咨询与建议

限定检索结果

文献类型

  • 209,488 篇 会议
  • 2,811 篇 期刊文献
  • 2,208 册 图书
  • 8 篇 学位论文
  • 1 件 标准
  • 1 篇 科技报告

馆藏范围

  • 214,517 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 122,306 篇 工学
    • 88,648 篇 计算机科学与技术...
    • 65,234 篇 软件工程
    • 29,172 篇 信息与通信工程
    • 16,766 篇 控制科学与工程
    • 14,157 篇 电气工程
    • 10,728 篇 生物工程
    • 10,354 篇 机械工程
    • 9,881 篇 电子科学与技术(可...
    • 8,002 篇 生物医学工程(可授...
    • 6,856 篇 仪器科学与技术
    • 5,597 篇 光学工程
    • 5,191 篇 动力工程及工程热...
    • 4,929 篇 化学工程与技术
    • 4,719 篇 安全科学与工程
    • 4,326 篇 网络空间安全
    • 4,165 篇 交通运输工程
  • 49,029 篇 理学
    • 26,346 篇 数学
    • 11,555 篇 生物学
    • 11,414 篇 物理学
    • 8,066 篇 统计学(可授理学、...
    • 6,120 篇 系统科学
    • 4,956 篇 化学
  • 37,478 篇 管理学
    • 22,463 篇 管理科学与工程(可...
    • 17,560 篇 图书情报与档案管...
    • 10,766 篇 工商管理
  • 7,366 篇 医学
    • 6,193 篇 临床医学
    • 5,827 篇 基础医学(可授医学...
  • 5,481 篇 法学
    • 4,414 篇 社会学
  • 4,380 篇 教育学
    • 4,160 篇 教育学
  • 4,341 篇 经济学
    • 4,219 篇 应用经济学
  • 2,981 篇 农学
  • 1,723 篇 文学
  • 569 篇 艺术学
  • 556 篇 军事学
  • 35 篇 历史学
  • 28 篇 哲学

主题

  • 10,618 篇 cloud computing
  • 6,663 篇 computational mo...
  • 6,290 篇 information tech...
  • 5,051 篇 feature extracti...
  • 4,652 篇 accuracy
  • 4,097 篇 data mining
  • 4,097 篇 training
  • 3,692 篇 computer archite...
  • 3,289 篇 computer science
  • 3,271 篇 mobile computing
  • 3,165 篇 security
  • 3,131 篇 internet of thin...
  • 3,030 篇 machine learning
  • 2,990 篇 servers
  • 2,976 篇 data models
  • 2,972 篇 deep learning
  • 2,944 篇 educational inst...
  • 2,911 篇 protocols
  • 2,765 篇 real-time system...
  • 2,722 篇 monitoring

机构

  • 674 篇 university of ch...
  • 577 篇 institute of com...
  • 444 篇 school of comput...
  • 243 篇 maharishi school...
  • 235 篇 faculty of infor...
  • 202 篇 school of inform...
  • 190 篇 department of co...
  • 154 篇 faculty of compu...
  • 151 篇 department of co...
  • 147 篇 institute of inf...
  • 140 篇 shenyang institu...
  • 134 篇 college of infor...
  • 125 篇 maharishi school...
  • 116 篇 university of sc...
  • 116 篇 department of co...
  • 114 篇 lovely professio...
  • 112 篇 school of electr...
  • 111 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 college of intel...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 88 篇 chen z.
  • 87 篇 wang wei
  • 83 篇 wei wang
  • 80 篇 zhang tao
  • 79 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 59 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 49 篇 wang lei
  • 48 篇 xiao liu
  • 48 篇 li li
  • 45 篇 xi chen

语言

  • 195,846 篇 英文
  • 16,652 篇 其他
  • 2,649 篇 中文
  • 25 篇 俄文
  • 18 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 5 篇 西班牙文
  • 5 篇 葡萄牙文
  • 3 篇 德文
  • 1 篇 捷克文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
214521 条 记 录,以下是931-940 订阅
排序:
Very Low-Resolution Face Recognition Based On Multilinear Side-information based Discriminant Analysis  10
Very Low-Resolution Face Recognition Based On Multilinear Si...
收藏 引用
IEEE 10th international conference on Big Data computing Service and Machine Learning Applications (IEEE BigDataService)
作者: Bellili, Sana Ouamane, Abdelmalik Chouchane, Ammar Himeur, Yassine Atalla, Shadi Mansoor, Wathiq Al Ahmad, Hussain Univ Biskra Dept Elect Engn Biskra Algeria Univ Ctr Barika Amdoukal Rd Barika 05001 Algeria Univ Dubai Coll Engn & Informat Technol Dubai U Arab Emirates
Facial recognition technology is widely used for biometric authentication, but it struggles with accurately identifying individuals from low-resolution images. This study introduces a new method for improving low-reso... 详细信息
来源: 评论
Quantum computing Outreach: Raising Public Awareness and Understanding
Quantum Computing Outreach: Raising Public Awareness and Und...
收藏 引用
2024 international conference on Artificial Intelligence, Computer, Data Sciences, and Applications, ACDSA 2024
作者: Boateng, S. Liu, M. Marymount University Leadership & Technology Sch. of Technology & Innovation Applied Research Department ArlingtonVA United States
Quantum computing is a technology that is frantically growing. It revolutionizes many industries for all different types of things and will solve problems that transpositional computers have not thought of yet. Quantu... 详细信息
来源: 评论
Why People Want To Use E-money Card based On RFID technology ?  8
Why People Want To Use E-money Card based On RFID Technology...
收藏 引用
8th international conference on Informatics and computing, ICIC 2023
作者: Fathur N.P, Freza Cassandra, Cadelina Bina Nusantara University Information Systems Department Jakarta Indonesia Bina Nusantara University Information Systems Department Jakarta11480 Indonesia
Radio Frequency Identification (RFID) is a technology that is used widely for mobile payment, the security is the main issue of the usage of this technology. The aim of this study is to identify the key factors influe... 详细信息
来源: 评论
Recognizing Functional Pragmatics of Chinese Discourses on Multi-level information and Ensemble Learning  20th
Recognizing Functional Pragmatics of Chinese Discourses on M...
收藏 引用
20th international conference on Intelligent computing (ICIC)
作者: Lu, Yu Fan, Yaxin Chu, Xiaomin Li, Peifeng Zhu, Qiaoming Soochow Univ Suzhou Peoples R China
The theory of discourse functional pragmatics posits that every discourse unit serves a purpose, and functional pragmatics can reveal its role in the text. To achieve a more informative representation of paragraphs, m... 详细信息
来源: 评论
Research on a New Speech Synthesis Fraud Method  9
Research on a New Speech Synthesis Fraud Method
收藏 引用
9th international conference on Intelligent computing and Signal Processing, ICSP 2024
作者: Zhang, Hang Li, Yuhui Kui, Shijian Qin, Zhaoyi Harbin Institute of Technology Faculty of Computing Harbin China School of Automotive Engineering Harbin Institute of Technology Harbin China Harbin Institute of Technology Faculty of New Energy Harbin China School of Information Science and Engineering Harbin Institute of Technology Harbin China
With the rapid development of deep learning technology, deep counterfeiting has also quietly ascended to the stage of history, and voice disguise fraud, as a new type of attack means, has laid a huge hidden danger for... 详细信息
来源: 评论
Exploring the Future of information Storage: QR Code Extended Storage technology  7
Exploring the Future of Information Storage: QR Code Extende...
收藏 引用
7th international conference on Internet Applications, Protocols, and Services, NETAPPS 2024
作者: Abas, Azizi Omar, Mohd Hasbullah Azzali, Fazli School of Computing Universiti Utara Malaysia Sintok Kedah Malaysia
The emerging QR Code Extended Storage technology has the potential to greatly advance information storage and retrieval. This research examines the current state of QR code technology, its limitations, and the opportu... 详细信息
来源: 评论
Privacy-Preserving Human Activity Recognition in Smart Homes using Deep Learning and Edge computing for Real-Time Processing  5
Privacy-Preserving Human Activity Recognition in Smart Homes...
收藏 引用
5th international conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Mariappan, K. Gopal, Baskar Parthasarathy, J. Sreekanth, G.R. Nanmaran, R. Jegajothi, B. SRM Institute of Science and Technology Department of Computer Science and Applications Chennai India College of Engineering University of Technology & Applied Science Nizwa Oman Computer Science & Engineering Jayalakshmi Institute Of Technology Dharmapuri India Information Technology Nandha Engineering College Erode52 India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India SRS Tech Solutions Chennai India
The rapid advancement of smart home technologies necessitates efficient human activity recognition (HAR) systems while ensuring user privacy. This research presents a novel architecture that integrates deep learning a... 详细信息
来源: 评论
An Exploration of Data Augmentation Techniques in Ensemble Learning for Medical Image Segmentation with Transfer Learning
An Exploration of Data Augmentation Techniques in Ensemble L...
收藏 引用
2024 international conference on Optimization computing and Wireless Communication, ICOCWC 2024
作者: Singh, Swati Gupta, Namit Prakash, Febin Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Teetthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India
this paper examines using data augmentation strategies in the ensemble, getting to know medical photo segmentation with transfer learning. Various transfer-gaining knowledge of techniques, namely pretrained models, un... 详细信息
来源: 评论
An Overview of Data Security Algorithms in Cloud computing  3rd
An Overview of Data Security Algorithms in Cloud Computing
收藏 引用
3rd international conference on applied Intelligence and Informatics (AII)
作者: Amalarethinam, D. I. George Rajakumari, S. Edel Josephine Bharathidasan Univ Jamal Mohamed Coll Autonomous Dept Comp Sci Tiruchirappalli 620020 Tamil Nadu India
Cloud computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries;It introduced the notion of 'pay as you use' and revolutionized devel... 详细信息
来源: 评论
Research on cloud storage data integrity verification protocol based on smart technologies
Research on cloud storage data integrity verification protoc...
收藏 引用
2024 international conference on Cloud computing, Performance computing, and Deep Learning, CCPCDL 2024
作者: Wang, Xiangyu School of Information Dalian Jiaotong University Liaoning province Dalian City116028 China
With the continuous development of digital economy and Internet of Things technology, it has brought huge benefits to people and generated massive amounts of data. As a result, users migrate their data to the cloud. C... 详细信息
来源: 评论