咨询与建议

限定检索结果

文献类型

  • 1,006 篇 会议
  • 10 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,025 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 378 篇 计算机科学与技术...
    • 333 篇 软件工程
    • 145 篇 信息与通信工程
    • 116 篇 生物工程
    • 69 篇 生物医学工程(可授...
    • 58 篇 控制科学与工程
    • 52 篇 电气工程
    • 50 篇 光学工程
    • 39 篇 电子科学与技术(可...
    • 26 篇 化学工程与技术
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 23 篇 机械工程
    • 21 篇 动力工程及工程热...
  • 285 篇 理学
    • 125 篇 数学
    • 122 篇 生物学
    • 71 篇 物理学
    • 45 篇 统计学(可授理学、...
    • 41 篇 系统科学
    • 35 篇 化学
  • 143 篇 管理学
    • 81 篇 图书情报与档案管...
    • 73 篇 管理科学与工程(可...
    • 43 篇 工商管理
  • 51 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
    • 15 篇 公共卫生与预防医...
  • 36 篇 法学
    • 26 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 10 篇 农学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 43 篇 deep learning
  • 32 篇 machine learning...
  • 29 篇 training
  • 25 篇 support vector m...
  • 24 篇 computational mo...
  • 24 篇 machine learning
  • 20 篇 internet of thin...
  • 19 篇 predictive model...
  • 18 篇 feature extracti...
  • 18 篇 computer vision
  • 16 篇 convolutional ne...
  • 15 篇 computer archite...
  • 14 篇 neural networks
  • 13 篇 object detection
  • 13 篇 education
  • 12 篇 social networkin...
  • 12 篇 forecasting
  • 11 篇 generative adver...
  • 11 篇 big data
  • 11 篇 visualization

机构

  • 9 篇 université de st...
  • 9 篇 heilongjiang int...
  • 9 篇 international ce...
  • 8 篇 università di ca...
  • 8 篇 infn sezione di ...
  • 8 篇 henan internatio...
  • 8 篇 north-west unive...
  • 8 篇 infn sezione di ...
  • 8 篇 institut univers...
  • 8 篇 national centre ...
  • 8 篇 tno technical sc...
  • 8 篇 nikhef national ...
  • 8 篇 university würzb...
  • 8 篇 university of jo...
  • 8 篇 university moham...
  • 8 篇 ncsr demokritos ...
  • 8 篇 infn sezione di ...
  • 8 篇 infn sezione di ...
  • 8 篇 infn sezione di ...
  • 8 篇 university of am...

作者

  • 9 篇 ferrara g.
  • 9 篇 ardid m.
  • 9 篇 kalekin o.
  • 9 篇 huang f.
  • 9 篇 díaz a.f.
  • 9 篇 boumaaza j.
  • 9 篇 coleiro a.
  • 9 篇 enzenhöfer a.
  • 9 篇 celli s.
  • 9 篇 dornic d.
  • 9 篇 carretero v.
  • 9 篇 ardid s.
  • 9 篇 bendahman m.
  • 9 篇 brunner j.
  • 9 篇 di palma i.
  • 9 篇 coniglione r.
  • 9 篇 eberl t.
  • 9 篇 bouta m.
  • 9 篇 van haren h.
  • 9 篇 chabab m.

语言

  • 928 篇 英文
  • 97 篇 其他
  • 24 篇 中文
检索条件"任意字段=2022 International Conference on Algorithms, Network and Computer Technology, ICANCT 2022"
1025 条 记 录,以下是371-380 订阅
排序:
SADG-Net: Sparse Adaptive Dynamic Guidance network for Depth Completion
SADG-Net: Sparse Adaptive Dynamic Guidance Network for Depth...
收藏 引用
2022 IEEE international conference on Multimedia and Expo, ICME 2022
作者: Wu, Hao Zhang, Guodong Feng, Chenchen Yang, Sifan Yang, Wenming Wang, Guijin Tsinghua University Department of Electronic Engineering China Shenzhen International Graduate School Tsinghua University Dept. of E.E. China
Existing depth completion methods with standard CNN and fixed guidance information often produce invalid value diffusion and mismatch between the guidance and the depth. To address this issue, we propose a SADG-Net fo... 详细信息
来源: 评论
IoT network Intrusion Detection: A Brief Review
IoT Network Intrusion Detection: A Brief Review
收藏 引用
2022 international conference on Smart Information Systems and Technologies, SIST 2022
作者: Omarov, Bauyrzhan Asqar, Marzhan Sadybekov, Ruslan Koishiyeva, Tursynay Bazarbayeva, Aizhan Uxikbayev, Yerkebulan Al-Farabi Kazakh National University Department Of Inforamtion Systems Almaty Kazakhstan Khoja Akhmet Yassawi International Kazakh-Turkish University Department Of Computer Engineering Turkestan Kazakhstan
The technology used to detect network breaches has a big impact on the efficacy of an information security system in a computer network. Modern ways to detecting network intrusions are described in this study, as well... 详细信息
来源: 评论
Optimization analysis of 5G+ frequency allocation problem and simulation experiments of some existing optimization algorithms  4
Optimization analysis of 5G+ frequency allocation problem an...
收藏 引用
4th IEEE international conference on Civil Aviation Safety and Information technology, ICCASIT 2022
作者: Zhang, Yitao Major in Telecommunications Engineering with Management International School Beijing University of Posts and Telecommunications Beijing100000 China
Since its birth, mobile communication has developed rapidly and has become the basic information network connecting human society. Now, the future oriented fifth generation mobile communication has become a global res... 详细信息
来源: 评论
DeviceLLM: Synergistic Recognition of Device Attributes in Cyberspace Based on Large Language Models  24
DeviceLLM: Synergistic Recognition of Device Attributes in C...
收藏 引用
4th international conference on Artificial Intelligence, Big Data and algorithms, CAIBDA 2024
作者: Zhang, Hongtu Li, Wenhao Hu, Jiahao Zuo, Fang School of Software Henan University Kaifeng Henan China Henan International Joint Laboratory of Intelligent Network Theory and Key Technology Henan University Kaifeng Henan China
In recent years, large language models (LLMs) have undergone rapid development, demonstrating significant potential across various domains. As Internet technology advances, Internet-connected devices find increasingly... 详细信息
来源: 评论
Sentiment Analysis on Reviews of E-commerce Sites Using Machine Learning algorithms
Sentiment Analysis on Reviews of E-commerce Sites Using Mach...
收藏 引用
2022 international conference on Innovations in Science, Engineering and technology, ICISET 2022
作者: Hossain, Md. Jahed Joy, Dabasish Das Das, Sowmitra Mustafa, Rashed Port City International University Department of Computer Science and Engineering Chattogram Bangladesh University of Chittagong Department of Computer Science and Engineering Chattogram Bangladesh
Customers of e-commerce platforms exchange their thoughts with such kinds of languages. In the age of the present competitive business world, sentiment analysis is widely used in the e-commerce industry to improve eff... 详细信息
来源: 评论
X-ray Security Contraband Detection Based on Improved YOLOX  24
X-ray Security Contraband Detection Based on Improved YOLOX
收藏 引用
3rd Asia conference on algorithms, Computing and Machine Learning, CACML 2024
作者: Liu, Kaiwei Ren, Bin He, Chunhong Wang, Fujie Xu, Ziming Dongguan University of technology China International Institute of Microelectronics Dongguan University of technology China School of Urban Construction and environment Dongguan City University China
Aiming at the problems of complex background, sample imbalance and easy to squeeze and deform objects in X-ray security inspection contraband images, a YOLOX-based algorithm for detecting contraband objects in X-ray s... 详细信息
来源: 评论
A Proposed Ensemble Voting Model for Fake News Detection  2
A Proposed Ensemble Voting Model for Fake News Detection
收藏 引用
2nd international Mobile, Intelligent, and Ubiquitous Computing conference, MIUCC 2022
作者: Girgis, Sherry Amer, Eslam NetSync Cairo Egypt Misr International University Faculty of Computer Science Cairo Egypt
Fake news or rumors are a phenomenon that significantly influences our social lives. Politicians in the political world usually rely on fake news as a powerful mechanism to change public opinion. Fake news spread thro... 详细信息
来源: 评论
Distributed Search Engine Query Optimization Using Artificial Neural network
Distributed Search Engine Query Optimization Using Artificia...
收藏 引用
2022 international conference on Cyber Resilience, ICCR 2022
作者: Ali, Liaqat Al-Sakhnini, Mahmoud M. Kalra, Deepak Afzaal, Farheen Pervaiz, Madiha Khan, Muhammad Farrukh College of Engineering and Technology University of Science and Technology of Fujairah Fujairah United Arab Emirates School of Business Skyline University College University City Sharjah Sharjah1797 United Arab Emirates Faculty of Computer and Information Technology Al-Madinah International University Kuala Lumpur57100 Malaysia School of Information Technology Skyline University College University City Sharjah Sharjah1797 United Arab Emirates National College of Business Administration and Economics Lahore Pakistan University of South Asia Lahore Pakistan Minhaj University Department of Computer Science Lahore Pakistan
In this research, we propose a Distributed Search Engine Query Optimization (DSEQO) based sensor network concept for instantaneous forest fire exposure. The sensor network may identify and predict forest fire more sha... 详细信息
来源: 评论
A Secure network Architecture for any on Premises Organization;Possible Vulnerabilities & their Solutions in CISCO  1
A Secure Network Architecture for any on Premises Organizati...
收藏 引用
1st international conference on Computational Science and technology, ICCST 2022
作者: Mim, Salman Hasan Mim, Afrin Akter Tasnim, Rehnuma Jabiullah, Md. Ismail Vengatesh, T. Daffodil International Universityline Dept. of Computer Science & Engineering Dhaka Bangladesh Madurai Kamaraj University Dept. of Computer Science Tamilnadu India
In the present time, in order to properly connect with various IoT devices from one end to the other, every organization requires a network. The architecture of a network should be designed such that communication may... 详细信息
来源: 评论
Optimization Procedure for Intelligent Internet of Things Applications
Optimization Procedure for Intelligent Internet of Things Ap...
收藏 引用
2022 international conference on Business Analytics for technology and Security, ICBATS 2022
作者: Ahmed, Zeinab E. Hasan, Mohammad Kamrul Hashim, Aisha A. Saeed, Rashid A. Mokhtar, Rania A. Singh, Simar P. Ghazal, Taher M. University of Gezira Department of Computer Engineering Sudan Faculty of Information Science and Technlogy Bangi43600 Malaysia International Islamic University Malaysia Department of Electrical and Computer Engineering Malaysia Taif University College of Computers and Information Technology Department of Computer Engineering P.O. Box 11099 Taif Saudi Arabia Uttar Pradesh Greater Noida India
Internet of Things (IoT) is basically the concept and terminology of vehicular communications for Vehicles are becoming increasingly available in the literature. Applications for these are efficient traffic management... 详细信息
来源: 评论