咨询与建议

限定检索结果

文献类型

  • 8,546 篇 会议
  • 51 篇 期刊文献
  • 29 册 图书

馆藏范围

  • 8,626 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,501 篇 工学
    • 3,440 篇 计算机科学与技术...
    • 2,297 篇 软件工程
    • 1,130 篇 信息与通信工程
    • 857 篇 控制科学与工程
    • 790 篇 电气工程
    • 358 篇 生物工程
    • 343 篇 电子科学与技术(可...
    • 260 篇 动力工程及工程热...
    • 257 篇 机械工程
    • 204 篇 网络空间安全
    • 196 篇 生物医学工程(可授...
    • 184 篇 仪器科学与技术
    • 159 篇 交通运输工程
    • 152 篇 安全科学与工程
    • 139 篇 光学工程
    • 116 篇 化学工程与技术
  • 2,237 篇 理学
    • 1,674 篇 数学
    • 392 篇 生物学
    • 372 篇 统计学(可授理学、...
    • 341 篇 物理学
    • 306 篇 系统科学
    • 124 篇 化学
  • 1,135 篇 管理学
    • 825 篇 管理科学与工程(可...
    • 381 篇 图书情报与档案管...
    • 339 篇 工商管理
  • 180 篇 医学
    • 153 篇 临床医学
    • 147 篇 基础医学(可授医学...
  • 150 篇 法学
    • 124 篇 社会学
  • 133 篇 文学
    • 129 篇 新闻传播学
  • 116 篇 经济学
    • 114 篇 应用经济学
  • 61 篇 教育学
  • 45 篇 农学
  • 16 篇 军事学
  • 9 篇 艺术学

主题

  • 1,150 篇 convergence
  • 444 篇 cloud computing
  • 422 篇 optimization
  • 350 篇 computational mo...
  • 296 篇 genetic algorith...
  • 230 篇 information tech...
  • 199 篇 particle swarm o...
  • 198 篇 algorithm design...
  • 196 篇 neural networks
  • 190 篇 resource managem...
  • 186 篇 training
  • 183 篇 servers
  • 173 篇 internet of thin...
  • 164 篇 computer archite...
  • 150 篇 real-time system...
  • 142 篇 mobile computing
  • 141 篇 wireless sensor ...
  • 140 篇 costs
  • 137 篇 educational inst...
  • 135 篇 accuracy

机构

  • 39 篇 university of ch...
  • 29 篇 state key labora...
  • 26 篇 chitkara univers...
  • 25 篇 college of compu...
  • 22 篇 amrita vishwa vi...
  • 18 篇 beijing key labo...
  • 17 篇 shenyang institu...
  • 17 篇 school of comput...
  • 16 篇 school of inform...
  • 16 篇 key laboratory o...
  • 15 篇 university of sc...
  • 15 篇 college of compu...
  • 14 篇 faculty of infor...
  • 14 篇 school of comput...
  • 14 篇 department of co...
  • 14 篇 college of infor...
  • 13 篇 college of compu...
  • 13 篇 national univers...
  • 13 篇 institute of com...
  • 12 篇 communication un...

作者

  • 40 篇 jeong jongpil
  • 24 篇 kim dong-seong
  • 20 篇 lee jae-min
  • 19 篇 yang yang
  • 14 篇 wang hui
  • 14 篇 pan jeng-shyang
  • 13 篇 wang lei
  • 12 篇 zhiwei ye
  • 12 篇 dong-seong kim
  • 11 篇 sampedro gabriel...
  • 11 篇 peeta basa pati
  • 11 篇 younghan kim
  • 11 篇 jongpil jeong
  • 10 篇 jongwon kim
  • 10 篇 rajagopal shinu ...
  • 10 篇 lee jae min
  • 9 篇 jie yang
  • 9 篇 li li
  • 9 篇 liu yang
  • 9 篇 jae-min lee

语言

  • 7,483 篇 英文
  • 1,116 篇 其他
  • 55 篇 中文
  • 1 篇 法文
检索条件"任意字段=International Conference on Computing and Convergence Technology"
8626 条 记 录,以下是1231-1240 订阅
排序:
Quantum computing in Cybersecurity and LLM
Quantum Computing in Cybersecurity and LLM
收藏 引用
international conference on Web Research (ICWR)
作者: Fazel Mohammad Ali Pour Mohammad Hossein Arastoo Faculty of Technology and Engineering Behbahan Khatam-Alanbia University of Technology Khuzestan Iran Faculty of Technology and Engineering Azad University of Kashan Kashan Iran
Quantum computing is fundamentally transforming the cybersecurity landscape by simultaneously introducing robust defense mechanisms and sophisticated attack vectors. This paper explores the dual nature of quantum comp... 详细信息
来源: 评论
Voice Pathology Detection Using Decision Tree Classifier  14
Voice Pathology Detection Using Decision Tree Classifier
收藏 引用
14th international conference on Information and Communication technology convergence, ICTC 2023
作者: Al-Dhief, Fahad Taha Mu'azzah Abdul Latiff, Nurul Nik Abd. Malik, Nik Noordini Mat Baki, Marina Sabri, Naseer Abbood Albadr, Musatafa Abbas Fariesya Suhaila Md Sazihan, Nurul Universiti Teknologi Malaysia Faculty of Electrical Engineering Johor Bahru Malaysia Universiti Kebangsaan Malaysia Medical Centre Faculty of Medicine Kuala Lumpur Malaysia Sohar University Computing and Information Technology Sohar Oman Basrah University for Oil and Gas Department of Oil and Gas Engineering Al Basrah Iraq
Nowadays, the systems of voice disorder detection obtained considerable attention due to the high importance of this field. However, the assessment of voice pathology requires certain tools and well-trained doctors. M... 详细信息
来源: 评论
Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion Detection  2023
Enhancing In-Vehicle Network Security Through Bitstream Feat...
收藏 引用
15th international conference on Contemporary computing, IC3 2023
作者: Islam, Md Rezanur Ugli, Muminov Ibrokhim Botir Oh, Insu Yim, Kangbin Department of Software Convergence Soonchunhyang University Asan-si Chungnam Korea Republic of Department of Computer Software Engineering Soonchunhyang University Asan-si Chungnam Korea Republic of Department of Information Security Engineering Soonchunhyang University Asan-si Chungnam Korea Republic of
The in-vehicle network (IVN) is highly vulnerable due to its inherent structure, and the continuous introduction of new features in next-generation vehicles only exacerbates this issue. To address this problem, a prop... 详细信息
来源: 评论
Smart Teacher - An AI-Based Self-Learning Platform for Grade 10 ICT Students  7
Smart Teacher - An AI-Based Self-Learning Platform for Grade...
收藏 引用
7th IEEE international conference for convergence in technology, I2CT 2022
作者: Jathushan, V. Senthujan, B. Ajiharan, B. Kasthury, M. Gamage, Anjali Ganegoda, Devanshi Sri Lanka Institute of Information Technology Faculty of Computing Malabe Sri Lanka
E-learning is a method of learning that uses electronic resources but is based on institutionalized education. While education can take place in or outside of the classroom, E-learning relies heavily on computers and ... 详细信息
来源: 评论
Skeleton Based Periodicity Analysis of Repetitive Actions  7
Skeleton Based Periodicity Analysis of Repetitive Actions
收藏 引用
7th IEEE international conference for convergence in technology, I2CT 2022
作者: Wedasingha, Nushara Samarasinghe, Pradeepa Seneviratne, Lasantha Puiatti, Alessandro Papandrea, Michela Dhanayaka, Dulangi Sri Lanka Institute of Information Technology Faculty of Computing Sri Lanka Switzerland Switzerland University of Colombo Faculty of Medicine Colombo Sri Lanka
This paper investigates the problem of detecting and recognizing repetitive actions performed by a human. Repetitive action analysis play a major role in detecting many behavioral disorders. In this work, we present a... 详细信息
来源: 评论
Surveillance based Child Kidnap Detection and Prevention Assistance  7
Surveillance based Child Kidnap Detection and Prevention Ass...
收藏 引用
7th IEEE international conference for convergence in technology, I2CT 2022
作者: Kodikara, K.A.O.V. Hettiarachchi, Pramodya Prathapa, D.M.J. Jayakody, J.M.A.M.S. Haddela, Prasanna S. Sri Lanka Institute of Information Technology Faculty of Computing Sri Lanka
This research paper is based on child kidnap detection and prevention to identify susceptible child kidnap by unauthorized persons. The intelligent surveillance system proposed for this is known as "AICare".... 详细信息
来源: 评论
Nonmonotone Accelerated Manifold Proximal Gradient with Adaptive Stepsize Method for Sparse PCA with Application to Dimensionality Reduction
Nonmonotone Accelerated Manifold Proximal Gradient with Adap...
收藏 引用
2022 international conference on Image Processing and Media computing, ICIPMC 2022
作者: Zhang, Xinyu Yan, Tao Wang, Kai Nanjing University of Science and Technology School of Mathematics and Statistics Nanjing China
Sparse principal component analysis (SPCA) has attracted attention in many areas such as signal/image processing, statistics, bioinformatics and machine learning. In this paper, we develop a new accelerated proximal g... 详细信息
来源: 评论
KnowMore: Social Media based Student Centric E-learning platform with Machine Learning Approaches  7
KnowMore: Social Media based Student Centric E-learning plat...
收藏 引用
7th IEEE international conference for convergence in technology, I2CT 2022
作者: Nasome, Vidusha Malavige, Oshani Costa, Maleesha Jayasinghe, Bhagya Karunasena, Anuradha Samarakoon, Uthpala Sri Lanka Institute of Information Technology Faculty of Computing Malabe Sri Lanka
Social media has become increasingly popular among the younger generation in the last decade. Students engage with social media on daily basis, and it affects their interests, lifestyle, and attitude. There are many e... 详细信息
来源: 评论
Decorrelation Proportionate Normalized Least Mean M-estimate Algorithm with Variable Step-Size  22
Decorrelation Proportionate Normalized Least Mean M-estimate...
收藏 引用
5th international conference on Signal Processing and Machine Learning, SPML 2022
作者: Huang, Zongxin Yu, Yi Fan, Yongcun Li, Ke School of Information Engineering Robot Technology Used for Special Environment Key Laboratory of Sichuan Province Southwest University of Science and Technology Sichuan Mianyang China
To improve the performance of the proportionate normalized least mean M-estimate (PNLMM) algorithm, this paper proposes a variable step-size adaptive decorrelation PNLMM (VSS-AD-PNLMM) algorithm. First, an adaptive de... 详细信息
来源: 评论
Multivariate Deep Learning Model For Workload Prediction In Cloud computing  12
Multivariate Deep Learning Model For Workload Prediction In ...
收藏 引用
12th international conference on ICT convergence (ICTC) - Beyond the Pandemic Era with ICT convergence Innovation
作者: Dang-Quang, Nhat-Minh Yoo, Myungsik Soongsil Univ Dept Informat Commun Convergence Technol Seoul South Korea Soongsil Univ Sch Elect Engn Seoul South Korea
Many application developers are now choosing to install their Web applications on cloud data centers because of the attractiveness of cloud computing environment. Predicting future resource workload is critical since ... 详细信息
来源: 评论