咨询与建议

限定检索结果

文献类型

  • 16,123 篇 会议
  • 117 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 16,278 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,967 篇 工学
    • 8,110 篇 计算机科学与技术...
    • 5,603 篇 软件工程
    • 2,180 篇 信息与通信工程
    • 1,608 篇 控制科学与工程
    • 1,420 篇 电气工程
    • 906 篇 生物工程
    • 773 篇 生物医学工程(可授...
    • 663 篇 机械工程
    • 560 篇 仪器科学与技术
    • 555 篇 电子科学与技术(可...
    • 488 篇 安全科学与工程
    • 450 篇 网络空间安全
    • 411 篇 交通运输工程
    • 372 篇 光学工程
    • 361 篇 动力工程及工程热...
  • 3,321 篇 理学
    • 1,645 篇 数学
    • 993 篇 生物学
    • 601 篇 物理学
    • 585 篇 统计学(可授理学、...
    • 453 篇 系统科学
    • 389 篇 化学
  • 3,017 篇 管理学
    • 2,120 篇 管理科学与工程(可...
    • 1,351 篇 图书情报与档案管...
    • 813 篇 工商管理
  • 875 篇 医学
    • 707 篇 基础医学(可授医学...
    • 678 篇 临床医学
    • 389 篇 公共卫生与预防医...
    • 340 篇 药学(可授医学、理...
  • 438 篇 法学
    • 375 篇 社会学
  • 323 篇 教育学
  • 322 篇 经济学
    • 321 篇 应用经济学
  • 216 篇 农学
  • 115 篇 文学
  • 34 篇 军事学
  • 30 篇 艺术学
  • 6 篇 哲学
  • 5 篇 历史学

主题

  • 889 篇 cloud computing
  • 740 篇 informatics
  • 543 篇 computational mo...
  • 373 篇 computer archite...
  • 316 篇 conferences
  • 243 篇 internet of thin...
  • 239 篇 big data
  • 228 篇 deep learning
  • 222 篇 monitoring
  • 217 篇 data mining
  • 198 篇 educational inst...
  • 185 篇 computer science
  • 163 篇 semantics
  • 162 篇 servers
  • 156 篇 machine learning
  • 156 篇 training
  • 155 篇 task analysis
  • 155 篇 ontologies
  • 152 篇 application soft...
  • 151 篇 feature extracti...

机构

  • 127 篇 national institu...
  • 64 篇 institut teknolo...
  • 58 篇 graduate school ...
  • 50 篇 school of inform...
  • 47 篇 school of comput...
  • 43 篇 telkom universit...
  • 38 篇 school of electr...
  • 32 篇 faculty of compu...
  • 31 篇 college of infor...
  • 30 篇 college of compu...
  • 28 篇 school of inform...
  • 27 篇 university of ch...
  • 26 篇 informatics inst...
  • 25 篇 luddy school of ...
  • 25 篇 institut teknolo...
  • 23 篇 department of so...
  • 21 篇 school of inform...
  • 19 篇 ieee
  • 18 篇 department of in...
  • 18 篇 department of la...

作者

  • 34 篇 xhafa fatos
  • 29 篇 masahide nakamur...
  • 21 篇 sharif mhd saeed
  • 21 篇 zivkovic miodrag
  • 19 篇 christopher c. y...
  • 19 篇 omer rana
  • 18 篇 hluchy ladislav
  • 18 篇 geyong min
  • 17 篇 sachio saiki
  • 17 篇 beth plale
  • 16 篇 geoffrey fox
  • 16 篇 nugraha yudhisti...
  • 16 篇 bacanin nebojsa
  • 16 篇 xiaohua hu
  • 15 篇 jean araujo
  • 15 篇 xiong gang
  • 14 篇 ishida toru
  • 14 篇 hanzi wang
  • 14 篇 yusheng ji
  • 14 篇 moung ervin gubi...

语言

  • 13,653 篇 英文
  • 2,582 篇 其他
  • 44 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=IEEE International Conference on Progress in Informatics and Computing"
16278 条 记 录,以下是121-130 订阅
排序:
Distributed Brute-Force Password Recovery with a Partitioned Quantum Grover’s Algorithm  2
Distributed Brute-Force Password Recovery with a Partitioned...
收藏 引用
2nd international conference on Computational Intelligence and Network Systems, CINS 2024
作者: Bounceur, Ahcene University of Sharjah College of Computing and Informatics Sharjah United Arab Emirates
In the booming field of quantum computing, Grover’s Algorithm emerges as a pivotal quantum search algorithm, theoretically capable of outperforming classical brute-force search methods by exploiting the principles of... 详细信息
来源: 评论
A Data-driven Truck Dispatching Algorithm for a Sequence-constrained Less-than-truckload Container Transshipment Problem  22
A Data-driven Truck Dispatching Algorithm for a Sequence-con...
收藏 引用
22nd ieee international conference on Industrial informatics, INDIN 2024
作者: Gong, Jiahui Chen, Jianjun Qi, Jun Zhang, Haiyang Department of Computing Xi’an Jiaotong-Liverpool University Jiangsu China
Container handling optimization in ports significantly influences logistics chain efficiency and cost control, vital for economic benefits. Traditional research prioritizes quay crane (QC) scheduling, while truck dyna... 详细信息
来源: 评论
Detecting Singular Value Decomposition-based WatermarkEmbedded Medical Images using ResNet Neural Network  2
Detecting Singular Value Decomposition-based WatermarkEmbedd...
收藏 引用
2nd ieee international conference on Advances in computing, Communication and Applied informatics, ACCAI 2023
作者: Abirami, R. Malathy, C. Srm Institute of Science and Technology School of Computing Department of Networking and Communications Kattankulathur603 203 India
Digital products copyright protection is a severe issue in the growth of network technology. The security of data, especially medical data, is of utmost importance. The growth of the internet gives easy access to tran... 详细信息
来源: 评论
Energy-Efficient and Intelligent Lighting Solutions: A Prototype for Smart Cities  6
Energy-Efficient and Intelligent Lighting Solutions: A Proto...
收藏 引用
6th international conference on Mobile computing and Sustainable informatics, ICMCSI 2025
作者: Ariff, Mohamed Imran Mohamed Razally, Batrisyia Qistina Azizan, Azilawati Ahmad, Samsiah Zulkifli, Zalikha Arshad, Noreen Izza College of Computing Informatics and Mathematics Universiti Teknologi MARA Perak Branch Tapah Campus Malaysia EMI Solutions Sdn Bhd C-43-2 Block C Jaya One 72A Jalan Universiti Section 13 Selangor Petaling Jaya46200 Malaysia Department of Computer and Information Sciences Universiti Teknologi PETRONAS Seri Iskandar Malaysia
This paper presents a Smart Street Lighting System (SSLS) aimed at improving energy efficiency and providing enhanced convenience for urban areas, with a particular focus on parking facilities. By employing light, rai... 详细信息
来源: 评论
Enhancing Security: Evaluating RFID Card Access Control Systems using SHA-256
Enhancing Security: Evaluating RFID Card Access Control Syst...
收藏 引用
2024 international conference on Innovation and Intelligence for informatics, computing, and Technologies, 3ICT 2024
作者: Yang, You Zhi Ramly, Athirah Mohd Sharif, Mhd Saeed Department of Computing and Information Systems Sunway University Selangor Malaysia School of Architecture Computing and Engineering UEL London United Kingdom Intelligent Technologies Research Group School of Architecture Computing and Engineering UEL London United Kingdom
This paper focuses on enhancing the security of a chosen system by implementing multiple layers of protection, including concealing sensitive data on the Liquid Crystal Display (LCD), utilizing hashed Unique Identifie... 详细信息
来源: 评论
Overview of Vehicle Edge computing and Its Security  6th
Overview of Vehicle Edge Computing and Its Security
收藏 引用
6th international conference on Security and Privacy in New computing Environments, SPNCE 2023
作者: Han, Shaodong Wang, Maojie Chen, Guihong Guangdong Polytechnic Normal University Guangzhou510635 China
The Internet of Vehicles (IoV) is a part of the Internet of Things (IoT). With the continuous development of the Internet of Things technology, the Internet of Vehicles technology has also made great progress. However... 详细信息
来源: 评论
A Comprehensive Review on Machine Learning Advancements for Plant Disease Detection and Classification  6
A Comprehensive Review on Machine Learning Advancements for ...
收藏 引用
6th international conference on Intelligent computing in Data Sciences, ICDS 2024
作者: Almazrouei, Khawla Bonny, Talal College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Technology Innovation Institute Autonomous Robotics Research Centre Abu Dhabi United Arab Emirates
Plant diseases still exist and spread despite technological advancements in disease prevention. It is still a major concern for humanity as it affects the economy of agriculture-based countries and the food supply cha... 详细信息
来源: 评论
AI Chatbots for Competency-Based Training in Programming Languages Courses  3
AI Chatbots for Competency-Based Training in Programming Lan...
收藏 引用
3rd international conference on Intelligent computing and Next Generation Networks, ICNGN 2024
作者: Nacheva, Radka Hristova, Iviana Department of Informatics University of Economics – Varna Varna Bulgaria
Competency-based training (CBT) is a specialized method for teaching programming languages, focusing on mastering new skills through time-based development. It emphasizes specialized skills in information and communic... 详细信息
来源: 评论
A Transfer Learning-Based Intelligent Judiciary System for Public Safety
A Transfer Learning-Based Intelligent Judiciary System for P...
收藏 引用
2024 ieee international conference on Communications, computing, Cybersecurity and informatics, CCCI 2024
作者: Pathak, Lakshin Virani, Mili Obaidat, Mohammad S. Patel, Prachita Hathaliya, Jigna J. Jadav, Nilesh Kumar Tanwar, Sudeep Yamsani, Nagendar Nirma University Dept.of CSE Ahmedabad India School of Computer & Communication Engineering University of Science and Technology Beijing Beijing100083 China School of Computing SRM University Department of Computational Intelligence TN 603203 India School of Engineering The Amity University UP Noida201301 India Marwadi University Dept. of CE-AI Rajkot India SR University Department of CS & AI Telangana India
With the increasing prevalence of criminal activities, there is a growing need for effective crime detection methods leveraging modern technologies, such as artificial intelligence (AI), the Internet of Things (IoT), ... 详细信息
来源: 评论
Enhanced Authentication Protocol for Securing Internet of Medical Things with Lightweight Post-Quantum Cryptography  6
Enhanced Authentication Protocol for Securing Internet of Me...
收藏 引用
6th ieee international conference on Artificial Intelligence in Engineering and Technology, IICAIET 2024
作者: Man Lo, Chris Ka Tan, Soo Fun Chung, Gwo Chin Universiti Malaysia Sabah Cybersecurity Research Lab Faculty of Computing and Informatics Sabah Kota Kinabalu Malaysia Universiti Malaysia Sabah Creative Advanced Machine Intelligence Research Centre Faculty of Computing and Informatics Sabah Kota Kinabalu Malaysia Multimedia University Faculty of Enginerering Cyberjaya Malaysia
As the healthcare sector transitions to the Internet of Medical Things (IoMT), it promises significant improvements in productivity by streamlining processes, reducing administrative burdens, and automating routine ta... 详细信息
来源: 评论