咨询与建议

限定检索结果

文献类型

  • 191,826 篇 会议
  • 1,982 册 图书
  • 1,430 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,249 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,799 篇 工学
    • 86,467 篇 计算机科学与技术...
    • 63,729 篇 软件工程
    • 30,507 篇 信息与通信工程
    • 14,625 篇 控制科学与工程
    • 12,594 篇 电气工程
    • 10,397 篇 生物工程
    • 8,337 篇 电子科学与技术(可...
    • 7,687 篇 机械工程
    • 7,412 篇 生物医学工程(可授...
    • 5,718 篇 仪器科学与技术
    • 5,150 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,546 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 3,908 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,383 篇 理学
    • 23,679 篇 数学
    • 11,208 篇 生物学
    • 9,436 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,055 篇 化学
  • 32,589 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,270 篇 图书情报与档案管...
    • 9,779 篇 工商管理
  • 6,833 篇 医学
    • 5,812 篇 临床医学
    • 5,439 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,395 篇 法学
    • 4,402 篇 社会学
  • 3,677 篇 经济学
    • 3,621 篇 应用经济学
  • 3,267 篇 教育学
  • 2,634 篇 农学
  • 1,510 篇 文学
  • 537 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,517 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,701 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,531 篇 data mining
  • 3,485 篇 computer archite...
  • 3,411 篇 image coding
  • 3,269 篇 internet of thin...
  • 3,163 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,912 篇 computer science
  • 2,890 篇 protocols
  • 2,671 篇 machine learning
  • 2,667 篇 deep learning
  • 2,550 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 629 篇 university of ch...
  • 554 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 223 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 133 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 99 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 46 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,553 篇 英文
  • 3,339 篇 其他
  • 1,913 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195250 条 记 录,以下是4761-4770 订阅
排序:
Dynamic Spectrum Access in Cognitive Radio Networks: A Game-Theoretic Approach  15
Dynamic Spectrum Access in Cognitive Radio Networks: A Game-...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Dhabliya, Dharmesh Vigenesh, M. Minhas, Deepak Shalini, M. Das, Sidhant Renukajyothi, S. Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Karpagam Academy of Higher Education Department of Computer Science Engineering Coimbatore641021 India Chitkara University Institute of Engineering and Technology Chitkara University Centre for Interdisciplinary Research for Business and Technology Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai127 India Chitkara University Chitkara Centre for Research and Development Himachal Pradesh 174103 India School of Sciences Department of Biotechnology and Genetics Karnataka Bangalore India
Cognitive radio networks (CRNs) are a promising technology which could offer better spectrum efficiency and utilization via permitting dynamic spectrum get right of entry to (DSA). Game idea has been an increasing num... 详细信息
来源: 评论
Research on data lakehouse architecture for grid business data  3
Research on data lakehouse architecture for grid business da...
收藏 引用
3rd international conference on Energy, Power and Electrical technology, ICEPET 2024
作者: Meng, Yu Li, Qiang Wang, Ziheng State Grid Information and Telecommunication Group Co. Ltd. Beijing100052 China
With the development of national informatization construction and big data technology, the traditional database design can no longer support the efficient storage and real-time analysis of massive data, and it is diff... 详细信息
来源: 评论
GMBox: Box-Supervised Remote Sensing Images Instance Segmentation Based on Multi-Scale Gradient Prior Fusion and Mask Correction  11
GMBox: Box-Supervised Remote Sensing Images Instance Segment...
收藏 引用
11th international conference on information Systems and computing technology, ISCTech 2023
作者: Qi, Ying Hou, Wei Yang, Liuqing Yan, Yiming Harbin Engineering University College of Information and Communication Engineering Harbin China Harbin Aerospace Star Data System Science and Technology Co. Ltd. Harbin China
In the field of remote sensing, instance segmentation of buildings helps to accurately extract their position, shape, and size information. However, instance segmentation requires pixel by pixel annotation, which cons... 详细信息
来源: 评论
Intelligent Recognition of Athlete's Erroneous Movements in Sports Training Under Artificial Intelligence technology  3
Intelligent Recognition of Athlete's Erroneous Movements in ...
收藏 引用
3rd IEEE international conference on Distributed computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Xie, Huaicheng Xu, Liyu Chongqing College Of Architecture And Technology Chongqing China Chongqing Electronic Information College Chongqing China
To address the challenge of inaccuracies in human assessment of movement accuracy, the author suggests incorporating artificial intelligence technology into sports training. Leveraging the advancements in computer vis... 详细信息
来源: 评论
Continuous-Variable Quantum K-Means Clustering with Photonic Gaussian States  15
Continuous-Variable Quantum K-Means Clustering with Photonic...
收藏 引用
15th international conference on information and Communication technology Convergence, ICTC 2024
作者: Ul Haque, Abrar Cho, Jinsung Shin, Hyundong Kyung Hee University Department of Electronics and Information Convergence Engineering Korea Republic of
This paper presents a novel approach to the K-Means clustering algorithm using continuous variable (CV) quantum computing, specifically leveraging Gaussian states on quantum photonic hardware. We implement the algorit... 详细信息
来源: 评论
Research on DoS Attack Traffic Detection for Industrial Control System  20
Research on DoS Attack Traffic Detection for Industrial Cont...
收藏 引用
20th international Computer conference on Wavelet Active Media technology and information Processing, ICCWAMTIP 2023
作者: Chen, Hong Liu, Sisi Yuan, Xiaoshu Huang, Yuanyuan Feng, Li Energy Equipment Cyber Security Key Laboratory of Sichuan Province Chengdu610016 China Chengdu University of Information Technology China
The rapid development of the Internet has brought convenience to the industrial control system, but also brought serious security problems of network attacks. DoS attack is the most common network traffic attack. The ... 详细信息
来源: 评论
Customer Relationship Management in the Digital Age by Implementing Blockchain for Enhanced Data Security and Customer Trust  2
Customer Relationship Management in the Digital Age by Imple...
收藏 引用
2nd international conference on Disruptive Technologies, ICDT 2024
作者: Saxena, Mudit Senthilkumar, N. Girimurugan, B. Ljb Anuhya, B.A.P. Hasan, Kesineni Sai Sanjay College of Computing Sciences and Information Technology Teerthanker Mahaveer University Moradabad India School of Management Studies Bannari Amman Institute of Technology Sathyamangalam India Business School Koneru Lakshmaiah Education Foundation A.P. Vaddeswaram522302 India
Using Blockchain in conjunction with industry leaders in digital marketing and technology might reimagine how customers interact with businesses. If businesses move quickly to take advantage of this potentially transf... 详细信息
来源: 评论
Investigating Fault-Tolerance Techniques for Protecting Cyber-Physical Systems  2
Investigating Fault-Tolerance Techniques for Protecting Cybe...
收藏 引用
2nd international conference on Advances in Computation, Communication and information technology, ICAICCIT 2024
作者: Jaggi, Arjun Takkalapally, Prashamsh Rajaram, Shravan Kumar Hudani, Karim Jiwani, Nasmin Natarajan, Yuvaraj HCLTech San DiegoCA United States Department of Engineering Computing and Mathematical Sciences Lewis University United States Microsoft Inc. CharlotteNC United States Tampa FL United States Dept. of Information Technology University of The Cumberlands WilliamsburgKY United States Department of Computer Science Engineering Sri Shakthi Institute of Engineering and Technology Tamil Nadu Coimbatore India
Cyber-physical systems (CPSs) gift a unique set of protection demanding situations because they rely on a huge and various set of digital additives. To protect CPSs from cyber-attacks, fault-tolerance techniques, incl... 详细信息
来源: 评论
Research on UAV Fixed-Point Delivery Based on Dynamic Model
Research on UAV Fixed-Point Delivery Based on Dynamic Model
收藏 引用
2023 international conference on Applied Physics and computing, ICAPC 2023
作者: Liu, Chuang Yang, Jiqiang Anhui University of Science and Technology Huainan China
With the continuous development of UAV technology, UAV has been widely used in many fields, and obtaining accurate position information and using a flight control system with good performance is an important condition... 详细信息
来源: 评论
Data security and Integrity in Cloud computing  2
Data security and Integrity in Cloud Computing
收藏 引用
2nd international conference for Advancement in technology, ICONAT 2023
作者: Hasan, Muhammad Zulkifl Hussain, Muhammad Zunnurain Mubarak, Zaima Siddiqui, Adeel Ahmad Qureshi, Ali Moiz Ismail, Imran University of Central Punjab Faculty of Computer Science and Information Technology India Bahria University Department of Computer Science Lahore Campus Pakistan National College of Business Administration and Economics Department of Computer Science Lahore Pakistan National College of Business Administration & Economics Department of Computer Science DHA Campus Lahore Pakistan Punjab Board of Technical Education Lahore Pakistan
Cloud computing security refers to data protection, while data integrity refers to the reliability of the data. Integrity and security of data are not the same things. Therefore, both of them are very important in the... 详细信息
来源: 评论