咨询与建议

限定检索结果

文献类型

  • 3,015 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 3,023 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,289 篇 工学
    • 2,036 篇 计算机科学与技术...
    • 1,643 篇 软件工程
    • 896 篇 信息与通信工程
    • 656 篇 控制科学与工程
    • 468 篇 网络空间安全
    • 418 篇 生物工程
    • 321 篇 电气工程
    • 273 篇 生物医学工程(可授...
    • 241 篇 电子科学与技术(可...
    • 219 篇 仪器科学与技术
    • 218 篇 石油与天然气工程
    • 175 篇 动力工程及工程热...
    • 147 篇 光学工程
    • 119 篇 安全科学与工程
    • 109 篇 机械工程
  • 1,356 篇 理学
    • 794 篇 数学
    • 436 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 242 篇 化学
    • 193 篇 物理学
    • 130 篇 系统科学
  • 829 篇 管理学
    • 527 篇 管理科学与工程(可...
    • 435 篇 图书情报与档案管...
    • 229 篇 工商管理
  • 307 篇 医学
    • 237 篇 临床医学
    • 235 篇 基础医学(可授医学...
    • 167 篇 药学(可授医学、理...
    • 166 篇 公共卫生与预防医...
  • 138 篇 法学
    • 102 篇 社会学
  • 87 篇 农学
    • 86 篇 作物学
  • 81 篇 教育学
  • 80 篇 经济学
  • 10 篇 军事学
  • 2 篇 文学

主题

  • 89 篇 deep learning
  • 87 篇 machine learning
  • 66 篇 internet of thin...
  • 61 篇 blockchain
  • 53 篇 big data
  • 47 篇 support vector m...
  • 46 篇 forecasting
  • 45 篇 data mining
  • 37 篇 students
  • 34 篇 artificial intel...
  • 34 篇 convolutional ne...
  • 33 篇 feature extracti...
  • 32 篇 long short-term ...
  • 30 篇 decision trees
  • 29 篇 sentiment analys...
  • 26 篇 object detection
  • 26 篇 training
  • 25 篇 cybersecurity
  • 24 篇 computer vision
  • 24 篇 power electronic...

机构

  • 58 篇 maharishi school...
  • 57 篇 uttaranchal univ...
  • 39 篇 vishwakarma inst...
  • 36 篇 chitkara univers...
  • 35 篇 vivekananda glob...
  • 32 篇 national univers...
  • 32 篇 the islamic univ...
  • 29 篇 centre of interd...
  • 27 篇 lovely professio...
  • 24 篇 chitkara univers...
  • 24 篇 vishwakarma inst...
  • 24 篇 graphic era deem...
  • 23 篇 sr university sc...
  • 21 篇 school of comput...
  • 20 篇 uttaranchal inst...
  • 19 篇 graphic era hill...
  • 18 篇 maharishi school...
  • 16 篇 vishwakarma inst...
  • 16 篇 college of pharm...
  • 15 篇 ajloun national ...

作者

  • 29 篇 chauhan rahul
  • 17 篇 alazzam malik ba...
  • 16 篇 joshi kapil
  • 14 篇 dhabliya dharmes...
  • 13 篇 gill kanwarparta...
  • 13 篇 gehlot anita
  • 13 篇 tiwari mohit
  • 10 篇 kukreja vinay
  • 10 篇 mondal dipannita
  • 10 篇 vats satvik
  • 10 篇 anand vatsala
  • 9 篇 sharma neha
  • 9 篇 gupta rupesh
  • 9 篇 kumar bura vijay
  • 8 篇 anjali t.
  • 8 篇 kumar ritesh
  • 8 篇 singh vaishali
  • 8 篇 singh akhilendra...
  • 8 篇 singh rajesh
  • 8 篇 abdelminaam diaa...

语言

  • 2,956 篇 英文
  • 67 篇 其他
  • 6 篇 中文
检索条件"任意字段=2023 IEEE 3rd International Conference on Data Science and Computer Application, ICDSCA 2023"
3023 条 记 录,以下是541-550 订阅
排序:
Research on Intrusion Detection Method Based on Machine Learning Algorithm and Big data Technology  3
Research on Intrusion Detection Method Based on Machine Lear...
收藏 引用
3rd international conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Li, Junhua Geely University of China Sichuan Province Chengdu city641423 China
With the popularization and application of Internet technology, people are easy to steal valuable information by cyber attackers in the process of using computer networks and electronic products. In order to maintain ... 详细信息
来源: 评论
Segment anything model for subgrade distress detection with GPR
Segment anything model for subgrade distress detection with ...
收藏 引用
data science and computer application (icdsca), ieee international conference on
作者: Kangjie Ning Chunpeng Zhou Zhi Yu School of Software Technology Zhejiang University Zhejiang Provincial Key Laboratory of Service Robot College of Computer Science Zhejiang University Hangzhou China School of Computer Science Zhejiang University Zhejiang Provincial Key Laboratory of Service Robot College of Computer Science Zhejiang University Hangzhou China
The detection of distresses with ground-penetrating radar (GPR) images is a highly challenging task due to their complex structure, blurred boundaries, and varying scales. The Segment Anything Model (SAM) has demonstr...
来源: 评论
Hybrid Beamforming Design Based Oversampling for 1-Bit Quantized Massive MIMO Systems  3
Hybrid Beamforming Design Based Oversampling for 1-Bit Quant...
收藏 引用
3rd ieee international conference on Electronic Technology, Communication and Information, ICETCI 2023
作者: Yu, Yingying Chen, Wenxun He, Qijun Yan, Junjie Yin, Zengzuo Qin, Huafeng Guangxi University of Science and Technology School of Computer Science and Technology Liuzhou China Liuzhou Vocational & Technical College Liuzhou China Guangxi University of Science and Technology School of Electrical and Electronic Engineering Liuzhou China
In massive multiple-input multiple-output (MIMO) systems, data converters with low resolution are appropriate because of their low power consumption and cost. Moreover, oversampling for such systems has benefits for t... 详细信息
来源: 评论
MSTP Network data Traffic Anomaly Optimization Detection Algorithm  3
MSTP Network Data Traffic Anomaly Optimization Detection Alg...
收藏 引用
3rd international Symposium on computer Technology and Information science, ISCTIS 2023
作者: Gong, Haoquan Liu, Chao Gao, Wenpeng Wang, Lidan Wang, Xuyang State Grid Gansu Electric Power Company Information and Communication Company Gansu Lanzhou730050 China
The current conventional network data traffic anomaly optimization detection algorithm mainly achieves the extraction of anomaly features by constructing a feature attribute matrix, which leads to poor detection resul... 详细信息
来源: 评论
application of Deep Learning Based Longitudinal Tear Detection in Intelligent Main Transportation  3
Application of Deep Learning Based Longitudinal Tear Detecti...
收藏 引用
3rd international conference on computer science, Electronic Information Engineering and Intelligent Control Technology, CEI 2023
作者: Yu, Zhiqiang Automation Co. Ltd. Changzhou213003 China Middling Coal Science and Engineering Group Changzhou Research Institute Co. Ltd. Changzhou213003 China
The current traditional device for detecting longitudinal tearing of belts has a low level of intelligence, and the triggering mechanism is inherently prone to missed and false detections. This paper designs a longitu... 详细信息
来源: 评论
Real-Time Synchronized Positioning and Dense Map Construction from Feature-Based ORB-SLAM3  3
Real-Time Synchronized Positioning and Dense Map Constructio...
收藏 引用
3rd international conference on Artificial Intelligence and computer Information Technology, AICIT 2024
作者: Ye, Weijia He, Ning Liu, Yong Yuan, XiaoZhongLing Wu, Lie Yang Tan, Jing He, Donglin R and D Center The Second Research Institute of CAAC Chengdu China Civil Aviation Chengdu Electronic Technology Co. Ltd Chengdu China Jiangxi Traffic Monitoring Command Center Nanchang China
With the development of SLAM technology, many excellent SLAM algorithms have emerged, categorized into visual and laser SLAM, among others, based on the application scenario. This paper adopts the ORB-SLAM3 algorithm ... 详细信息
来源: 评论
A Review of Adversarial Machine Learning for Cyber security in Intelligent Systems using Image Classification & Signal Classification Analysis  3
A Review of Adversarial Machine Learning for Cyber security ...
收藏 引用
3rd ieee international conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Jahan, Tasneem Lnct University Department of Computer Science & Engineering Bhopal India
Machine learning models with adversarial examples must be trained to differentiate between genuine and invading data. Cyber computing technology and tools face huge intrusion attacks and malicious programs. Tampered Q... 详细信息
来源: 评论
Optimizing Drug Dosage and Medication Management for Geriatric Patients with Artificial Neural Networks  3
Optimizing Drug Dosage and Medication Management for Geriatr...
收藏 引用
3rd ieee international conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Beemkumar, N. Singh, Daljeet Pal Ahmed, Zahid Faculty of Engineering and Technology Department of Mechanical Engineering Bagalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Vivekananda Global University Department of Computer Science & Application Jaipur India
In this paper, we utilize ANNs to investigate how medicine dosing and management might be improved for the elderly population. The suggested strategy calls for the use of patient-specific data as inputs for the ANNs, ... 详细信息
来源: 评论
Face Detection and Classification using Convolutional Neural Network with Channel Attention Module  3
Face Detection and Classification using Convolutional Neural...
收藏 引用
3rd ieee international conference on Mobile Networks and Wireless Communications, ICMNWC 2023
作者: Almoussawi, Zainab Abed Kumar, K Sudheer Veena, T. Adnan, Myasar Mundher Jabar, Muhammed Basim College of Islamic Science Ahl Al Bayt University Karbala Zainb Iraq School of Computer Science & Artificial Intelligence SR University Telangana Warangal India S.A. Engineering College Department of Information Technology Chennai India The Islamic University Najaf Iraq National University of Science and Technology Dhi Qar Iraq
Automatic face detection is one of the most challenging in computer vision, FER is a wide range of application in human- computer interaction, behavior, and human expression. However, most of these related researches ... 详细信息
来源: 评论
A Method for Automatic Registration of Realistic 3D Models without Control Points
A Method for Automatic Registration of Realistic 3D Models w...
收藏 引用
data science and computer application (icdsca), ieee international conference on
作者: Haixing Shang Wenyu Huang Sihong Li Xing Wen Northwest Engineering Corporation Limited Power China Group Xi’an China Xi’an Key Laboratory of Clean Energy Digital Technology Xi’an China The Tibet Electric Power Co. Ltd of CHN Energy Group Linzhi China
In order to realize the periodic surface monitoring and early warning of the multi-terrain realistic 3D model of the landslide, it is for the unmanned aerial vehicle to use multiphase optical images to measure the gro...
来源: 评论