咨询与建议

限定检索结果

文献类型

  • 191,938 篇 会议
  • 1,973 册 图书
  • 1,433 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,355 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,927 篇 工学
    • 86,613 篇 计算机科学与技术...
    • 63,779 篇 软件工程
    • 30,642 篇 信息与通信工程
    • 14,723 篇 控制科学与工程
    • 12,639 篇 电气工程
    • 10,398 篇 生物工程
    • 8,351 篇 电子科学与技术(可...
    • 7,746 篇 机械工程
    • 7,401 篇 生物医学工程(可授...
    • 5,717 篇 仪器科学与技术
    • 5,138 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,547 篇 安全科学与工程
    • 4,430 篇 网络空间安全
    • 3,909 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,474 篇 理学
    • 23,768 篇 数学
    • 11,210 篇 生物学
    • 9,444 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,280 篇 系统科学
    • 4,058 篇 化学
  • 32,618 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,303 篇 图书情报与档案管...
    • 9,771 篇 工商管理
  • 6,880 篇 医学
    • 5,810 篇 临床医学
    • 5,438 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,399 篇 法学
    • 4,407 篇 社会学
  • 3,675 篇 经济学
    • 3,619 篇 应用经济学
  • 3,255 篇 教育学
  • 2,631 篇 农学
  • 1,510 篇 文学
  • 536 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,521 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,700 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,537 篇 data mining
  • 3,485 篇 computer archite...
  • 3,413 篇 image coding
  • 3,270 篇 internet of thin...
  • 3,168 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,915 篇 computer science
  • 2,890 篇 protocols
  • 2,698 篇 machine learning
  • 2,680 篇 deep learning
  • 2,549 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 556 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 224 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 134 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 98 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,586 篇 英文
  • 3,413 篇 其他
  • 1,975 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195356 条 记 录,以下是231-240 订阅
排序:
An End-to-End Audio Transformer with Multi-student Knowledge Distillation algorithm for Deepfake Speech Detection  24
An End-to-End Audio Transformer with Multi-student Knowledge...
收藏 引用
13th international conference on computing and Pattern Recognition, ICCPR 2024
作者: An, Weidong Li, Ruwei Ge, Haoyu Li, Man Li, Huaiyu School of Information Science and Technology Beijing University of Technology Beijing China School of Information Science and Technology Chengdu university of information technology Chengdu Sichuan China
An increased prevalence of fraudulent techniques has revealed the limitations in performance and detection speed of existing Spoofed Speech Detection(SSD) algorithms. To address these challenges, a more stable and rap... 详细信息
来源: 评论
End-User-Centric Cloud Security: An Integrated Approach for File Encryption and Decryption with Blowfish and AWS
End-User-Centric Cloud Security: An Integrated Approach for ...
收藏 引用
2025 IEEE international conference on Computational, Communication and information technology, ICCCIT 2025
作者: Phatangare, Sheetal Jadhav, Deepali Waghmare, Apurv Ajgaonkar, Durva Varpe, Anushka Anand, Asit Vishwakarma Institute of Technology Department of Computer Engineering Pune India
With the growing trend of cloud computing, the necessity for secure data storage arises as traditional security measures fail with different types of new emerging cyber threats. The paper introduces a file storage sys... 详细信息
来源: 评论
An iterated greedy algorithm based on NSGA-II for distributed hybrid flow shop scheduling problem  3
An iterated greedy algorithm based on NSGA-II for distribute...
收藏 引用
3rd international conference on Communications, information System, and Data Science, CISDS 2024
作者: Liu, Dandan Liang, Xu Zou, Zhiyuan School of Computing Beijing Information Science and Technology University Beijing China
The distributed hybrid flow shop scheduling problems (DHFSP) widely exist in various industrial production processes, and thus have received widespread attention. However, studies on HFSP considering green objective i... 详细信息
来源: 评论
Edge Intelligence Hybrid Framework for Real-Time IoT Applications using Multi-Stage Adaptive Processing Methods  6
Edge Intelligence Hybrid Framework for Real-Time IoT Applica...
收藏 引用
6th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Suneel, Sajja Yadav, Rakesh Kumar Nirmala Devi, K. Teja sree, B. Aarthi, R. Upadhyay, Shrikant Institute of Aeronautical Engineering Dundigal Telangana Hyderabad500043 India Amity School of Engineering and Technology Amity University Bihar Patna India Department of Computer Applications Madanapalle Institute of Technology & Science India Department of IT S.R.K.R Engineering College Bhimavaram India Department of ECE Rajalakshmi Institute of Technology Kuthambakkam Post Tamil Nadu Chembarambakkam600124 India Department of Electronics and Communication Engineering MLR Institute of Technology Hyderabad India
The rapid proliferation of IoT devices has created an unprecedented need for real-time data processing and decision-making. This paper proposes an Edge Intelligence Hybrid Framework designed for real-time IoT applicat... 详细信息
来源: 评论
27th international conference on Advanced Communications technology: Toward Secure and Comfortable Life in AI Cambrian Explosion Era!!, ICACT 2025 - Proceedings
27th International Conference on Advanced Communications Tec...
收藏 引用
27th international conference on Advanced Communications technology, ICACT 2025
The proceedings contain 86 papers. The topics discussed include: predicting academic procrastination among university students using autoencoder model;design of metaverse-supported blockchain test process;implementati...
来源: 评论
Soft-Decision Decoding for LDPC Code-Based Quantitative Group Testing  14
Soft-Decision Decoding for LDPC Code-Based Quantitative Grou...
收藏 引用
14th international ITG conference on Systems, Communications and coding, SCC 2025
作者: Xhemrishi, Marvin Ostman, Johan Amat, Alexandre Graell I. Technical University of Munich Munich Germany AI Sweden Gothenburg Sweden Chalmers University of Technology Gothenburg Sweden
We consider the problem of identifying defective items in a population with non-adaptive quantitative group testing. For this scenario, Mashauri et al. recently proposed a low-density parity-check (LDPC) code-based qu... 详细信息
来源: 评论
Memristor-based Neural Network Circuit Simulation for Classification Application  24
Memristor-based Neural Network Circuit Simulation for Classi...
收藏 引用
8th international conference on Electronic information technology and Computer Engineering, EITCE 2024
作者: Hou, Zhuang Tao, Ye Wang, Zhongqiang Lin, Ya Zhao, Xiaoning Key Laboratory for UV Light-Emitting Materials and Technology Northeast Normal University Jilin Changchun China
With the advent of the big data era, the traditional von Neumann architecture, which has separate processing units and storage units, brings huge delay and energy consumption, and suffers from high data transmission c... 详细信息
来源: 评论
The Applications and Research of NLP and Deep Learning Technologies in Public Security Data  24
The Applications and Research of NLP and Deep Learning Techn...
收藏 引用
8th international conference on Electronic information technology and Computer Engineering, EITCE 2024
作者: Zhu, Yupeng Zhu, Yuhao College of Information Engineering Hainan Vocational University of Science and Technology Hainan Haikou China The Smart City Research Institute of China Electronics Technology Group Corporation Guangdong Shenzhen China
With the deepening reform and construction of the police system, it is imperative to fully utilize technologies such as artificial intelligence, big data, blockchain, cloud computing, and the Internet of Things to rap... 详细信息
来源: 评论
Digital Twin-based Dynamic Resource Provisioning Using Deep Q-Network on 6G-enabled Mobile Edge Networks  17
Digital Twin-based Dynamic Resource Provisioning Using Deep ...
收藏 引用
17th international conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Alex, Suja A. Singh, Neha Adhikari, Mainak St. Xavier's Catholic College of Engineering Department of Information Technology Nagercoil India Indian Institute of Information Technology Lucknow Department of Computer Science Lucknow India Indian Institute of Science Education and Research Thiruvananthapuram School of Data Science Thiruvananthapuram India
The advancement of Digital Twin (DT) technology has enabled the creation of digital replicas of physical entitics, significantly enhancing the functionality and performance of mobile networks. However, this innovative... 详细信息
来源: 评论
Assessment and Management of Security Risks in Accounting information Systems from a Lifecycle Perspective
Assessment and Management of Security Risks in Accounting In...
收藏 引用
2024 international conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Gong, Lijiahui Business School Wuhan Huaxia Institute of Technology Wuhan430223 China
As the carrier of information assets, the importance of accounting information systems is increasing with the development of informatization. Meanwhile, information systems are facing more security threats. How to eff... 详细信息
来源: 评论