咨询与建议

限定检索结果

文献类型

  • 6,860 篇 会议
  • 72 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 6,977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,967 篇 工学
    • 3,667 篇 计算机科学与技术...
    • 2,767 篇 软件工程
    • 1,207 篇 信息与通信工程
    • 718 篇 控制科学与工程
    • 518 篇 电气工程
    • 475 篇 生物工程
    • 338 篇 网络空间安全
    • 314 篇 生物医学工程(可授...
    • 274 篇 电子科学与技术(可...
    • 262 篇 动力工程及工程热...
    • 221 篇 交通运输工程
    • 221 篇 安全科学与工程
    • 216 篇 机械工程
    • 211 篇 仪器科学与技术
    • 179 篇 光学工程
    • 170 篇 石油与天然气工程
    • 167 篇 化学工程与技术
  • 1,728 篇 理学
    • 1,027 篇 数学
    • 494 篇 生物学
    • 372 篇 统计学(可授理学、...
    • 309 篇 物理学
    • 257 篇 化学
    • 195 篇 系统科学
  • 1,374 篇 管理学
    • 782 篇 图书情报与档案管...
    • 755 篇 管理科学与工程(可...
    • 352 篇 工商管理
  • 342 篇 医学
    • 272 篇 临床医学
    • 260 篇 基础医学(可授医学...
    • 170 篇 公共卫生与预防医...
  • 196 篇 法学
    • 164 篇 社会学
  • 130 篇 经济学
  • 87 篇 农学
  • 72 篇 教育学
  • 19 篇 文学
  • 8 篇 军事学
  • 2 篇 艺术学

主题

  • 311 篇 big data
  • 297 篇 machine learning
  • 213 篇 deep learning
  • 211 篇 data mining
  • 203 篇 data models
  • 158 篇 cloud computing
  • 139 篇 machine learning...
  • 124 篇 training
  • 120 篇 computational mo...
  • 116 篇 feature extracti...
  • 108 篇 signal processin...
  • 103 篇 predictive model...
  • 97 篇 internet of thin...
  • 96 篇 signal processin...
  • 94 篇 prediction algor...
  • 89 篇 support vector m...
  • 83 篇 data privacy
  • 81 篇 artificial intel...
  • 75 篇 sentiment analys...
  • 72 篇 edge computing

机构

  • 88 篇 maharishi school...
  • 67 篇 centre of interd...
  • 31 篇 department of ar...
  • 28 篇 tianjin universi...
  • 28 篇 college of compu...
  • 27 篇 vishwakarma inst...
  • 26 篇 department of co...
  • 26 篇 department of el...
  • 25 篇 chitkara univers...
  • 25 篇 department of co...
  • 22 篇 department of in...
  • 20 篇 vivekananda glob...
  • 19 篇 university of ch...
  • 18 篇 vishwakarma inst...
  • 17 篇 chitkara univers...
  • 17 篇 lovely professio...
  • 17 篇 department of sc...
  • 16 篇 department of el...
  • 15 篇 vishwakarma inst...
  • 14 篇 key laboratory o...

作者

  • 13 篇 ramakrishnan ram...
  • 11 篇 dipannita mondal
  • 10 篇 wang jing
  • 10 篇 nitin n. sakhare
  • 10 篇 mondal dipannita
  • 10 篇 rajeswari d.
  • 8 篇 kumar ritesh
  • 8 篇 akhilendra prata...
  • 8 篇 xu xiaolong
  • 8 篇 li zuoyong
  • 8 篇 jambi ratna raja...
  • 7 篇 chen chen
  • 7 篇 liu ying
  • 7 篇 wang tao
  • 7 篇 vaishali singh
  • 7 篇 kodipalli ashwin...
  • 7 篇 zhang jing
  • 6 篇 zheng-guang wu
  • 6 篇 bin wang
  • 6 篇 ye jun

语言

  • 3,941 篇 英文
  • 3,029 篇 其他
  • 156 篇 中文
检索条件"任意字段=2023 International Conference on Algorithms, Computing and Data Processing, ACDP 2023"
6977 条 记 录,以下是651-660 订阅
排序:
Energy-efficient OECT Sensor data Analysis on Constrained Edge Devices  11
Energy-efficient OECT Sensor Data Analysis on Constrained Ed...
收藏 引用
11th IEEE international conference on Cloud Engineering (IC2E)
作者: Saccani, Francesco Bettelli, Manuele Gentile, Francesco Amoretti, Michele Univ Parma Dept Engn & Architecture Parma Italy Inst Mat Elect & Magnetism IMEM CNR Parma Italy Magna Graecia Univ Catanzaro Dept Expt & Clin Med Catanzaro Italy
A new frontier in Smart Agriculture is merging nanobiotechnology with edge computing, for on-field raw data collection and processing. Smart plant sensors communicate plant chemical signals to on-field agricultural an... 详细信息
来源: 评论
Whose data are Reliable: Sensor Declared data Reliability  19
Whose Data are Reliable: Sensor Declared Data Reliability
收藏 引用
19th international conference on Wireless and Mobile computing, Networking and Communications (WiMob)
作者: Shafin, Sakib Shahriar Karmakar, Gour Mareels, Iven Balasubramanian, Venki Kolluri, Ramachandra Rao Federat Univ Australia Ctr Smart Analyt CSA Ballarat Vic 3350 Australia Federat Univ Australia Inst Innovat Sci & Sustainabil Ballarat Vic 3350 Australia IBM Australia Pty Ltd IBM Consulting St Leonards Australia
Sensor data is susceptible to faults, noise, and malicious attacks, posing a significant operational and security threat. Therefore, ensuring reliability of sensor data is critical for real-time monitoring systems. Pr... 详细信息
来源: 评论
A Survey on Mechanisms for Fast Network Packet processing  23
A Survey on Mechanisms for Fast Network Packet Processing
收藏 引用
4th international conference on computing, Networks and Internet of Things, CNIOT 2023
作者: Du, Yimin Chang, Keyang Shi, Jinglin Zhou, Yiqing Liu, Min Institute of Computing Technology Chinese Academy of Sciences Beijing China
As the Internet of Things becoming widely used, the requirement for high performance network is growing rapidly. Network performance is affected by data transmission based on physical link and packet processing handle... 详细信息
来源: 评论
Research on A Coal Mine Safety Knowledge Model Based on Spatial Knowledge Map Service  8
Research on A Coal Mine Safety Knowledge Model Based on Spat...
收藏 引用
8th international conference on Intelligent computing and Signal processing, ICSP 2023
作者: Zhang, Xinju Jiang, Haiyan Zhai, Lulu Big Data Center of Ministry of Emergency Management Dongcheng District Hepingli North Street No.Jia 4 Beijing China
Research on conceptual models for coal mine safety management rely on data mining. Text mining of big data is used to extract the laws and rules that are implied in safety models, making these laws and rules more tran... 详细信息
来源: 评论
Predictive Queue-based Low Latency Congestion Detection in data Center Networks  21
Predictive Queue-based Low Latency Congestion Detection in D...
收藏 引用
21st IEEE international Symposium on Parallel and Distributed processing with Applications, 13th IEEE international conference on Big data and Cloud computing, 16th IEEE international conference on Social computing and Networking and 13th international conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Dong, Pingping Lu, Xiaojuan Huang, Tairan Chen, Liying Yang, Yang Zhang, Lianming Hunan Normal University College of Information Science and Engineering Changsha China
End-to-end congestion control in lossless data center networks (DCN) depends on congestion detection. However, many current congestion control mechanisms ignore the mutually reinforcing relationship with congestion de... 详细信息
来源: 评论
Leveraging Neural Networks to Enhance Large-Scale data processing Performance  3
Leveraging Neural Networks to Enhance Large-Scale Data Proce...
收藏 引用
3rd international conference on Smart Generation computing, Communication and Networking, SMART GENCON 2023
作者: Pandey, Megha Vinay Kumar, S.B. Khurana, Jatin Kalpana, B. Pathak, Kishor R. Kumar, Mukesh Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India 1 Electronics and Communication Engineering Faculty of Engineering and Technology Karnataka Bangalore India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Science and Humanities Chennai127 India Vishwakarma Institute of Information Technology Department of Information Technology Pune India Vivekananda Global University Department of Mechanical Engineering Jaipur India
Recent advances in neural networks have enabled them to become powerful tools in data processing for tasks such as pattern recognition and classification. This has enabled neural networks to be applied to large-scale ... 详细信息
来源: 评论
Detection and Classification of DDoS Attacks in Cloud data Using Hybrid LSTM and RNN for Feature Selection
Detection and Classification of DDoS Attacks in Cloud Data U...
收藏 引用
2023 international conference on Circuit Power and computing Technologies, ICCPCT 2023
作者: Karthika, R.A. Sriramya, P. Rohini, A. SRMIST Dept. of Computational Intelligence Chennai India Saveetha School of Engineering SIMATS Dept. of Artificial Intelligence and Data Science Chennai India Presidency University Dept. of CSE Bengaluru India
Cyber threats are the main source of concern in the sector it is deployed. DDoS attacks are at the very top of the list. The rapid growth of cloud migration also expands the attack surface. Different forms of DDoS att... 详细信息
来源: 评论
Multi-Server Based Task Offloading Strategy in Mobile Edge computing
Multi-Server Based Task Offloading Strategy in Mobile Edge C...
收藏 引用
2023 international conference on algorithms, High Performance computing, and Artificial Intelligence, AHPCAI 2023
作者: Wei, Zeju Gao, Jingnan Ruan, Peiguang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Alibaba Cloud Big Data Application College Zhuhai College of Science and Technology Zhuhai China
Edge computing, as a complement to cloud computing, has many unique advantages. In mobile edge computing (MEC) scenarios, tasks on terminal devices can be offloaded to edge servers for computing purposes, reducing the... 详细信息
来源: 评论
Application Research of Computer Virtual Reality Technology in Big data Information Face Recognition System  5
Application Research of Computer Virtual Reality Technology ...
收藏 引用
2023 5th international conference on Artificial Intelligence and Computer Applications, ICAICA 2023
作者: Yu, Xin Li, Yuan Modern Finance Industry School Shandong Institute of Commerce and Technology Shandong Jinan China
This paper studies the edge-cloud collaborative face recognition technology. This project intends to integrate cloud computing technology with boundary computing technology, breaking through the limitations of traditi... 详细信息
来源: 评论
A Federated Learning Network Intrusion Detection System for Multiple Imbalances
A Federated Learning Network Intrusion Detection System for ...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal processing, ICASSP 2025
作者: Zeng, Yifan Zheng Li, Jian School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Jinan China
Centralized training of deep learning-based network intrusion detection systems (DLNIDS) raises privacy concerns and incurs huge overhead. Federated learning (FL), while preserving privacy, confronts challenges includ... 详细信息
来源: 评论