咨询与建议

限定检索结果

文献类型

  • 191,938 篇 会议
  • 1,973 册 图书
  • 1,433 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,355 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,927 篇 工学
    • 86,613 篇 计算机科学与技术...
    • 63,779 篇 软件工程
    • 30,642 篇 信息与通信工程
    • 14,723 篇 控制科学与工程
    • 12,639 篇 电气工程
    • 10,398 篇 生物工程
    • 8,351 篇 电子科学与技术(可...
    • 7,746 篇 机械工程
    • 7,401 篇 生物医学工程(可授...
    • 5,717 篇 仪器科学与技术
    • 5,138 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,547 篇 安全科学与工程
    • 4,430 篇 网络空间安全
    • 3,909 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,474 篇 理学
    • 23,768 篇 数学
    • 11,210 篇 生物学
    • 9,444 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,280 篇 系统科学
    • 4,058 篇 化学
  • 32,618 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,303 篇 图书情报与档案管...
    • 9,771 篇 工商管理
  • 6,880 篇 医学
    • 5,810 篇 临床医学
    • 5,438 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,399 篇 法学
    • 4,407 篇 社会学
  • 3,675 篇 经济学
    • 3,619 篇 应用经济学
  • 3,255 篇 教育学
  • 2,631 篇 农学
  • 1,510 篇 文学
  • 536 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,521 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,700 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,537 篇 data mining
  • 3,485 篇 computer archite...
  • 3,413 篇 image coding
  • 3,270 篇 internet of thin...
  • 3,168 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,915 篇 computer science
  • 2,890 篇 protocols
  • 2,698 篇 machine learning
  • 2,680 篇 deep learning
  • 2,549 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 556 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 224 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 134 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 98 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,586 篇 英文
  • 3,413 篇 其他
  • 1,975 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195356 条 记 录,以下是641-650 订阅
排序:
AER-LLM: Ambiguity-aware Emotion Recognition Leveraging Large Language Models
AER-LLM: Ambiguity-aware Emotion Recognition Leveraging Larg...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Hong, Xin Gong, Yuan Sethu, Vidhyasaharan Dang, Ting School of Computing and Information Systems University of Melbourne Melbourne Australia CSAIL SLS Massachusetts Institute of Technology Boston United States School of Electrical Engineering and Telecommunications University of New South Wales Sydney Australia
Recent advancements in Large Language Models (LLMs) have demonstrated great success in many Natural Language Processing (NLP) tasks. In addition to their cognitive intelligence, exploring their capabilities in emotion... 详细信息
来源: 评论
Research on crime risk prediction model based on machine learning  24
Research on crime risk prediction model based on machine lea...
收藏 引用
13th international conference on computing and Pattern Recognition, ICCPR 2024
作者: Hou, Xuehui Rexiti, Kudelaiti Aizezi, Yasen School of Resources and Environment University of Electronic Science and Technology of China Chengdu Sichuan China Faculty of Information Security and Engineering Xinjiang Police College Urumqi Xinjiang China
Crime prediction is an important method for public security departments to conduct crime early warning and investigation. According to the multidimensional characteristics of criminals, machine learning classification... 详细信息
来源: 评论
AI Integrated Healthcare System for Disease Predictions and Virtual Consultations  3
AI Integrated Healthcare System for Disease Predictions and ...
收藏 引用
3rd international conference on Electronics and Renewable Systems, ICEARS 2025
作者: Wilfred Blessing, N.R. Gunasekaran, Hemalatha Hariharan, B. Al Jabri, Jaber Saleh Salim University of Technology and Applied Sciences College of Computing and Information Sciences Ibri Oman Srm Institute of Science and Technology Department of Computational Intelligence Tamil Nadu Kattankulathur India
AI-based Disease Prediction and Online Consultation System aims to redesign the way people experience healthcare. The deep growth of machine learning opened doors for new opportunities, such as this system that carefu... 详细信息
来源: 评论
Enhancing Web Security: A Phishing Detection System Integrated with Password Managers  6
Enhancing Web Security: A Phishing Detection System Integrat...
收藏 引用
6th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Subbulakshmi, T. Meghana, G. Sunkara, S. Ravi Sailendra Shanmukha Sai, V. School of Computer Science and Engineering Vellore Institute of Technology Chennai India
Phishing attacks have become a widespread and intricate threat, targeting individuals and organizations through deceptive URLs to steal sensitive information such as login credentials and financial data. These attacks... 详细信息
来源: 评论
The Deepfake Dilemma: Enhancing Deepfake Detection with Vision Transformers  3
The Deepfake Dilemma: Enhancing Deepfake Detection with Visi...
收藏 引用
3rd international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Sumathi, D. Singh, Ashu Sinha, Arpita Aditya, D. Mohammed Riyaan, K.F. Alliance University Department of Computer Science and Engineering Bangalore India Alliance University Department of Information Technology Bangalore India
The emergence of deepfake videos at an alarming pace has compromised the integrity of digital multimedia and mandates progressive research into detection strategies. A new forensic method for subjecting face tampering... 详细信息
来源: 评论
Impact of news on stock prices of mid-cap companies in India  3
Impact of news on stock prices of mid-cap companies in India
收藏 引用
3rd international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Gupta, Abhijeet Kumar Hariharan, S. Aggarwal, Mansha Doiphode, Shivani Pulukkul, Yuktha Mohan Jadhav, Anil Symbiosis Centre for Information Technology Pune India
The objective of this study is to analyze how sentiment in news articles effect mid-cap stock prices in India. In this regard, it is important for investors to learn how such headlines correlate with stock movements. ... 详细信息
来源: 评论
PP-3FAT Scheme for 5G-IoHT Telemedicine Systems  2nd
PP-3FAT Scheme for 5G-IoHT Telemedicine Systems
收藏 引用
2nd international conference on Security and information Technologies with AI, Internet computing and Big-data Applications, SITAIBA 2023
作者: Lin, Tzu-Wei i.School Feng Chia University Taichung City Taiwan Information Security Office Office of Information Technology Feng Chia University Taichung City Taiwan
5G networks have many attractive features which can improve capacity and speed to provide reliable and speedy connectivity to thousands of devices of Internet of Things. Telemedicine relies on mobile healthcare system... 详细信息
来源: 评论
Use of Search Tools in Software Development: A Study of Microservice-Based Team Projects  17
Use of Search Tools in Software Development: A Study of Micr...
收藏 引用
17th international conference on Computer Supported Education, CSEDU 2025
作者: Lau, Yi Meng Koh, Christian Michael Jiang, Lingxiao School of Computing & Information Systems Singapore Management University Singapore Singapore
Universities are increasingly integrating real-world projects into software engineering curricula to prepare students for careers involving complex concepts like Microservices Architecture (MSA). Students frequently s... 详细信息
来源: 评论
Application of Personal information Privacy Protection Based on Artificial Intelligence Algorithms  14th
Application of Personal Information Privacy Protection Based...
收藏 引用
14th international conference on Frontier computing, FC 2024
作者: Mu, Xilin Jilin Police College Jilin Changchun130117 China
Personal information privacy protection is an important issue in the digital age. Artificial intelligence technology has been rapidly developed and widely used, and the data analysis and processing capabilities of art... 详细信息
来源: 评论
Predicting methane adsorption ability of MOFs based on the crystal structural information by convolutional neural network  5
Predicting methane adsorption ability of MOFs based on the c...
收藏 引用
5th international conference on Material Science and technology, ICMST 2025
作者: Lu, Gang Jiang, Xiuyi Yang, Qingyuan Zhao, Zhengyang Gu, Weiwei Li, Ruiqi College of Information Science and Technology Beijing University of Chemical Technology Beijing100029 China State Key Laboratory of Organic-Inorganic Composites Beijing University of Chemical Technology Beijing100029 China
High-throughput computational screening (HTCS) methods have been widely used in addressing the challenges of screening metal-organic framework (MOF) materials with high performance from large datasets. Accurately pred... 详细信息
来源: 评论