咨询与建议

限定检索结果

文献类型

  • 3,019 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 3,027 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,291 篇 工学
    • 2,037 篇 计算机科学与技术...
    • 1,643 篇 软件工程
    • 895 篇 信息与通信工程
    • 657 篇 控制科学与工程
    • 468 篇 网络空间安全
    • 418 篇 生物工程
    • 322 篇 电气工程
    • 273 篇 生物医学工程(可授...
    • 240 篇 电子科学与技术(可...
    • 219 篇 仪器科学与技术
    • 218 篇 石油与天然气工程
    • 175 篇 动力工程及工程热...
    • 147 篇 光学工程
    • 119 篇 安全科学与工程
    • 109 篇 机械工程
  • 1,356 篇 理学
    • 794 篇 数学
    • 436 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 242 篇 化学
    • 193 篇 物理学
    • 130 篇 系统科学
  • 830 篇 管理学
    • 527 篇 管理科学与工程(可...
    • 436 篇 图书情报与档案管...
    • 229 篇 工商管理
  • 307 篇 医学
    • 237 篇 临床医学
    • 235 篇 基础医学(可授医学...
    • 167 篇 药学(可授医学、理...
    • 166 篇 公共卫生与预防医...
  • 138 篇 法学
    • 102 篇 社会学
  • 87 篇 农学
    • 86 篇 作物学
  • 81 篇 教育学
  • 80 篇 经济学
  • 10 篇 军事学
  • 2 篇 文学

主题

  • 89 篇 deep learning
  • 87 篇 machine learning
  • 66 篇 internet of thin...
  • 61 篇 blockchain
  • 53 篇 big data
  • 47 篇 support vector m...
  • 46 篇 forecasting
  • 45 篇 data mining
  • 37 篇 students
  • 34 篇 artificial intel...
  • 34 篇 convolutional ne...
  • 33 篇 feature extracti...
  • 32 篇 long short-term ...
  • 30 篇 decision trees
  • 29 篇 sentiment analys...
  • 26 篇 object detection
  • 26 篇 training
  • 25 篇 cybersecurity
  • 24 篇 computer vision
  • 24 篇 power electronic...

机构

  • 58 篇 maharishi school...
  • 57 篇 uttaranchal univ...
  • 39 篇 vishwakarma inst...
  • 36 篇 chitkara univers...
  • 35 篇 vivekananda glob...
  • 32 篇 national univers...
  • 32 篇 the islamic univ...
  • 29 篇 centre of interd...
  • 27 篇 lovely professio...
  • 24 篇 chitkara univers...
  • 24 篇 vishwakarma inst...
  • 24 篇 graphic era deem...
  • 23 篇 sr university sc...
  • 21 篇 school of comput...
  • 20 篇 uttaranchal inst...
  • 19 篇 graphic era hill...
  • 18 篇 maharishi school...
  • 16 篇 vishwakarma inst...
  • 16 篇 college of pharm...
  • 15 篇 ajloun national ...

作者

  • 29 篇 chauhan rahul
  • 17 篇 joshi kapil
  • 17 篇 alazzam malik ba...
  • 14 篇 dhabliya dharmes...
  • 13 篇 gill kanwarparta...
  • 13 篇 gehlot anita
  • 13 篇 tiwari mohit
  • 10 篇 kukreja vinay
  • 10 篇 mondal dipannita
  • 10 篇 vats satvik
  • 10 篇 anand vatsala
  • 9 篇 sharma neha
  • 9 篇 gupta rupesh
  • 9 篇 kumar bura vijay
  • 8 篇 anjali t.
  • 8 篇 kumar ritesh
  • 8 篇 singh vaishali
  • 8 篇 singh akhilendra...
  • 8 篇 singh rajesh
  • 8 篇 abdelminaam diaa...

语言

  • 2,155 篇 其他
  • 872 篇 英文
  • 23 篇 中文
检索条件"任意字段=2023 IEEE 3rd International Conference on Data Science and Computer Application, ICDSCA 2023"
3027 条 记 录,以下是641-650 订阅
排序:
EMG Feature Selection Approach to Improve Classification Accuracy - A Review  3
EMG Feature Selection Approach to Improve Classification Acc...
收藏 引用
3rd international conference on Secure Cyber Computing and Communications, ICSCCC 2023
作者: Agarwal, Shweta Chadha, Raman Bhati, Bhoopesh Singh Chandigarh University Computer Science & Engineering Punjab Mohali India Indian Institute of Information Technology Computer Science & Engineering Haryana Sonepat India
Nowadays, many computing systems are a part of daily life;therefore, it is more comfortable to communicate with them naturally. The field of human-computer interaction (HCI) was created in order to break down the obst... 详细信息
来源: 评论
Chewing Detection Using Brightness Changes in Video based on Deep Learning  3
Chewing Detection Using Brightness Changes in Video based on...
收藏 引用
3rd ieee international conference on computer Communication and Artificial Intelligence, CCAI 2023
作者: Nakada, Daiki Ogawa, Tomomi Tokyo Denki University Faculty of Science and Engineering Tokyo Japan
Chewing well is known to be beneficial for human health. However, a simple method to measure the number of chews for health guidance has not been established. In this paper, we propose a simple method to measure the n... 详细信息
来源: 评论
Investigating The Role of Deep Learning Technology in Health Care System  3
Investigating The Role of Deep Learning Technology in Health...
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Karetla, Girija Rani Sriram, Tarigoppula V. S. Joshi, Kapil Gor, Mehul Bothe, Shivaji Bhatia, Shruti Western Sydney University School of Computer Data and Mathematical Sciences Australia Nsrit Department of Cse A.P. Visakhapatnam India Uttaranchal University Uttaranchal Institute of Technology India Parul University Department of Piet India India Graphic Era Hill University Department of Computer Science and Engineering Uttarakhand Dehradun India
A major obstacle to the transformation of health care is the ability to extract information and useful insights from complex, high-dimensional, and varied biological data. Modern biomedical research has seen the emerg... 详细信息
来源: 评论
Wireless Sensor Network Intrusion Detection Model for Real-time Hazardous Chemical Monitoring  3
Wireless Sensor Network Intrusion Detection Model for Real-t...
收藏 引用
3rd international conference on Smart data Intelligence, ICSMDI 2023
作者: Xu, Bing Chen, Youying School of Computer Science and Engineering Yulin Normal University Guangxi Yulin537000 China School of Mathematic and Computer Science Guangdong Ocean University Guangdong Zhanjiang524088 China
Intelligent video surveillance technology is composed of the extremely complex algorithms and technologies. Hence, this article proposes a wireless sensor network intrusion detection model to perform real-time hazardo... 详细信息
来源: 评论
Improving YOLOv5n for lightweight ship target detection  3
Improving YOLOv5n for lightweight ship target detection
收藏 引用
3rd ieee international conference on computer Systems, ICCS 2023
作者: Zhao, Xuemeng Song, Yinglei Shi, Sanxia Li, Shunxin Jiangsu University of Science and Technology School of Automation Jiangsu China
A lightweight target detection algorithm based on YOLOv5n is proposed for the current problems of low accuracy rate and high hardware and software limitations of ship target detection for near-shore port and river mon... 详细信息
来源: 评论
Personalized Confederation Training for Smart Iot Systems: A Cloud - Delivered Structure  3
Personalized Confederation Training for Smart Iot Systems: A...
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Katariya, Jitendra Kumar Nivesh Vivekananda Global University Department of Computer Science Engineering India Chandigarh School of Business Department of Master of Computer Application Jhanjeri India
The Internet of Things (IoT) has significantly impacted many facets of contemporary life, and several sophisticated IoT applications and services are already being developed. Recently, the concept of federated learnin... 详细信息
来源: 评论
Privacy-Preserving of Edge Intelligence using Homomorphic Encryption  3
Privacy-Preserving of Edge Intelligence using Homomorphic En...
收藏 引用
3rd ieee international conference on Intelligent Technologies, CONIT 2023
作者: Jerang, Ronaldo Nayak, Sumitra Mahato, Ganesh Kumar Kumar Chakraborty, Swarnendu National Institute of Technology Department of Computer Science & Engineering Arunachal Pradesh India
Edge intelligence has paved the way for a stronger and more secure system by combining security and artificial intelligence. A lot of research have been undertaken, revealing remarkable development and a variety of vi... 详细信息
来源: 评论
Early Warning System from Threat of Wild Animals using Digital Image Processing  3
Early Warning System from Threat of Wild Animals using Digit...
收藏 引用
3rd international conference on Smart data Intelligence, ICSMDI 2023
作者: Raji, C.G. Safa, Fathima Jishana, P. Adhil, Mohammed Assumption Autonomous College Dept. of Computer Science Changanassery Kerala India Mea Engineering College Dept. of Computer Science & Engg Kerala Perinthalmanna India
Wildlife infiltration in places with high human mobility has been proven to be dangerous for both humans and animals. If people fail to recognize an approaching wild animal, it may result in a direct attack. Due to th... 详细信息
来源: 评论
An Intent Understanding and Entity Extraction Method Based on Intent-Slot Attention Mechanism  3
An Intent Understanding and Entity Extraction Method Based o...
收藏 引用
3rd international conference on Electronic Information Engineering and computer science, EIECS 2023
作者: Cao, Sheng-Yuan Liu, Chen North China University of Technology Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data School of Information Beijing100144 China
In the realm of chronic disease health dialog, natural language understanding plays a pivotal role. It encompasses two vital subtasks: recognizing user intentions and populating relevant data slots. To establish a sym... 详细信息
来源: 评论
Vehicle Theft Detection Using Neural Pattern Recognition  3
Vehicle Theft Detection Using Neural Pattern Recognition
收藏 引用
3rd international conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Jane Rubel Angelina, J. Subhashini, S.J. Kumar Rapuri, Anil Ravva, Vennela Rasala, Raghavendra Ray Adurgam, Sai Dcepak Kalasalingam Academy of Research and Education Dept of Computer Science and Engineering TamilNadu Krishnankoil India SRM Madurai College for Engineering and Technology Dept of Computer Science and Engineering TamilNadu Sivagangai India
Finding stolen cars is becoming increasingly important in many urban regions. An automated system for scanning license plates can recognize vehicle numbers without the need for human interaction. This work proposes a ... 详细信息
来源: 评论