咨询与建议

限定检索结果

文献类型

  • 210,653 篇 会议
  • 2,861 篇 期刊文献
  • 2,208 册 图书
  • 8 篇 学位论文
  • 1 件 标准

馆藏范围

  • 215,728 篇 电子文献
  • 7 种 纸本馆藏

日期分布

学科分类号

  • 123,340 篇 工学
    • 89,510 篇 计算机科学与技术...
    • 65,668 篇 软件工程
    • 29,827 篇 信息与通信工程
    • 17,449 篇 控制科学与工程
    • 14,525 篇 电气工程
    • 10,761 篇 生物工程
    • 10,476 篇 机械工程
    • 10,043 篇 电子科学与技术(可...
    • 8,046 篇 生物医学工程(可授...
    • 6,994 篇 仪器科学与技术
    • 5,614 篇 光学工程
    • 5,386 篇 动力工程及工程热...
    • 4,948 篇 化学工程与技术
    • 4,903 篇 安全科学与工程
    • 4,688 篇 网络空间安全
    • 4,340 篇 交通运输工程
  • 49,414 篇 理学
    • 26,517 篇 数学
    • 11,569 篇 生物学
    • 11,533 篇 物理学
    • 8,103 篇 统计学(可授理学、...
    • 6,128 篇 系统科学
    • 5,113 篇 化学
  • 38,013 篇 管理学
    • 22,923 篇 管理科学与工程(可...
    • 17,845 篇 图书情报与档案管...
    • 10,813 篇 工商管理
  • 7,485 篇 医学
    • 6,237 篇 临床医学
    • 5,846 篇 基础医学(可授医学...
  • 5,567 篇 法学
    • 4,495 篇 社会学
  • 4,446 篇 教育学
    • 4,225 篇 教育学
  • 4,412 篇 经济学
    • 4,290 篇 应用经济学
  • 2,993 篇 农学
  • 1,736 篇 文学
  • 569 篇 艺术学
  • 557 篇 军事学
  • 35 篇 历史学
  • 29 篇 哲学

主题

  • 10,668 篇 cloud computing
  • 6,684 篇 computational mo...
  • 6,319 篇 information tech...
  • 5,083 篇 feature extracti...
  • 4,726 篇 accuracy
  • 4,107 篇 data mining
  • 4,103 篇 training
  • 3,700 篇 computer archite...
  • 3,290 篇 computer science
  • 3,276 篇 mobile computing
  • 3,190 篇 security
  • 3,153 篇 internet of thin...
  • 3,125 篇 machine learning
  • 3,077 篇 deep learning
  • 2,995 篇 servers
  • 2,992 篇 data models
  • 2,940 篇 educational inst...
  • 2,916 篇 protocols
  • 2,829 篇 real-time system...
  • 2,739 篇 monitoring

机构

  • 688 篇 university of ch...
  • 580 篇 institute of com...
  • 447 篇 school of comput...
  • 243 篇 maharishi school...
  • 235 篇 faculty of infor...
  • 202 篇 school of inform...
  • 190 篇 department of co...
  • 154 篇 faculty of compu...
  • 151 篇 shenyang institu...
  • 151 篇 department of co...
  • 149 篇 institute of inf...
  • 134 篇 college of infor...
  • 125 篇 maharishi school...
  • 117 篇 university of sc...
  • 116 篇 department of co...
  • 114 篇 lovely professio...
  • 113 篇 school of electr...
  • 113 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 college of intel...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 91 篇 wang wei
  • 87 篇 chen z.
  • 81 篇 wei wang
  • 79 篇 zhang tao
  • 78 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 59 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 48 篇 xiao liu
  • 48 篇 li li
  • 47 篇 wang lei
  • 45 篇 xi chen

语言

  • 190,722 篇 英文
  • 22,990 篇 其他
  • 2,800 篇 中文
  • 25 篇 俄文
  • 18 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 5 篇 西班牙文
  • 5 篇 葡萄牙文
  • 3 篇 德文
  • 1 篇 捷克文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
215732 条 记 录,以下是1101-1110 订阅
排序:
Financial Distress Prediction of Small and Medium- Sized Enterprises Based on Artificial Intelligence technology  1
Financial Distress Prediction of Small and Medium- Sized Ent...
收藏 引用
1st IEEE international conference on applied Intelligence and Sustainable computing, ICAISC 2023
作者: Tang, Yun Xie, Mingzhu Anhui Institute of International Business Hefei231131 China Anhui Xinhua University Hefei230088 China
In order to further improve the financial management quality of small and medium-sized enterprises, provide scientific and efficient financial information support for enterprise operation decisions and minimize the pr... 详细信息
来源: 评论
computing services oriented evolutionary architecture and key technologies of electric power communication network  24
Computing services oriented evolutionary architecture and ke...
收藏 引用
24th IEEE international conference on Communication technology, ICCT 2024
作者: Zhang, Xiangyi Zhao, Xing Gao, Xiaofang Zhao, Hanyu Tang, Jia Guo, Xiaoxi Chen, Yanyu Zhao, Junfeng State Grid Information & Communication Beijing China Beijing China
With the deepening of the digital transformation of power systems, new service scenarios such as computing power access and interconnection are continuously developing. The electric power communication network urgentl... 详细信息
来源: 评论
Educators' Attitudes Towards Using Virtual Laboratories in Programming Courses in Higher Education in Saudi Arabia  21
Educators' Attitudes Towards Using Virtual Laboratories in P...
收藏 引用
21st international conference on information technology Based Higher Education and Training, ITHET 2024
作者: Alasmari, Ohud Abdullah College of Computing and Informatics Saudi Electronic University Saudi Arabia
This study explored the attitudes of educators in Saudi universities towards using virtual labs in programming courses. A descriptive analytical approach was used to analyse questionnaires to obtain data. 50 educators... 详细信息
来源: 评论
The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation  29
The Evolution of Zero Trust Architecture (ZTA) from Concept ...
收藏 引用
29th international conference on information technology, IT 2025
作者: Nasiruzzaman, Md Ali, Maaruf Salam, Iftekhar Miraz, Mahdi H. Xiamen University Malaysia School of Computing and Data Science Malaysia Universiteti Metropolitan Tirana Faculty of Computer Science and IT Albania The Doctoral College United Kingdom Xiamen University Malaysia Mahdi H. Miraz Is with the School of Computing and Data Science Malaysia Wrexham University School of Computing Faculty of Arts Science and Technology United Kingdom University of South Wales Faculty of Computing Engineering and Science United Kingdom
Zero Trust Architecture (ZTA) is one of the paradigm changes in cybersecurity, from the traditional perimeter-based model to perimeterless. This article studies the core concepts of ZTA, its beginning, a few use cases...
来源: 评论
Bayesian Optimization of SVM for Efficient Detection of Cloud computing Failures  24
Bayesian Optimization of SVM for Efficient Detection of Clou...
收藏 引用
8th international conference on Electronic information technology and Computer Engineering, EITCE 2024
作者: Yuan, Yarui Li, Zhanhui Chengyi College Jimei University Fujian Xiamen China Tencent CSIG Zhejiang Hangzhou China
As cloud computing has become a fundamental technology underpinning a wide array of online services, ensuring its stability and reliability has emerged as a critical concern. Fault detection plays a pivotal role in ma... 详细信息
来源: 评论
Minimum Volume Constraint with Perturbation for Non-negative Matrix Factorization
Minimum Volume Constraint with Perturbation for Non-negative...
收藏 引用
2023 international conference on applied Mathematics and Digital Simulation, AMDS 2023
作者: Sun, Li Yang, Song Yu, Ruilin Zhang, Xinyuan Department of Applied Mathematics School of Information Science and Technology Shandong Agricultural University Tai'an271018 China
Nonnegative matrix factorization (NMF) has been applied in hyperspectral unmixing. The nonconvexity of the NMF's cost function leads to solutions that are only locally optimal. Adding regularized terms to the NMF ... 详细信息
来源: 评论
Enhancing AI Strategy in Checkers through Minimax and Alpha-Beta Pruning Techniques  1
Enhancing AI Strategy in Checkers through Minimax and Alpha-...
收藏 引用
1st international conference on Sustainable Energy Technologies and Computational Intelligence, SETCOM 2025
作者: Raut, Roshani Chaudhari, Mayur Raipalli, Shreya Banginwar, Sankalp Pimpri Chinchwad College of Engineering Department of Information Technology Pune India
This paper focuses on artificial intelligence in the game of Checkers and thus looks to further advance strategic decision-making within AI game agents. This is a problem arising in developing computationally efficien... 详细信息
来源: 评论
Kernel Fashion Context Recommender System (KFCR): A Kernel Mapping Fashion Recommender System Algorithm Using Contextual information  21
Kernel Fashion Context Recommender System (KFCR): A Kernel M...
收藏 引用
21st international Bhurban conference on applied Sciences and technology, IBCAST 2024
作者: Abbas, Waseem Rasheed, Uzair Khalid, Sadia Ghazanfar, Mustansar Hassan, Ali College of EME NUST Dept of Computer and Software Engineering Islamabad Pakistan University of East London Department of Engineering and Computing London United Kingdom
In Fashion, Recommender System represents a growing trend. They enable to offer the customer online fully personalized shopping experience. Many known names on the Fashion market such as Asos (***) or Zalando (***), h... 详细信息
来源: 评论
An Effective Analysis of Proficient Two Level Security Contraptions for Loading Data in Cloud  1
An Effective Analysis of Proficient Two Level Security Contr...
收藏 引用
1st IEEE international conference on Innovations in High Speed Communication and Signal Processing, IHCSP 2023
作者: Arulkumaran, G. Jayagopalan, Santhosh Thanga Mariappan, L. Balamurugan, P. School of Computing and Information Technology REVA University Bengaluru India British Applied College Department of Computing Umm Al Quwain United Arab Emirates School of Information Technology and Engineering Vellore Institute of Technology Vellore Department of Smart Computing Vellore Dist Tamil Nadu India School of Computing SRM Institute of Science and Technology Department of Networking and Communications Chengalpattu Dist Tamil Nadu Kattankulathur India
One of the cornerstones of the future generation of computing is cloud computing, a form of internet-based computing. It allows for the instantaneous allocation of Internet-accessible resources whenever they are neede... 详细信息
来源: 评论
Exploring Opinionated Sentiments through Web Scraping and Attribute-based Analysis  3
Exploring Opinionated Sentiments through Web Scraping and At...
收藏 引用
3rd international conference on applied Artificial Intelligence and computing, ICAAIC 2024
作者: Patil, Manjiri Patil, Palak Deshpande, Vedashree Karankale, Isha More, Shraddha St. John College of Engineering and Management Department of Information Technology Palghar India
The majority of customers consult online reviews before choosing which e-commerce services or products to buy. The new aspect of the suggested strategy is the use of opinion mining on customer reviews to assist busine... 详细信息
来源: 评论