咨询与建议

限定检索结果

文献类型

  • 6,837 篇 会议
  • 70 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 6,952 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,943 篇 工学
    • 3,644 篇 计算机科学与技术...
    • 2,747 篇 软件工程
    • 1,195 篇 信息与通信工程
    • 706 篇 控制科学与工程
    • 511 篇 电气工程
    • 472 篇 生物工程
    • 333 篇 网络空间安全
    • 312 篇 生物医学工程(可授...
    • 275 篇 电子科学与技术(可...
    • 261 篇 动力工程及工程热...
    • 216 篇 交通运输工程
    • 216 篇 安全科学与工程
    • 210 篇 机械工程
    • 210 篇 仪器科学与技术
    • 179 篇 光学工程
    • 167 篇 化学工程与技术
    • 166 篇 石油与天然气工程
  • 1,718 篇 理学
    • 1,019 篇 数学
    • 492 篇 生物学
    • 369 篇 统计学(可授理学、...
    • 305 篇 物理学
    • 255 篇 化学
    • 194 篇 系统科学
  • 1,361 篇 管理学
    • 776 篇 图书情报与档案管...
    • 744 篇 管理科学与工程(可...
    • 353 篇 工商管理
  • 339 篇 医学
    • 270 篇 临床医学
    • 261 篇 基础医学(可授医学...
    • 169 篇 公共卫生与预防医...
    • 164 篇 药学(可授医学、理...
  • 195 篇 法学
  • 129 篇 经济学
  • 87 篇 农学
  • 69 篇 教育学
  • 19 篇 文学
  • 8 篇 军事学
  • 2 篇 艺术学

主题

  • 311 篇 big data
  • 294 篇 machine learning
  • 211 篇 deep learning
  • 210 篇 data mining
  • 202 篇 data models
  • 158 篇 cloud computing
  • 139 篇 machine learning...
  • 124 篇 training
  • 119 篇 computational mo...
  • 116 篇 feature extracti...
  • 108 篇 signal processin...
  • 102 篇 predictive model...
  • 98 篇 internet of thin...
  • 96 篇 signal processin...
  • 94 篇 prediction algor...
  • 88 篇 support vector m...
  • 83 篇 data privacy
  • 80 篇 artificial intel...
  • 74 篇 sentiment analys...
  • 72 篇 edge computing

机构

  • 88 篇 maharishi school...
  • 67 篇 centre of interd...
  • 31 篇 department of ar...
  • 28 篇 tianjin universi...
  • 28 篇 college of compu...
  • 27 篇 vishwakarma inst...
  • 26 篇 department of co...
  • 26 篇 department of el...
  • 25 篇 chitkara univers...
  • 25 篇 department of co...
  • 22 篇 department of in...
  • 20 篇 vivekananda glob...
  • 18 篇 university of ch...
  • 18 篇 vishwakarma inst...
  • 17 篇 chitkara univers...
  • 17 篇 lovely professio...
  • 17 篇 department of sc...
  • 16 篇 department of el...
  • 15 篇 vishwakarma inst...
  • 14 篇 key laboratory o...

作者

  • 13 篇 ramakrishnan ram...
  • 11 篇 dipannita mondal
  • 10 篇 wang jing
  • 10 篇 nitin n. sakhare
  • 10 篇 mondal dipannita
  • 10 篇 rajeswari d.
  • 9 篇 jambi ratna raja...
  • 8 篇 kumar ritesh
  • 8 篇 akhilendra prata...
  • 8 篇 xu xiaolong
  • 8 篇 li zuoyong
  • 7 篇 chen chen
  • 7 篇 liu ying
  • 7 篇 wang tao
  • 7 篇 vaishali singh
  • 7 篇 kodipalli ashwin...
  • 7 篇 zhang jing
  • 6 篇 zheng-guang wu
  • 6 篇 bin wang
  • 6 篇 ye jun

语言

  • 6,664 篇 英文
  • 279 篇 其他
  • 62 篇 中文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Algorithms, Computing and Data Processing, ACDP 2023"
6952 条 记 录,以下是331-340 订阅
排序:
Design of Artificial Intelligence Information System Using NoSQL database and Ajax Technology
Design of Artificial Intelligence Information System Using N...
收藏 引用
2023 international conference on Applied Physics and computing, ICAPC 2023
作者: Bai, Danyang Tianjin University of Technology Tianjin China
With the rapid evolution of the Internet and artificial intelligence, big data has emerged as an indispensable asset in today's societal advancement. Given the monumental task of processing and analyzing massive a... 详细信息
来源: 评论
New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber Security
New Cryptographic Bent Functions from Permutations and Linea...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big data computing, 2023 international conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Liu, Qian Chen, Yan Chen, Zhixiong Liu, Ximeng Lin, Hui College of Computer and Data Science Fuzhou University Fuzhou China Putian University Fujian Key Laboratory of Financial Information Processing Putian China College of Computer and Data Science Fuzhou University Key Laboratory of Information Security of Network Systems Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China
Cryptographic bent functions are maximally nonlinear Boolean functions with an even number of variables. They are not only closely related to some interesting combinatorial objects, but also have important application... 详细信息
来源: 评论
Semantic Optimization in Lossless data Compression for IoT-Driven Smart Healthcare Solutions  2
Semantic Optimization in Lossless Data Compression for IoT-D...
收藏 引用
2nd IEEE international conference on Communication, Security and Artificial Intelligence, ICCSAI 2023
作者: Manju Bargavi, S.K. Hashmi, Hina University Karnataka Bangalore India College of Computing Science and Information Technology Teerthanker Mahaveer University Uttar Pradesh Moradabad India
In this study, we explore the potential of the Internet of Things (IoT) within the domain of smart healthcare management applications, an area of growing importance in Computer Science, Artificial Intelligence (AI), M... 详细信息
来源: 评论
An Extended Agglomerative Hierarchical Clustering Techniques  2
An Extended Agglomerative Hierarchical Clustering Techniques
收藏 引用
2nd IEEE international conference on Advances in computing, Communication and Applied Informatics, ACCAI 2023
作者: Maravarman, M. Babu, S. Pitchai, R. Srm Institute of Science and Technology School of Computing Department of Computing Technologies Tamil Nadu Kattangulathur India B v Raju Institute of Technology Department of Computer Science and Engineering Telangana Narsapur India
Clustering is a significant method of data analytics in real world environments since human labelling of the data is often costly. Clustering was developed as an alternative to manual tagging. In the field of data ana... 详细信息
来源: 评论
Analysis of Sentimental on Twitter using Content Aware Support Vector Machines
Analysis of Sentimental on Twitter using Content Aware Suppo...
收藏 引用
2023 international conference on Innovative computing, Intelligent Communication and Smart Electrical Systems, ICSES 2023
作者: Manikandan, B. Krishna Kumar, T. Bharath Institute of Higher Education and Research Department of Computer Science and Engineering Chennai India MNR Engineering and Technology Sangareddy Department of Computer Science and Engineering Hyderabad India Bharath Institute of Higher Education and Research Department of Computer Science and Engineering Chennai 73 India
In the era of the Internet's rapid expansion, social networking platforms have emerged as a crucial medium for individuals to convey their emotions and opinions to a global audience. Text, images, audio, and video... 详细信息
来源: 评论
Optimization of Supply Chain Management System Based on Big data Analysis Technology
Optimization of Supply Chain Management System Based on Big ...
收藏 引用
2023 international conference on Evolutionary algorithms and Soft computing Techniques, EASCT 2023
作者: Hu, Jiacai Harbin University of Commerce School of Economics Harbin China
With the advent of the era of big data, the supply chain management system has also ushered in a huge opportunity for optimization and change. This paper first analyzes the digital application status of China's su... 详细信息
来源: 评论
Evolution of Consensus algorithms in Blockchain Technology
Evolution of Consensus Algorithms in Blockchain Technology
收藏 引用
2023 international conference on Intelligent Systems for Communication, IoT and Security, ICISCoIS 2023
作者: Harshini Poojaa, K. Ganesh Kumar, S. School of Computing SRM Institute of Science and Technology Department of Data Science and Business Systems Chengalpattu India
Blockchain being a decentralised, distributed ledger, has attracted industries to implement the solutions on blockchain. The transactions are agreed in a deterministic manner because of the availability of consensus a... 详细信息
来源: 评论
Enhancing Cryptanalysis of DES Encryption using Neural Networks and Firefly algorithms
Enhancing Cryptanalysis of DES Encryption using Neural Netwo...
收藏 引用
2023 international conference on Evolutionary algorithms and Soft computing Techniques, EASCT 2023
作者: Balaji, Varshini Krishnamurthy, Vallidevi Vellore Institute of Technology School of Computer Science and Engineering Chennai India
In today's cryptographic landscape, evaluating encryption algorithms' integrity is crucial. Neural networks offer promise for extracting information from data Encryption Standard (DES) encrypted data. This rep... 详细信息
来源: 评论
Application of Mathematical Statistics Method Based on YOLOv3 Algorithm in Measurement and Detection data
Application of Mathematical Statistics Method Based on YOLOv...
收藏 引用
2023 international conference on Evolutionary algorithms and Soft computing Techniques, EASCT 2023
作者: Wang, Yunfan Zhongtai Securities Beijing China
With the development of Internet visual algorithms, the target demand of measurement and detection data analysis is optimized constantly. In the view of wide application of target detection technology in various indus... 详细信息
来源: 评论
AI for Finance (AIFF): from Abnormal data Recognition to Information System Intrusion Detection  2
AI for Finance (AIFF): from Abnormal Data Recognition to Inf...
收藏 引用
2nd international conference on Edge computing and Applications, ICECAA 2023
作者: Zhang, Xiaoyuan Shandong Youth University of Political Science Accounting School Jinan250103 China
With the development of the data mining and the intelligent information technology, the complex information processing paradigm based on artificial intelligence has become a mainstream trend. In this paper, starting f... 详细信息
来源: 评论