咨询与建议

限定检索结果

文献类型

  • 191,826 篇 会议
  • 1,982 册 图书
  • 1,430 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,249 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,799 篇 工学
    • 86,467 篇 计算机科学与技术...
    • 63,729 篇 软件工程
    • 30,507 篇 信息与通信工程
    • 14,625 篇 控制科学与工程
    • 12,594 篇 电气工程
    • 10,397 篇 生物工程
    • 8,337 篇 电子科学与技术(可...
    • 7,687 篇 机械工程
    • 7,412 篇 生物医学工程(可授...
    • 5,718 篇 仪器科学与技术
    • 5,150 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,546 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 3,908 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,383 篇 理学
    • 23,679 篇 数学
    • 11,208 篇 生物学
    • 9,436 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,055 篇 化学
  • 32,589 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,270 篇 图书情报与档案管...
    • 9,779 篇 工商管理
  • 6,833 篇 医学
    • 5,812 篇 临床医学
    • 5,439 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,395 篇 法学
    • 4,402 篇 社会学
  • 3,677 篇 经济学
    • 3,621 篇 应用经济学
  • 3,267 篇 教育学
  • 2,634 篇 农学
  • 1,510 篇 文学
  • 537 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,517 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,701 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,531 篇 data mining
  • 3,485 篇 computer archite...
  • 3,411 篇 image coding
  • 3,269 篇 internet of thin...
  • 3,163 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,912 篇 computer science
  • 2,890 篇 protocols
  • 2,671 篇 machine learning
  • 2,667 篇 deep learning
  • 2,550 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 629 篇 university of ch...
  • 554 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 223 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 133 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 99 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 46 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,553 篇 英文
  • 3,339 篇 其他
  • 1,913 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195250 条 记 录,以下是561-570 订阅
排序:
Secure Audio Steganography with Reversible Data Hiding and Encryption  6
Secure Audio Steganography with Reversible Data Hiding and E...
收藏 引用
6th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Arthy, P.S. Sanjai Kumar, K. Vinson Joshua, S. Sahaana, G. Kalpana, R. Ponkumar, D. David Neels Siamala Devi, S. Jeya Lakshmi, S. Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Tamil Nadu Chennai India Department of Artificial Intelligence and Data Science Dhanalakshmi College of Engineering Tamil Nadu Chennai India Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Tamil Nadu Chennai India Department of Electronics and Communication Engineering Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College Avadi Tamil Nadu Chennai India Sri Eshwar College of Engineering Tamil Nadu Coimbatore India Iconix Software Solution Tamil Nadu Tirunelveli India
This research study enhances secure data transmission by embedding sensitive information within audio files. Using Python for the frontend and PHP with MySQL as the backend, this approach employs reversible data hidin... 详细信息
来源: 评论
A Concept for Accelerating Long-Term Prototype Testing Using Anomaly Detection and Digital Twins  15
A Concept for Accelerating Long-Term Prototype Testing Using...
收藏 引用
15th international conference on Cloud computing and Services Science, CLOSER 2025
作者: Nebel, Vincent Goßrau-Lenau, Pia Agarwal, Harshvardhan Werth, Dirk August-Wilhelm Scheer Institute for Digital Products and Processes GGmbH Saarbrücken Germany Technology Center Drives Miele & Cie. KG Euskirchen Germany
Developing mechanical components, especially complex assemblies like pumps, is a resource and time intensive process. Testing pump prototypes for long-term durability is critical to ensure error-free operation of the ... 详细信息
来源: 评论
An efficient multi-modal fusion bird's-eye view 3D object detection algorithm  5
An efficient multi-modal fusion bird's-eye view 3D object de...
收藏 引用
5th international conference on Signal Processing and Computer Science, SPCS 2024
作者: Zheng, Ke Li, Qingxia Zhao, Chunsheng Tian, Chuanyin CATARC Intelligent & Connected Technology Co. Ltd. Tianjin300393 China
At present, the perception method based on bird's-eye view has become the mainstream of autonomous driving perception. It realizes comprehensive perception of the vehicle's surrounding environment by fusing mu... 详细信息
来源: 评论
Next-Gen Dermatology: Revolutionizing Dermatological Diagnostics with AI and Emergency Care Solutions  3
Next-Gen Dermatology: Revolutionizing Dermatological Diagnos...
收藏 引用
3rd international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Yashas, D. Kashyap, M. Shivani Charan, P.R. Hemanth Kumar, G.P. Abhishek, B.K. Deekshith, C. New Horizon College of Engineering Dept of Artificial Intelligence and Machine Learning Bengaluru India New Horizon College of Engineering Dept of Information Science and Engineering Bengaluru India Bnm Institute of Technology Dept of Artificial Intelligence and Machine Learning Bengaluru India Siddaganga Institute of Technology Dept of Artificial Intelligence and Data Science Tumkur India Vidyavardhaka College of Engineering Dept of Computer Science and Engineering Mysore India
Skin health conditions should be diagnosed and treated on time so as to prevent complications and promote better health results. This paper presents an AI-based system that makes use of Convolutional Neural Networks w... 详细信息
来源: 评论
Research on Public Opinion of Product Quality and Safety information Based on Crawler Retrieval technology  1
Research on Public Opinion of Product Quality and Safety Inf...
收藏 引用
1st international conference on Intelligent Manufacturing and Cloud computing, ICIMCC 2024
作者: Lu, Yuwei China National Institute of Standardization Beijing China
This study, from the perspective of online public opinion, uses web crawler retrieval technology and manual screening, and adopts targeted collection and information extraction from online public opinion monitoring pl... 详细信息
来源: 评论
3D information in Robot Vision System Based on Artificial Neural Network  14th
3D Information in Robot Vision System Based on Artificial Ne...
收藏 引用
14th international conference on Frontier computing, FC 2024
作者: Liu, Xiaoxiao Department of Mechanical and Electrical Engineering Jinan Engineering Vocational Technical College Shandong Jinan China
In the exploration of robot vision systems based on artificial neural networks, the research mainly focuses on their applications in 3D information recognition and processing. By simulating the processing of the human... 详细信息
来源: 评论
An international Examination of Non-Technical Skills and Professional Dispositions in computing - Identifying the Present Day Academia-Industry Gap  2024
An International Examination of Non-Technical Skills and Pro...
收藏 引用
29th Working Group Reports on Innovation and technology in Computer Science Education, ITiCSE WGR 2024
作者: Garcia, Rita Csizmadia, Andrew Pearce, Janice L. Alshaigy, Bedour Glebova, Olga Harrington, Brian Liaskos, Konstantinos Lunn, Stephanie J. Mackellar, Bonnie Nasir, Usman Pettit, Raymond Schulz, Sandra Stewart, Craig Zavaleta Bernuy, Angela School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand Newman University Birmingham United Kingdom Berea College BereaKY United States Department of Information Technology Uppsala University Uppsala Sweden University of Connecticut StorrsCT United States Computer and Mathematical Sciences University of Toronto Scarborough Toronto Canada University of Strathclyde United Kingdom SUCCEED Florida International University MiamiFL United States Computer Science Mathematics and Sciency St John's University Queens United States Blekinge Institute of Technology Karlskrona Sweden University of Virginia CharlottesvilleVA United States Faculty of Education University of Hamburg Hamburg Germany Durham University Durham United Kingdom University of Toronto Toronto Canada
computing graduates are frequently reported by members of industry to lack in professional dispositions and/or non-technical skills (often referred to as "soft skills"). In this work, we conduct a gap analys... 详细信息
来源: 评论
Quantum Resistance Blockchain Algorithm using QHF and Novel Consensus Mechanism
Quantum Resistance Blockchain Algorithm using QHF and Novel ...
收藏 引用
2025 IEEE international Students' conference on Electrical, Electronics and Computer Science, SCEECS 2025
作者: Paul, Soumyadip Mazumdar, Mausumi Maitra Chakraborty, Sarit Government College of Engineering & Ceramic Technology Dept. of Information Technology Kolkata700010 India Government College of Engineering and Leather Technology Department of Computer Science and Engineering Kolkata700106 India
The emergence of quantum computing poses a significant threat to the security of traditional blockchain systems, which rely heavily on classical cryptographic algorithms. To safeguard the integrity and reliability of ... 详细信息
来源: 评论
A Federated Learning Network Intrusion Detection System for Multiple Imbalances
A Federated Learning Network Intrusion Detection System for ...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zeng, Yifan Zheng Li, Jian School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Jinan China
Centralized training of deep learning-based network intrusion detection systems (DLNIDS) raises privacy concerns and incurs huge overhead. Federated learning (FL), while preserving privacy, confronts challenges includ... 详细信息
来源: 评论
The Multi-Way Path Over the Blockchain: The Development of the Security Algorithm RB-24-1  6
The Multi-Way Path Over the Blockchain: The Development of t...
收藏 引用
6th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Rajaprakash, S. Bagath Basha, C. Rathish Babu, T.K.S. Karthik, S. Subapriya, V. Kavitha, S. Department of Computer Science & Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science & Engineering Kommuri Pratap Reddy Institute of Technology Telagana Hyderabad India Department of Computer Science & Engineering SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai India Department of Computer Science & Engineering Aarupadai Veedu Institute of Technology Vinayaka Missions Research Foundation Tamil Nadu Chennai India Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Tamil Nadu Chennai India
In the current world, a lot of new technologies are becoming famous. The Block Chain is one of these technologies. A very high amount of safety is offered by the technology in question;it is extremely robust. Users ar... 详细信息
来源: 评论