咨询与建议

限定检索结果

文献类型

  • 1,006 篇 会议
  • 9 册 图书
  • 9 篇 期刊文献

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 378 篇 计算机科学与技术...
    • 333 篇 软件工程
    • 145 篇 信息与通信工程
    • 116 篇 生物工程
    • 69 篇 生物医学工程(可授...
    • 58 篇 控制科学与工程
    • 52 篇 电气工程
    • 50 篇 光学工程
    • 39 篇 电子科学与技术(可...
    • 26 篇 化学工程与技术
    • 26 篇 安全科学与工程
    • 25 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 23 篇 机械工程
    • 21 篇 动力工程及工程热...
  • 284 篇 理学
    • 125 篇 数学
    • 122 篇 生物学
    • 70 篇 物理学
    • 45 篇 统计学(可授理学、...
    • 41 篇 系统科学
    • 35 篇 化学
  • 143 篇 管理学
    • 81 篇 图书情报与档案管...
    • 73 篇 管理科学与工程(可...
    • 43 篇 工商管理
  • 51 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
    • 15 篇 公共卫生与预防医...
  • 36 篇 法学
    • 26 篇 社会学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 14 篇 教育学
  • 10 篇 农学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 43 篇 deep learning
  • 32 篇 machine learning...
  • 29 篇 training
  • 25 篇 support vector m...
  • 24 篇 computational mo...
  • 24 篇 machine learning
  • 20 篇 internet of thin...
  • 19 篇 predictive model...
  • 18 篇 feature extracti...
  • 18 篇 computer vision
  • 16 篇 convolutional ne...
  • 15 篇 computer archite...
  • 14 篇 neural networks
  • 13 篇 object detection
  • 13 篇 education
  • 12 篇 social networkin...
  • 12 篇 forecasting
  • 11 篇 generative adver...
  • 11 篇 big data
  • 11 篇 visualization

机构

  • 9 篇 université de st...
  • 9 篇 heilongjiang int...
  • 9 篇 international ce...
  • 8 篇 università di ca...
  • 8 篇 infn sezione di ...
  • 8 篇 henan internatio...
  • 8 篇 north-west unive...
  • 8 篇 infn sezione di ...
  • 8 篇 institut univers...
  • 8 篇 national centre ...
  • 8 篇 tno technical sc...
  • 8 篇 nikhef national ...
  • 8 篇 university würzb...
  • 8 篇 university of jo...
  • 8 篇 university moham...
  • 8 篇 ncsr demokritos ...
  • 8 篇 infn sezione di ...
  • 8 篇 infn sezione di ...
  • 8 篇 infn sezione di ...
  • 8 篇 university of am...

作者

  • 9 篇 ferrara g.
  • 9 篇 ardid m.
  • 9 篇 kalekin o.
  • 9 篇 huang f.
  • 9 篇 díaz a.f.
  • 9 篇 boumaaza j.
  • 9 篇 coleiro a.
  • 9 篇 enzenhöfer a.
  • 9 篇 celli s.
  • 9 篇 dornic d.
  • 9 篇 carretero v.
  • 9 篇 ardid s.
  • 9 篇 bendahman m.
  • 9 篇 brunner j.
  • 9 篇 di palma i.
  • 9 篇 coniglione r.
  • 9 篇 eberl t.
  • 9 篇 bouta m.
  • 9 篇 van haren h.
  • 9 篇 chabab m.

语言

  • 927 篇 英文
  • 97 篇 其他
  • 24 篇 中文
检索条件"任意字段=2022 International Conference on Algorithms, Network and Computer Technology, ICANCT 2022"
1024 条 记 录,以下是461-470 订阅
排序:
Secure Host Login Technique based Key Agreement protocol for Software Defined network  4
Secure Host Login Technique based Key Agreement protocol for...
收藏 引用
4th international conference on Inventive Research in Computing Applications, ICIRCA 2022
作者: Bhardwaj, Aditya Mutaher, Hamza International Inistitute of Technology Dept. Computer Science and Engineering Bhubaneswar India School of Computing and Innovative Technologies British University Vietnam Hanoi Viet Nam
Scalability is one of the Software Defined network features that makes it more efficient than the traditional network. Due to this feature, a huge number of hosts connect to the network and require network rules and p... 详细信息
来源: 评论
Landslide Semantic Segmentation Using Satellite Imagery  19
Landslide Semantic Segmentation Using Satellite Imagery
收藏 引用
19th international conference on Electrical Engineering/Electronics, computer, Telecommunications and Information technology, ECTI-CON 2022
作者: Achariyaviriya, Witthawin Kondo, Toshiaki Karnjana, Jessada Nishio, Takayuki Sirindhorn International Institute of Technology School of ICT Thailand National Electronics and Computer Technology Center NSTDA Thailand Tokyo Institute of Technology Department of Information and Communication Engineering Japan
This work aims to improve the accuracy of landslide detection with single satellite imagery by using slope factor extraction and normalized difference vegetation index (NDVI) extraction and by combining three semantic... 详细信息
来源: 评论
Performance Evaluation of Uplink Shared Channel for Cooperative Relay based Narrow Band Internet of Things network
Performance Evaluation of Uplink Shared Channel for Cooperat...
收藏 引用
2022 international conference on Business Analytics for technology and Security, ICBATS 2022
作者: Hassan, Mona Bakri Hasan, Mohammad Kamrul Ali, Elmustafa Sayed Saeed, Rashid A. Mokhtar, Rania A. Khalifa, Othman O. Hashim, Aisha Hassan Abdalla Electronics Engineering Dept Khartoum Sudan Universiti Kebngsaan Malaysia Center for Cyber Security Faculty of Information Sceince and Technology Selangor Bangi43600 Malaysia Department of Electrical and Electronics Engineering Port Sudan Sudan Taif University College of Computers and Information Technology Department of Computer Engineering P.O. Box 11099 Taif21944 Saudi Arabia International Islamic University Malaysia Department of Electrical and Computer Engineering Lumpur Kuala Malaysia
Low Power Wide Area network (LPWAN) is one of the fastest growing network techniques provides efficient communciations for smart cities, e-Health, industry 4.0 and other applications. LPWAN enables long-rang communcia... 详细信息
来源: 评论
Evaluating deep neural network for automated sleep staging in real-life scenarios
Evaluating deep neural network for automated sleep staging i...
收藏 引用
2022 international conference on computer network Security and Software Engineering, CNSSE 2022
作者: Cao, Dingbang Hu, Congjia Hu, Jiaming Li, Dailun Li, Wenkang School of Computer Engineering and Science Shanghai University Shanghai200444 China School of International Education Guangxi University of Science and Technology Guangxi Liuzhou545000 China Electronic and Electrical Engineering University College London Gower Street LondonWC1E6BT United Kingdom Faculty of Computer Science McGill University MontrealQCH3A0G4 Canada School of Computing University of Leeds West Yorkshire LeedsLS2 9JT United Kingdom
Using artificial intelligence in automated sleep staging has become very popular. In this paper, we evaluate a deep learning model, Tiny Sleep Net, to illustrate the limitations of the deep learning model in the task ... 详细信息
来源: 评论
A Comparative Analysis of ResNet Architectures
A Comparative Analysis of ResNet Architectures
收藏 引用
2022 international conference on Smart Generation Computing, Communication and networking, SMART GENCON 2022
作者: Nagpal, Piyush Bhinge, Shivani Atul Shitole, Ajitkumar International Institute of Information Technology Department of Electronic and Telecommunication Hope Foundation Pune India International Institute of Information Technology Department of Computer Engineering Hope Foundation Pune India
Neural networks today are becoming increasingly complex, from a few layers to more than 100 layers. The principal advantage of a totally deep neural network is that it may represent very complicated functions. Functio... 详细信息
来源: 评论
Credit Approval Decision using Machine Learning algorithms  10
Credit Approval Decision using Machine Learning Algorithms
收藏 引用
10th international conference on Reliability, Infocom Technologies and Optimization ,Trends and Future Directions, ICRITO 2022
作者: Mridha, Krishna Barua, Dipayan Shorna, Meghla Monir Nouman, Hasan Nouman Kabir, Md Hasanul Singh, Ajay Vikram Marwadi University Computer Engineering Rajkot India Marwadi Univeristy Informaation Technology Rajkot India Daffodil International University Computer Science and Engineering Dhaka Bangladesh Henan Polytechnic University Computer Science & Technology China Aiit Amity University Uttar Pradesh Noida India
The credit approval process for customers seeking a loan has been an important and risky full decision to take for banking institutions. The standard procedure involves a host of information regarding the customer bas... 详细信息
来源: 评论
LSMM: A Life-cycle Security Management Mechanism for Secure Image Sharing  2
LSMM: A Life-cycle Security Management Mechanism for Secure ...
收藏 引用
2nd international conference on computer Science and Blockchain, CCSB 2022
作者: Zhang, Yaoyao Yao, Zhongyuan Pan, Heng Si, Xueming Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou Henan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan China The Frontier Information Technology Research Institute Zhongyuan University of Technology China Shanghai Jiao Tong University Department of Computer Science and Engineer Shanghai China
During the storing, transferring, processing, and exchanging phases of the full life-cycle of secure image sharing, there may exist security issues such as information leakage, infringement and abuse. To address those... 详细信息
来源: 评论
Research Trend in the international Literatures on Machine Translation Based on CiteSpace
Research Trend in the International Literatures on Machine T...
收藏 引用
2022 Global conference on Robotics, Artificial Intelligence and Information technology, GCRAIT 2022
作者: Zhou, Li Xie, Baoxia School of Foreign Language South China University of Technology Guangzhou China
With the continuous development of computer, machine translation has experienced from 'mechanical brain' to neural network machine translation based on deep learning. It is constantly innovating in technology ... 详细信息
来源: 评论
Evaluation Method of English Teaching Quality Based on SOFM Neural network  2nd
Evaluation Method of English Teaching Quality Based on SOFM ...
收藏 引用
2nd EAI international conference on Application of Big Data, Blockchain, and Internet of Things for Education Informatization, BigIoT-EDU 2022
作者: Sheng, Jing Wuchang University of Technology Hubei Wuhan430070 China
With the globalization of world economy, culture, science and technology, international cooperation and exchanges are becoming more and more frequent, and English will occupy a more and more important position. As a p... 详细信息
来源: 评论
1st international conference on Artificial Intelligence and Internet of Things, ICAII 2022
1st International Conference on Artificial Intelligence and ...
收藏 引用
1st international conference on Artificial Intelligence and Internet of Things, ICAII 2022
The proceedings contain 23 papers. The special focus in this conference is on Artificial Intelligence and Internet of Things. The topics include: On Assaying the T-score Value for the Detection and Classification of O...
来源: 评论