咨询与建议

限定检索结果

文献类型

  • 191,938 篇 会议
  • 1,973 册 图书
  • 1,433 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,355 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,927 篇 工学
    • 86,613 篇 计算机科学与技术...
    • 63,779 篇 软件工程
    • 30,642 篇 信息与通信工程
    • 14,723 篇 控制科学与工程
    • 12,639 篇 电气工程
    • 10,398 篇 生物工程
    • 8,351 篇 电子科学与技术(可...
    • 7,746 篇 机械工程
    • 7,401 篇 生物医学工程(可授...
    • 5,717 篇 仪器科学与技术
    • 5,138 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,547 篇 安全科学与工程
    • 4,430 篇 网络空间安全
    • 3,909 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,474 篇 理学
    • 23,768 篇 数学
    • 11,210 篇 生物学
    • 9,444 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,280 篇 系统科学
    • 4,058 篇 化学
  • 32,618 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,303 篇 图书情报与档案管...
    • 9,771 篇 工商管理
  • 6,880 篇 医学
    • 5,810 篇 临床医学
    • 5,438 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,399 篇 法学
    • 4,407 篇 社会学
  • 3,675 篇 经济学
    • 3,619 篇 应用经济学
  • 3,255 篇 教育学
  • 2,631 篇 农学
  • 1,510 篇 文学
  • 536 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,521 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,700 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,537 篇 data mining
  • 3,485 篇 computer archite...
  • 3,413 篇 image coding
  • 3,270 篇 internet of thin...
  • 3,168 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,915 篇 computer science
  • 2,890 篇 protocols
  • 2,698 篇 machine learning
  • 2,680 篇 deep learning
  • 2,549 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 556 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 224 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 134 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 98 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,586 篇 英文
  • 3,413 篇 其他
  • 1,975 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195356 条 记 录,以下是4731-4740 订阅
排序:
Research on reactive power optimization algorithm of power system based on improved genetic algorithm  3
Research on reactive power optimization algorithm of power s...
收藏 引用
3rd international conference on Industrial Informatics - computing technology, Intelligent technology, Industrial information Integration, ICIICII 2017
作者: Siyuan, Chang Suwen, Zhang Wuhan University of Technology School of Automation Wuhan China
Reactive power optimization of power system is an effective means to ensure the safety and economic operation of the system. It is an important measure to reduce the power loss and improve the power quality. In this p... 详细信息
来源: 评论
Multi-channel Speech coding Based on Phase Alignment and Energy Ratio of Internal Channels.
Multi-channel Speech Coding Based on Phase Alignment and Ene...
收藏 引用
2021 IEEE international conference on Signal Processing, Communications and computing, ICSPCC 2021
作者: Zhu, Jinru Bao, Changchun Beijing University of Technology Speech and Audio Signal Processing Laboratory Faculty of Information Technology Beijing100124 China
In the paper, a new multi-channel speech coding method is proposed by extracting spatial cue parameters called inter-channel time difference (ICTD) and inter-channel energy ratio (ICER). Based on these two spatial cue... 详细信息
来源: 评论
An Encryption Scheme Using DNA technology
An Encryption Scheme Using DNA Technology
收藏 引用
3rd international conference on Bio-Inspired computing
作者: Cui, Guangzhao Qin, Limin Wang, Yanfeng Zhang, Xuncai Zhengzhou Univ Light Ind Coll Elect Informat Engn Zhengzhou 450002 Peoples R China Huazhong Univ Sci & Technol Dept Control Sci & Engn Wuhan 430074 Peoples R China
The vast parallelism, exceptional energy efficiency and extraordinary information density inherent in DNA molecules are being explored for computing, data storage and cryptography. DNA cryptography is a new field of c... 详细信息
来源: 评论
Run-length chain coding and shape's moment computations on arrays with reconfigurable optical buses
Run-length chain coding and shape's moment computations on a...
收藏 引用
international conference on Parallel Processing, ICPP 2001
作者: Wu, Chin-Hsiung Horng, Shi-Jinn Chen, Yi-Wen Yu, Chen-Kuo Dept. of Information Management Chinese Naval Academy Kaohsiung Taiwan Dept. of Electrical Engineering National Taiwan University of Science and Technology Taipei Taiwan NJTC Taiwan
The main contribution of this paper is the design of several efficient algorithms for modified run-length chain coding and for computing shape's moments on arrays with reconfigurable optical buses. We first propos... 详细信息
来源: 评论
Canonical Huffman coding for Image Compression  3
Canonical Huffman Coding for Image Compression
收藏 引用
3rd IEEE international conference on computing, Communication and Security (ICCCS)
作者: Khaitu, Shree Ram Panday, Sanjeeb Prasad Purbanchal Univ Khwopa Engn Coll Dept Comp Engn Bhaktapur Nepal Tribhuvan Univ Inst Engn Dept Elect & Comp Engn Pulchowk Campus Kathmandu Nepal
With the rapid growth of multimedia technology, sharing of multimedia components have become a common practice. Thus, compression of image has become an integral approach that motivates the image compression for the e... 详细信息
来源: 评论
Special Section: Scalable information systems
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE international JOURNAL OF GRID computing THEORY METHODS AND APPLICATIONS 2009年 第1期25卷 51-52页
作者: Lee, Wang-Chien Xu, Jianliang Li, Jianzhong Silvestri, Fabrizio Penn State Univ State Coll PA 16801 USA Hong Kong Baptist Univ Hong Kong Hong Kong Peoples R China Harbin Inst Technol Harbin Peoples R China
As data and knowledge volumes keep increasing, and global means for information dissemination continues to diversify, new methods, modeling paradigms and structures are needed to efficiently support the mounting scala... 详细信息
来源: 评论
Fuzzy Image Segmentation combing ring and elliptic shaped clustering algorithms
Fuzzy Image Segmentation combing ring and elliptic shaped cl...
收藏 引用
ITCC 2005 - international conference on information technology: coding and computing
作者: Ali, M. Ameer Dooley, Laurence S. Karmakar, Gour C. Gippsland School of Computing and Information Technology Monash University Australia
Results from any existing clustering algorithm that are used for segmentation are highly sensitive to features that limit their generalization. Shape is one important attribute of an object. The detection and separati... 详细信息
来源: 评论
One full-diversity coding communication network transmission scheme for two users and four antennas
One full-diversity coding communication network transmission...
收藏 引用
international conference on Multimedia, Communication and computing Application, MCCA 2014
作者: Zhang, G.Q. Zou, M.Q. Li, X.H. Zhang, H.W. School of Electronic and Information Engineering Anhui University Hefei China
To achieve high-efficiency and high-reliable data transfer between each pair of users in multiinput multi-output (MIMO) wireless communication, researchers show concerns for communication system that has become a key ... 详细信息
来源: 评论
DENNC: A Wireless Malicious Detection Approach based on Network coding
DENNC: A Wireless Malicious Detection Approach based on Netw...
收藏 引用
Int Joint conference of 10th IEEE Int Conf on Trust, Security and Privacy in computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and technology (FCST)
作者: Song, Hong Xiao, Xiao Wang, Weiping Yang, Luming Cent S Univ Sch Informat Sci & Engn Changsha 410083 Hunan Peoples R China
In wireless networks, communications among nodes are vulnerable to attacks launched by malicious nodes. Presently, Existing malicious node detection approaches either need special hardware or depend on node listening,... 详细信息
来源: 评论
A fast intra-frame prediction algorithm based on characteristic of 4×4 sub-block for H.264/AVC
A fast intra-frame prediction algorithm based on characteris...
收藏 引用
2nd international conference on Innovative computing, information and Control, ICICIC 2007
作者: Kebin, Jia Zhuoyi, Lv Jing, Xie Pengyu, Liu Qing, Zhu School of Electronic Information and Control Engineering Beijing University of Technology Beijing 100022 China
H.264/AVC is the newest video coding standard with high compression efficiency. Because it will take a long time to code with extremely complex algorithm, it can not achieve real-time application. In this paper, accor... 详细信息
来源: 评论