咨询与建议

限定检索结果

文献类型

  • 191,826 篇 会议
  • 1,982 册 图书
  • 1,430 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,249 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,799 篇 工学
    • 86,467 篇 计算机科学与技术...
    • 63,729 篇 软件工程
    • 30,507 篇 信息与通信工程
    • 14,625 篇 控制科学与工程
    • 12,594 篇 电气工程
    • 10,397 篇 生物工程
    • 8,337 篇 电子科学与技术(可...
    • 7,687 篇 机械工程
    • 7,412 篇 生物医学工程(可授...
    • 5,718 篇 仪器科学与技术
    • 5,150 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,546 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 3,908 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,383 篇 理学
    • 23,679 篇 数学
    • 11,208 篇 生物学
    • 9,436 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,055 篇 化学
  • 32,589 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,270 篇 图书情报与档案管...
    • 9,779 篇 工商管理
  • 6,833 篇 医学
    • 5,812 篇 临床医学
    • 5,439 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,395 篇 法学
    • 4,402 篇 社会学
  • 3,677 篇 经济学
    • 3,621 篇 应用经济学
  • 3,267 篇 教育学
  • 2,634 篇 农学
  • 1,510 篇 文学
  • 537 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,517 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,701 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,531 篇 data mining
  • 3,485 篇 computer archite...
  • 3,411 篇 image coding
  • 3,269 篇 internet of thin...
  • 3,163 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,912 篇 computer science
  • 2,890 篇 protocols
  • 2,671 篇 machine learning
  • 2,667 篇 deep learning
  • 2,550 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 629 篇 university of ch...
  • 554 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 223 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 133 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 99 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 46 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,553 篇 英文
  • 3,339 篇 其他
  • 1,913 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195250 条 记 录,以下是681-690 订阅
排序:
TrustMesh: A Blockchain-Enabled Trusted Distributed computing Framework for Open Heterogeneous IoT Environments  22
TrustMesh: A Blockchain-Enabled Trusted Distributed Computin...
收藏 引用
22nd IEEE international conference on Software Architecture, ICSA 2025
作者: Rangwala, Murtaza Buyya, Rajkumar Laboratory School of Computing and Information Systems Australia
The rapid evolution of Internet of Things (IoT) environments has created an urgent need for secure and trust-worthy distributed computing systems, particularly when dealing with heterogeneous devices and applications ... 详细信息
来源: 评论
Optimizing VPN Security in Financial Services: Implementing 256-Bit Encryption and Tunneling Protocols for Secure Data Transmission  19
Optimizing VPN Security in Financial Services: Implementing ...
收藏 引用
19th international conference on Ubiquitous information Management and Communication, IMCOM 2025
作者: Ilias, Irma Syarlina Che Sameon, Sera Syarmila Zulkifli, Muhammad Zaqwan Ezzad Salleh, Mohammad Zahir Mat Malaysian Institute of Information Technology Universiti Kuala Lumpur Kuala Lumpur Malaysia College of Computing and Informatics Universiti Tenaga Nasional Selangor Malaysia CyberSecurity RawSec Kuala Lumpur Malaysia
This study examines the essential importance of security in contemporary network settings, emphasizing the increasing dependence on Virtual Private Networks (VPNs) for safe data transfer. The emphasis is on assessing ... 详细信息
来源: 评论
Emerging Horizons in Renal Cell Carcinoma Therapy: Impact of Cuproptosis-Related miRNAs on RCC  16th
Emerging Horizons in Renal Cell Carcinoma Therapy: Impact of...
收藏 引用
16th international conference on Genetic and Evolutionary computing, ICGEC 2024
作者: Abraham Gnanadass, Subeka Viswanathan, Pragasam 412-B Renal Research Laboratory Pearl Research Park School of Bio-Sciences and Technology Vellore Institute of Technology Tamil Nadu Vellore632014 India
Renal Cell Carcinoma (RCC) is a common type of genitourinary cancer. Despite progress in treatment, challenges such as drug resistance and disease recurrence remain, emphasizing the need for ongoing research to improv... 详细信息
来源: 评论
Design of a Smart Home Door Security System with Face Detection and Smart Bell using ESP32-CAM  6
Design of a Smart Home Door Security System with Face Detect...
收藏 引用
6th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Salsabila, Nurhusna Siswanto, Apri Bayuaji, Luhur Informatics Department Faculty of Engineering Universitas Islam Riau Pekanbaru Indonesia Fac. Data Science and Information Technology INTI International University Malaysia
This research introduces the design and implementation of an advanced IoT-based home security system aimed at improving both convenience and safety for homeowners. The system integrates a smart doorbell with a mobile ... 详细信息
来源: 评论
Real-Time Sign Language to Speech Converter Using OpenCV and MediaPipe  5
Real-Time Sign Language to Speech Converter Using OpenCV and...
收藏 引用
5th international conference on Emerging Systems and Intelligent computing, ESIC 2025
作者: Pathak, Anvisha Patil, Niraj Padhy, Prashant Jadhav, Adarsh Rukhande, Smita Gadhikar, Lakshmi Fr. Conceicao Rodrigues Institute of Technology Dept. of Information Technology Navi Mumbai India Fr. Conceicao Rodrigues Institute of Technology Dept. of Computer Engineering Navi Mumbai India
Communication barriers between deaf individuals and hearing people can lead to several significant problems such as social integration, reduced access to information and reduced opportunities thereby affecting quality... 详细信息
来源: 评论
Secure Smart Contracts: Enhancing Vulnerability Detection With Graph and Tokenization Analysis
Secure Smart Contracts: Enhancing Vulnerability Detection Wi...
收藏 引用
2025 international conference on computing for Sustainability and Intelligent Future, COMP-SIF 2025
作者: Arun Kumar, B.R. Lakshmi, B.N. Prasad, Mahadeshwara Sangolli, Dharshan B. Gowda, Akshith Likhith, Y.V. Bms Institute of Technology & Management Department of Information Science Bengaluru India Bms Institute of Technology & Management Department of Computer Science Bengaluru India
Blockchain smart contracts can be easily integrated into any DApp because they function automatically and cannot be altered. But the existence of important weaknesses, like reentrancy attacks, integer overflow, underf... 详细信息
来源: 评论
Pronunciation Correction for Hearing Impairment by Web Connection with Volunteers  12th
Pronunciation Correction for Hearing Impairment by Web Conne...
收藏 引用
12th international conference on Frontiers of Intelligent computing: Theory and Applications, FICTA 2024
作者: Park, JungHyun Chadwick International School Incheon Korea Republic of
Pronunciation plays a crucial role in shaping first impressions during initial conversations, and unclear pronunciation is often misconstrued to be closely linked to intelligence. Consequently, individuals with hearin... 详细信息
来源: 评论
Latency optimization for task offloading in Space-Terrestrial collaborative networks based on deep reinforcement learning
Latency optimization for task offloading in Space-Terrestria...
收藏 引用
2024 international conference on Smart Transportation and City Engineering, STCE 2024
作者: Song, Chuanlong Zhao, Yuxuan He, Jian School of Communication and Information Engineering Shanghai University Shanghai China Shanghai Aerospace Electronic Technology Institute Key Laboratory of Intelligent Computing for Spatial Heterogeneous Network Shanghai China
Satellite networks, as a crucial component of space communication systems, effectively mitigate the limitations of terrestrial communication networks in edge computing, such as insufficient ground station coverage and... 详细信息
来源: 评论
Zero-correlation Linear Cryptanalysis on Full-round Shadow  24
Zero-correlation Linear Cryptanalysis on Full-round Shadow
收藏 引用
5th international conference on Computer Science and Management technology, ICCSMT 2024
作者: Hong, Haonan Li, Wenya Chen, Ziyu Zhang, Kai Information Engineering University Henan Zhengzhou China Laboratory for Advanced Computing and Intelligence Engineering Jiangsu WuXi China
The rapid development of the Internet of Things (IoT) has led to an increasing demand for symmetric ciphers in IoT devices. Shadow is a lightweight block cipher proposed in 2021. In previous research, the security eva... 详细信息
来源: 评论
Diabetes Detection Using Iris Image  3
Diabetes Detection Using Iris Image
收藏 引用
3rd international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Bindu, S. Sarala, T. Prashanth, M.K. Mohan Kishore, D. Bnm Institute of Technology Visveswaraya Technological University Dept. of Electronics & Communication Engineering Bengaluru India Bnm Institute of Technology Visveswaraya Technological University Dept. of Chemistry Bengaluru India Svyasa Deemed to be University Karnataka India
The diabetes detection utilizing iris images was an extensive investigation into the application of machine learning techniques for medical image analysis. The primary objective was to develop an effective system capa... 详细信息
来源: 评论