咨询与建议

限定检索结果

文献类型

  • 1,559 篇 会议
  • 27 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,321 篇 工学
    • 852 篇 计算机科学与技术...
    • 610 篇 软件工程
    • 298 篇 信息与通信工程
    • 203 篇 机械工程
    • 167 篇 控制科学与工程
    • 160 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 115 篇 仪器科学与技术
    • 76 篇 材料科学与工程(可...
    • 61 篇 生物医学工程(可授...
    • 53 篇 化学工程与技术
    • 52 篇 光学工程
    • 51 篇 生物工程
    • 47 篇 动力工程及工程热...
    • 44 篇 网络空间安全
  • 409 篇 理学
    • 229 篇 数学
    • 111 篇 物理学
    • 64 篇 系统科学
    • 52 篇 生物学
    • 52 篇 统计学(可授理学、...
    • 49 篇 化学
  • 305 篇 管理学
    • 231 篇 管理科学与工程(可...
    • 79 篇 图书情报与档案管...
    • 77 篇 工商管理
  • 61 篇 医学
    • 56 篇 临床医学
    • 50 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
  • 40 篇 经济学
    • 40 篇 应用经济学
  • 37 篇 农学
    • 34 篇 作物学
  • 33 篇 法学
  • 33 篇 教育学
    • 32 篇 教育学
  • 11 篇 艺术学
  • 7 篇 军事学
  • 3 篇 文学

主题

  • 19 篇 wireless sensor ...
  • 17 篇 wireless communi...
  • 14 篇 human computer i...
  • 14 篇 computers
  • 13 篇 quality of servi...
  • 13 篇 cloud computing
  • 12 篇 optical fibers
  • 12 篇 data mining
  • 12 篇 humans
  • 11 篇 sensor nodes
  • 11 篇 bit error rate
  • 11 篇 authentication
  • 11 篇 visualization
  • 11 篇 mobile communica...
  • 11 篇 web services
  • 10 篇 monitoring
  • 10 篇 semantics
  • 10 篇 network security
  • 10 篇 computer vision
  • 9 篇 reliability

机构

  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 7 篇 department of co...
  • 7 篇 centre for infor...
  • 7 篇 faculty of compu...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 school of commun...
  • 5 篇 computer and aut...
  • 5 篇 department of te...
  • 5 篇 affective comput...
  • 4 篇 information engi...
  • 4 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 ministry of educ...
  • 4 篇 florida internat...
  • 4 篇 department of co...
  • 4 篇 school of inform...
  • 4 篇 research institu...

作者

  • 9 篇 fuji ren
  • 8 篇 china
  • 8 篇 arulmozhi k.
  • 8 篇 arumuga perumal ...
  • 8 篇 s. a. aljunid
  • 6 篇 nallaperumal kri...
  • 5 篇 min hu
  • 5 篇 wang hui
  • 5 篇 holzinger andrea...
  • 5 篇 deris mustafa ma...
  • 5 篇 li wei
  • 5 篇 herawan tutut
  • 5 篇 zhu quanyin
  • 5 篇 won dongho
  • 4 篇 noraziah a.
  • 4 篇 sung ho cho
  • 4 篇 venugopal k.r.
  • 4 篇 a. f. abas
  • 4 篇 zhenjiang miao
  • 4 篇 hilal a. fadhil

语言

  • 1,571 篇 英文
  • 14 篇 中文
  • 7 篇 其他
检索条件"任意字段=2012 3rd International Conference on Computer and Communication Technology, ICCCT 2012"
1592 条 记 录,以下是1-10 订阅
排序:
Proceedings of the 2012 3rd international conference on computer and communication technology, iccct 2012
Proceedings of the 2012 3rd International Conference on Comp...
收藏 引用
2012 3rd international conference on computer and communication technology, iccct 2012
The proceedings contain 69 papers. The topics discussed include: an ontology-based topical crawling algorithm for accessing deep web content;image mining: a new approach for data mining based on texture;decision makin...
来源: 评论
Empirical Analysis of Digital Currency Herding and Contagion Effect Using Deep Learning Approaches  3
Empirical Analysis of Digital Currency Herding and Contagion...
收藏 引用
3rd Odisha international conference on Electrical Power Engineering, communication and Computing technology, ODICON 2024
作者: Tripathy, Nrusingha Hota, Sarbeswara Mishra, Debahuti Dash, Biswajit Nayak, Subrat Kumar Tripathy, Jogeswar Deemed to Be University Department of Computer Science and Engineering Siksha 'O' Anusandhan Odisha Bhubaneswar India Deemed to Be University Department of Computer Application Siksha 'O' Anusandhan Odisha Bhubaneswar India Raajdhani Engineering College Department of Computer Science and Engineering Odisha Bhubaneswar India
In recent years, the use of virtual or cryptocurrency-based money has grown. Blockchain, a digital accounting system, is the foundation of cryptocurrency. The markets for cryptocurrencies are eminent for their high vo... 详细信息
来源: 评论
Target Detection Based on Taylor Expansion and Bilateral Symmetric Network  3
Target Detection Based on Taylor Expansion and Bilateral Sym...
收藏 引用
3rd IEEE international conference on computer communication and Artificial Intelligence, CCAI 2023
作者: Li, Zhihui Jia, Xiaoshuo Li, Shuhua Liu, Suping Guangdong University of Science and Technology College of Computer Science Guangdong Dongguan China
In the task of target detection, traditional detection algorithms are prone to weak generalization and low detection accuracy due to the small number of parameters and fixed parameter values. Conversely, CNN-based det... 详细信息
来源: 评论
Parallel Model to Detect Attacks Using Evolutionary Based Technique  3
Parallel Model to Detect Attacks Using Evolutionary Based Te...
收藏 引用
3rd international conference on Advances in Computing, communication, Embedded and Secure Systems, ACCESS 2023
作者: Guruprasad, Sunitha Rio D'Souza, G.L. St Joseph Engineering College Department of Computer Science and Engineering Mangaluru India
Evolutionary-based algorithms emerged due to their flexibility and effectiveness in solving different varieties of problems. Optimization-based techniques are used in finding solutions that involve multiple conflictin... 详细信息
来源: 评论
Goodness Ratio and Throughput Improvement Using Multi-criteria LEACH Method in Group Sensing Device Network  3rd
Goodness Ratio and Throughput Improvement Using Multi-criter...
收藏 引用
3rd international conference on Data Science, Machine Learning and Applications, ICDSMLA 2021
作者: Rekha, V.S. Siddaraju DrAmbedkar Institute of Technology Karnataka Bangalore India Department of Computer Science and Engineering Dr Ambedkar Institute of Technology Karnataka Bangalore India
In wireless sensor networks, the entire region is disbursed with a set of sensing devices (SDs), and then, multiple sets are formed. For controlling each set, a unique SD is selected for inter-set communication. The s... 详细信息
来源: 评论
Cooperation network analysis of strength training for physical health in older adults  3
Cooperation network analysis of strength training for physic...
收藏 引用
3rd international conference on Electronic Information Engineering and Data Processing, EIEDP 2024
作者: Fu, Xinjin Wang, Yao Pang, Hongshen Zhu, Yuenan Xu, Xiaoqi Taiyuan University of Technology Shanxi Taiyuan China College of physical education Taiyuan University of Technology Shanxi Taiyuan China Shenzhen University Guangdong Shenzhen China College of International Studies Shenzhen University Guangdong Shenzhen China Universiti Sains Malaysia Gelugor Penang Malaysia
To deeply grasp the academic trend and development trend of strength training in the field of strength training on the health of older adults, 4827 articles about the impact of strength training on the physical health... 详细信息
来源: 评论
Role of Educational Data Mining and Learning Analytics Techniques Used for Predictive Modeling  3
Role of Educational Data Mining and Learning Analytics Techn...
收藏 引用
3rd international conference on Innovative Practices in technology and Management, ICIPTM 2023
作者: Kaur, Kanksha Dahiya, Omdev School of Computer Science and Engineering Lovely Professional University Punjab India
The use of data mining techniques to answer important educational questions is done with educational data mining that may be related to predicting students' performance or assessment. The purpose of these remains ... 详细信息
来源: 评论
Performance Improvement of Single-stage Target Detection by Tuning Parameters in CNN  3
Performance Improvement of Single-stage Target Detection by ...
收藏 引用
3rd international conference on Electronic communication and Artificial Intelligence, IWECAI 2022
作者: Zhang, Gangrui Zhou, Xuecong Jxust Information And Computing Sciences Department Ganzhou China Gxust Computer Department Liuzhou China
Single-stage Target detection can find almost all the objects in the images and determine the category and location of the objects, which includes two key points: object positioning and object classifying. Deep learni... 详细信息
来源: 评论
Vehicle Detection in Smart City Surveillance Using Emerging Technologies  3
Vehicle Detection in Smart City Surveillance Using Emerging ...
收藏 引用
3rd international conference on Innovations in Science and technology for Sustainable Development, ICISTSD 2022
作者: Shihabudeen, H. Rajeesh, J. College of Engineering Kidangoor Department of Electronics and Communication Kerala India
A Smart City is a technologically advanced metropolitan area that employs electrical technologies to gather data to increase operational effectiveness, communicate information to the public, as well as provide improve... 详细信息
来源: 评论
Target Detection Based on Taylor Expansion and Bilateral Symmetric Network
Target Detection Based on Taylor Expansion and Bilateral Sym...
收藏 引用
computer communication and Artificial Intelligence (CCAI), international conference on
作者: Zhihui Li Xiaoshuo Jia Shuhua Li Suping Liu College of Computer Science Guangdong University of Science and Technology Guangdong Dongguan
In the task of target detection, traditional detection algorithms are prone to weak generalization and low detection accuracy due to the small number of parameters and fixed parameter values. Conversely, CNN-based det...
来源: 评论