咨询与建议

限定检索结果

文献类型

  • 3,015 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 3,023 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,289 篇 工学
    • 2,036 篇 计算机科学与技术...
    • 1,643 篇 软件工程
    • 896 篇 信息与通信工程
    • 656 篇 控制科学与工程
    • 468 篇 网络空间安全
    • 418 篇 生物工程
    • 321 篇 电气工程
    • 273 篇 生物医学工程(可授...
    • 241 篇 电子科学与技术(可...
    • 219 篇 仪器科学与技术
    • 218 篇 石油与天然气工程
    • 175 篇 动力工程及工程热...
    • 147 篇 光学工程
    • 119 篇 安全科学与工程
    • 109 篇 机械工程
  • 1,356 篇 理学
    • 794 篇 数学
    • 436 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 242 篇 化学
    • 193 篇 物理学
    • 130 篇 系统科学
  • 829 篇 管理学
    • 527 篇 管理科学与工程(可...
    • 435 篇 图书情报与档案管...
    • 229 篇 工商管理
  • 307 篇 医学
    • 237 篇 临床医学
    • 235 篇 基础医学(可授医学...
    • 167 篇 药学(可授医学、理...
    • 166 篇 公共卫生与预防医...
  • 138 篇 法学
    • 102 篇 社会学
  • 87 篇 农学
    • 86 篇 作物学
  • 81 篇 教育学
  • 80 篇 经济学
  • 10 篇 军事学
  • 2 篇 文学

主题

  • 89 篇 deep learning
  • 87 篇 machine learning
  • 66 篇 internet of thin...
  • 61 篇 blockchain
  • 53 篇 big data
  • 47 篇 support vector m...
  • 46 篇 forecasting
  • 45 篇 data mining
  • 37 篇 students
  • 34 篇 artificial intel...
  • 34 篇 convolutional ne...
  • 33 篇 feature extracti...
  • 32 篇 long short-term ...
  • 30 篇 decision trees
  • 29 篇 sentiment analys...
  • 26 篇 object detection
  • 26 篇 training
  • 25 篇 cybersecurity
  • 24 篇 computer vision
  • 24 篇 power electronic...

机构

  • 58 篇 maharishi school...
  • 57 篇 uttaranchal univ...
  • 39 篇 vishwakarma inst...
  • 36 篇 chitkara univers...
  • 35 篇 vivekananda glob...
  • 32 篇 national univers...
  • 32 篇 the islamic univ...
  • 29 篇 centre of interd...
  • 27 篇 lovely professio...
  • 24 篇 chitkara univers...
  • 24 篇 vishwakarma inst...
  • 24 篇 graphic era deem...
  • 23 篇 sr university sc...
  • 21 篇 school of comput...
  • 20 篇 uttaranchal inst...
  • 19 篇 graphic era hill...
  • 18 篇 maharishi school...
  • 16 篇 vishwakarma inst...
  • 16 篇 college of pharm...
  • 15 篇 ajloun national ...

作者

  • 29 篇 chauhan rahul
  • 17 篇 alazzam malik ba...
  • 16 篇 joshi kapil
  • 14 篇 dhabliya dharmes...
  • 13 篇 gill kanwarparta...
  • 13 篇 gehlot anita
  • 13 篇 tiwari mohit
  • 10 篇 kukreja vinay
  • 10 篇 mondal dipannita
  • 10 篇 vats satvik
  • 10 篇 anand vatsala
  • 9 篇 sharma neha
  • 9 篇 gupta rupesh
  • 9 篇 kumar bura vijay
  • 8 篇 anjali t.
  • 8 篇 kumar ritesh
  • 8 篇 singh vaishali
  • 8 篇 singh akhilendra...
  • 8 篇 singh rajesh
  • 8 篇 abdelminaam diaa...

语言

  • 2,956 篇 英文
  • 67 篇 其他
  • 6 篇 中文
检索条件"任意字段=2023 IEEE 3rd International Conference on Data Science and Computer Application, ICDSCA 2023"
3023 条 记 录,以下是441-450 订阅
排序:
Enhancing Cross-Border data Sharing in Blockchain Networks: A Compliance-Centric Approach Ensuring Anonymity and Traceability  3
Enhancing Cross-Border Data Sharing in Blockchain Networks: ...
收藏 引用
3rd international conference on computer science and Blockchain, CCSB 2023
作者: Peng, Sheng Sun, Di Zhu, Linkai Zhou, Hongtu Zhang, Xueshuai Cui, Chenchang Guangdong University of Science and Technology Academy of Management Dongguan China Shijiazhuang College of Applied Technology Department of Information Engineering Shijiazhuang China Information Technology School Hebei University of Economics and Business Shijiazhuang China International Education School Hebei University of Economics and Business Shijiazhuang China
The rise of digital globalization necessitates robust cross-border data sharing mechanisms, presenting challenges in security, privacy, and regulatory compliance. This paper introduces a novel blockchain-based framewo... 详细信息
来源: 评论
Research on Fine-Grained Image Classification with Residual Network and Feature Fusion  3
Research on Fine-Grained Image Classification with Residual ...
收藏 引用
3rd international conference on Electronic Information Engineering and computer science, EIECS 2023
作者: Xin, Haitao Dou, Ruili Harbin University of Commerce School of Computer and Information Engineering Heilongjiang Harbin China Harbin Business University School of Computer and Information Engineering Heilongjiang Harbin China
With the development of deep learning, deep residual networks have been emerging. Deep residual networks are widely used in image classification by virtue of the advantages of mitigating the gradient vanishing problem... 详细信息
来源: 评论
Research on the application of Deep Learning Methods in Carbon Emission Prediction  3
Research on the Application of Deep Learning Methods in Carb...
收藏 引用
3rd international conference on Electronic Information Engineering and computer, EIECT 2023
作者: Tan, Ning Liu, Jun Fan, Shuaizuo Shenyang Jianzhu University Liaoning Shenyang China Huazhong Agricultural University Wuhan Hubei China University of Queensland Brisbane Australia
This paper aims to explore techniques for forecasting carbon emissions using gated cyclic unit (GRU) neural networks. Firstly, historical carbon emissions data from various countries were collected and data preprocess... 详细信息
来源: 评论
Detecting phishing attacks using Convolutional Neural Network and LSTM  3
Detecting phishing attacks using Convolutional Neural Networ...
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Jesmithaa, S. Eliyas, Sherin Hindustan Institute of Science and Technology Department of Computer Application Chennai India
Cybersecurity threats are increasing immensely due to the evolution of digitization. Due to this evolution, many security threats are happening around the world. One serious threat is phishing. It is a fraudulent acti... 详细信息
来源: 评论
DenseNet-SALD: A Lightweight Diseases and Pests Spatial Attention Classification Model  3
DenseNet-SALD: A Lightweight Diseases and Pests Spatial Atte...
收藏 引用
3rd ieee international conference on Software Engineering and Artificial Intelligence, SEAI 2023
作者: Qin, Zhanghao Chen, Longqiu Wang, Yanan Jiang Nan University College of Artificial Intelligence and Computer Science Wuxi China Tianjin Agricultural University College of Computer and Information Engineering Tianjin China Tianjin University of Commerce College of Science Tianjin China
Leaf diseases and pests significantly impact crop yields, making it crucial to rapidly and accurately identify plant foliar diseases and implement appropriate control measures. We present a novel DenseNet-SALD-based m... 详细信息
来源: 评论
Ship Target Detection Algorithm Based on Improved YOLOv5  3
Ship Target Detection Algorithm Based on Improved YOLOv5
收藏 引用
3rd international conference on computer science, Electronic Information Engineering and Intelligent Control Technology, CEI 2023
作者: Zhu, Louyu Bi, Zhenbo School of Information Engineering Zhejiang Ocean University Zhoushan China Zhejiang Ocean University Department of Physics Key Laboratory of Oceanographic Big Data Mining & Application of Zhejiang Province Zhoushan China
In view of the low accuracy and low efficiency of traditional ship target detection methods, this paper introduces an improved ship target detection method based on YOLOv5. Firstly, we preprocess the ship target data ... 详细信息
来源: 评论
A Machine Learning based Insect Bite Classification  3
A Machine Learning based Insect Bite Classification
收藏 引用
3rd international conference on Smart data Intelligence, ICSMDI 2023
作者: Akshaykrishnan, V. Sharanya, C. Abhinav, K. Aparna, C.K. Bindu, P.V. Government College of Engineering Department of Computer Science and Engineering Kerala Kannur India
Identifying insects by their bite marks can assist doctors in diagnosing victims and providing appropriate treatment. In recent years, researches using Machine Learning have been actively conducted and have produced e... 详细信息
来源: 评论
Ethereum Decentralized peer-to-peer Contracts Mechanism  3
Ethereum Decentralized peer-to-peer Contracts Mechanism
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Singh, Rajender Bansal, Naveen Vivekananda Global University Department of Mechanical Engineering Jaipur India Chandigarh School of Business Department of Master of Computer Application India
With its dedicated money Ether, Ethereum offers regionalized Ethernet simulated computers to manage as an open-source public blockchain, peer-to-peer agreementsability to perform clever contracts. And since Ethereum i... 详细信息
来源: 评论
Snake-Stega: A snake game-based steganography scheme  3
Snake-Stega: A snake game-based steganography scheme
收藏 引用
3rd international conference on Secure Cyber Computing and Communications, ICSCCC 2023
作者: Mahato, Susmita School of Computer Science and Engineering NIST Institute of Science & Technology Odisha Brahmapur761008 India
When two people want to communicate secretly, they can use steganography, which entails hiding the message within a seemingly innocuous medium. This research proposes a novel approach to encrypt hidden data in the fam... 详细信息
来源: 评论
Developing an Exam Assessment Website Based application for Assurance of Learning at One of Universities in Indonesia  3
Developing an Exam Assessment Website Based Application for ...
收藏 引用
3rd international conference on Smart Cities, Automation and Intelligent Computing Systems, ICON-SONICS 2023
作者: Sari, Azani Cempaka Deodat, Christopher Susanto, Jasmine Tanti Amartya, Natashya Nurhakim, Muhammad Ihsan Arief Maryani Bina Nusantara University School of Computer Science Computer Science Department Tangerang Indonesia Bina Nusantara University School of Information System Information Systems Department Jakarta Indonesia
Assessment is essential in the education system as it helps determining students' performance as well as evaluation. There are different types of assessment and one of them is exam. The creation of exams may diffe... 详细信息
来源: 评论