咨询与建议

限定检索结果

文献类型

  • 1,560 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 1,561 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 884 篇 工学
    • 764 篇 计算机科学与技术...
    • 525 篇 软件工程
    • 249 篇 信息与通信工程
    • 192 篇 控制科学与工程
    • 127 篇 电气工程
    • 82 篇 网络空间安全
    • 77 篇 生物医学工程(可授...
    • 72 篇 安全科学与工程
    • 63 篇 交通运输工程
    • 61 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 44 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 42 篇 石油与天然气工程
    • 41 篇 光学工程
  • 302 篇 理学
    • 161 篇 数学
    • 82 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 60 篇 物理学
    • 37 篇 系统科学
    • 33 篇 化学
  • 262 篇 管理学
    • 199 篇 管理科学与工程(可...
    • 104 篇 图书情报与档案管...
    • 82 篇 工商管理
    • 34 篇 公共管理
  • 112 篇 医学
    • 78 篇 临床医学
    • 75 篇 公共卫生与预防医...
    • 62 篇 基础医学(可授医学...
  • 49 篇 法学
    • 47 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 18 篇 文学
  • 15 篇 教育学
  • 11 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 193 篇 data models
  • 157 篇 accuracy
  • 153 篇 computational mo...
  • 92 篇 training
  • 86 篇 feature extracti...
  • 86 篇 machine learning
  • 77 篇 predictive model...
  • 69 篇 data mining
  • 67 篇 deep learning
  • 63 篇 real-time system...
  • 57 篇 big data
  • 49 篇 adaptation model...
  • 45 篇 security
  • 44 篇 robustness
  • 41 篇 decision making
  • 40 篇 convolutional ne...
  • 39 篇 cloud computing
  • 36 篇 analytical model...
  • 35 篇 neural networks
  • 34 篇 optimization

机构

  • 14 篇 lovely professio...
  • 7 篇 shandong provinc...
  • 7 篇 key laboratory o...
  • 6 篇 college of mecha...
  • 6 篇 institute of aer...
  • 5 篇 lloyd institute ...
  • 5 篇 college of intel...
  • 5 篇 national univers...
  • 5 篇 department of co...
  • 5 篇 shandong fundame...
  • 5 篇 national univers...
  • 5 篇 institute of aer...
  • 4 篇 karnataka bangal...
  • 4 篇 shanghai jiao to...
  • 4 篇 school of comput...
  • 4 篇 chitkara univers...
  • 4 篇 new horizon coll...
  • 4 篇 srm institute of...
  • 4 篇 school of softwa...
  • 4 篇 koneru lakshmaia...

作者

  • 7 篇 nijhawan ginni
  • 5 篇 jeanette miriam ...
  • 5 篇 lu xiaobo
  • 5 篇 singh navdeep
  • 4 篇 nicola franco
  • 4 篇 choudhry mani de...
  • 4 篇 akhil karnam
  • 4 篇 zhang rui
  • 4 篇 yu zhang
  • 4 篇 akshya j.
  • 4 篇 lihui wang
  • 4 篇 qu yuben
  • 4 篇 wang lihui
  • 4 篇 li lei
  • 4 篇 dong chao
  • 4 篇 dutt varun
  • 4 篇 puri chetan
  • 3 篇 yuangan wang
  • 3 篇 junqi luo
  • 3 篇 zhang lei

语言

  • 1,452 篇 英文
  • 108 篇 其他
  • 3 篇 中文
检索条件"任意字段=2024 IEEE International Conference on Cognitive Computing and Complex Data"
1561 条 记 录,以下是291-300 订阅
排序:
CyberShield Cloud: Fortifying data Exchange with Role-Based Encryption Mastery  1
CyberShield Cloud: Fortifying Data Exchange with Role-Based ...
收藏 引用
1st international conference on cognitive, Green and Ubiquitous computing, IC-CGU 2024
作者: Abinaya, P. Senthil Kumar, J. Aakash, T. Roshan, Jerry J A Mepco Schlenk Engineering College Department of Computer Science and Engineering Sivakasi India Mepco Schlenk Engineering College Department of Electronics and Communication Engineering Sivakasi India
In today's digital landscape, when a myriad of products are widely available online, the critical necessity for authenticity, anonymity, and security above accessibility high-lights the importance of encryption wi... 详细信息
来源: 评论
3D reconstruction and path planning of complex parts for laser cladding  9
3D reconstruction and path planning of complex parts for las...
收藏 引用
9th international conference on Image, Vision and computing, ICIVC 2024
作者: Zhu, Hao Wang, Shaopeng School of Information and Communication Engineering Nanjing Institute of Technology Nanjing China Jiangsu Advanced CNC and Electric Power Transmission Key Laboratory Nanjing Institute of Technology Nanjing China
When laser cladding is performed on a free surface, the accuracy of 3D reconstruction of the parts and the planning of the cladding path have a significant impact on the machining quality. This article studies the pat... 详细信息
来源: 评论
An Action Recognition Algorithm Based on Two-Stream Deep Learning for Metaverse Applications  20
An Action Recognition Algorithm Based on Two-Stream Deep Lea...
收藏 引用
20th ieee international Wireless Communications and Mobile computing (ieee IWCMC) - Green and Intelligent Communications
作者: Liu, Jiayue Mao, Tianqi Huang, Yicheng He, Dongxuan Beijing Inst Technol MIIT Key Lab Complex Field Intelligent Sensing Beijing 100081 Peoples R China Beijing Inst Technol Jiaxing Yangtze Delta Reg Acad Jiaxing 314019 Peoples R China Tsinghua Univ Dept Elect Engn Beijing 100084 Peoples R China Beijing Inst Technol Sch Informat & Elect Beijing 100081 Peoples R China
Action recognition algorithms have gained significant attention in recent years, which can be indispensable for a plethora of cutting-edge applications like extended reality or Metaverse. These services often pose str... 详细信息
来源: 评论
Spatiotemporal Analysis and Risk Profiling of Dengue in Lima and Callao: A data-Driven Approach for Tailored Prevention Policies  31
Spatiotemporal Analysis and Risk Profiling of Dengue in Lima...
收藏 引用
31st ieee international conference on Electronics, Electrical Engineering and computing, INTERCON 2024
作者: Alcocer, Rodrigo Alonso Bisetti Llerena, Soledad Espezua Universidad del Pacífico Facultad de Ingeniería Lima Peru
The recent atypical increase in dengue cases in Lima and Callao, Peru, underscores the need for a more sophisticated approach to controlling this disease in urban settings. This study employs advanced data mining tech... 详细信息
来源: 评论
Chart Career Using AI and data Analytics  1
Chart Career Using AI and Data Analytics
收藏 引用
1st international conference on Computational Intelligence for Security, Communication and Sustainable Development, CISCSD 2024
作者: Yogitha Ramani, Roja Nayak, Vaishnavi Sirisha, M. New Horizon College of Engineering Department of Computer Science and Engineering Bengaluru India
In the realm of educational research, a comprehensive analysis of student performance unfolds through the application of diverse machine learning algorithms. These algorithms serve as advanced analytical tools, distil... 详细信息
来源: 评论
cognitive Dissonance in Banking Employees: Exploring Factors Amid the Artificial Intelligence Revolution
Cognitive Dissonance in Banking Employees: Exploring Factors...
收藏 引用
2024 ASU international conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024
作者: Sachdeva, Channi Gangwar, Veer P Grover, Veena Gochhait, Saikat Mittal School of Business Lovely Professional University Jalandhar India School of Management Noida Institute of Engineering and Technology Greater Noida India Symbiosis Institute of Digital and Telecom Management Symbiosis International Deemed University India Neurosciences Research Institute Russia
This research explores the complex terrain of cognitive dissonance that banking industry employees encounter while negotiating the changing environment of artificial intelligence (AI) integration. In a time when artif... 详细信息
来源: 评论
Towards Precision Dementia Detection: Integrating ML and Clinical data  2
Towards Precision Dementia Detection: Integrating ML and Cli...
收藏 引用
2nd international conference on Advancements in Smart, Secure and Intelligent computing, ASSIC 2024
作者: Kandula, Niravange Chakravarty, Sujata Kandula, Aksha Mohapatra, Sunil Kumar Centurion University of Technology & Management Computer Science & Engineering Vizianagaram India Centurion University of Technology & Management Computer Science & Engineering Bhubaneswar India Andhra University College of Engineering Computer Science & Engineering Andhra Pradesh Visakhapatnam India
The dominant pathology theory holds that dementia results from amyloid buildup, followed by tau protein aggregation and neurodegeneration. Current anti-amyloid and anti-tau therapies, however, show varied therapeutic ... 详细信息
来源: 评论
Enhanced Cloud Security Through DNA-based Authentication for data Storage and Transactions  5
Enhanced Cloud Security Through DNA-based Authentication for...
收藏 引用
5th international conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Yuvarani, R. Mahaveerakannan, R. Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Computer Science and Engineering Tamilnadu Chennai602105 India
Cloud computing has experienced rapid growth, yet data breaches and unauthorized account access continue to be significant threats. Traditional cryptographic authentication methods, although mathematically complex, of... 详细信息
来源: 评论
cognitive Differences in Network Security Based on Mathematical Modeling Based on Ensemble Learning Algorithm  2
Cognitive Differences in Network Security Based on Mathemati...
收藏 引用
2nd international conference on data Science and Information System, ICDSIS 2024
作者: Wang, Weiwei Shandong Polytechnic Teaching Department Of Humanities And Basic Courses Jinan China
With the rapid development of network technology and digital economy, network security issues are increasingly receiving widespread attention. People's awareness of network security has attracted the attention of ... 详细信息
来源: 评论
Achieving High-Accuracy Human Activity Recognition Using BERT-Based Classwise Ensemble Models
Achieving High-Accuracy Human Activity Recognition Using BER...
收藏 引用
2024 ieee international conference on computing, Applications and Systems, COMPAS 2024
作者: Rahman Fuad, K.M Nafiur Ahmed, Mumtahina Rabbani Abir, Md. Golam Anisur Rahman, Md Hossain Zamil, Md Zakir Mridha, M.F. Shin, Jungpil Bangladesh University of Business and Technology Dhaka Bangladesh Western Illinois University IL United States American International University - Bangladesh Dhaka Bangladesh The University of Aizu School of Computer Science and Engineering Aizuwakamatsu Japan
Human Activity Recognition (HAR) plays a vital role in ubiquitous computing and has a wide range of applications in healthcare, sports, and human-computer interaction. The study presents an innovative way of leveragin... 详细信息
来源: 评论