息
来源: 评论