咨询与建议

限定检索结果

文献类型

  • 209,488 篇 会议
  • 2,811 篇 期刊文献
  • 2,208 册 图书
  • 8 篇 学位论文
  • 1 件 标准
  • 1 篇 科技报告

馆藏范围

  • 214,517 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 122,306 篇 工学
    • 88,648 篇 计算机科学与技术...
    • 65,234 篇 软件工程
    • 29,172 篇 信息与通信工程
    • 16,766 篇 控制科学与工程
    • 14,157 篇 电气工程
    • 10,728 篇 生物工程
    • 10,354 篇 机械工程
    • 9,881 篇 电子科学与技术(可...
    • 8,002 篇 生物医学工程(可授...
    • 6,856 篇 仪器科学与技术
    • 5,597 篇 光学工程
    • 5,191 篇 动力工程及工程热...
    • 4,929 篇 化学工程与技术
    • 4,719 篇 安全科学与工程
    • 4,326 篇 网络空间安全
    • 4,165 篇 交通运输工程
  • 49,029 篇 理学
    • 26,346 篇 数学
    • 11,555 篇 生物学
    • 11,414 篇 物理学
    • 8,066 篇 统计学(可授理学、...
    • 6,120 篇 系统科学
    • 4,956 篇 化学
  • 37,478 篇 管理学
    • 22,463 篇 管理科学与工程(可...
    • 17,560 篇 图书情报与档案管...
    • 10,766 篇 工商管理
  • 7,366 篇 医学
    • 6,193 篇 临床医学
    • 5,827 篇 基础医学(可授医学...
  • 5,481 篇 法学
    • 4,414 篇 社会学
  • 4,380 篇 教育学
    • 4,160 篇 教育学
  • 4,341 篇 经济学
    • 4,219 篇 应用经济学
  • 2,981 篇 农学
  • 1,723 篇 文学
  • 569 篇 艺术学
  • 556 篇 军事学
  • 35 篇 历史学
  • 28 篇 哲学

主题

  • 10,618 篇 cloud computing
  • 6,663 篇 computational mo...
  • 6,290 篇 information tech...
  • 5,051 篇 feature extracti...
  • 4,652 篇 accuracy
  • 4,097 篇 data mining
  • 4,097 篇 training
  • 3,692 篇 computer archite...
  • 3,289 篇 computer science
  • 3,271 篇 mobile computing
  • 3,165 篇 security
  • 3,131 篇 internet of thin...
  • 3,030 篇 machine learning
  • 2,990 篇 servers
  • 2,976 篇 data models
  • 2,972 篇 deep learning
  • 2,944 篇 educational inst...
  • 2,911 篇 protocols
  • 2,765 篇 real-time system...
  • 2,722 篇 monitoring

机构

  • 674 篇 university of ch...
  • 577 篇 institute of com...
  • 444 篇 school of comput...
  • 243 篇 maharishi school...
  • 235 篇 faculty of infor...
  • 202 篇 school of inform...
  • 190 篇 department of co...
  • 154 篇 faculty of compu...
  • 151 篇 department of co...
  • 147 篇 institute of inf...
  • 140 篇 shenyang institu...
  • 134 篇 college of infor...
  • 125 篇 maharishi school...
  • 116 篇 university of sc...
  • 116 篇 department of co...
  • 114 篇 lovely professio...
  • 112 篇 school of electr...
  • 111 篇 school of comput...
  • 110 篇 school of comput...
  • 109 篇 college of intel...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 88 篇 chen z.
  • 87 篇 wang wei
  • 83 篇 wei wang
  • 80 篇 zhang tao
  • 79 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 59 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 49 篇 wang lei
  • 48 篇 xiao liu
  • 48 篇 li li
  • 45 篇 xi chen

语言

  • 195,846 篇 英文
  • 16,652 篇 其他
  • 2,649 篇 中文
  • 25 篇 俄文
  • 18 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 5 篇 西班牙文
  • 5 篇 葡萄牙文
  • 3 篇 德文
  • 1 篇 捷克文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
214521 条 记 录,以下是951-960 订阅
排序:
Proceedings of 2024 2nd international conference on Internet of Things and Cloud computing technology, IoTCCT 2024
Proceedings of 2024 2nd International Conference on Internet...
收藏 引用
2024 2nd international conference on Internet of Things and Cloud computing technology, IoTCCT 2024
The proceedings contain 63 papers. The topics discussed include: application of fuzzy complex set valued integral classifier in hospital infection control monitoring system;the application and comparison of artificial...
来源: 评论
Key Logger for Recording the Keystroke of the Targeted Machine  1
Key Logger for Recording the Keystroke of the Targeted Machi...
收藏 引用
1st IEEE international conference on computing and Data Science, ICCDS 2024
作者: Gnanavel, S. Sreekrishna, M. Shivaramakrishnan, P. Yaswanth, R. Gopika, G.S. Supriya, S. SRM Institute of Science and Technology Faculty of Engineering and Technology Dept of Computing Technologies Kattankulathur603203 India Sathyabama Institute of Science and Technology Dept of Computer Science Engineering Chennai600119 India
In the recent digital era security has become more challenging. There is a plethora of ways to find solution to ensure monitor the system and provide required security. Key logger is one of the cyber attacks which rec... 详细信息
来源: 评论
Measuring Electromagnetic Performance and Configuration of Networks in High Interference Environments  15
Measuring Electromagnetic Performance and Configuration of N...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Khan, A.Z. Panwar, Neeraj Rayaguru, N.K. Shelke, Priya M. Giri, Rakesh Kumar Jaishankar, P. Yeshwantrao Chavan College of Engineering Applied Physics Department Nagpur India University Gehu Dehradun Department of School of Computing India Vel Tech Rangarajan Dr sagunthala R & D Institute of Science and Technology Department of Eee India Vishwakarma Institute of Information Technology Department of Information Technology Pune India Sunrise University Department of Computer Science & Engineering Alwar India Sastra Deemed to be University Department of School of Civil Engineering India
Measuring the electromagnetic overall performance and configuration of networks in high-interference environments can be challenging. In those environments, the indicators of hobby can be infected with unwanted herita... 详细信息
来源: 评论
Key Factors Affecting Steel Construction Projects' Performance by Adopting Building information Modeling (BIM) in Egypt
Key Factors Affecting Steel Construction Projects' Performan...
收藏 引用
ASCE international conference on computing in Civil Engineering 2023: Visualization, information Modeling, and Simulation, i3CE 2023
作者: Soliman, Shorouk M. Elhegazy, Hosam Mostafa Zhang, Jiansong Mahdi, Ibrahim M. Dessouki, Abdelrahim Khalil Abdel Rashid, Ibrahim Dept. of Structural Engineering Ain Shams Univ. Egypt Dept. of Structural Engineering and Construction Management Future Univ. in Egypt Egypt School of Construction Management Technology Purdue Univ. West LafayetteIN United States
This study aims to investigate critical factors that impact the performance of steel construction projects in Egypt when considering the use of building information modeling (BIM). A group of Egyptian practitioners an... 详细信息
来源: 评论
Towards Requirements Engineering for Quantum computing Applications in Manufacturing  57
Towards Requirements Engineering for Quantum Computing Appli...
收藏 引用
57th Hawaii international conference on System Sciences (HICSS)
作者: Stein, Hannah Schroeder, Stefan Kienast, Pascal Kulig, Marco German Res Ctr Artificial Intelligence DFKI Kaiserslautern Germany Saarland Univ Saarbrucken Germany Fraunhofer Inst Prod Technol IPT Aachen Germany TRUMPF SE Co KG Ditzingen Germany
Quantum computing (QC) shows the potential to trigger a paradigm shift for numerous industries. As an emerging technology, methodological support for designing and developing QC-based applications is lacking. This pap... 详细信息
来源: 评论
Theoretical analysis of multi-beam bathymetry seabed coverage area model  4
Theoretical analysis of multi-beam bathymetry seabed coverag...
收藏 引用
4rth international conference on applied Mathematics, Modelling, and Intelligent computing, CAMMIC 2024
作者: Sheng, Yakun Sheng, Yaxin Tian, Zhaoyang School of Computer Science Qufu Normal University Shandong Rizhao276827 China School of Information Science and Engineering Linyi University Shandong Linyi276000 China School of Physical Science and Engineering Beijing Jiaotong University Beijing100044 China
In this paper, based on the function of multi-beam bathymetric system which can simultaneously send hundreds of beams to measure the depth of water at the same time, according to the real topographic characteristics o... 详细信息
来源: 评论
Smart Resume Analyser  15
Smart Resume Analyser
收藏 引用
15th international conference on Advances in computing, Control, and Telecommunication Technologies, ACT 2024
作者: Rane, Milind Zanwar, Harsh Wagh, Kunal Wakode, Suhani Yadav, Avishkar Kulkarni, Atul Department of Artificial Intelligence and Data Science Vishwakarma Institute of Technology Pune India Department of Mechanical Engineering Vishwakarma Institute of Information Technology Pune India
Every time job recruiters (HR) have to go through a huge pile of resumes submitted by applicants. which becomes a very burdensome task, with Python, NumPy, and Pandas, a resume parser is to be created as part of the p... 详细信息
来源: 评论
A Hybrid Strategy Whale Optimization Algorithm for Edge computing Task Scheduling  11th
A Hybrid Strategy Whale Optimization Algorithm for Edge Comp...
收藏 引用
11th international conference on Signal and information Processing, Network and Computers, ICSINC 2023
作者: Sun, Qizheng Yuan, Changqing Liu, Naijia Xu, Enqing Ma, Fei Li, Wei China Academy of Information and Communications Technology Beijing China
For the task scheduling problem in edge computing scenarios, whale optimization algorithm (WOA) can be used to solve this non-deterministic polynomial situation (NP-hard). However, WOA is prone to local extreme values... 详细信息
来源: 评论
Research on Risk Detection and Cleansing technology for OOXML During Cross-Network Transmission  3
Research on Risk Detection and Cleansing Technology for OOXM...
收藏 引用
3rd international conference on Cloud computing, Big Data Application and Software Engineering, CBASE 2024
作者: Ma, Yonghui Li, Ting Liu, Heng Bai, Liyang Qi, Weigang Huadian Shaanxi Energy CO. LTD. Xi'an China CETC Cyberspace Security Technology Co. Ltd. Chengdu China
With the increasing frequency of data exchange, the security issue of cross-network file transfer has become more prominent. Safe data transmission requires controlling the sensitive information in documents to preven... 详细信息
来源: 评论
Real-time Asset False Matching Detection via Attentive Siamese Networks  6
Real-time Asset False Matching Detection via Attentive Siame...
收藏 引用
6th international conference on Frontier Technologies of information and Computer, ICFTIC 2024
作者: Miao, Ziwan Zhang, Li School of Computing Beijing Information Science & Technology University Beijing China School of Management Science and Engineering Beijing Information Science & Technology University Beijing China
Accurate and efficient asset matching is crucial for remote management and diversified investment entities. To address the challenges of low efficiency, high labor costs, and false matching, this paper proposes a real... 详细信息
来源: 评论