咨询与建议

限定检索结果

文献类型

  • 192,061 篇 会议
  • 1,982 册 图书
  • 1,432 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,486 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,804 篇 工学
    • 86,472 篇 计算机科学与技术...
    • 63,731 篇 软件工程
    • 30,508 篇 信息与通信工程
    • 14,627 篇 控制科学与工程
    • 12,595 篇 电气工程
    • 10,397 篇 生物工程
    • 8,337 篇 电子科学与技术(可...
    • 7,687 篇 机械工程
    • 7,412 篇 生物医学工程(可授...
    • 5,718 篇 仪器科学与技术
    • 5,150 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,546 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 3,908 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,385 篇 理学
    • 23,681 篇 数学
    • 11,208 篇 生物学
    • 9,436 篇 物理学
    • 7,278 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,055 篇 化学
  • 32,591 篇 管理学
    • 19,841 篇 管理科学与工程(可...
    • 15,271 篇 图书情报与档案管...
    • 9,779 篇 工商管理
  • 6,833 篇 医学
    • 5,812 篇 临床医学
    • 5,439 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,395 篇 法学
    • 4,402 篇 社会学
  • 3,677 篇 经济学
    • 3,621 篇 应用经济学
  • 3,267 篇 教育学
  • 2,634 篇 农学
  • 1,510 篇 文学
  • 537 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,530 篇 cloud computing
  • 6,209 篇 computational mo...
  • 4,703 篇 information tech...
  • 4,658 篇 feature extracti...
  • 4,063 篇 accuracy
  • 3,593 篇 training
  • 3,532 篇 data mining
  • 3,490 篇 computer archite...
  • 3,412 篇 image coding
  • 3,278 篇 internet of thin...
  • 3,167 篇 security
  • 2,984 篇 servers
  • 2,953 篇 mobile computing
  • 2,912 篇 computer science
  • 2,892 篇 protocols
  • 2,682 篇 machine learning
  • 2,666 篇 deep learning
  • 2,572 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,463 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 558 篇 institute of com...
  • 384 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 227 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 146 篇 lovely professio...
  • 145 篇 department of co...
  • 143 篇 school of comput...
  • 132 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 107 篇 school of inform...
  • 102 篇 state key labora...
  • 102 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 99 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 xiao liu
  • 46 篇 zhang lin
  • 44 篇 bastieri d.
  • 43 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,790 篇 英文
  • 3,339 篇 其他
  • 1,913 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195487 条 记 录,以下是4831-4840 订阅
排序:
Research on the Application of Power System Cryptography Based on Quantum Key
Research on the Application of Power System Cryptography Bas...
收藏 引用
2024 international conference on Innovative Design and Intelligent Manufacturing, IDIM 2024
作者: Dong, Wu Liu, Xu Peng, Linyu Liu, Kang Peng, Dili Wang, Tao Shi, Ji Zuo, Jun Power Dispatching Control Center of Guizhou Power Grid Guiyang550002 China
The research and test of the security protection technology of distribution network quantum encryption information based on 5G multi access edge computing applies the communication technology and quantum encryption te... 详细信息
来源: 评论
A Review on Blockchain Based Security in Education  3
A Review on Blockchain Based Security in Education
收藏 引用
3rd international conference on Pervasive computing and Social Networking, ICPCSN 2023
作者: Sheela Rani, P. Kaveri, C. Nivedha, M. Niveda, S. Lakshi, K. Sandhiya, R. Panimalar Engineering College Information Technology Dept Chennai India
Blockchain technology is very well positioned, and the education industry may greatly benefit from blockchain technology, which can be used for digital credentials, academic records, learning management systems, fundi... 详细信息
来源: 评论
Enhanced Facial Emotion Detection Using Convolutional Neural Networks and Attention Mechanisms  5
Enhanced Facial Emotion Detection Using Convolutional Neural...
收藏 引用
5th IEEE international conference on Advances in Electrical, computing, Communication and Sustainable Technologies, ICAECT 2025
作者: Indhumathy, D. Yeswanth, S. Sri Ramakrishna Engineering College Department of Mathematics Coimbatore India Bannari Amman Institute of Technology Department of Computer Science and Engineering Sathyamangalam Erode India
Convolutional neural networks are now facing a number of technological obstacles in the field of facial expression identification, including the low automatic recognition rate, the difficulty of effectively recognizin... 详细信息
来源: 评论
Assessing the Applicability of Adversarial Machine Learning Approaches for Cybersecurity  2
Assessing the Applicability of Adversarial Machine Learning ...
收藏 引用
2nd international conference on Advances in Computation, Communication and information technology, ICAICCIT 2024
作者: Takkalapally, Prashamsh Sharma, Nandan Jaggi, Arjun Hudani, Karim Gupta, Ketan Natarajan, Yuvaraj Department of Engineering Computing and Mathematical Sciences Lewis University United States Senior Security Analyst BC Public Service VictoriaBC Canada HCLTech San DiegoCA United States Tampa FL United States Dept. of Information Technology University of The Cumberlands WilliamsburgKY United States Department of Computer Science Engineering Sri Shakthi institute of engineering and technology Tamil Nadu Coimbatore India
Adverse machine learning (AML) is a rising area of study that uses system-mastering algorithms to perceive malicious hobbies or to discover malicious adversaries in cybersecurity settings. This research domain combine... 详细信息
来源: 评论
Pre-Trained Encoder Decoder Transformer Model for Language Processing  6
Pre-Trained Encoder Decoder Transformer Model for Language P...
收藏 引用
6th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Farhan Akthar, K. Deepaksakthi, V.K. Tamizhselvi, A. Department of Information Technology St.Joseph’s College of Engineering Chennai India
Tamil language processing in NLP has yet to be outstanding, mainly because of the absence of high-quality resources. In this project, a novel approach to address these limitations is to build an encoder-decoder transf... 详细信息
来源: 评论
A Simulation Study of Battery Integrated Photovoltaic System for Gram Panchayat Development information Kiosk  5
A Simulation Study of Battery Integrated Photovoltaic System...
收藏 引用
5th international conference on Circuits, Control, Communication and computing, I4C 2024
作者: Hemachandra, G. Arakeri, Megha P Lakshmana Samprathi, H.S. Shilpa, H.B. Nanditha, S. Ramaiah Institute of Technology Department of Eee Bengaluru India Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Department of Computer Science and Engineering Manipal India Seamovations Labs Pvt.Ltd Bengaluru India
In rural India, gram panchayats serve as vital administrative bodies that require access to accurate information on government initiatives aimed at fostering community growth. However, these gram panchayats frequently... 详细信息
来源: 评论
An Anomaly Detection Method Based on Adaptive Log and Dual Feature Fusion Analysis for Distributed Systems  11
An Anomaly Detection Method Based on Adaptive Log and Dual F...
收藏 引用
11th international conference on information Systems and computing technology, ISCTech 2023
作者: Jia, Yijiang Li, Kefei Lu, Ping Xie, Baodi Wang, Huayang Chen, Jincai Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Wuhan China National Key Laboratory of Modeling and Simulation for Complex Systems Beijing China
In this study, we present a middleware-based approach for detecting anomalies in distributed systems. Our method facilitates the dynamic collection of logs at various levels of detail and incorporates an a priori dict... 详细信息
来源: 评论
Optimizing Hyperspectral Anomaly Detection with a Scalable Quantum Snow Geese Non-Local Neural Network Algorithm  4
Optimizing Hyperspectral Anomaly Detection with a Scalable Q...
收藏 引用
4th international conference on Ubiquitous computing and Intelligent information Systems, ICUIS 2024
作者: Ramkumar, M.Siva Emayavaramban, G. Latha, G.Charlyn Pushpa Giri, Jayant Al-Qawasmi, Khaled Sns College of Technology Department of Ece India Jct College of Engineering and Technology Department of Ece India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Dept of Information Technology Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Saveetha University Department of Vlsi Microelectronics TN Chennai602105 India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Hyperspectral Anomaly Detection (HAD) focuses on identifying unusual objects or patterns in hyperspectral imagery (HSI) that differ from the normal background or surrounding pixels. In the past two decades, anomaly de... 详细信息
来源: 评论
Vehicular Network Security: Threats, Vulnerabilities and Countermeasures  15
Vehicular Network Security: Threats, Vulnerabilities and Cou...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Dhabliya, Dharmesh Thangarasu, N. Khurana, Shivam Raajini, X. Mercilin Goyal, Shobhit Arunkumar, D.T. Vishwakarma Institute of Technology Department of Information Technology Maharashtra Pune India Karpagam Academy of Higher Education Department of Computer Science Coimbatore641021 India Chitkara University Institute of Engineering and Technology Chitkara University Centre for Interdisciplinary Research for Business and Technology Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai127 India Quantum University Research Center Quantum University India School of Engineering and Technology Mechaical Engineering Karnataka Bangalore India
Vehicular community protection (VNS) covers a diffusion of security measures to ensure the secure, cozy, and dependable operation of motors on the street. VNS is an essential software of the Internet of Things, and it... 详细信息
来源: 评论
Generation Z: How Acceptable Health Application for Us?  13
Generation Z: How Acceptable Health Application for Us?
收藏 引用
Joint 13th international conference on Soft computing and Intelligent Systems and 25th international Symposium on Advanced Intelligent Systems, SCIS and ISIS 2024
作者: Mulia, Johan Kristian Wella Universitas Multimedia Nusantara Information System Study Program Tangerang Indonesia
Over the course of the last three years, the whole global population has been impacted by a COVID-19 epidemic. As a result of the ongoing pandemic crisis, all human activities have been halted, including remote office... 详细信息
来源: 评论