咨询与建议

限定检索结果

文献类型

  • 1,006 篇 会议
  • 9 册 图书
  • 9 篇 期刊文献

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 378 篇 计算机科学与技术...
    • 333 篇 软件工程
    • 145 篇 信息与通信工程
    • 116 篇 生物工程
    • 69 篇 生物医学工程(可授...
    • 58 篇 控制科学与工程
    • 52 篇 电气工程
    • 50 篇 光学工程
    • 39 篇 电子科学与技术(可...
    • 26 篇 化学工程与技术
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 23 篇 机械工程
    • 21 篇 动力工程及工程热...
  • 284 篇 理学
    • 125 篇 数学
    • 122 篇 生物学
    • 70 篇 物理学
    • 45 篇 统计学(可授理学、...
    • 41 篇 系统科学
    • 35 篇 化学
  • 143 篇 管理学
    • 81 篇 图书情报与档案管...
    • 73 篇 管理科学与工程(可...
    • 43 篇 工商管理
  • 51 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
    • 15 篇 公共卫生与预防医...
  • 36 篇 法学
    • 26 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 10 篇 农学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 43 篇 deep learning
  • 32 篇 machine learning...
  • 29 篇 training
  • 25 篇 support vector m...
  • 24 篇 computational mo...
  • 24 篇 machine learning
  • 20 篇 internet of thin...
  • 19 篇 predictive model...
  • 18 篇 feature extracti...
  • 18 篇 computer vision
  • 16 篇 convolutional ne...
  • 15 篇 computer archite...
  • 14 篇 neural networks
  • 13 篇 object detection
  • 13 篇 education
  • 12 篇 social networkin...
  • 12 篇 forecasting
  • 11 篇 generative adver...
  • 11 篇 big data
  • 11 篇 visualization

机构

  • 9 篇 université de st...
  • 9 篇 heilongjiang int...
  • 9 篇 international ce...
  • 8 篇 università di ca...
  • 8 篇 infn sezione di ...
  • 8 篇 henan internatio...
  • 8 篇 north-west unive...
  • 8 篇 infn sezione di ...
  • 8 篇 institut univers...
  • 8 篇 national centre ...
  • 8 篇 tno technical sc...
  • 8 篇 nikhef national ...
  • 8 篇 university würzb...
  • 8 篇 university of jo...
  • 8 篇 university moham...
  • 8 篇 ncsr demokritos ...
  • 8 篇 infn sezione di ...
  • 8 篇 infn sezione di ...
  • 8 篇 infn sezione di ...
  • 8 篇 university of am...

作者

  • 9 篇 ferrara g.
  • 9 篇 ardid m.
  • 9 篇 kalekin o.
  • 9 篇 huang f.
  • 9 篇 díaz a.f.
  • 9 篇 boumaaza j.
  • 9 篇 coleiro a.
  • 9 篇 enzenhöfer a.
  • 9 篇 celli s.
  • 9 篇 dornic d.
  • 9 篇 carretero v.
  • 9 篇 ardid s.
  • 9 篇 bendahman m.
  • 9 篇 brunner j.
  • 9 篇 di palma i.
  • 9 篇 coniglione r.
  • 9 篇 eberl t.
  • 9 篇 bouta m.
  • 9 篇 van haren h.
  • 9 篇 chabab m.

语言

  • 927 篇 英文
  • 97 篇 其他
  • 24 篇 中文
检索条件"任意字段=2022 International Conference on Algorithms, Network and Computer Technology, ICANCT 2022"
1024 条 记 录,以下是441-450 订阅
排序:
A Survey of Classification and Detection of Fake and Real News using Machine Learning algorithms and Techniques  14
A Survey of Classification and Detection of Fake and Real Ne...
收藏 引用
14th international conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Rangdale, Sonali Mali, Nilesh Rathod, Sunil Department of Information Technology Rajarshi Shahu College of Engineering Tathawade SPPU Maharashtra Pune411033 India Department of Information Technology International Institute of Information Technology Hinjewadi SPPU Maharashtra Pune411057 India Department of Computer Engineering Indira College of Engineering and Management SPPU Maharashtra Pune410506 India
False news for various commercial and political goals has been appearing in enormous numbers and spreading across the internet in recent years. It is a result of the tremendous growth in online contents published on d... 详细信息
来源: 评论
Heuristic Elastic Scaling for Kubernetes Heterogeneous Microservices  21
Heuristic Elastic Scaling for Kubernetes Heterogeneous Micro...
收藏 引用
21st international conference on networking, Sensing and Control, ICNSC 2024
作者: Wang, Song He, Sheng Ning, Yishuang Gao, Xiang Ding, Zhijun The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai201804 China The Department of Computer Science and Technology Tongji University Shanghai201804 China Kingdee Research Kingdee International Software Group Co. Ltd Shenzhen518057 China Intelligent Computing Facility Innovation Center ZhejiangLab Hangzhou30012 China
Kubernetes has become the basic platform for building cloud native applications. However, existing horizontal scaling methods based on Kubernetes have problems with resource redundancy. Furthermore, the combined horiz... 详细信息
来源: 评论
Adaptive Adjustment of Factor's Weight for a Multi-Sensor SLAM  2
Adaptive Adjustment of Factor's Weight for a Multi-Sensor SL...
收藏 引用
2022 2nd international conference on computer, Internet of Things and Control Engineering, CITCE 2022
作者: Zhu, Zihan Zhang, Yi Wang, Weijun Feng, Wei Luo, Haowen Zhang, Yaojie Shenzhen Institute of Advanced Technology Chinese Academy of Sciences 518055 China University of Chinese Academy of Sciences Beijing100049 China Guangdong Provincial Key Lab of Construction Robotics and Intelligent Manufacturing Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Guangdong Provincial International Joint Research Center for Robotics and Intelligent Construction Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
A multi-sensor fusion simultaneous localization and mapping(SLAM) method based on factor graph optimization that can adaptively modify the weight of the graph factor is proposed in this study, to enhance the localizat... 详细信息
来源: 评论
An Online Learning and Co-construction Platform for Fragmented Knowledge Based on computer technology
An Online Learning and Co-construction Platform for Fragment...
收藏 引用
2022 international conference on Education, network and Information technology, ICENIT 2022
作者: Zhao, Bairu School of Literature and Education Shaanxi Institute of International Trade and Commerce Shaanxi Province Xi'an712046 China
With the development of computer and artificial intelligence technology, the application of online learning has more conditions, and has the advantages of convenient resource information and real-time communication. F... 详细信息
来源: 评论
Interpretability Study of Pretrained Models via Transfer Learning on ImageNet for Lung Cancer Prediction  5
Interpretability Study of Pretrained Models via Transfer Lea...
收藏 引用
5th international conference on computer Information Science and Application technology, CISAT 2022
作者: Lin, Zhe Department of Computer Science and Technology Beijing Normal University Hong Kong Baptist University United International College Guangdong Zhuhai519087 China
Transfer learning is an effective strategy to obtain models for lung cancer analysis due to the limited number of labeled datasets. But few studies have made an interpretable explanation that why networks pretrained o... 详细信息
来源: 评论
Brain Stroke Prediction Using ANN
Brain Stroke Prediction Using ANN
收藏 引用
2022 international conference on Cyber Resilience, ICCR 2022
作者: Issa, Ghassan F. Shaalan, Khaled Shaalan, Yara Saeed, Hafiza Afia Fatima, Noor Rehman, Abd Ur Skyline University College University City Sharjah School of Information Technology Sharjah1797 United Arab Emirates The British University in Dubai Faculty of Engineering and It United Arab Emirates Misr University for Science and Technology Egypt Agriculture University Department of Computer Science Faisalabad Pakistan Fatima Memorial Hospital College of Medicine and Dentistry Lahore Lahore54000 Pakistan Riphah International University Riphah School of Computing Lahore Pakistan
Brain stroke is an intense health condition that happens when a blood clot restricts the normal flow of blood and different nutrients withinside the brain. It can cause neurologic damage, headaches and often death if ... 详细信息
来源: 评论
The grab tracking method for 3D reconstruction of a waste pool  3
The grab tracking method for 3D reconstruction of a waste po...
收藏 引用
3rd international conference on Advanced algorithms and Signal Image Processing, AASIP 2023
作者: Ding, Xiaosong Feng, Chong Li, Liqiang Chen, Xi International Business School Beijing Foreign Studies University Beijing100089 China
With 3D reconstruction method, this paper conducts experiments based on the data of a waste incineration plant in eastern China, and analyzes and compares the visual 3D monitoring, laser sensor 3D monitoring, and grab... 详细信息
来源: 评论
Studies on Human Recognition Activities Based on Federated Learning
Studies on Human Recognition Activities Based on Federated L...
收藏 引用
2022 international conference on computer Engineering and Artificial Intelligence, ICCEAI 2022
作者: Xu, Shuzhen Liu, Yanhong He, Xin School of Software Henan University International Joint Laboratory of Intelligent Network Theory and Key Technology Kaifeng China
The traditional Human activity recognition (Human Activity Recognition, HAR) failed to protect user data effectively and had low recognition accuracy in the process of training model by machine learning. Under protect... 详细信息
来源: 评论
Predictive Analysis on University Dropout Rate of Bangladesh in Covid-19
Predictive Analysis on University Dropout Rate of Bangladesh...
收藏 引用
2022 international conference on Innovations in Science, Engineering and technology, ICISET 2022
作者: Hossain, Mia Shamim Azad, Shams Bin Md. Hossen, Md Labib Khan, Shahidul Islam Masum, Abdul Kadar Muhammad International Islamic University Chittagong Computer Science and Engineering Chattogram4318 Bangladesh
The hard times of COVID 19 have shown mankind some harsh reality. Numerous sectors including education have been terribly victimized by the grasp of the pandemic. Schools, colleges, and universities were closed down f... 详细信息
来源: 评论
Utilizing Hyperledger Fabric Based Private Blockchain and IPFS to Secure Educational Certificate Management
Utilizing Hyperledger Fabric Based Private Blockchain and IP...
收藏 引用
2022 IEEE international Women in Engineering (WIE) conference on Electrical and computer Engineering, WIECON-ECE 2022
作者: Jahid Alam, Md. Hossain, Shahrin Shekh, Amina Reno, Saha Bangladesh Army International University of Science and Technology Department of Cse Cumilla Bangladesh
In recent decades, the quantity of fake educational certificates has increased, damaging testing centers' reputations. The most common verification methods include email, phone, and proxy for background checking, ... 详细信息
来源: 评论