咨询与建议

限定检索结果

文献类型

  • 191,067 篇 会议
  • 1,976 册 图书
  • 1,444 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 194,498 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,446 篇 工学
    • 86,216 篇 计算机科学与技术...
    • 63,552 篇 软件工程
    • 30,359 篇 信息与通信工程
    • 14,495 篇 控制科学与工程
    • 12,491 篇 电气工程
    • 10,390 篇 生物工程
    • 8,261 篇 电子科学与技术(可...
    • 7,659 篇 机械工程
    • 7,389 篇 生物医学工程(可授...
    • 5,707 篇 仪器科学与技术
    • 5,115 篇 光学工程
    • 4,732 篇 动力工程及工程热...
    • 4,535 篇 安全科学与工程
    • 4,288 篇 网络空间安全
    • 3,904 篇 化学工程与技术
    • 3,739 篇 交通运输工程
  • 43,246 篇 理学
    • 23,595 篇 数学
    • 11,194 篇 生物学
    • 9,393 篇 物理学
    • 7,259 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,051 篇 化学
  • 32,467 篇 管理学
    • 19,779 篇 管理科学与工程(可...
    • 15,207 篇 图书情报与档案管...
    • 9,733 篇 工商管理
  • 6,787 篇 医学
    • 5,788 篇 临床医学
    • 5,419 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,379 篇 法学
    • 4,394 篇 社会学
  • 3,664 篇 经济学
    • 3,608 篇 应用经济学
  • 3,241 篇 教育学
  • 2,628 篇 农学
  • 1,508 篇 文学
  • 536 篇 军事学
  • 384 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,483 篇 cloud computing
  • 6,130 篇 computational mo...
  • 4,656 篇 information tech...
  • 4,604 篇 feature extracti...
  • 3,901 篇 accuracy
  • 3,546 篇 training
  • 3,527 篇 data mining
  • 3,464 篇 computer archite...
  • 3,397 篇 image coding
  • 3,242 篇 internet of thin...
  • 3,120 篇 security
  • 2,978 篇 servers
  • 2,953 篇 mobile computing
  • 2,913 篇 computer science
  • 2,881 篇 protocols
  • 2,642 篇 machine learning
  • 2,569 篇 deep learning
  • 2,532 篇 educational inst...
  • 2,455 篇 wireless sensor ...
  • 2,421 篇 real-time system...

机构

  • 629 篇 university of ch...
  • 553 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 223 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 146 篇 school of comput...
  • 143 篇 department of co...
  • 135 篇 key laboratory o...
  • 133 篇 lovely professio...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 101 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 100 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 46 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,138 篇 英文
  • 3,016 篇 其他
  • 1,947 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
194499 条 记 录,以下是111-120 订阅
排序:
Advanced Data Storage Model with Blockchain technology and Huffman Algorithm  29
Advanced Data Storage Model with Blockchain Technology and H...
收藏 引用
29th international conference on information technology, IT 2025
作者: Canpolat, Nida Yetis, Hasan Yaman, Orhan Karakose, Mehmet Firat University Department of Digital Forensic Engineering Elazig Turkey Firat University Department of Computer Engineering Elazig Turkey
The secure storage and preservation of data is a very important issue. Different methods and studies have been presented for the secure storage of data. One of these methods is Blockchain based approaches. Blockchain ... 详细信息
来源: 评论
The impact of the stratospheric sudden warming event in 2021 on local atmospheric environment  3
The impact of the stratospheric sudden warming event in 2021...
收藏 引用
3rd international conference on Geographic information and Remote Sensing technology, GIRST 2024
作者: Liu, Bainian Yao, Qiang Zhu, Di College of Meteorologhy and Oceanography National University of Defense Technology NUDT Changsha China
This study pioneers the utilization of the YHGSM dataset to conduct an in-depth analysis of the ramifications of the stratosphere's sudden warming (SSW) event in 2021 on local atmospheric circulation, temperature,... 详细信息
来源: 评论
Distributed-computing based versatile healthcare services framework for diagnostic markers  2nd
Distributed-computing based versatile healthcare services fr...
收藏 引用
2nd international conference on Next-Generation computing and information Systems, ICNGCIS 2023
作者: Chunduri, Venkata Posinasetty, Bhargavi Son, Mukesh Byeon, Haewon Department of Mathematics & Computer Science Indiana State University United States The University of Southern Mississippi HattiesburgMS United States Dr. D. Y. Patil Vidyapeeth Pune Dr. D. Y. Patil School of Science & Technology Pune Tathawade India Department of Digital Anti-Aging Healthcare Inje University Gimhae Korea Republic of
Recently, there has been a boom in imaginative medical services technologies that have enhanced the delivery of medical care data. Human-to-human and gadget-to-gadget networks are crucial in people’s lives and functi... 详细信息
来源: 评论
Deploying Deep Learning to Improve the Performance of MIMO-OFDM Systems Using LDPC Channel coding in V2X Communications  19
Deploying Deep Learning to Improve the Performance of MIMO-O...
收藏 引用
19th international conference on Ubiquitous information Management and Communication, IMCOM 2025
作者: Nga, Nguyen Thu Duc, Nguyen Dinh Tien, Trinh Manh WICOM Lab School of Electrical and Electronic Engineering SEEE Hanoi University of Science and Technology HUST Hanoi Viet Nam
This paper focuses on the application of Deep Learning technology to improve the performance of V2X (Vehicle-to-Everything) communication systems. Of the Multiple-input Multiple-output Orthogonal Frequency Division Mu... 详细信息
来源: 评论
Enhancing Data Security and Privacy in Cloud computing: A Survey of Modern Techniques  3
Enhancing Data Security and Privacy in Cloud Computing: A Su...
收藏 引用
3rd international conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Suganya, N. Gouthami, P. Sathiya, R. Sivaranjani, S. Murugesan, M. Department of Computer Science and Business Systems Dr. N.G.P. Institute of Technology Coimbatore India Department of Information Technology Thangavelu Engineering College Chennai India Departement of Electrical and Electronics Engineering Sri Krishna College of Engineering and Technology Coimbatore India Departement of Electrical and Electronics Engineering Karpagam Institute of Technology Coimbatore India
A computing system that is based on the internet and offers users all resources as on-demand services. Servers, storage, databases, software, and networking are among these on-demand services. Usually, the user must p... 详细信息
来源: 评论
Percepti Alarm: A Beacon of Safety and Autonomy Leveraging OCR and ML  3
Percepti Alarm: A Beacon of Safety and Autonomy Leveraging O...
收藏 引用
3rd international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Priya, N. Cyril, Pretty Diana Geetha, Geetha Preethi, Preethi Nhce Dept of Ise Bengaluru India Srm Institute of Science and Technology Dept of Computing Technology India Bnmit Dept of Cse Bengaluru India Manipal Institute of Technology Dept of Information Technology Bengaluru India
Percepti-Alarm is a groundbreaking endeavor aimed at revolutionizing the lives of the visually impaired. It introduces a transformative solution by integrating a high-tech camera onto the conventional white cane, offe... 详细信息
来源: 评论
MFC based Smart Irrigation System using IoT and Machine Learning  6
MFC based Smart Irrigation System using IoT and Machine Lear...
收藏 引用
6th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Chaitanya, Manne Sai Uday Kiran Reddy, B. Sreekumar, K. Amaran, Sibi Department of Computing Technologies Technologies SRM Institute of Science and Technology Kattankulathur Chennai603203 India Department of Computing SRM Institue of Science and Technology Kattankulathur Chennai603203 India
This research study proposes a novel Smart Irrigation System that integrates Microbial Fuel Cells (MFCs) with IoT and Machine Learning for sustainable agricultural practices. The system uses MFCs to generate electrici... 详细信息
来源: 评论
Design of Automated Container Layout and Resource Optimization Algorithm based on Cloud computing technology
Design of Automated Container Layout and Resource Optimizati...
收藏 引用
2024 international conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Zhang, Feng Shandong Province Light Industry Collective Enterprise Association Information Department Shandong Jinan China
With the rapid development and widespread application of cloud computing, container technology has become a hot topic for enterprises and research institutions in recent years. This article proposes an automated conta... 详细信息
来源: 评论
Function Scheduling with Data Security in Serverless computing Systems  17
Function Scheduling with Data Security in Serverless Computi...
收藏 引用
17th international conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Saha, Srestha Pandey, Arvind Addya, Sourav Kanti Brata Nath, Shubha Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India SRM Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu India National Institute of Technology Karnataka Department of Computer Science and Engineering Surathkal India
In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these chal... 详细信息
来源: 评论
Algebraic Signature based Trusted Execution Environment for Remote Computation  25
Algebraic Signature based Trusted Execution Environment for ...
收藏 引用
26th international conference on Distributed computing and Networking, ICDCN 2025
作者: Majumder, Arnab Warsi, Shahnaz Alam, Junaid Maity, Soumyadev Indian Institute of Information Technology Allahabad Prayagraj India
Today, remote computational activities must be secure and private. Trusted Execution Environments (TEEs) enable hardware-based data and operation isolation. This method may expose users to side-channel attacks and sof... 详细信息
来源: 评论