咨询与建议

限定检索结果

文献类型

  • 8,812 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 8,820 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,455 篇 工学
    • 5,763 篇 计算机科学与技术...
    • 4,862 篇 软件工程
    • 2,244 篇 信息与通信工程
    • 959 篇 控制科学与工程
    • 702 篇 生物工程
    • 637 篇 电气工程
    • 553 篇 生物医学工程(可授...
    • 509 篇 电子科学与技术(可...
    • 451 篇 机械工程
    • 418 篇 光学工程
    • 405 篇 仪器科学与技术
    • 330 篇 化学工程与技术
    • 326 篇 安全科学与工程
    • 316 篇 动力工程及工程热...
    • 315 篇 网络空间安全
    • 279 篇 交通运输工程
  • 3,281 篇 理学
    • 1,894 篇 数学
    • 785 篇 生物学
    • 742 篇 统计学(可授理学、...
    • 512 篇 物理学
    • 376 篇 系统科学
    • 296 篇 化学
  • 2,596 篇 管理学
    • 1,504 篇 管理科学与工程(可...
    • 1,281 篇 图书情报与档案管...
    • 800 篇 工商管理
  • 543 篇 医学
    • 464 篇 临床医学
    • 450 篇 基础医学(可授医学...
    • 309 篇 公共卫生与预防医...
  • 447 篇 法学
    • 368 篇 社会学
  • 374 篇 经济学
    • 373 篇 应用经济学
  • 242 篇 农学
  • 211 篇 教育学
  • 130 篇 文学
  • 51 篇 军事学
  • 13 篇 艺术学
  • 1 篇 哲学

主题

  • 272 篇 data mining
  • 247 篇 big data
  • 155 篇 internet of thin...
  • 122 篇 convolutional ne...
  • 108 篇 machine learning
  • 105 篇 support vector m...
  • 103 篇 feature extracti...
  • 100 篇 deep learning
  • 99 篇 blockchain
  • 92 篇 data models
  • 87 篇 forecasting
  • 84 篇 data acquisition
  • 84 篇 classification (...
  • 82 篇 information mana...
  • 80 篇 cryptography
  • 75 篇 students
  • 61 篇 cloud computing
  • 59 篇 semantics
  • 58 篇 adversarial mach...
  • 58 篇 wireless sensor ...

机构

  • 59 篇 beijing institut...
  • 40 篇 the islamic univ...
  • 35 篇 chitkara univers...
  • 29 篇 beijing institut...
  • 27 篇 graphic era deem...
  • 25 篇 university of el...
  • 24 篇 national univers...
  • 24 篇 beijing institut...
  • 22 篇 applied science ...
  • 22 篇 graphic era deem...
  • 22 篇 karpagam academy...
  • 19 篇 vishwakarma inst...
  • 19 篇 beijing institut...
  • 18 篇 chitkara univers...
  • 18 篇 shenyang ligong ...
  • 17 篇 pune
  • 16 篇 tsinghua univers...
  • 16 篇 college of techn...
  • 15 篇 department of co...
  • 15 篇 ncba&e school of...

作者

  • 22 篇 liu yang
  • 21 篇 pareek piyush ku...
  • 20 篇 liu quanhua
  • 18 篇 li yang
  • 15 篇 wang jian
  • 15 篇 kukreja vinay
  • 14 篇 raman ramakrishn...
  • 14 篇 ding zegang
  • 13 篇 wang wei
  • 12 篇 li jun
  • 12 篇 chen yen-wei
  • 11 篇 dong zhen
  • 11 篇 chen liang
  • 11 篇 yang jian
  • 10 篇 zhang lei
  • 10 篇 wang jing
  • 10 篇 srinivasan c.
  • 10 篇 china
  • 9 篇 wang tao
  • 9 篇 huang pingping

语言

  • 8,168 篇 英文
  • 367 篇 其他
  • 285 篇 中文
检索条件"任意字段=2nd IEEE Conference on Information Technology and Data Science, CITDS 2022"
8820 条 记 录,以下是1-10 订阅
排序:
2022 ieee 2nd conference on information technology and data science, citds 2022 - Proceedings
2022 IEEE 2nd Conference on Information Technology and Data ...
收藏 引用
2nd ieee conference on information technology and data science, citds 2022
The proceedings contain 45 papers. The topics discussed include: smart watch activity recognition using plot image analysis;single user activity recognition with density activity abstraction graphics algorithm;a multi...
来源: 评论
Predictive Model for Student Career Success Using Blockchain technology and Machine learning  2
Predictive Model for Student Career Success Using Blockchain...
收藏 引用
2nd International conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Aggarwal, Mansi Vyas, Vaibhav Department of Computer Science Banasthali Vidyapith Rajasthan India Department of Computer Science and Engineering- AIML ABES Engineering College UP Ghaziabad India
Using blockchain for student career prediction offers key benefits, including enhanced data security and privacy through encryption and immutability, ensuring personal information protection. It provides transparency ... 详细信息
来源: 评论
Blockchain for Patient-Centric Solutions Using Distributed Ledger technology  2
Blockchain for Patient-Centric Solutions Using Distributed L...
收藏 引用
2nd International conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Sandhya, G. Vaishnavi, T. Subashree, M. Naveen Kumar, A. Sri Krishna College of Technology Computer Science and Engineering Tamil Nadu India
Blockchain technology, with its decentralized and tamper-resistant nature, has the potential to revolutionize healthcare by improving data security, reliability, and interoperability. By leveraging encryption methods ... 详细信息
来源: 评论
Intelligent Algorithm System for Security Governance Driven by Big data in Autonomous Systems  2
Intelligent Algorithm System for Security Governance Driven ...
收藏 引用
2nd International conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Wang, Yiran Shanghai University of Political Science and Law Shanghai201500 China
With the advancement of big data encryption and decryption technology, the role of data in national governance and social governance has become increasingly prominent. In order to effectively deal with the increasingl... 详细信息
来源: 评论
Towards Designing an information Superhighway for Neurological Disorders  2
Towards Designing an Information Superhighway for Neurologic...
收藏 引用
2nd International conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Mazumdar, Bireshwar Dass Gupta, Prashant K. Singh, Mohak Singh, Sujal School of Computer Science & Engineering Technology Bennett University Uttar Pradesh Greater Noida India
Neurological Disorders impact a subject's/person's nervous system in various ways and include a wide range of neurological conditions. More often than not, the impact is life altering and affects the subject&#... 详细信息
来源: 评论
AES Efficient Encryption of Multimedia data using Threads for 5G System  2
AES Efficient Encryption of Multimedia Data using Threads fo...
收藏 引用
2nd International conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Govinda Rajulu, G. Sharmila, L. Venkatesan, D. Kumar, Nathi Kranthi Venkateswaramma, Jarabhala Nirosha, Chelumala Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Design Tamil Nadu Chennai India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu India St. Martin's Engineering College Dept. of Artificial Intelligence and Machine Learning Hyderabad India Hyderabad India Secunderabad India St. Martin's Engineering College Department of EEE Telangana Secunderabad500 100 India
As technology advances, encryption methods must adapt to protect sensitive information. Organizations must stay informed about emerging threats and regularly update their protocols to stay ahead. Investing in advanced... 详细信息
来源: 评论
Leveraging RAG for Effective Prompt Engineering in Job Portals  2
Leveraging RAG for Effective Prompt Engineering in Job Porta...
收藏 引用
2nd International conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Haneef, Farhan Varalakshmi, M. Peer Mohamed, P.U. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India CapitalOne United States
Traditional recruitment methods are time-consuming and heavily reliant on manual processes, leading to inefficiencies. This paper explores the integration of AI technologies into a job portal to streamline the hiring ... 详细信息
来源: 评论
Identification of Negative Intent in Social Media Posts Using Natural Language Processing  2
Identification of Negative Intent in Social Media Posts Usin...
收藏 引用
2nd International conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Tiwari, Priti Verma, Parul HarshDev AIIT Amity University Lucknow India Computer Science and Engineering Department Babu Banarasi Das University Lucknow India
Daily content viewing and/or posting on social media is very common and influences people across all geographies using numerous strategies and ways. A number of daily activities over web platforms like YouTube in term... 详细信息
来源: 评论
Evaluating Self-Supervised Learning Models for Multi-Label Pathology Detection: A Benchmark Against Supervised Learning  2
Evaluating Self-Supervised Learning Models for Multi-Label P...
收藏 引用
2nd International conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Agarwal, Nidhi Pooja Kumar, Nitish Anushka Garg, Yashica Department of Computer Science Engineering Galgotias University Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Information Technology Bharati Vidyapeeth College of Engineering New Delhi India Department of Computer Science and Engineering Indira Gandhi Delhi Technical University for Women New Delhi India
The analysis and objective of the current work is to check the performance of SSL Models in multi-label classification on the available dataset of NIH Chest X-ray images which is a large-scale medical imaging dataset.... 详细信息
来源: 评论
NEMO: ML based fish species classification  2
NEMO: ML based fish species classification
收藏 引用
2nd International conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Singh, Manvendra Gaur, Sreesh Tyagi, Sarthak Sharma, Udit Yadav, Prince Mishra, Adarsh Department of Computer Science KIET Group of Institutions Delhi Ghaziabad India Department of CSE-AIML ABES Engineering College U.P. Ghaziabad India
This paper describes the creation of an ML-based tool for image-based identification of fish species commonly found in Indian oceans, addressing the issues that fishermen experience in accurately reporting their catch... 详细信息
来源: 评论