咨询与建议

限定检索结果

文献类型

  • 16,123 篇 会议
  • 117 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 16,278 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,967 篇 工学
    • 8,110 篇 计算机科学与技术...
    • 5,603 篇 软件工程
    • 2,180 篇 信息与通信工程
    • 1,608 篇 控制科学与工程
    • 1,420 篇 电气工程
    • 906 篇 生物工程
    • 773 篇 生物医学工程(可授...
    • 663 篇 机械工程
    • 560 篇 仪器科学与技术
    • 555 篇 电子科学与技术(可...
    • 488 篇 安全科学与工程
    • 450 篇 网络空间安全
    • 411 篇 交通运输工程
    • 372 篇 光学工程
    • 361 篇 动力工程及工程热...
  • 3,321 篇 理学
    • 1,645 篇 数学
    • 993 篇 生物学
    • 601 篇 物理学
    • 585 篇 统计学(可授理学、...
    • 453 篇 系统科学
    • 389 篇 化学
  • 3,017 篇 管理学
    • 2,120 篇 管理科学与工程(可...
    • 1,351 篇 图书情报与档案管...
    • 813 篇 工商管理
  • 875 篇 医学
    • 707 篇 基础医学(可授医学...
    • 678 篇 临床医学
    • 389 篇 公共卫生与预防医...
    • 340 篇 药学(可授医学、理...
  • 438 篇 法学
    • 375 篇 社会学
  • 323 篇 教育学
  • 322 篇 经济学
    • 321 篇 应用经济学
  • 216 篇 农学
  • 115 篇 文学
  • 34 篇 军事学
  • 30 篇 艺术学
  • 6 篇 哲学
  • 5 篇 历史学

主题

  • 889 篇 cloud computing
  • 740 篇 informatics
  • 543 篇 computational mo...
  • 373 篇 computer archite...
  • 316 篇 conferences
  • 243 篇 internet of thin...
  • 239 篇 big data
  • 228 篇 deep learning
  • 222 篇 monitoring
  • 217 篇 data mining
  • 198 篇 educational inst...
  • 185 篇 computer science
  • 163 篇 semantics
  • 162 篇 servers
  • 156 篇 machine learning
  • 156 篇 training
  • 155 篇 task analysis
  • 155 篇 ontologies
  • 152 篇 application soft...
  • 151 篇 feature extracti...

机构

  • 127 篇 national institu...
  • 64 篇 institut teknolo...
  • 58 篇 graduate school ...
  • 50 篇 school of inform...
  • 47 篇 school of comput...
  • 43 篇 telkom universit...
  • 38 篇 school of electr...
  • 32 篇 faculty of compu...
  • 31 篇 college of infor...
  • 30 篇 college of compu...
  • 28 篇 school of inform...
  • 27 篇 university of ch...
  • 26 篇 informatics inst...
  • 25 篇 luddy school of ...
  • 25 篇 institut teknolo...
  • 23 篇 department of so...
  • 21 篇 school of inform...
  • 19 篇 ieee
  • 18 篇 department of in...
  • 18 篇 department of la...

作者

  • 34 篇 xhafa fatos
  • 29 篇 masahide nakamur...
  • 21 篇 sharif mhd saeed
  • 21 篇 zivkovic miodrag
  • 19 篇 christopher c. y...
  • 19 篇 omer rana
  • 18 篇 hluchy ladislav
  • 18 篇 geyong min
  • 17 篇 sachio saiki
  • 17 篇 beth plale
  • 16 篇 geoffrey fox
  • 16 篇 nugraha yudhisti...
  • 16 篇 bacanin nebojsa
  • 16 篇 xiaohua hu
  • 15 篇 jean araujo
  • 15 篇 xiong gang
  • 14 篇 ishida toru
  • 14 篇 hanzi wang
  • 14 篇 yusheng ji
  • 14 篇 moung ervin gubi...

语言

  • 13,653 篇 英文
  • 2,582 篇 其他
  • 44 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=IEEE International Conference on Progress in Informatics and Computing"
16278 条 记 录,以下是171-180 订阅
排序:
Leveraging Transformer Networks for Enhanced Conversational AI  7
Leveraging Transformer Networks for Enhanced Conversational ...
收藏 引用
7th international conference on Contemporary computing and informatics, IC3I 2024
作者: Behl, Vivek Bibhu, Vimal Noida International University Department of Computer Science and Engineering Uttar Pradesh Greater Noida India
This paper presents a comprehensive study on leveraging transformer networks for enhanced conversational AI, show casing their superiority over traditional models such as LSTM, GRU, and GRU BiRNN decoders. The archite... 详细信息
来源: 评论
Real Time Gas Alert Leakage System using Arduino and NodeMCU  6
Real Time Gas Alert Leakage System using Arduino and NodeMCU
收藏 引用
6th international conference on Mobile computing and Sustainable informatics, ICMCSI 2025
作者: Gurupriya, M. Umesh Raghav, P. Pavan Nikhith, S. Bhargav Reddy, P. Rohit, K.C. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Standard Chartered Global business Services Bengaluru India
Today, gas leakage has become a common problem in both industrial and household sectors as it can cause explosions, fires, and toxic exposures. The real time gas alert system ensures that gas leaks are not only detect... 详细信息
来源: 评论
Construction of Ontology Graphs in a Cyber Security Framework (OCSF)  6
Construction of Ontology Graphs in a Cyber Security Framewor...
收藏 引用
6th international conference on Contemporary computing and informatics, IC3I 2023
作者: Pandey, Rajendra P. Jebaraj, Solomon College of Computing Science and Information Technology Teerthanker Mahaveer University Uttar Pradesh Moradabad India University Karnataka Bangalore India
The paper develops ontology for cyber security to provide information from huge collection of structured and unstructured web data. It deals with identification of several aspects related to cyber security including v... 详细信息
来源: 评论
Analysis of Density-Based Methods for Selecting Cluster Heads  2
Analysis of Density-Based Methods for Selecting Cluster Head...
收藏 引用
2nd ieee international conference on Advances in computing, Communication and Applied informatics, ACCAI 2023
作者: Maravarman, M. Babu, S. Pitchai, R. Srm Institute of Science and Technology School of Computing Department of Computing Technologies Tamil Nadu Kattangulathur India B v Raju Institute of Technology Department of Computer Science and Engineering Telangana Narsapur India
It is one of the most significant things that can be done to make a Wireless Sensor Networks(WSNs) last for a longer period of time, and one of those things is to reduce the amount of power that each sensor node in th... 详细信息
来源: 评论
GemmaWithLoRA: A New Approach to Click Fraud Detection
GemmaWithLoRA: A New Approach to Click Fraud Detection
收藏 引用
2024 ieee international conference on Communications, computing, Cybersecurity and informatics, CCCI 2024
作者: Dai, Bingzhou Wang, Lei Zhao, Xiaoyong Guo, Yu Obaidat, Mohammad S. School of Information Management Beijing Information Science & Technology University Beijing China Information Systems Institute Beijing Advanced Innovation Center for Materials Genome Engineering Beijing Information Science & Technology University Beijing China Beijing Advanced Innovation Center for Materials Genome Engineering and Shunde Innovation School University of Science and Technology Beijing China King Abdullah II School of Information Technology University of Jordan School of Engineering Amity University School of Computing SRM University Amman Jordan
With the rapid development of artificial intelligence technology, pre-Trained large language models (LLMs) have demonstrated their powerful application potential in various fields. Click fraud is a serious issue in th... 详细信息
来源: 评论
Energy Aware Federated Learning with Application of Activity Recognition
Energy Aware Federated Learning with Application of Activity...
收藏 引用
2023 ieee international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big Data computing, 2023 international conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Thakur, Dipanwita Guzzo, Antonella Fortino, Giancarlo University of Calabria Dept. of Informatics Modeling Electronics and Systems Rende Italy University of Calabria Department of Informatics Modeling Electronics and Systems Rende Italy
Human activity recognition (HAR) based on smart devices is gaining increasing attention from the pervasive computing research community due to its wide application in smart healthcare. Modern deep learning models for ... 详细信息
来源: 评论
A Forward Chaining Expert System for Personalized Programming Language Selection
A Forward Chaining Expert System for Personalized Programmin...
收藏 引用
2024 international conference on Innovation and Intelligence for informatics, computing, and Technologies, 3ICT 2024
作者: Sholihin, Andi Hidayati, Shintami Chusnul Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia
Choosing the right programming language is a critical decision for beginners in computer science because it greatly influences their learning experience and future opportunities. This paper presents an expert system d... 详细信息
来源: 评论
An Investigation into the Perception of Gen Z Students in Higher Education towards Gamification Techniques in Learning computing Subjects
An Investigation into the Perception of Gen Z Students in Hi...
收藏 引用
2024 international Visualization, informatics and Technology conference, IVIT 2024
作者: Chong, Mien May Subramanian, Preethi Ting, Mary Ying, Lau Joe Asia Pacific University of Technology and Innovation School of Computing Kuala Lumpur Malaysia
This study examines how gamification techniques can improve the learning experience for Generation Z students in university-level computing courses. It explores game-based learning methods to tackle challenges like en... 详细信息
来源: 评论
Security Analysis and Improvement of Authenticated Key Agreement Protocol for Remote Patient Monitoring IoMT
Security Analysis and Improvement of Authenticated Key Agree...
收藏 引用
2024 ieee international conference on Communications, computing, Cybersecurity and informatics, CCCI 2024
作者: Gautam, Deepika Thakur, Garima Obaidat, Mohammad S. Hsiao, Kuei-Fang Kumar, Pankaj Central University of Himachal Pradesh Srinivasa Ramanujan Department of Mathematics HP Dharamshala176215 India School of Computer and Communication Engineering University of Science and Technology Beijing China School of Computing SRM University Department of Computational Intelligence TN Kattankulathur India School of Engineering The Amity University UP 201301 India
The Internet of Medical Things (IoMT) is a network of medical devices, hardware infrastructure, and software that accumulates real-Time data through remote monitoring and minimizes doctor-patient interaction, enhancin... 详细信息
来源: 评论
Work-in-progress: Security of Public-Key Schemes in the Quantum computing Era - A Literature Review
Work-in-Progress: Security of Public-Key Schemes in the Quan...
收藏 引用
2023 ieee international Black Sea conference on Communications and Networking, BlackSeaCom 2023
作者: Redkins, Boriss Kuzminykh, Ievgeniia Ghita, Bogdan King's College London Department of Informatics London United Kingdom School of Engineering Computing and Mathematics University of Plymouth Plymouth United Kingdom
Quantum computers, although still in the theoretical stage, conceptually have the power to break many current cryptosystems, including public-key schemes., for example, RSA (Rivest, Shamir., Adleman), elliptic-curve c... 详细信息
来源: 评论