咨询与建议

限定检索结果

文献类型

  • 209,209 篇 会议
  • 2,854 篇 期刊文献
  • 2,191 册 图书
  • 10 篇 学位论文
  • 2 篇 科技报告
  • 1 件 标准

馆藏范围

  • 214,265 篇 电子文献
  • 7 种 纸本馆藏

日期分布

学科分类号

  • 122,334 篇 工学
    • 88,680 篇 计算机科学与技术...
    • 65,258 篇 软件工程
    • 29,178 篇 信息与通信工程
    • 16,772 篇 控制科学与工程
    • 14,164 篇 电气工程
    • 10,731 篇 生物工程
    • 10,350 篇 机械工程
    • 9,895 篇 电子科学与技术(可...
    • 8,005 篇 生物医学工程(可授...
    • 6,857 篇 仪器科学与技术
    • 5,603 篇 光学工程
    • 5,192 篇 动力工程及工程热...
    • 4,928 篇 化学工程与技术
    • 4,721 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 4,166 篇 交通运输工程
  • 49,070 篇 理学
    • 26,352 篇 数学
    • 11,559 篇 生物学
    • 11,437 篇 物理学
    • 8,067 篇 统计学(可授理学、...
    • 6,126 篇 系统科学
    • 4,960 篇 化学
  • 37,495 篇 管理学
    • 22,475 篇 管理科学与工程(可...
    • 17,563 篇 图书情报与档案管...
    • 10,772 篇 工商管理
  • 7,371 篇 医学
    • 6,194 篇 临床医学
    • 5,826 篇 基础医学(可授医学...
  • 5,483 篇 法学
    • 4,416 篇 社会学
  • 4,382 篇 教育学
    • 4,162 篇 教育学
  • 4,343 篇 经济学
    • 4,221 篇 应用经济学
  • 2,984 篇 农学
  • 1,724 篇 文学
  • 569 篇 艺术学
  • 556 篇 军事学
  • 35 篇 历史学
  • 28 篇 哲学

主题

  • 10,584 篇 cloud computing
  • 6,596 篇 computational mo...
  • 6,306 篇 information tech...
  • 5,006 篇 feature extracti...
  • 4,553 篇 accuracy
  • 4,088 篇 data mining
  • 4,065 篇 training
  • 3,681 篇 computer archite...
  • 3,289 篇 computer science
  • 3,270 篇 mobile computing
  • 3,142 篇 security
  • 3,099 篇 internet of thin...
  • 2,994 篇 machine learning
  • 2,977 篇 servers
  • 2,948 篇 educational inst...
  • 2,946 篇 deep learning
  • 2,931 篇 data models
  • 2,903 篇 protocols
  • 2,698 篇 monitoring
  • 2,690 篇 real-time system...

机构

  • 675 篇 university of ch...
  • 577 篇 institute of com...
  • 444 篇 school of comput...
  • 243 篇 maharishi school...
  • 235 篇 faculty of infor...
  • 202 篇 school of inform...
  • 190 篇 department of co...
  • 154 篇 faculty of compu...
  • 151 篇 department of co...
  • 143 篇 institute of inf...
  • 140 篇 shenyang institu...
  • 134 篇 college of infor...
  • 125 篇 maharishi school...
  • 116 篇 university of sc...
  • 116 篇 department of co...
  • 114 篇 lovely professio...
  • 114 篇 school of comput...
  • 112 篇 school of electr...
  • 111 篇 school of comput...
  • 109 篇 college of intel...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 88 篇 chen z.
  • 87 篇 wang wei
  • 83 篇 wei wang
  • 81 篇 zhang tao
  • 80 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 58 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 49 篇 wang lei
  • 48 篇 xiao liu
  • 48 篇 li li
  • 45 篇 xi chen

语言

  • 205,845 篇 英文
  • 6,398 篇 其他
  • 2,425 篇 中文
  • 25 篇 俄文
  • 18 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 7 篇 葡萄牙文
  • 6 篇 西班牙文
  • 3 篇 德文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
214269 条 记 录,以下是731-740 订阅
排序:
Performance Analysis of Load Balancing Mechanism in Cloud computing  1
Performance Analysis of Load Balancing Mechanism in Cloud Co...
收藏 引用
1st IEEE international conference on applied Intelligence and Sustainable computing, ICAISC 2023
作者: Halappa, Annaiah Rajesh, A. Government Engineering College Dept. of Computer Science & Engineering Hassan India Jain Technological University Dept. of Computer Science & Engineering Bengaluru India
The advancement of information technology has made cloud computing technology an innovative model for offering its consumers services on a rental basis at any time or location. Numerous firms converted to cloud techno... 详细信息
来源: 评论
Arm motion recognition based on attitude angle sensor  24
Arm motion recognition based on attitude angle sensor
收藏 引用
13th international conference on computing and Pattern Recognition, ICCPR 2024
作者: Niu, Weikun Zhang, Feng Yang, Guang Xie, Qiang Li, Yonggang Key labortory of recognition and intelligence China Electronics Technology Group Corporation Information Science Research Institute Beijing China Beijing Sanchuan Weiwei Technology Co. LTD Beijing100086 China
In this paper, the data-driven predictive maintenance technology is applied to the motion recognition of assembly line workers. Specifically, the motion data (acceleration, angular velocity and angle) of workers compl... 详细信息
来源: 评论
Leveraging Neural Networks to Enhance Large-Scale Data Processing Performance  3
Leveraging Neural Networks to Enhance Large-Scale Data Proce...
收藏 引用
3rd international conference on Smart Generation computing, Communication and Networking, SMART GENCON 2023
作者: Pandey, Megha Vinay Kumar, S.B. Khurana, Jatin Kalpana, B. Pathak, Kishor R. Kumar, Mukesh Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India 1 Electronics and Communication Engineering Faculty of Engineering and Technology Karnataka Bangalore India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Science and Humanities Chennai127 India Vishwakarma Institute of Information Technology Department of Information Technology Pune India Vivekananda Global University Department of Mechanical Engineering Jaipur India
Recent advances in neural networks have enabled them to become powerful tools in data processing for tasks such as pattern recognition and classification. This has enabled neural networks to be applied to large-scale ... 详细信息
来源: 评论
Web Vulnerability Scanner  5th
Web Vulnerability Scanner
收藏 引用
5th international conference on Advances in information Communication technology and computing, AICTC 2024
作者: Kumaran, U. Sree, Pothireddy Sneha Udaya Sree, S. Sowgandhi, Vadlamudi Krishna Balasubramanian, Sundaravadivazhagn Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India University of Technology and Applied Sciences Al Mussanah Oman
A Web Vulnerabilities Scanner scans the website’s web pages for comprehensive vulnerabilities. The recently constructed web application is a dynamic site that necessitates frequent changes for both clients and the de... 详细信息
来源: 评论
Self-attention is What You Need to Fool a Speaker Recognition System  22
Self-attention is What You Need to Fool a Speaker Recognitio...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Wang, Fangwei Song, Ruixin Tan, Zhiyuan Li, Qingru Wang, Changguang Yang, Yong Hebei Normal Univ Coll Comp & Cyberspace Secur Shijiazhuang Hebei Peoples R China Edinburgh Napier Univ Sch Comp Engn & Built Environm Edinburgh Midlothian Scotland Yunnan Univ Ctr Informat Technol Kunming Yunnan Peoples R China
Speaker Recognition Systems (SRSs) are becoming increasingly popular in various aspects of life due to advances in technology. However, these systems are vulnerable to cyber threats, particularly adversarial attacks. ... 详细信息
来源: 评论
Research on Cloud computing Elastic Resource Allocation Method Based on Real time Operation and Maintenance  11
Research on Cloud Computing Elastic Resource Allocation Meth...
收藏 引用
11th international conference on information technology - IoT and Smart City (ITIoTSC)
作者: Lai, Danhui Yuan, Xudong Luo, Weifeng Shenzhen Power Supply Co Ltd Shenzhen 518000 Guangdong Peoples R China
Conventional elastic allocation methods of cloud computing resources mainly use OFDMA (Orthogonal Frequency Division Multi-plexing Access) multi location access technology to share resource allocation information, whi... 详细信息
来源: 评论
Twin Bounded Least Squares Support Vector Regression  6th
Twin Bounded Least Squares Support Vector Regression
收藏 引用
6th IFIP TC 12 international conference on Intelligence Science, ICIS 2024
作者: Chen, Ran Liu, Muhan Ma, Jinwen Department of Information and Computational Sciences School of Mathematical Sciences Peking University Beijing100871 China Department of Applied Mathematics China Agricultural University Beijing100083 China
Support Vector Machine (SVM) has received much attention in machine learning due to its profound theoretical research and practical application results. Support Vector Regression (SVR) has become a powerful tool for s... 详细信息
来源: 评论
Demographic and Psychographic Customer Segmentation for Ecommerce Applications  2
Demographic and Psychographic Customer Segmentation for Ecom...
收藏 引用
2nd international conference on applied Artificial Intelligence and computing, ICAAIC 2023
作者: Vamsee, Ch. Sai Rakesh, D. Prathyusha, I. Dinesh, B. Bharathi, Ch. Gmr Institute of Technology Information Technology Andhra Pradesh Rajam India
E-commerce transactions are not a new concept anymore. E-commerce is a popular method of shopping, and many businesses utilize it to market and sell their goods. As a result, clients perceive an overabundance of infor... 详细信息
来源: 评论
Exploring the Reform of Mathematical Finance Course Based on Data Visualization: Evidence from Nonparametric Causality-in-Quantiles Tests
Exploring the Reform of Mathematical Finance Course Based on...
收藏 引用
2023 international conference on Algorithms, computing and Data Processing, ACDP 2023
作者: Gao, Wang Zhang, Linlin Cao, Qian Hebei University of Economics and Business Research Center for Finance and Enterprise Innovation Shijiazhuang050062 China School of Finance Hebei University of Economics and Business Shijiazhuang China School of Information Technology Hebei University of Economics and Business Shijiazhuang China Institute of Science and Technology Information Beijing Academy of Science and Technology Beijing China
Data visualization is the use of graphical or visual representations to convey complex information, such as financial data. By incorporating data visualization techniques into mathematical finance courses, educators c... 详细信息
来源: 评论
Performance Analysis of IoT Networks with UAV-assisted NOMA-based WPT-MEC  24
Performance Analysis of IoT Networks with UAV-assisted NOMA-...
收藏 引用
9th international conference on Intelligent information technology (ICIIT)
作者: Anh-Nhat Nguyen Dinh-Cuong Hoang Gia-Huy Nguyen Khai Nguyen Nam-Truong Nguyen FPT Univ Hanoi Vietnam
This paper investigates the performance of an Internet of Things (IoT) system utilizing a unmanned aerial vehicle (UAV) in an urban environment with the assistance of non-orthogonal multiple access (NOMA) based mobile... 详细信息
来源: 评论