咨询与建议

限定检索结果

文献类型

  • 191,938 篇 会议
  • 1,973 册 图书
  • 1,433 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,355 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,927 篇 工学
    • 86,613 篇 计算机科学与技术...
    • 63,779 篇 软件工程
    • 30,642 篇 信息与通信工程
    • 14,723 篇 控制科学与工程
    • 12,639 篇 电气工程
    • 10,398 篇 生物工程
    • 8,351 篇 电子科学与技术(可...
    • 7,746 篇 机械工程
    • 7,401 篇 生物医学工程(可授...
    • 5,717 篇 仪器科学与技术
    • 5,138 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,547 篇 安全科学与工程
    • 4,430 篇 网络空间安全
    • 3,909 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,474 篇 理学
    • 23,768 篇 数学
    • 11,210 篇 生物学
    • 9,444 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,280 篇 系统科学
    • 4,058 篇 化学
  • 32,618 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,303 篇 图书情报与档案管...
    • 9,771 篇 工商管理
  • 6,880 篇 医学
    • 5,810 篇 临床医学
    • 5,438 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,399 篇 法学
    • 4,407 篇 社会学
  • 3,675 篇 经济学
    • 3,619 篇 应用经济学
  • 3,255 篇 教育学
  • 2,631 篇 农学
  • 1,510 篇 文学
  • 536 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,521 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,700 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,537 篇 data mining
  • 3,485 篇 computer archite...
  • 3,413 篇 image coding
  • 3,270 篇 internet of thin...
  • 3,168 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,915 篇 computer science
  • 2,890 篇 protocols
  • 2,698 篇 machine learning
  • 2,680 篇 deep learning
  • 2,549 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 556 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 224 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 134 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 98 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,586 篇 英文
  • 3,413 篇 其他
  • 1,975 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195356 条 记 录,以下是281-290 订阅
排序:
Research on Industrial Control System Security Protection Based on Cryptographic technology  24
Research on Industrial Control System Security Protection Ba...
收藏 引用
2nd international conference on Artificial Intelligence, Systems and Network Security, AISNS 2024
作者: Zhou, Junping Zhang, Chen Gao, Fei Wang, Sai Chengdu Weishitong Information Security Technology Co. Ltd Beijing China China Electric Power Research Institute Beijing China CNNC Control System Engineering Co. Ltd Beijing China
With the application of new technologies such as the Internet of Things, cloud computing, and big data, industrial control systems are increasingly becoming digitalized, networked, and intelligent, which injects vital... 详细信息
来源: 评论
Overview of spatial data management methods based on digital twins for airport construction  24
Overview of spatial data management methods based on digital...
收藏 引用
8th international conference on Electronic information technology and Computer Engineering, EITCE 2024
作者: Sang, Hongxia Liang, Congshan Nie, Liangxue Zhao, Zihan Wang, Han Academy of Military Sciences Beijing China Geovis Technology Co. Ltd. Beijing China 93125 troops of PLA Jiangsu Xuzhou China
The command and resource scheduling capabilities of the airport serve as crucial support for rapid take-off and landing, as well as efficient aircraft operations, the future intelligent airport scheduling poses new re... 详细信息
来源: 评论
Debunking technology and Efforts in Combating Dis/Misinformation  19
Debunking Technology and Efforts in Combating Dis/Misinforma...
收藏 引用
19th international conference on Ubiquitous information Management and Communication, IMCOM 2025
作者: Luthfia, Amia Muslikhin, Muslikhin Prahassacitta, Vidya Wahyuningtyas, Bhernadetta Pravita Condrobimo, Andreas Raharto Communication Department Bina Nusantara University Jakarta Indonesia Business Law Department Bina Nusantara University Jakarta Indonesia Information Systems Department Bina Nusantara University Jakarta Indonesia
The pervasive spread of dis/misinformation in Indonesia, particularly via social media and instant messaging applications, has emerged as a major concern due to its societal challenges. This study investigates the rol... 详细信息
来源: 评论
Edge Node Load Balancing Using Game Theoretic Approaches  5
Edge Node Load Balancing Using Game Theoretic Approaches
收藏 引用
5th international conference on Emerging Systems and Intelligent computing, ESIC 2025
作者: Haldar, Rajdeep Rooj, Saptadip Sharma, Neeraj Das, Ritambhar Mandal, Arnab Bandyopadhyay, Anjan Dept. of Information Technology Bhubaneswar India Lovely Professional University School of Computer Science and Engineering Jalandhar India School of Computer Engineering Bhubaneswar India
This paper explores the application of game theoretic approaches to load balancing across edge nodes within distributed computing systems. Focusing on a non-cooperative game model, we aim to enhance system efficiency ... 详细信息
来源: 评论
Compressed VGGNet for Automatic COVID-19 Disease Detection from CT Scan Images  8th
Compressed VGGNet for Automatic COVID-19 Disease Detection f...
收藏 引用
8th IFIP TC 12 international conference on Computer, Communication and Signal Processing, ICCCSP 2024
作者: Vinothini, R. Niranjana, G. Dhamanti, Inge Lailiyah, Syifa’ul Yakub, Fitri Department of Computer Science and Engineering SRM Institute of Science and Technology Kattankulathur 603203 India Department of Computing Technologies School of Computing SRM Institute of Science and Technology Kattankulathur 603203 India Department of Health Policy and Administration Faculty of Public Health Universitas Airlangga Surabaya Indonesia Faculty of Health Medicine and Life Sciences Universitas Airlangga East Java Indonesia Electronic System Engineering Department Malaysia-Japan International Institute of Technology Kuala Lumpur Malaysia
Millions of people across the globe were affected by this rapidly spreading disease by the year 2020. Contamination of the respiratory system results from contracting COVID-19. Nonetheless, establishing a conclusive d... 详细信息
来源: 评论
Bridging Theory and Practice in Outcome-Based Assessment: Developing a Web Application for Learning Outcome Alignment  14
Bridging Theory and Practice in Outcome-Based Assessment: De...
收藏 引用
14th international conference on Educational and information technology, ICEIT 2025
作者: Alhazmi, Abdulsalam K. University of Science and Technology Faculty of Engineering & Computing Aden Yemen
Assessment remains a cornerstone of the educational process, with standardized testing often serving as a primary method for evaluating learning. However, as pedagogical approaches continue to evolve, Outcome-Based As... 详细信息
来源: 评论
Comparison of AWS and AZURE in Prototype for Automated Selected Security Controls
Comparison of AWS and AZURE in Prototype for Automated Selec...
收藏 引用
20th international conference on Cyber Warfare and Security, ICCWS 2025
作者: Maimela, Mpho Erick van Vuuren, Joey Jansen Moeti, Michael Tshwane University of Technology South Africa
The cloud computing phenomenon has achieved global popularity, with enterprises increasingly relying on cloud services for day-to-day business operations. However, the rapid dissemination of new malicious code variant... 详细信息
来源: 评论
Ethical Implications of WannaCry: A Cybersecurity Dilemma
Ethical Implications of WannaCry: A Cybersecurity Dilemma
收藏 引用
20th international conference on Cyber Warfare and Security, ICCWS 2025
作者: Osamor, Jude Odum, Jane Iwendi, Celestine Olajide, Funminiyi Peter-Osamor, Isaac Onyenagubom, Victor Ayodele, Innocent Bristol United Kingdom School of Computing University of Georgia United States School of Creative Technologies University of Bolton United Kingdom School of Computer Science & Engineering University of Westminster London United Kingdom University of Lagos Akoka Nigeria Department of Computing Teeside University United Kingdom The Department of Engineering & Computer Science University of Hertfordshire United Kingdom
The WannaCry ransomware attack of May 2017 marked a critical turning point in cybersecurity history, prompting profound ethical discussions about software vulnerability management. This comprehensive analysis examines... 详细信息
来源: 评论
A Game Centric E-Learning Application For Preschoolers  5
A Game Centric E-Learning Application For Preschoolers
收藏 引用
5th international conference on Advanced Research in computing, ICARC 2025
作者: Kulasekara, D.A.M.N. Nipun, P.G.I. Dombawela, H.M.D.L.B.A. Manilka, G.S. Kodagoda, N. De Silva, D.I. Sri Lanka Institute of Information Technology Department of Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka
This research explores the potential of advanced technologies such as pose detection (PD), augmented reality (AR), object detection (OD), and voice recognition (VR) in creating a game-centric e-learning application fo... 详细信息
来源: 评论
Federated Learning for Privacy Preserving Intelligent Healthcare Application to Breast Cancer Detection  25
Federated Learning for Privacy Preserving Intelligent Health...
收藏 引用
26th international conference on Distributed computing and Networking, ICDCN 2025
作者: Amritanjali Gupta, Ragav Birla Institute of Technology Mesra Ranchi Ranchi India Sri Mata Vaishno Devi University Jammu Katra India
Health data used in building intelligent medical care systems contain sensitive personal information of the patients. Distributed storage, processing and sharing of data poses threats to the data privacy and security.... 详细信息
来源: 评论