咨询与建议

限定检索结果

文献类型

  • 6,144 篇 会议
  • 125 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 6,286 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,228 篇 工学
    • 4,311 篇 计算机科学与技术...
    • 3,414 篇 软件工程
    • 1,309 篇 信息与通信工程
    • 534 篇 电气工程
    • 512 篇 生物工程
    • 507 篇 控制科学与工程
    • 506 篇 生物医学工程(可授...
    • 266 篇 电子科学与技术(可...
    • 259 篇 光学工程
    • 243 篇 化学工程与技术
    • 233 篇 机械工程
    • 231 篇 安全科学与工程
    • 220 篇 仪器科学与技术
    • 199 篇 交通运输工程
    • 188 篇 动力工程及工程热...
  • 2,262 篇 理学
    • 1,281 篇 数学
    • 583 篇 生物学
    • 500 篇 统计学(可授理学、...
    • 394 篇 物理学
    • 290 篇 系统科学
    • 227 篇 化学
  • 1,707 篇 管理学
    • 1,018 篇 图书情报与档案管...
    • 822 篇 管理科学与工程(可...
    • 573 篇 工商管理
  • 517 篇 医学
    • 452 篇 临床医学
    • 435 篇 基础医学(可授医学...
    • 272 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 329 篇 法学
    • 272 篇 社会学
  • 187 篇 经济学
    • 186 篇 应用经济学
  • 169 篇 农学
  • 115 篇 教育学
  • 93 篇 文学
  • 25 篇 军事学
  • 2 篇 历史学
  • 1 篇 艺术学

主题

  • 199 篇 data mining
  • 139 篇 big data
  • 123 篇 internet of thin...
  • 104 篇 machine learning
  • 95 篇 deep learning
  • 88 篇 support vector m...
  • 87 篇 convolutional ne...
  • 80 篇 blockchain
  • 78 篇 students
  • 72 篇 accuracy
  • 69 篇 classification (...
  • 67 篇 cloud computing
  • 63 篇 forecasting
  • 59 篇 feature extracti...
  • 57 篇 cryptography
  • 51 篇 decision trees
  • 51 篇 artificial intel...
  • 49 篇 real-time system...
  • 48 篇 predictive model...
  • 47 篇 data privacy

机构

  • 20 篇 the islamic univ...
  • 16 篇 maharishi school...
  • 15 篇 chitkara univers...
  • 13 篇 lloyd institute ...
  • 13 篇 lloyd law colleg...
  • 12 篇 chitkara univers...
  • 12 篇 school of politi...
  • 12 篇 maharishi univer...
  • 11 篇 sona college of ...
  • 10 篇 al-farahidi univ...
  • 10 篇 al-turath univer...
  • 10 篇 al-kunooze unive...
  • 10 篇 sternberg astron...
  • 9 篇 graduate school ...
  • 9 篇 nambu yoichiro i...
  • 9 篇 academic assembl...
  • 9 篇 graduate school ...
  • 9 篇 institute of phy...
  • 9 篇 ceico institute ...
  • 9 篇 graduate school ...

作者

  • 13 篇 ozawa s.
  • 12 篇 kodipalli ashwin...
  • 12 篇 rao trupthi
  • 11 篇 kawata k.
  • 10 篇 jui c.c.h.
  • 10 篇 oshima a.
  • 10 篇 tsuda r.
  • 10 篇 kim j.h.
  • 10 篇 bergman d.r.
  • 10 篇 allen m.
  • 10 篇 matsuyama t.
  • 10 篇 wong t.
  • 10 篇 ishii t.
  • 10 篇 kim s.w.
  • 10 篇 takamura m.
  • 10 篇 yashiro k.
  • 10 篇 kadota k.
  • 10 篇 mayta r.
  • 10 篇 ikeda d.
  • 10 篇 belz j.w.

语言

  • 5,593 篇 英文
  • 671 篇 其他
  • 430 篇 中文
检索条件"任意字段=1st Conference on Information Technology and Data Science, CITDS 2020"
6286 条 记 录,以下是1-10 订阅
排序:
citds 2020 - Proceedings of the 1st conference on information technology and data science
CITDS 2020 - Proceedings of the 1st Conference on Informatio...
收藏 引用
1st conference on information technology and data science, citds 2020
The proceedings contain 27 papers. The topics discussed include: deep learning-based method for detecting Cassini-Huygens spacecraft trajectory modifications;multi-resident location detecting in smart home;smartwatch ...
来源: 评论
Attention Span and it's Correlation with Mental Health  1
Attention Span and it's Correlation with Mental Health
收藏 引用
1st International conference on AIML-Applications for Engineering and technology, ICAET 2025
作者: Shah, Richa Bewoor, Laxmi Rak, Sarthak Patne, Ayush Vishwakarma Institute of Information Technology Artificial Intelligence and Data Science Pune India Vishwakarma Institute of Information Technology Computer Engineering Pune India
This paper delves into the correlation between attention span and mental health. Attention span is the ability to focus on a task before being distracted by certain factors. It ranges from 2 seconds to more than 20 mi... 详细信息
来源: 评论
1st International conference on Computer Applied science and information technology, ICCASIT 2020
1st International Conference on Computer Applied Science and...
收藏 引用
1st International conference on Computer Applied science and information technology, ICCASIT 2020
The proceedings contain 179 papers. The topics discussed include: the influence of computer network on the ideological and political work of college students;application of computer application technology in employmen...
来源: 评论
Optimization of Intelligent Substation Location Scheme Based on data Fusion technology and Artificial Intelligence  24
Optimization of Intelligent Substation Location Scheme Based...
收藏 引用
1st International conference on Image Processing Machine Learning and Pattern Recognition
作者: Wang, Zhipeng Xie, Dan Feng, Cai He, Chunhui Lan, Feng State Grid Shandong Elect Power Co Econ &Technol Res Inst Beijing Peoples R China
At present, the world is experiencing the second information wave with data as the core and the Internet as the means, and the society is shifting from IT (information) era to DT (data) era. The planning of substation... 详细信息
来源: 评论
SupplyRx: Intelligent Pharmaceutical Inventory and Supply Monitoring System  1
SupplyRx: Intelligent Pharmaceutical Inventory and Supply Mo...
收藏 引用
1st International conference on Advances in Computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Singh, Dhruvveer Singh, Harkamal Kumar, Shubham Garg, Vanshit Kumar, Vijay Chahar, Narendra Kumar Dr B R Ambedkar National institute of Technology Department of Information Technology Jalandhar India
To guarantee the availability of necessary medications and reduce waste in healthcare systems, effective management of drug inventory and supply chains is vital. The goal of the Drug Inventory and Supply Chain Trackin... 详细信息
来源: 评论
Analysis of data Extraction Techniques on Medical Health Records  1
Analysis of Data Extraction Techniques on Medical Health Rec...
收藏 引用
1st IEEE International conference on Electronics, Computing, Communication and Control technology, ICECCC 2024
作者: Ruwali, Abhishek Bisht, Lavanya Narang, Harshit Das, Purushottam Dhanalakshmi, R. Yadav, Satya Prakash Graphic Era Hill University Computer Science and Engineering Dehradun India Indian Institute of Information Technology Department of Computer Science and Engineering Tamil Nadu Tiruchirappalli India Department of Computer Science and Engineering Greater Noida201306 India
Extracting cancer-related information from unstructured text presents challenges that require accurate identification and extraction techniques. This study compares three methods: keyword-based matching, regular expre... 详细信息
来源: 评论
Kissan Konnect: AI-Powered Plant Disease Control System Fusing Temporal data Modeling with Deep Learning  1
Kissan Konnect: AI-Powered Plant Disease Control System Fusi...
收藏 引用
1st International conference on Software, Systems and information technology, SSITCON 2024
作者: Verma, Manav Singh, Ajay Pal Singh, Japneet Kumari, Sakshi Chandigarh University Department of Computer Science and Engineering Mohali India
This research introduces a sophisticated framework tailored for the proactive identification and management of viral afflictions in plants, concentrating on five primary culprits: Yellow Curl Virus, Mosaic Virus, Late... 详细信息
来源: 评论
A Binary and Multi Classification Model on Tax Evasion:A Comparative study  1
A Binary and Multi Classification Model on Tax Evasion:A Com...
收藏 引用
1st International conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Shujaaddeen, Abeer Abdullah Ba-Alwi, Fadl Mutaher Zahary, Ammar T. Alhegami, Ahmed Sultan Alsabry, Ayman Al-Badani, Abdulkader M. Faculty of Computer and Information Technology Sana’a University Sana’a Yemen International University of Technology Twintech Malaysia Department of Computer Science Faculty of Computing and Information Technology University of Science and Technology Sana’a University Sana’a Yemen Department of Computer Science International University of Technology Twintech Sana’a Yemen Faculty of Science and Engineering Department of Computers Aljazeera University Ibb Yemen
In this paper, a model was built to compare the performance of the following machine learning (ML) models: DT, RF, SVM, and MLP, using two types of classification: binary classification and multi classification. The r... 详细信息
来源: 评论
Investigating Bigdata Analytics Adoption in Higher Education: Pilot study  1
Investigating Bigdata Analytics Adoption in Higher Education...
收藏 引用
1st IEEE Karachi Section Humanitarian technology conference, Khi-HTC 2024
作者: Salleh, Noor Afzan Shah, Asadullah Talpur, Samar Raza Ali, Hazirah Bee Yusof Ali, Najma Imtiaz Mat, Che Rosmawati Che International Islamic University of Malaysia Kuliyyah of Information and Communication Technology Malaysia International Islamic University of Malaysia Kulliyah of Information and Communication Technology Kuala Lumpur Malaysia Sukkur IBA University Kandhkot Campus Pakistan University Malaysia of Computer Science and Engineering Kuala Lumpur Malaysia Institute of Mathematics and Computer Science University of Sindh Jamshoro Pakistan Universiti Kuala Lumpur Kuala Lumpur Malaysia
In a data-centric era, big data analytics (BDA) in promoting sustainable development and data-driven decision-based culture has gained recent attention in various studies. Although big data analytics does enhance inno... 详细信息
来源: 评论
Optimizing Electricity Theft Detection using Neural Turing Machines and Machine Learning  1
Optimizing Electricity Theft Detection using Neural Turing M...
收藏 引用
1st International conference on Software, Systems and information technology, SSITCON 2024
作者: Buyukbicakci, Erdal Bulat, Selcuk Senthilkumar, C. Rajesh, A. Sivasundaram, Malatthi Palla, Rama Raju Svsv University of Applied Sciences Information Technologies Vocational Highschool Department of Computer Technologies Sakarya Turkey Institute of Natural Sciences Sakarya University Turkey Erode Sengunthar Engineering College Department of Artificial Intelligence and Data Science Erode India Erode Sengunthar Engineering College Department of Cse Erode India Ksr College of Engineering Department of Computer Science and Design Tiruchengode India Vignan's Institute of Information Technology Department of Cse Duvvada India Turkish Standards Institution Department of Nanoscience and Nanoengineering Istanbul Turkey
Electricity theft detection (ETD) is crucial for smart grids to maintain their cost-effectiveness. Current approaches for identifying theft struggle with large datasets of electricity use owing to problems with missin... 详细信息
来源: 评论