咨询与建议

限定检索结果

文献类型

  • 210,653 篇 会议
  • 2,861 篇 期刊文献
  • 2,208 册 图书
  • 8 篇 学位论文
  • 1 件 标准

馆藏范围

  • 215,728 篇 电子文献
  • 7 种 纸本馆藏

日期分布

学科分类号

  • 123,340 篇 工学
    • 89,510 篇 计算机科学与技术...
    • 65,668 篇 软件工程
    • 29,827 篇 信息与通信工程
    • 17,449 篇 控制科学与工程
    • 14,525 篇 电气工程
    • 10,761 篇 生物工程
    • 10,476 篇 机械工程
    • 10,043 篇 电子科学与技术(可...
    • 8,046 篇 生物医学工程(可授...
    • 6,994 篇 仪器科学与技术
    • 5,614 篇 光学工程
    • 5,386 篇 动力工程及工程热...
    • 4,948 篇 化学工程与技术
    • 4,903 篇 安全科学与工程
    • 4,688 篇 网络空间安全
    • 4,340 篇 交通运输工程
  • 49,414 篇 理学
    • 26,517 篇 数学
    • 11,569 篇 生物学
    • 11,533 篇 物理学
    • 8,103 篇 统计学(可授理学、...
    • 6,128 篇 系统科学
    • 5,113 篇 化学
  • 38,013 篇 管理学
    • 22,923 篇 管理科学与工程(可...
    • 17,845 篇 图书情报与档案管...
    • 10,813 篇 工商管理
  • 7,485 篇 医学
    • 6,237 篇 临床医学
    • 5,846 篇 基础医学(可授医学...
  • 5,567 篇 法学
    • 4,495 篇 社会学
  • 4,446 篇 教育学
    • 4,225 篇 教育学
  • 4,412 篇 经济学
    • 4,290 篇 应用经济学
  • 2,993 篇 农学
  • 1,736 篇 文学
  • 569 篇 艺术学
  • 557 篇 军事学
  • 35 篇 历史学
  • 29 篇 哲学

主题

  • 10,668 篇 cloud computing
  • 6,684 篇 computational mo...
  • 6,319 篇 information tech...
  • 5,083 篇 feature extracti...
  • 4,726 篇 accuracy
  • 4,107 篇 data mining
  • 4,103 篇 training
  • 3,700 篇 computer archite...
  • 3,290 篇 computer science
  • 3,276 篇 mobile computing
  • 3,190 篇 security
  • 3,153 篇 internet of thin...
  • 3,125 篇 machine learning
  • 3,077 篇 deep learning
  • 2,995 篇 servers
  • 2,992 篇 data models
  • 2,940 篇 educational inst...
  • 2,916 篇 protocols
  • 2,829 篇 real-time system...
  • 2,739 篇 monitoring

机构

  • 688 篇 university of ch...
  • 580 篇 institute of com...
  • 447 篇 school of comput...
  • 243 篇 maharishi school...
  • 235 篇 faculty of infor...
  • 202 篇 school of inform...
  • 190 篇 department of co...
  • 154 篇 faculty of compu...
  • 151 篇 shenyang institu...
  • 151 篇 department of co...
  • 149 篇 institute of inf...
  • 134 篇 college of infor...
  • 125 篇 maharishi school...
  • 117 篇 university of sc...
  • 116 篇 department of co...
  • 114 篇 lovely professio...
  • 113 篇 school of electr...
  • 113 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 college of intel...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 91 篇 wang wei
  • 87 篇 chen z.
  • 81 篇 wei wang
  • 79 篇 zhang tao
  • 78 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 59 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 48 篇 xiao liu
  • 48 篇 li li
  • 47 篇 wang lei
  • 45 篇 xi chen

语言

  • 190,722 篇 英文
  • 22,990 篇 其他
  • 2,800 篇 中文
  • 25 篇 俄文
  • 18 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 5 篇 西班牙文
  • 5 篇 葡萄牙文
  • 3 篇 德文
  • 1 篇 捷克文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
215732 条 记 录,以下是1091-1100 订阅
排序:
Sliding Mode Control Strategy for State-of-Charge (SoC) Balancing in Lithium-ion Battery Packs  13
Sliding Mode Control Strategy for State-of-Charge (SoC) Bala...
收藏 引用
13th international conference on Control, Automation and information Sciences, ICCAIS 2024
作者: Feng, Yong Han, Fengling Yang, Rebecca Wang, Yanmin Bai, Fan Truong, Nguyen-Vu School of Science Computing and Engineering Technologies Swinburne University of Technology Melbourne Australia School of Science Rmit University Melbourne Australia School of Electrical Engineering and Automation Harbin Institute of Technology Harbin China National Institute of Applied Mechanics and Informatics Vietnam Academy of Science and Technology Ho Chi Minh City Viet Nam
This paper proposes a sliding mode control strategy for balancing the State of Charge (SoC) in lithium-ion battery packs. By thoroughly analyzing the battery balancing circuit topology, a bidirectional Cuk circuit bal... 详细信息
来源: 评论
Detection of Internet Layer DoS Attack on Cloud Using Deep Learning  20
Detection of Internet Layer DoS Attack on Cloud Using Deep L...
收藏 引用
20th international Bhurban conference on applied Sciences and technology (IBCAST)
作者: Mansoor-ul-haque Asghar, Hassan Duradt, Muhammad Hanif Usmant, Anita Pakistan Inst Engn & Appl Sci Dept Comp & Informat Sci Islamabad Pakistan
Attacks on cloud infrastructure and services have become a significant concern due to the increasing reliance on cloud computing. Various types of attacks pose threats to the cloud ecosystem. Denial-of-Service (DoS) a... 详细信息
来源: 评论
SoulMate: Short-Text Author Linking Through Multi-Aspect Temporal-Textual Embedding (Extended Abstract)  40
SoulMate: Short-Text Author Linking Through Multi-Aspect Tem...
收藏 引用
40th IEEE international conference on Data Engineering, ICDE 2024
作者: Najafipour, Saeed Hosseini, Saeid Hua, Wen Kangavari, Mohammad Reza Zhou, Xiaofang School of Information Technology and Electrical Engineering Iran University of Science and Technology Tehran Iran Sohar University Faculty of Computing and Information Technology Sohar Oman Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
We devise a neural network-based temporal-textual framework that generates subgraphs with highly correlated authors from short-text contents. Our approach computes the relevance score (edge weight) between authors by ... 详细信息
来源: 评论
High-order functional connectivity based Major depressive disorder classification using self-attention based CNN  7
High-order functional connectivity based Major depressive di...
收藏 引用
7th international conference on Data Science and information technology, DSIT 2024
作者: Chenxi, Tian Meili, Lu Tianjin University of Technology and Education School of Information Technology Engineering Tianjin China
Major depressive disorder (MDD) is a common and socially significant psychiatric disorder with extremely complex pathologic mechanisms. In recent years, resting-state functional magnetic resonance imaging (rs-fMRI) ha... 详细信息
来源: 评论
Tekele Zemamie Action Recognition in Ethiopia Orthodox Tewahedo Church Using CNN-Bi-LSTM
Tekele Zemamie Action Recognition in Ethiopia Orthodox Tewah...
收藏 引用
2024 international conference on information and Communication technology for Development for Africa, ICT4DA 2024
作者: Fikirie, Tenagne Azmeraw, Emiyamrew Tesfay, Wakjira Debasu, Abrham Bahir Dar University Faculty of Electrical and Computer Engineering Bahir Dar Institute of Technology P.O.Box 26 Bahir Dar Ethiopia University of Gondar College of Engineering Department of Computer Engineering Gondar Ethiopia Assosa University Department of Computer Engineering Assosa Ethiopia Bahir Dar University Faculty of Computing Bahir Dar Institute of Technology P.O.Box 26 Bahir Dar Ethiopia
Human action recognition (HAR) is a computer vision technique used to understand the activity of the action performed in the scene. Computer vision technology has become popular and is applied in various areas like su... 详细信息
来源: 评论
MAR-Net: Multi-Attention Residual Network for Lensless Image Super-Resolution  24
MAR-Net: Multi-Attention Residual Network for Lensless Image...
收藏 引用
2024 2nd international conference on Internet of Things and Cloud computing technology, IoTCCT 2024
作者: Xu, Xinjie Wang, Shuangxun Jiang, Baoxiang School of Ocean Information Jimei University Xiamen China School of Information Science & Technology Xiamen University Tan Kah Kee College Zhangzhou China
Aiming at the problems of blurred edge contours and low overall clarity of lensless images in the process of super-resolution reconstruction, this paper proposes an image super-resolution network MAR-Net combining mul... 详细信息
来源: 评论
Privacy-Preserving Edge Assistance for Solving Matrix Eigenvalue Problem  33
Privacy-Preserving Edge Assistance for Solving Matrix Eigenv...
收藏 引用
33rd IEEE international conference on Computer Communications and Networks (ICCCN)
作者: Zhao, Xiaotong Zhang, Hanlin Lin, Jie Kong, Fanyu Yu, Leyun Qingdao Univ Coll Comp Sci & Technol Qingdao Peoples R China Xi An Jiao Tong Univ Sch Comp Sci & Technol Xian Peoples R China Shandong Univ Sch Comp Sci & Technol Jinan Peoples R China JIC IOT CO LTD Nanchang Peoples R China
The large-scale matrix eigenvalue computation, as a basic mathematical tool, has been widely used in many fields such as face recognition and data analysis. However, local terminal devices lack sufficient resources to... 详细信息
来源: 评论
Vehicle Access Monitoring System Based on Radio Frequency Identification technology Monitoring System  2
Vehicle Access Monitoring System Based on Radio Frequency Id...
收藏 引用
2nd international conference on Signal Processing and Intelligent computing, SPIC 2024
作者: Zheng, Fei Liu, Shuangjie Hao, Yongping Niu, Lanjie Zhao, Guoyang Shenyang Ligong University Shenyang China Xi'an Institute of Electromechanical Information Technology Xi'an China Baicheng Thermal Power Plant Guoneng Jilin Longhua Thermal Power Co. LTD. Changchun China
With the ongoing progress of the contemporary economy and technology, there has been a notable surge in the quantity of vehicles in China. Consequently, there is a pressing requirement for an automated, secure, depend... 详细信息
来源: 评论
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain
CHSTS: Chameleon Hash based on Schnorr threshold signature o...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big Data computing, 2023 international conference on Cyber Science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Yuan, Linlin Yang, Yuxiang Tan, Chaoyue Dou, Hui Luo, Yun Chen, Yuling College of Information Engineering Guizhou Open University Guiyang China College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
Blockchain's immutability, while a core feature, can pose challenges in cases involving sensitive information or compliance with legal regulations, hindering its development. Many subsequent works designed editabl... 详细信息
来源: 评论
Embedded Responsible computing: Mainstreaming Ethics into Computer Science Curriculum: A Case Study of Dedan Kimathi University of technology (DeKUT)
Embedded Responsible Computing: Mainstreaming Ethics into Co...
收藏 引用
2024 international conference on information and Communication technology for Development for Africa, ICT4DA 2024
作者: Musumba, George Kagiri, Michael Mwangi, Hellen Wachepele, David Miano, Dennis Dedan Kimathi University of Technology Dept. Computer Science Nyeri Kenya Dedan Kimathi University of Technology Institute of Criminology Forensics and Security Studies Nyeri Kenya
The rapid advancement of software solutions in the industry has brought significant ethical concerns, ranging from data privacy issues to algorithmic bias and cybersecurity threats. Addressing these concerns requires ... 详细信息
来源: 评论