咨询与建议

限定检索结果

文献类型

  • 192,061 篇 会议
  • 1,982 册 图书
  • 1,432 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,486 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,804 篇 工学
    • 86,472 篇 计算机科学与技术...
    • 63,731 篇 软件工程
    • 30,508 篇 信息与通信工程
    • 14,627 篇 控制科学与工程
    • 12,595 篇 电气工程
    • 10,397 篇 生物工程
    • 8,337 篇 电子科学与技术(可...
    • 7,687 篇 机械工程
    • 7,412 篇 生物医学工程(可授...
    • 5,718 篇 仪器科学与技术
    • 5,150 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,546 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 3,908 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,385 篇 理学
    • 23,681 篇 数学
    • 11,208 篇 生物学
    • 9,436 篇 物理学
    • 7,278 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,055 篇 化学
  • 32,591 篇 管理学
    • 19,841 篇 管理科学与工程(可...
    • 15,271 篇 图书情报与档案管...
    • 9,779 篇 工商管理
  • 6,833 篇 医学
    • 5,812 篇 临床医学
    • 5,439 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,395 篇 法学
    • 4,402 篇 社会学
  • 3,677 篇 经济学
    • 3,621 篇 应用经济学
  • 3,267 篇 教育学
  • 2,634 篇 农学
  • 1,510 篇 文学
  • 537 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,530 篇 cloud computing
  • 6,209 篇 computational mo...
  • 4,703 篇 information tech...
  • 4,658 篇 feature extracti...
  • 4,063 篇 accuracy
  • 3,593 篇 training
  • 3,532 篇 data mining
  • 3,490 篇 computer archite...
  • 3,412 篇 image coding
  • 3,278 篇 internet of thin...
  • 3,167 篇 security
  • 2,984 篇 servers
  • 2,953 篇 mobile computing
  • 2,912 篇 computer science
  • 2,892 篇 protocols
  • 2,682 篇 machine learning
  • 2,666 篇 deep learning
  • 2,572 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,463 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 558 篇 institute of com...
  • 384 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 227 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 146 篇 lovely professio...
  • 145 篇 department of co...
  • 143 篇 school of comput...
  • 132 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 107 篇 school of inform...
  • 102 篇 state key labora...
  • 102 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 99 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 xiao liu
  • 46 篇 zhang lin
  • 44 篇 bastieri d.
  • 43 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,790 篇 英文
  • 3,339 篇 其他
  • 1,913 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195487 条 记 录,以下是651-660 订阅
排序:
Enhancing IoT Data Security: Integrating Elliptic Galois Cryptography with Matrix XOR Steganography and Adaptive Firefly Optimization  8
Enhancing IoT Data Security: Integrating Elliptic Galois Cry...
收藏 引用
8th international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Chinnasamy, P. Ayyasamy, Ramesh Kumar Anuradha, K. Alam, Irfan Nair, Deveendra Menon Narayanan Kiran, Ajmeera Kalasalingam Academy of Research and Education School of Computing Department of Computer Science and Engineering Tamilnadu India Faculty of Information and Communication Technology Kampar Malaysia Telangana India Scai Vit Bhopal University Cyber Security and Digital Forensics Division Kothari Kalan Sehore India Mlr Institute of Technology Department of Computer Science and Engineering Hdyerabad India
Securing the uninterrupted data flow is crucial in the fast-advancing Internet of Things (IoT) market. This work investigates the incorporation of elliptic Galois cryptography and matrix XOR coding steganography to im... 详细信息
来源: 评论
Collaborative Caching and Scheduling for Live Streaming in Mobile Edge computing
Collaborative Caching and Scheduling for Live Streaming in M...
收藏 引用
IEEE international conference on Communications (IEEE ICC)
作者: Chen, Ao Zhang, Tong Zhu, Kun Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Peoples R China
With the vigorous increase in live video traffic today, more and more live users require low-latency high-quality video streaming. To this end, there have been many Adaptive Bitrate Streaming (ABR) algorithms to adapt... 详细信息
来源: 评论
Digital Filter Design Using Soft computing Technique
Digital Filter Design Using Soft Computing Technique
收藏 引用
2024 IEEE international conference on information technology, Electronics and Intelligent Communication Systems, ICITEICS 2024
作者: Talwandi, Navjot Singh Swati Chandigarh University Dept of Computer Science Engineering Punjab India
Digital filter design plays a crucial role in signal processing applications, aiming to enhance, extract, or suppress specific components of a signal. Soft computing techniques have emerged as effective methods for de... 详细信息
来源: 评论
Autonomous cruise control of intelligent high-speed train with online energy-saving optimization  21
Autonomous cruise control of intelligent high-speed train wi...
收藏 引用
21st IEEE international Symposium on Parallel and Distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhou, Feng Liang, Hongkun Tao, Kewu Li, Shuo Changsha University of Science and Technology College of Electrical and Information Engineering Changsha China
The rapid development of intelligent transportation technology has promoted the progress of multiple trains cooperative technology. This paper proposes an online cooperative cruise control method based on improved par... 详细信息
来源: 评论
information-Centric Networking (ICN) Based Disaster Recovery and Business Continuity (DRBC) of Bangladesh
Information-Centric Networking (ICN) Based Disaster Recovery...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big Data computing, 2023 international conference on Cyber Science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Mazumder, Kawser A. Abdallah, Eslam G. Department AB Canada
We are proposing an information-Centric Networking (ICN) technology-based solution for a Disaster Recovery Management System (DRMS) for a country such as Bangladesh where disasters happen almost annually. Bangladesh h... 详细信息
来源: 评论
Fog computing in the Internet of Things: Challenges and Opportunities  6th
Fog Computing in the Internet of Things: Challenges and Oppo...
收藏 引用
6th IFIP international conference on Internet of Things, IFIP IoT 2023
作者: Shah, Iqra Amin Chishti, Mohammad Ahsan Baba, Asif I. Department of Information Technology School of Engineering and Technology Central University of Kashmir Kashmir India Department of Computer Science and Engineering National Institute of Technology Srinagar Kashmir India Department of Computer Science and Engineering University of North Texas DentonTX76207 United States
The expansion of the Internet of Things (IoT) has made it possible for numerous widespread objects to connect to one another and communicate with one another, leading to unprecedented data releases. However, regardles... 详细信息
来源: 评论
Sakanat: A Competent Mobile Application to Automate Real-Estate  14
Sakanat: A Competent Mobile Application to Automate Real-Est...
收藏 引用
14th IEEE international conference on Control System, computing and Engineering, ICCSCE 2024
作者: Qassabi, Saeed Saud Sulaiman Al Wilfred Blessing, N.R. Tahir, Nooritawati Md University of Technology and Applied Sciences-Muscat College of Computing and Information Sciences Muscat Oman University of Technology and Applied Sciences-Ibri College of Computing and Information Sciences Ibri Oman Malaysia Universiti Teknologi MARA College of Engineering Malaysia Applied College Riyadh Saudi Arabia
The traditional methods of searching for flats are often inefficient and lack necessary features, making it difficult for both landlords and tenants to find what they are looking for. The 'Sakanat' mobile appl... 详细信息
来源: 评论
Unified Security Framework for Cloud Applications with IoT Fusion via Decentralized Blockchain  3
Unified Security Framework for Cloud Applications with IoT F...
收藏 引用
3rd international conference on Applied Artificial Intelligence and computing, ICAAIC 2024
作者: Mohanraj, B. Kalpana A, M. Priya, M. Abdul Jaleel, D. Karthikeyan A, N. Velusamy, A. Sona College of Technology Department of Information Technology Salem India Government College of Engineering Department of Computer Science Engineering Salem India Knowledge Institute of Technology Department of Information Technology Salem India Madanapalle Institute of Technology & Science Department of Computer Science & Technology Madanapalle India Sri Venkateshwara College of Engineering Department of Cse - Artificial Intelligence Vidyanagar India
Recent advancements in blockchain-based cloud computing highlight its potential in providing robust data security, integrity, and confidentiality. While cloud computing is increasingly utilized for remote resource acc... 详细信息
来源: 评论
Design and Violation Analysis of Bilateral Complementary Switches in Analog and Digital Circuits
Design and Violation Analysis of Bilateral Complementary Swi...
收藏 引用
2024 international conference on Optimization computing and Wireless Communication, ICOCWC 2024
作者: Joshi, Manish Saha, Ananya Singh, Shweta Teerthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
This technical summary examines the design and violation analysis of analog and virtual circuits with bilateral complementary switches. The primary consciousness is on examining the electric traits and operation of sw... 详细信息
来源: 评论
Application of Blockchain technology based on Fuzzy Evaluation Algorithm in Cloud Auditing  2
Application of Blockchain Technology based on Fuzzy Evaluati...
收藏 引用
2nd international conference on Distributed computing and Optimization Techniques, ICDCOT 2024
作者: Xu, Wenda Shu, Lan College of Finance and Economics Guangdong University of Science and Technology Dongguan China
As a traditional thing, the mobile service of digital archives for cloud auditing is not only lack of theoretical research on mobile service of archives, but also the practical application of mobile service in archive... 详细信息
来源: 评论