咨询与建议

限定检索结果

文献类型

  • 208,384 篇 会议
  • 2,838 篇 期刊文献
  • 2,176 册 图书
  • 10 篇 学位论文
  • 2 篇 科技报告
  • 1 件 标准

馆藏范围

  • 213,411 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 121,834 篇 工学
    • 88,341 篇 计算机科学与技术...
    • 64,990 篇 软件工程
    • 29,086 篇 信息与通信工程
    • 16,677 篇 控制科学与工程
    • 14,110 篇 电气工程
    • 10,719 篇 生物工程
    • 10,328 篇 机械工程
    • 9,871 篇 电子科学与技术(可...
    • 7,982 篇 生物医学工程(可授...
    • 6,843 篇 仪器科学与技术
    • 5,543 篇 光学工程
    • 5,177 篇 动力工程及工程热...
    • 4,918 篇 化学工程与技术
    • 4,685 篇 安全科学与工程
    • 4,287 篇 网络空间安全
    • 4,141 篇 交通运输工程
  • 48,915 篇 理学
    • 26,275 篇 数学
    • 11,546 篇 生物学
    • 11,377 篇 物理学
    • 8,033 篇 统计学(可授理学、...
    • 6,120 篇 系统科学
    • 4,951 篇 化学
  • 37,367 篇 管理学
    • 22,387 篇 管理科学与工程(可...
    • 17,515 篇 图书情报与档案管...
    • 10,716 篇 工商管理
  • 7,341 篇 医学
    • 6,166 篇 临床医学
    • 5,800 篇 基础医学(可授医学...
  • 5,455 篇 法学
    • 4,401 篇 社会学
  • 4,355 篇 教育学
    • 4,135 篇 教育学
  • 4,334 篇 经济学
    • 4,212 篇 应用经济学
  • 2,970 篇 农学
  • 1,724 篇 文学
  • 569 篇 艺术学
  • 555 篇 军事学
  • 35 篇 历史学
  • 28 篇 哲学

主题

  • 10,573 篇 cloud computing
  • 6,555 篇 computational mo...
  • 6,278 篇 information tech...
  • 4,979 篇 feature extracti...
  • 4,472 篇 accuracy
  • 4,085 篇 data mining
  • 4,046 篇 training
  • 3,671 篇 computer archite...
  • 3,289 篇 computer science
  • 3,270 篇 mobile computing
  • 3,113 篇 security
  • 3,093 篇 internet of thin...
  • 2,973 篇 servers
  • 2,956 篇 machine learning
  • 2,948 篇 educational inst...
  • 2,910 篇 data models
  • 2,900 篇 protocols
  • 2,863 篇 deep learning
  • 2,667 篇 monitoring
  • 2,607 篇 predictive model...

机构

  • 652 篇 university of ch...
  • 575 篇 institute of com...
  • 442 篇 school of comput...
  • 243 篇 maharishi school...
  • 233 篇 faculty of infor...
  • 202 篇 school of inform...
  • 190 篇 department of co...
  • 151 篇 department of co...
  • 150 篇 faculty of compu...
  • 139 篇 institute of inf...
  • 134 篇 college of infor...
  • 132 篇 shenyang institu...
  • 125 篇 maharishi school...
  • 116 篇 university of sc...
  • 114 篇 lovely professio...
  • 114 篇 department of co...
  • 112 篇 school of electr...
  • 112 篇 school of comput...
  • 111 篇 school of comput...
  • 106 篇 institute of inf...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 88 篇 chen z.
  • 85 篇 wang wei
  • 83 篇 wei wang
  • 81 篇 zhang tao
  • 80 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 57 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 48 篇 xiao liu
  • 48 篇 li li
  • 47 篇 wang lei
  • 45 篇 xi chen

语言

  • 208,108 篇 英文
  • 3,281 篇 其他
  • 2,322 篇 中文
  • 25 篇 俄文
  • 18 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 7 篇 葡萄牙文
  • 6 篇 西班牙文
  • 2 篇 德文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
213415 条 记 录,以下是221-230 订阅
排序:
SoK: Autonomic computing Based Mehods for ICS/SCADA and IIoT Security
SoK: Autonomic Computing Based Mehods for ICS/SCADA and IIoT...
收藏 引用
2024 IEEE international conference on Cyber Security and Resilience, CSR 2024
作者: Rouff, Christopher Tekeoglu, Ali Johns Hopkins University Applied Physics Laboratory & Jhu Whiting School of Engineering United States Leidos Innovations Center United States Johns Hopkins University Whiting School of Engineering United States
Industrial Control Systems (ICS) stand out as a prime target for global attackers due to their critical role in many nation's infrastructure. The autonomy and proactive nature of autonomic systems make them inhere... 详细信息
来源: 评论
information Retrieval using OSINT and GHDB  2
Information Retrieval using OSINT and GHDB
收藏 引用
2nd IEEE international conference on Advances in computing, Communication and applied Informatics, ACCAI 2023
作者: Manohari, D. Dafni Rose, J. Adithya, E.S. Vijayakumar, K. Omr St Joseph's Institute of Technology Department of Cse Chennai600119 India
Data in the 21st Century is like Oil in the 18th Century. The amount of data available publicly on the web repository is indeterminable. By gathering, processing, filtering, analysing, and correlating data from every ... 详细信息
来源: 评论
Optical reservoir computing based on the bagging trees  4
Optical reservoir computing based on the bagging trees
收藏 引用
4th international conference on Advanced Manufacturing technology and Electronic information, AMTEI 2024
作者: Xiao, Mujun Zhang, Ailing Wang, Chao Tianjin Key Laboratory of Thin Film Electronics and Communication Devices Engineering Research Center for Optoelectronic Devices and Communication Technology Ministry of Education School of Integrated Circuit Science and Engineering Tianjin University of Technology Tianjin300384 China School of Engineering and Digital Arts University of Kent Canterbury United Kingdom
In traditional optical reservoir computing, the least squares method are commonly used to train the output weights for regression tasks. Although these algorithms are highly versatile, their training efficiency and ac... 详细信息
来源: 评论
Improving Intrusion Detection in a Software Defined Network using Hybrid CNN and Bi-LSTM  3
Improving Intrusion Detection in a Software Defined Network ...
收藏 引用
3rd international conference on applied Artificial Intelligence and computing, ICAAIC 2024
作者: Bhattarai, Ashutosh Gyawali, Unmik Verma, Abhishek Ranga, Virender Delhi Technological University Department of Information Technology New Delhi India
A Software Defined Networking is a modern offering against traditional network systems to make network control more efficient by reducing the dependency on the hardware side. With a logical control plane, it is essent... 详细信息
来源: 评论
Text Mining for Knowledge Discovery and information Analysis  15
Text Mining for Knowledge Discovery and Information Analysis
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Singh, Satendra Gupta, Shikhar Singh, Vaishali Narmadha, T. Karthikeyan, Kavitha Chavan, Gurunath T. Vivekananda Global University Department of Mechanical Engineering Jaipur India Chitkara University Institute of Engineering and technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Engineering Faculty of Engineering and Technology Karnataka Ramnagar District562112 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Civil Engineering Chennai127 India Vishwakarma Institute of Technology Department of Information Technology Pune India
textual content mining for know-how Discovery and facts analysis is an especially new subject of research that analyses unstructured data together with textual files. It's far an interdisciplinary technique that c... 详细信息
来源: 评论
Bovitrack:Animal behavior monitoring using Machine learning and IoT  5
Bovitrack:Animal behavior monitoring using Machine learning ...
收藏 引用
5th international conference on Advanced Research in computing, ICARC 2025
作者: Viraj, Harsha Wijesekara, Sumuduni Tharuka, Kuluni Fernando, Shenika Jayakody, Anuradha Wijesiri, Pipuni Sri Lanka Institute of Information Technology Dept of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Dept of Computer Systems Engineering Malabe Sri Lanka
Analyzing dairy cattle behavior and anomalies is a critical component of precision livestock farming, allowing farmers to remotely monitor animals for health and behavior. In order to accomplish this task better, the ... 详细信息
来源: 评论
Research on Intelligent Data Mining and Knowledge Discovery Method Based on Software information System
Research on Intelligent Data Mining and Knowledge Discovery ...
收藏 引用
2023 international conference on applied Physics and computing, ICAPC 2023
作者: Tang, Xiaojun Radio and Television Monitoring Center of Shandong Province Shandong Jinan China
Data mining is an important branch of information technology, which is mainly used in search engine, knowledge management, decision analysis and so on. An important direction of modern information management is the tr... 详细信息
来源: 评论
computing Power Detection Based on Smart Contract  3
Computing Power Detection Based on Smart Contract
收藏 引用
3rd international conference on Electrical, Electronics, and information Engineering, EEIE 2024
作者: Liu, Shaowei Liu, Xue Long, Chengnian School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Jiangsu Automation Research Institute Lianyungang China
As blockchain technology is widely applied across various fields, the performance requirements of blockchain systems, such as throughput and transaction latency, are increasing. In this context, blockchain systems hav... 详细信息
来源: 评论
Cloud resource computing power allocation method based on distributed multi-layer deep learning  6
Cloud resource computing power allocation method based on di...
收藏 引用
6th international conference on Computer information Science and Application technology, CISAT 2023
作者: Zhang, Xiaodong Yang, Mingjie Guo, Rui Di, Lei Wang, Wei State Grid Gansu Electric Power Gansu Lanzhou730050 China
Conventional cloud resource computing power allocation methods mainly focus on cloud resource scheduling, and the effect of computing power balanced allocation is poor. Therefore, a cloud resource computing power allo... 详细信息
来源: 评论
Deep learning-based cognitive digital twin system for wrist pulse diagnostic and classification  2nd
Deep learning-based cognitive digital twin system for wrist ...
收藏 引用
2nd international conference on Next-Generation computing and information Systems, ICNGCIS 2023
作者: Chaudhary, Jitendra Kumar Parimalam, T. Alghayadh, Faisal Yousef Keshta, Ismail Soni, Mukesh Degadwala, Sheshang School of Computing Graphic Era Hill University Bhimtal Campus Uttrakhand India Department of Computer Science Nandha Arts and Science College Tamilnadu Erode India Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia Dr. D. Y. Patil Vidyapeeth Pune Dr. D. Y. Patil School of Science & Technology Tathawade Pune India Department of Computer Engineering Sigma University Gujarat Vadodara India
In analyzing and recognizing wrist pulse signals, it isn’t easy to mine the nonlinear information of wrist pulse signals using analysis methods such as time and frequency. Traditional machine learning methods require... 详细信息
来源: 评论