咨询与建议

限定检索结果

文献类型

  • 6,860 篇 会议
  • 72 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 6,977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,967 篇 工学
    • 3,667 篇 计算机科学与技术...
    • 2,767 篇 软件工程
    • 1,207 篇 信息与通信工程
    • 718 篇 控制科学与工程
    • 518 篇 电气工程
    • 475 篇 生物工程
    • 338 篇 网络空间安全
    • 314 篇 生物医学工程(可授...
    • 274 篇 电子科学与技术(可...
    • 262 篇 动力工程及工程热...
    • 221 篇 交通运输工程
    • 221 篇 安全科学与工程
    • 216 篇 机械工程
    • 211 篇 仪器科学与技术
    • 179 篇 光学工程
    • 170 篇 石油与天然气工程
    • 167 篇 化学工程与技术
  • 1,728 篇 理学
    • 1,027 篇 数学
    • 494 篇 生物学
    • 372 篇 统计学(可授理学、...
    • 309 篇 物理学
    • 257 篇 化学
    • 195 篇 系统科学
  • 1,374 篇 管理学
    • 782 篇 图书情报与档案管...
    • 755 篇 管理科学与工程(可...
    • 352 篇 工商管理
  • 342 篇 医学
    • 272 篇 临床医学
    • 260 篇 基础医学(可授医学...
    • 170 篇 公共卫生与预防医...
  • 196 篇 法学
    • 164 篇 社会学
  • 130 篇 经济学
  • 87 篇 农学
  • 72 篇 教育学
  • 19 篇 文学
  • 8 篇 军事学
  • 2 篇 艺术学

主题

  • 311 篇 big data
  • 297 篇 machine learning
  • 213 篇 deep learning
  • 211 篇 data mining
  • 203 篇 data models
  • 158 篇 cloud computing
  • 139 篇 machine learning...
  • 124 篇 training
  • 120 篇 computational mo...
  • 116 篇 feature extracti...
  • 108 篇 signal processin...
  • 103 篇 predictive model...
  • 97 篇 internet of thin...
  • 96 篇 signal processin...
  • 94 篇 prediction algor...
  • 89 篇 support vector m...
  • 83 篇 data privacy
  • 81 篇 artificial intel...
  • 75 篇 sentiment analys...
  • 72 篇 edge computing

机构

  • 88 篇 maharishi school...
  • 67 篇 centre of interd...
  • 31 篇 department of ar...
  • 28 篇 tianjin universi...
  • 28 篇 college of compu...
  • 27 篇 vishwakarma inst...
  • 26 篇 department of co...
  • 26 篇 department of el...
  • 25 篇 chitkara univers...
  • 25 篇 department of co...
  • 22 篇 department of in...
  • 20 篇 vivekananda glob...
  • 19 篇 university of ch...
  • 18 篇 vishwakarma inst...
  • 17 篇 chitkara univers...
  • 17 篇 lovely professio...
  • 17 篇 department of sc...
  • 16 篇 department of el...
  • 15 篇 vishwakarma inst...
  • 14 篇 key laboratory o...

作者

  • 13 篇 ramakrishnan ram...
  • 11 篇 dipannita mondal
  • 10 篇 wang jing
  • 10 篇 nitin n. sakhare
  • 10 篇 mondal dipannita
  • 10 篇 rajeswari d.
  • 8 篇 kumar ritesh
  • 8 篇 akhilendra prata...
  • 8 篇 xu xiaolong
  • 8 篇 li zuoyong
  • 8 篇 jambi ratna raja...
  • 7 篇 chen chen
  • 7 篇 liu ying
  • 7 篇 wang tao
  • 7 篇 vaishali singh
  • 7 篇 kodipalli ashwin...
  • 7 篇 zhang jing
  • 6 篇 zheng-guang wu
  • 6 篇 bin wang
  • 6 篇 ye jun

语言

  • 3,941 篇 英文
  • 3,029 篇 其他
  • 156 篇 中文
检索条件"任意字段=2023 International Conference on Algorithms, Computing and Data Processing, ACDP 2023"
6977 条 记 录,以下是4701-4710 订阅
Classification and prediction of ECG data based on decision trees and their optimization algorithms
Classification and prediction of ECG data based on decision ...
收藏 引用
Computers, Information processing and Advanced Education (CIPAE), 2020 international conference on
作者: Runqiang Xing Xi’an Technological University Xi’an China
The heart beat is usually synchronized with the electrical activity of the heart, and the ECG records the representation of the heart's electrical signals on the body surface. In this study, we developed a classif...
来源: 评论
Detection of Misinformation Related to Pandemic Diseases Using Machine Learning  7th
Detection of Misinformation Related to Pandemic Diseases Usi...
收藏 引用
7th EAI international conference on Robotics and Networks, ROSENET 2023
作者: Naeem, Javaria Gül, Ömer Melih Parlak, Ismail Burak Karpouzis, Kostas Kadry, Seifedine Nimer Salman, Yücel Batu Department of Computer Engineering Bahçeşehir University İstanbul Turkey Department of Computer Engineering Galatasaray University İstanbul Turkey Panteion Uninversity of Social and Political Sciences Kallithea Greece Department of Applied Data Science Noroff College Kristiansand Norway Ajman University Ajman United Arab Emirates Department of Software Engineering Bahcesehir University İstanbul Turkey
The advent of the COVID-19 pandemic has brought with it not only a global health crisis but also an infodemic characterized by the rampant spread of misinformation on social media platforms. In response to the urgent ... 详细信息
来源: 评论
Convolutional Neural Networks For Eye Detection Trained With Manually And Automatically Generated Ground Truth data
Convolutional Neural Networks For Eye Detection Trained With...
收藏 引用
international Symposium on Symbolic and Numeric algorithms for Scientific computing (SYNASC)
作者: Sorin Valcan Mihail Găianu Department of Computer Science West University of Timişoara and Continental Automotive Romania - User Experience UX Timişoara Romania
Eye detection represents an essential facial feature to be detected in driver monitoring systems representing the basis for further processing for attention or drowsiness detection. The machine learning approach for i...
来源: 评论
GAPter: Gray-Box data Protector for Deep Learning Inference Services at User Side
GAPter: Gray-Box Data Protector for Deep Learning Inference ...
收藏 引用
international conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Hao Wu Bo Yang Xiaopeng Ke Siyi He Fengyuan Xu Sheng Zhong State Key Laboratory for Novel Software Technology Nanjing University
The widespread deployment of Deep Learning Inference Services (DLISes) has raised people’s concerns about their data privacy being breached. Although data privacy enhancement has recently attracted a lot of attention... 详细信息
来源: 评论
Parallel computing Approach for Preprocessing AIS data in Transshipment Feature Extraction
Parallel Computing Approach for Preprocessing AIS Data in Tr...
收藏 引用
international conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS)
作者: Widyadi Setiawan Linawati Linawati I Made Oka Widyantara Dewa Made Wiharta Putu Arya Mertasana Sri Andriati Asri Doctoral Program of Engineering Science Udayana University Denpasar Indonesia Electrical Engineering Departement Udayana University Denpasar Indonesia Electrical Engineering Departement Politeknik Negeri Bali Denpasar Indonesia
AIS (Automatic Identification System) data is an important data source in the shipping and logistics industry to track and monitor ships in real-time. Extraction of transshipment features from AIS data is essential in...
来源: 评论
Research on Image processing of Big data Based on Computer Vision
Research on Image Processing of Big Data Based on Computer V...
收藏 引用
Internet of Things, Robotics and Distributed computing (ICIRDC), international conference on
作者: Cui Wang Yuanyuan Wang Weifang Engineering Vocational College Weifang China
With the advent of the era of big data, the image processing of big data based on Computer Vision (CV) has become a research field of great concern. The purpose of this study is to explore how to improve image process...
来源: 评论
Utilizing Machine Learning to Develop an Improved Real-Time data Analysis System
Utilizing Machine Learning to Develop an Improved Real-Time ...
收藏 引用
Smart Generation computing, Communication and Networking (SMART GENCON), international conference on
作者: Harsimrat Khandari Girija Shankar Sahoo Raja Praveen K N Ritu Shree Umamaheswari B Yashwant V Centre of Interdisciplinary Research in Business and Technology Chitkara University Institute of Engineering and technology Chitkara University Punjab India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Department of Computer Science and Engineering Faculty of Engineering and Technology JAIN (Deemed-to-be University) Bangalore Karnataka India Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Computer Science and Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai Department of Computer Engineering Vishwakarma Institute of Information Technology Pune India
With the constantly growing volume of facts being produced, conventional data evaluation structures are regularly insufficient in terms of presenting an correct overview of the most modern-day data. The utilization of...
来源: 评论
Feature Selection Implementation on High-Dimensional data using Firefly Algorithm
Feature Selection Implementation on High-Dimensional Data us...
收藏 引用
international conference on Informatics and computing (ICIC)
作者: Tessy Badriyah Iwan Syarif Danang Djehan Lukmanto Prakoso Politeknik Elektronika Negeri Surabaya Indonesia
High-dimensional data often presents a challenge in machine learning tasks due to the curse of dimensionality. Feature selection is a common technique used to overcome this problem by reducing the number of features a...
来源: 评论
The Smart Application of data Mining in the Detection of Fraudulent Transactions
The Smart Application of Data Mining in the Detection of Fra...
收藏 引用
Smart Generation computing, Communication and Networking (SMART GENCON), international conference on
作者: Aniruddha Bodhankar Upendra Singh Aswal D. Arivazhagn Sachin S. Pund Nandini Kulkarni Sudhir Kumar Chaturvedi Department of Data Science & Information Systems Dr. Ambedkar Institute of Management Studies and Research- Nagpur Nagpur India Department of Industrial Engineering Shri Ramdeobaba College of Engineering and Management Nagpur Maharashtra India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Symbiosis School of Planning Architecture and Design Nagpur Symbiosis International University Nagpur India Department of AMET Business school Academy of Maritime Education and Training Deemed to be university Chennai Department of School of Engineering UPES Dehradun India
Records mining is a powerful analytical device used to find out styles, correlations, and traits in large facts sets. Smart application of data mining methods within the detection of fraudulent transactions has finish...
来源: 评论
A data encryption scheme combined symmetric encryption algorithm with asymmetric encryption algorithm
A data encryption scheme combined symmetric encryption algor...
收藏 引用
5th international conference on Artificial Intelligence and Advanced Manufacturing (AIAM 2023)
作者: Y. Wang School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan People's Republic of China
In order to explore the research of computer network data security encryption technology. The author proposes a data encryption scheme that combines symmetric encryption algorithms with asymmetric encryption algorithm...
来源: 评论