咨询与建议

限定检索结果

文献类型

  • 6,832 篇 会议
  • 70 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 6,946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,935 篇 工学
    • 3,638 篇 计算机科学与技术...
    • 2,747 篇 软件工程
    • 1,191 篇 信息与通信工程
    • 700 篇 控制科学与工程
    • 509 篇 电气工程
    • 472 篇 生物工程
    • 330 篇 网络空间安全
    • 312 篇 生物医学工程(可授...
    • 274 篇 电子科学与技术(可...
    • 259 篇 动力工程及工程热...
    • 215 篇 交通运输工程
    • 215 篇 安全科学与工程
    • 209 篇 机械工程
    • 208 篇 仪器科学与技术
    • 179 篇 光学工程
    • 166 篇 化学工程与技术
    • 165 篇 石油与天然气工程
  • 1,716 篇 理学
    • 1,019 篇 数学
    • 492 篇 生物学
    • 370 篇 统计学(可授理学、...
    • 305 篇 物理学
    • 253 篇 化学
    • 194 篇 系统科学
  • 1,359 篇 管理学
    • 775 篇 图书情报与档案管...
    • 743 篇 管理科学与工程(可...
    • 353 篇 工商管理
  • 339 篇 医学
    • 270 篇 临床医学
    • 261 篇 基础医学(可授医学...
    • 169 篇 公共卫生与预防医...
    • 164 篇 药学(可授医学、理...
  • 195 篇 法学
  • 129 篇 经济学
  • 87 篇 农学
  • 71 篇 教育学
  • 19 篇 文学
  • 8 篇 军事学
  • 2 篇 艺术学

主题

  • 311 篇 big data
  • 294 篇 machine learning
  • 211 篇 deep learning
  • 210 篇 data mining
  • 202 篇 data models
  • 158 篇 cloud computing
  • 139 篇 machine learning...
  • 124 篇 training
  • 119 篇 computational mo...
  • 116 篇 feature extracti...
  • 108 篇 signal processin...
  • 102 篇 predictive model...
  • 97 篇 internet of thin...
  • 96 篇 signal processin...
  • 94 篇 prediction algor...
  • 88 篇 support vector m...
  • 83 篇 data privacy
  • 80 篇 artificial intel...
  • 74 篇 sentiment analys...
  • 72 篇 edge computing

机构

  • 88 篇 maharishi school...
  • 67 篇 centre of interd...
  • 31 篇 department of ar...
  • 28 篇 tianjin universi...
  • 28 篇 college of compu...
  • 27 篇 vishwakarma inst...
  • 26 篇 department of co...
  • 26 篇 department of el...
  • 25 篇 chitkara univers...
  • 25 篇 department of co...
  • 22 篇 department of in...
  • 20 篇 vivekananda glob...
  • 18 篇 university of ch...
  • 18 篇 vishwakarma inst...
  • 17 篇 chitkara univers...
  • 17 篇 lovely professio...
  • 17 篇 department of sc...
  • 16 篇 department of el...
  • 15 篇 vishwakarma inst...
  • 14 篇 key laboratory o...

作者

  • 13 篇 ramakrishnan ram...
  • 11 篇 dipannita mondal
  • 10 篇 wang jing
  • 10 篇 nitin n. sakhare
  • 10 篇 mondal dipannita
  • 10 篇 rajeswari d.
  • 9 篇 jambi ratna raja...
  • 8 篇 kumar ritesh
  • 8 篇 akhilendra prata...
  • 8 篇 xu xiaolong
  • 8 篇 li zuoyong
  • 7 篇 chen chen
  • 7 篇 liu ying
  • 7 篇 wang tao
  • 7 篇 vaishali singh
  • 7 篇 kodipalli ashwin...
  • 7 篇 zhang jing
  • 6 篇 zheng-guang wu
  • 6 篇 bin wang
  • 6 篇 ye jun

语言

  • 6,665 篇 英文
  • 272 篇 其他
  • 62 篇 中文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Algorithms, Computing and Data Processing, ACDP 2023"
6946 条 记 录,以下是4681-4690 订阅
排序:
A Survey on Cyber Attack Detection: Techniques, datasets, and Challenge
A Survey on Cyber Attack Detection: Techniques, Datasets, an...
收藏 引用
Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE), international conference on
作者: G Geetha Manjula Rajagopal K Purna Chand Department of Computing Technologies School of Computing (Research Scholor) SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of Computing Technologies School of Computing (Assistant Professor) SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of Computer Science and Engineering(Data Science) (Professor) B V Raju Institute of Technology Narsapur India
Networking technology is expanded along with cyber threats. Cyber threats are the instances which adversely influences the functional operations of the system or network. It results in various issues such as illegal a...
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage  29
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
29th IEEE international conference on Parallel and Distributed Systems, ICPADS 2023
作者: Shi, Jiaoli Hu, Chao Yao, Shimao Mei, Zhuolin Wu, Bin Li, Hui Jiujiang Univ. School of Computer and Big Data Jiujiang China Jiangxi Univ. of Finance and Economics School of Software IoT Engineering Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China Jiujiang University School of Computer and Big Data Jiujiang China Peking University School of Elec. and Comp. Engineering Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user's private key to the pr... 详细信息
来源: 评论
data Cataloging based SINDy Approach for Weather Forecasting
Data Cataloging based SINDy Approach for Weather Forecasting
收藏 引用
international conference on Advanced computing, ICAC
作者: X Regis J John Mathuram V Padiyarajan Department of Mechanical Engineering Loyola-ICAM college of Engineering and Technology Chennai India Department of Chemical Engineering Alagappa college of Technology Anna University Chennai India
In the present era, climatic change is a crucial phenomenon that poses a great threat to human and animal life. Accurately simulating and forecasting the temperature of a particular geographical location have been a g...
来源: 评论
A Principled Approach to Model Validation in Domain Generalization
A Principled Approach to Model Validation in Domain Generali...
收藏 引用
international conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Boyang Lyu Thuan Nguyen Matthias Scheutz Prakash Ishwar Shuchin Aeron Department of Electrical and Computer Engineering Tufts University Medford MA Department of Computer Science Tufts University Medford MA Department of Electrical and Computer Engineering Boston University Boston MA
Domain generalization aims to learn a model with good generalization ability, that is, the learned model should not only perform well on several seen domains but also on unseen domains with different data distribution... 详细信息
来源: 评论
Classification of Currencies as Authentic or Counterfeit: A data-Driven Approach  3rd
Classification of Currencies as Authentic or Counterfeit: A ...
收藏 引用
3rd international conference on Signal and data processing, ICSDP 2023
作者: Koushik, K. Venkat Sai, G. Chaurasiya, Rahul K. Department of ECE Maulana Azad National Institute of Technology Bhopal India
The pervasive issue of counterfeit currency poses a significant threat to global economies, leading to substantial financial losses and eroding trust in financial institutions. While traditional methods of counterfeit... 详细信息
来源: 评论
An Efficient Technique for Improving Trust and Privacy in Blockchain as a Service (BaaS)
An Efficient Technique for Improving Trust and Privacy in Bl...
收藏 引用
IEEE Students' conference on Electrical, Electronics and Computer Science (SCEECS)
作者: Sonali Vishwajeet Shinge Urmila Shrawankar Computer Science & Engg. Dept. G. H. Raisoni College of Engineering Nagpur (MS) India Computer Science & Engineering Deptartment G. H. Raisoni College of Engineering Nagpur (MS) India
Cloud computing is a developing technology used for providing various services such as PaaS, IaaS and SaaS for various applications based on the pay as per usage. The foundation of trust is the assurance and confidenc... 详细信息
来源: 评论
Forecasting Future Sea Level Rise: A data-driven Approach using Climate Analysis
Forecasting Future Sea Level Rise: A Data-driven Approach us...
收藏 引用
international conference on Edge computing and Applications (ICECAA)
作者: Vinay Nagarad Dasavandi Krishnamurthy Sheshang Degadwala Dhairya Vyas Bosch Michigan United state of America Head of Computer Engineering Department Sigma University Vadodara Gujarat The Maharaja Sayajirao University of Baroda Vadodara Gujarat India
This research article presents a data-driven approach for predicting future sea level rise using climate data analysis. By employing advanced statistical techniques and machine learning algorithms, the study establish...
来源: 评论
Resume Screening–Testing For data Stability
Resume Screening–Testing For Data Stability
收藏 引用
Innovative computing, Intelligent Communication and Smart Electrical Systems (ICSES), international conference on
作者: Asim Wahedna Adit Vakil Somil Shah Vishakha V. Kelkar Ishan Shrivastava Department of Electronics and Telecommunication Dwarkadas J.Sanghvi College of Engineering Mumbai India
Resume parsing and evaluation are critical tasks for human resources teams, and with the surplus of candidates applying to jobs in today’s time, the process of resume evaluation is both manual and time consuming. The...
来源: 评论
A Privacy-Preserving Method for Blockchain Oracle data Based on Improved Threshold Aggregated Signatures
A Privacy-Preserving Method for Blockchain Oracle Data Based...
收藏 引用
Information Systems and computing Technology (ISCTech), international conference on
作者: Huanliang Xiong Quan Wen Canghai Wu School of Software Jiangxi Agricultural University Nanchang China
Blockchain oracle is one of the important secure channels for obtaining off-chain data in the blockchain. Addressing the weak security issue in existing blockchain oracle solutions when acquiring and validating multi-...
来源: 评论
Fast Prediction for Suspect Candidates from Criminal Networks
Fast Prediction for Suspect Candidates from Criminal Network...
收藏 引用
international conference on Big data and Smart computing (BIGCOMP)
作者: Jong Ho Jhee Myung Jun Kim Myunggeon Park Jeongheun Yeon Yoonshin Kwak Hyunjung Shin Center for KIURI Bio-Artificial Intelligence Ajou University School of Medicine Suwon South Korea Soda INRIA Saclay Palaiseau France Marketboro Crop. Seongnam South Korea Department of Artificial Intelligence Ajou University Suwon South Korea Department of Industrial Engineering Department of Artificial Intelligence Ajou University Suwon South Korea
Machine learning approaches have been introduced to support criminal investigations in recent years. In criminal investigations, Criminal acts may be similar, and similar incidents may occur consecutively by the same ... 详细信息
来源: 评论