咨询与建议

限定检索结果

文献类型

  • 192,061 篇 会议
  • 1,982 册 图书
  • 1,432 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,486 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,804 篇 工学
    • 86,472 篇 计算机科学与技术...
    • 63,731 篇 软件工程
    • 30,508 篇 信息与通信工程
    • 14,627 篇 控制科学与工程
    • 12,595 篇 电气工程
    • 10,397 篇 生物工程
    • 8,337 篇 电子科学与技术(可...
    • 7,687 篇 机械工程
    • 7,412 篇 生物医学工程(可授...
    • 5,718 篇 仪器科学与技术
    • 5,150 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,546 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 3,908 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,385 篇 理学
    • 23,681 篇 数学
    • 11,208 篇 生物学
    • 9,436 篇 物理学
    • 7,278 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,055 篇 化学
  • 32,591 篇 管理学
    • 19,841 篇 管理科学与工程(可...
    • 15,271 篇 图书情报与档案管...
    • 9,779 篇 工商管理
  • 6,833 篇 医学
    • 5,812 篇 临床医学
    • 5,439 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,395 篇 法学
    • 4,402 篇 社会学
  • 3,677 篇 经济学
    • 3,621 篇 应用经济学
  • 3,267 篇 教育学
  • 2,634 篇 农学
  • 1,510 篇 文学
  • 537 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,530 篇 cloud computing
  • 6,209 篇 computational mo...
  • 4,703 篇 information tech...
  • 4,658 篇 feature extracti...
  • 4,063 篇 accuracy
  • 3,593 篇 training
  • 3,532 篇 data mining
  • 3,490 篇 computer archite...
  • 3,412 篇 image coding
  • 3,278 篇 internet of thin...
  • 3,167 篇 security
  • 2,984 篇 servers
  • 2,953 篇 mobile computing
  • 2,912 篇 computer science
  • 2,892 篇 protocols
  • 2,682 篇 machine learning
  • 2,666 篇 deep learning
  • 2,572 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,463 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 558 篇 institute of com...
  • 384 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 227 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 146 篇 lovely professio...
  • 145 篇 department of co...
  • 143 篇 school of comput...
  • 132 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 107 篇 school of inform...
  • 102 篇 state key labora...
  • 102 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 99 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 xiao liu
  • 46 篇 zhang lin
  • 44 篇 bastieri d.
  • 43 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,790 篇 英文
  • 3,339 篇 其他
  • 1,913 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195487 条 记 录,以下是4791-4800 订阅
排序:
Research on DoS Attack Traffic Detection for Industrial Control System  20
Research on DoS Attack Traffic Detection for Industrial Cont...
收藏 引用
20th international Computer conference on Wavelet Active Media technology and information Processing, ICCWAMTIP 2023
作者: Chen, Hong Liu, Sisi Yuan, Xiaoshu Huang, Yuanyuan Feng, Li Energy Equipment Cyber Security Key Laboratory of Sichuan Province Chengdu610016 China Chengdu University of Information Technology China
The rapid development of the Internet has brought convenience to the industrial control system, but also brought serious security problems of network attacks. DoS attack is the most common network traffic attack. The ... 详细信息
来源: 评论
Continuous-Variable Quantum K-Means Clustering with Photonic Gaussian States  15
Continuous-Variable Quantum K-Means Clustering with Photonic...
收藏 引用
15th international conference on information and Communication technology Convergence, ICTC 2024
作者: Ul Haque, Abrar Cho, Jinsung Shin, Hyundong Kyung Hee University Department of Electronics and Information Convergence Engineering Korea Republic of
This paper presents a novel approach to the K-Means clustering algorithm using continuous variable (CV) quantum computing, specifically leveraging Gaussian states on quantum photonic hardware. We implement the algorit... 详细信息
来源: 评论
Intelligent Recognition of Athlete's Erroneous Movements in Sports Training Under Artificial Intelligence technology  3
Intelligent Recognition of Athlete's Erroneous Movements in ...
收藏 引用
3rd IEEE international conference on Distributed computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Xie, Huaicheng Xu, Liyu Chongqing College Of Architecture And Technology Chongqing China Chongqing Electronic Information College Chongqing China
To address the challenge of inaccuracies in human assessment of movement accuracy, the author suggests incorporating artificial intelligence technology into sports training. Leveraging the advancements in computer vis... 详细信息
来源: 评论
Research on UAV Fixed-Point Delivery Based on Dynamic Model
Research on UAV Fixed-Point Delivery Based on Dynamic Model
收藏 引用
2023 international conference on Applied Physics and computing, ICAPC 2023
作者: Liu, Chuang Yang, Jiqiang Anhui University of Science and Technology Huainan China
With the continuous development of UAV technology, UAV has been widely used in many fields, and obtaining accurate position information and using a flight control system with good performance is an important condition... 详细信息
来源: 评论
Customer Relationship Management in the Digital Age by Implementing Blockchain for Enhanced Data Security and Customer Trust  2
Customer Relationship Management in the Digital Age by Imple...
收藏 引用
2nd international conference on Disruptive Technologies, ICDT 2024
作者: Saxena, Mudit Senthilkumar, N. Girimurugan, B. Ljb Anuhya, B.A.P. Hasan, Kesineni Sai Sanjay College of Computing Sciences and Information Technology Teerthanker Mahaveer University Moradabad India School of Management Studies Bannari Amman Institute of Technology Sathyamangalam India Business School Koneru Lakshmaiah Education Foundation A.P. Vaddeswaram522302 India
Using Blockchain in conjunction with industry leaders in digital marketing and technology might reimagine how customers interact with businesses. If businesses move quickly to take advantage of this potentially transf... 详细信息
来源: 评论
Data security and Integrity in Cloud computing  2
Data security and Integrity in Cloud Computing
收藏 引用
2nd international conference for Advancement in technology, ICONAT 2023
作者: Hasan, Muhammad Zulkifl Hussain, Muhammad Zunnurain Mubarak, Zaima Siddiqui, Adeel Ahmad Qureshi, Ali Moiz Ismail, Imran University of Central Punjab Faculty of Computer Science and Information Technology India Bahria University Department of Computer Science Lahore Campus Pakistan National College of Business Administration and Economics Department of Computer Science Lahore Pakistan National College of Business Administration & Economics Department of Computer Science DHA Campus Lahore Pakistan Punjab Board of Technical Education Lahore Pakistan
Cloud computing security refers to data protection, while data integrity refers to the reliability of the data. Integrity and security of data are not the same things. Therefore, both of them are very important in the... 详细信息
来源: 评论
Investigating Fault-Tolerance Techniques for Protecting Cyber-Physical Systems  2
Investigating Fault-Tolerance Techniques for Protecting Cybe...
收藏 引用
2nd international conference on Advances in Computation, Communication and information technology, ICAICCIT 2024
作者: Jaggi, Arjun Takkalapally, Prashamsh Rajaram, Shravan Kumar Hudani, Karim Jiwani, Nasmin Natarajan, Yuvaraj HCLTech San DiegoCA United States Department of Engineering Computing and Mathematical Sciences Lewis University United States Microsoft Inc. CharlotteNC United States Tampa FL United States Dept. of Information Technology University of The Cumberlands WilliamsburgKY United States Department of Computer Science Engineering Sri Shakthi Institute of Engineering and Technology Tamil Nadu Coimbatore India
Cyber-physical systems (CPSs) gift a unique set of protection demanding situations because they rely on a huge and various set of digital additives. To protect CPSs from cyber-attacks, fault-tolerance techniques, incl... 详细信息
来源: 评论
Design and Development of Real-Time Image Based Fire Detection Using OpenCV and HSV
Design and Development of Real-Time Image Based Fire Detecti...
收藏 引用
2024 international conference on Advances in computing Research on Science Engineering and technology, ACROSET 2024
作者: Bothraa, Raajjhesh Ahire, Darsh Bhadange, Rutuja Temkar, Rutvij Mane, Mayuri Jamdhade, Shweta University of Mumbai Departement of Information Technology Mumbai India
Nowadays fire detection and recognition are one of the major securities and security region for saving human life. Concern to this we are going to propose a new model for early detection and recognition of the fire fo... 详细信息
来源: 评论
Enhancing Underwater Mine Detection Accuracy through Sonar Signal Analysis  15
Enhancing Underwater Mine Detection Accuracy through Sonar S...
收藏 引用
15th international conference on Advances in computing, Control, and Telecommunication Technologies, ACT 2024
作者: Deshpande, Deepali Vayadande, Kuldeep Thopate, Kaushalya Kulkarni, Isha Deshpande, Neha Jadhav, Pranav Kulkarni, Sai Sagarkar, Sayali Department of Information Technology Vishwakarma Institute of Technology Maharashtra Pune India
Naval defense systems employ underwater mines as a critical measure to bolster maritime security. While these mines play a pivotal role in safeguarding vital waters, their deployment introduces a dual challenge: ensur... 详细信息
来源: 评论
Simulation of Blockchain information Protection Prediction Model Based on Machine Learning  2
Simulation of Blockchain Information Protection Prediction M...
收藏 引用
2nd international conference on Artificial Intelligence and Autonomous Robot Systems, AIARS 2023
作者: Yang, Chengchen Yuan, Pengfei Feng, Zicheng Chengdu University of Technology Chengdu610000 China
With the rapid development of blockchain, blockchain-based outsourcing computing has been widely used. Outsourcing computing allows users with limited resources to outsource complex computing to those with powerful re... 详细信息
来源: 评论