咨询与建议

限定检索结果

文献类型

  • 210,653 篇 会议
  • 2,861 篇 期刊文献
  • 2,208 册 图书
  • 8 篇 学位论文
  • 1 件 标准

馆藏范围

  • 215,728 篇 电子文献
  • 7 种 纸本馆藏

日期分布

学科分类号

  • 123,340 篇 工学
    • 89,510 篇 计算机科学与技术...
    • 65,668 篇 软件工程
    • 29,827 篇 信息与通信工程
    • 17,449 篇 控制科学与工程
    • 14,525 篇 电气工程
    • 10,761 篇 生物工程
    • 10,476 篇 机械工程
    • 10,043 篇 电子科学与技术(可...
    • 8,046 篇 生物医学工程(可授...
    • 6,994 篇 仪器科学与技术
    • 5,614 篇 光学工程
    • 5,386 篇 动力工程及工程热...
    • 4,948 篇 化学工程与技术
    • 4,903 篇 安全科学与工程
    • 4,688 篇 网络空间安全
    • 4,340 篇 交通运输工程
  • 49,414 篇 理学
    • 26,517 篇 数学
    • 11,569 篇 生物学
    • 11,533 篇 物理学
    • 8,103 篇 统计学(可授理学、...
    • 6,128 篇 系统科学
    • 5,113 篇 化学
  • 38,013 篇 管理学
    • 22,923 篇 管理科学与工程(可...
    • 17,845 篇 图书情报与档案管...
    • 10,813 篇 工商管理
  • 7,485 篇 医学
    • 6,237 篇 临床医学
    • 5,846 篇 基础医学(可授医学...
  • 5,567 篇 法学
    • 4,495 篇 社会学
  • 4,446 篇 教育学
    • 4,225 篇 教育学
  • 4,412 篇 经济学
    • 4,290 篇 应用经济学
  • 2,993 篇 农学
  • 1,736 篇 文学
  • 569 篇 艺术学
  • 557 篇 军事学
  • 35 篇 历史学
  • 29 篇 哲学

主题

  • 10,668 篇 cloud computing
  • 6,684 篇 computational mo...
  • 6,319 篇 information tech...
  • 5,083 篇 feature extracti...
  • 4,726 篇 accuracy
  • 4,107 篇 data mining
  • 4,103 篇 training
  • 3,700 篇 computer archite...
  • 3,290 篇 computer science
  • 3,276 篇 mobile computing
  • 3,190 篇 security
  • 3,153 篇 internet of thin...
  • 3,125 篇 machine learning
  • 3,077 篇 deep learning
  • 2,995 篇 servers
  • 2,992 篇 data models
  • 2,940 篇 educational inst...
  • 2,916 篇 protocols
  • 2,829 篇 real-time system...
  • 2,739 篇 monitoring

机构

  • 688 篇 university of ch...
  • 580 篇 institute of com...
  • 447 篇 school of comput...
  • 243 篇 maharishi school...
  • 235 篇 faculty of infor...
  • 202 篇 school of inform...
  • 190 篇 department of co...
  • 154 篇 faculty of compu...
  • 151 篇 shenyang institu...
  • 151 篇 department of co...
  • 149 篇 institute of inf...
  • 134 篇 college of infor...
  • 125 篇 maharishi school...
  • 117 篇 university of sc...
  • 116 篇 department of co...
  • 114 篇 lovely professio...
  • 113 篇 school of electr...
  • 113 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 college of intel...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 91 篇 wang wei
  • 87 篇 chen z.
  • 81 篇 wei wang
  • 79 篇 zhang tao
  • 78 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 59 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 48 篇 xiao liu
  • 48 篇 li li
  • 47 篇 wang lei
  • 45 篇 xi chen

语言

  • 190,722 篇 英文
  • 22,990 篇 其他
  • 2,800 篇 中文
  • 25 篇 俄文
  • 18 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 5 篇 西班牙文
  • 5 篇 葡萄牙文
  • 3 篇 德文
  • 1 篇 捷克文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
215732 条 记 录,以下是991-1000 订阅
排序:
Blockchain and Edge computing Integration Boosts Scalability and Reduces Latency  2
Blockchain and Edge Computing Integration Boosts Scalability...
收藏 引用
2nd international conference on Business Analytics for technology and Security, ICBATS 2023
作者: Mahfuri, Mahmoud Alnawaiseh, Ahmad Enad Asad, Umber Yousif, Muhammad Aslam, Shoukat Chabani, Zakariya Fiaz, Muhammad International University for Science and Technolgy Faculty of Engineering - Computer and Information Technolgy Department Syria Orange-Jordan Telecom Company Jordan NCBA&E Lahore School of Computer Computer Pakistan Canadian University Dubai Faculty of Management Dubai United Arab Emirates NCBA&E Lahore School of Computer Science Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan
Nowadays, the integration of blockchain and edge computing has become important in computer science due to the significant advantages it can bring to a range of real-world applications. By combining the strengths of b... 详细信息
来源: 评论
Analysis on the Application of Data Volley Computer statistical Data Analysis system in Volleyball Competition: A Case Study of 2020-2021 Chinese Women's Volleyball Super League  2
Analysis on the Application of Data Volley Computer statisti...
收藏 引用
2nd international conference on Statistics, applied Mathematics, and computing Science, CSAMCS 2022
作者: Liu, Chenxi Ding, Yi Wang, Jun Faculty for Physical Education Shanghai International Studies University Shanghai China Faculty for Physical Education Fudan University Shanghai China
With the application of modern information technology in volleyball games, the "rules" of volleyball games can now be reflected as quickly and accurately. Statistics have gradually become an important source... 详细信息
来源: 评论
Very Low-Resolution Face Recognition Based On Multilinear Side-information based Discriminant Analysis  10
Very Low-Resolution Face Recognition Based On Multilinear Si...
收藏 引用
IEEE 10th international conference on Big Data computing Service and Machine Learning Applications (IEEE BigDataService)
作者: Bellili, Sana Ouamane, Abdelmalik Chouchane, Ammar Himeur, Yassine Atalla, Shadi Mansoor, Wathiq Al Ahmad, Hussain Univ Biskra Dept Elect Engn Biskra Algeria Univ Ctr Barika Amdoukal Rd Barika 05001 Algeria Univ Dubai Coll Engn & Informat Technol Dubai U Arab Emirates
Facial recognition technology is widely used for biometric authentication, but it struggles with accurately identifying individuals from low-resolution images. This study introduces a new method for improving low-reso... 详细信息
来源: 评论
Exploring Students' Perspectives: Leveraging Smart computing for Online and Offline Education Optimization
Exploring Students' Perspectives: Leveraging Smart Computing...
收藏 引用
2024 OPJU international technology conference on Smart computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Gund, Pratima Mane, Pravin Padalikar, Hemchandra Thorat, Swapnil Patil, Sangeeta Dharmadhikari, Krupa Institute of Management and Entrepreneurship Development Bharati Vidyapeeth Pune India
This research paper delves into the exploration of students' viewpoints regarding the integration of smart computing for optimizing both online and offline education. Employing a meticulous approach, a comprehensi... 详细信息
来源: 评论
Privacy-Preserving Human Activity Recognition in Smart Homes using Deep Learning and Edge computing for Real-Time Processing  5
Privacy-Preserving Human Activity Recognition in Smart Homes...
收藏 引用
5th international conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Mariappan, K. Gopal, Baskar Parthasarathy, J. Sreekanth, G.R. Nanmaran, R. Jegajothi, B. SRM Institute of Science and Technology Department of Computer Science and Applications Chennai India College of Engineering University of Technology & Applied Science Nizwa Oman Computer Science & Engineering Jayalakshmi Institute Of Technology Dharmapuri India Information Technology Nandha Engineering College Erode52 India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India SRS Tech Solutions Chennai India
The rapid advancement of smart home technologies necessitates efficient human activity recognition (HAR) systems while ensuring user privacy. This research presents a novel architecture that integrates deep learning a... 详细信息
来源: 评论
Proceedings of the international conferences on applied computing and WWW/Internet 2024
Proceedings of the International Conferences on Applied Comp...
收藏 引用
21st international conference on applied computing 2024, AC 2024 and 23rd international conference on WWW/Internet 2024, ICWI 2024
The proceedings contain 51 papers. The topics discussed include: design and implementation of a virtual lab platform for academic teaching: experience in the development and use of a new platform for the digitization ...
来源: 评论
Why People Want To Use E-money Card based On RFID technology ?  8
Why People Want To Use E-money Card based On RFID Technology...
收藏 引用
8th international conference on Informatics and computing, ICIC 2023
作者: Fathur N.P, Freza Cassandra, Cadelina Bina Nusantara University Information Systems Department Jakarta Indonesia Bina Nusantara University Information Systems Department Jakarta11480 Indonesia
Radio Frequency Identification (RFID) is a technology that is used widely for mobile payment, the security is the main issue of the usage of this technology. The aim of this study is to identify the key factors influe... 详细信息
来源: 评论
An Overview of Data Security Algorithms in Cloud computing  3rd
An Overview of Data Security Algorithms in Cloud Computing
收藏 引用
3rd international conference on applied Intelligence and Informatics (AII)
作者: Amalarethinam, D. I. George Rajakumari, S. Edel Josephine Bharathidasan Univ Jamal Mohamed Coll Autonomous Dept Comp Sci Tiruchirappalli 620020 Tamil Nadu India
Cloud computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries;It introduced the notion of 'pay as you use' and revolutionized devel... 详细信息
来源: 评论
The Use of Cloud computing and its Security Risks in a Philippine Education System: A Literature Review  11
The Use of Cloud Computing and its Security Risks in a Phili...
收藏 引用
11th international conference on information and Education technology, ICIET 2023
作者: Blancaflor, Eric Saunar, Bianca Ysabel P. Darrel C. Bilbao, Tristian Villarias, Ian Howell B. Paula V. Mapue, Iris Mapua University School of Information Technology Makati Philippines
Cloud computing is a technology that impacted the performance of modern markets and businesses. Because of this, cloud computing has become more significant to humans with its virtualization and distributed computing.... 详细信息
来源: 评论
Research on a New Speech Synthesis Fraud Method  9
Research on a New Speech Synthesis Fraud Method
收藏 引用
9th international conference on Intelligent computing and Signal Processing, ICSP 2024
作者: Zhang, Hang Li, Yuhui Kui, Shijian Qin, Zhaoyi Harbin Institute of Technology Faculty of Computing Harbin China School of Automotive Engineering Harbin Institute of Technology Harbin China Harbin Institute of Technology Faculty of New Energy Harbin China School of Information Science and Engineering Harbin Institute of Technology Harbin China
With the rapid development of deep learning technology, deep counterfeiting has also quietly ascended to the stage of history, and voice disguise fraud, as a new type of attack means, has laid a huge hidden danger for... 详细信息
来源: 评论