咨询与建议

限定检索结果

文献类型

  • 8,812 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 8,820 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,455 篇 工学
    • 5,763 篇 计算机科学与技术...
    • 4,862 篇 软件工程
    • 2,244 篇 信息与通信工程
    • 959 篇 控制科学与工程
    • 702 篇 生物工程
    • 637 篇 电气工程
    • 553 篇 生物医学工程(可授...
    • 509 篇 电子科学与技术(可...
    • 451 篇 机械工程
    • 418 篇 光学工程
    • 405 篇 仪器科学与技术
    • 330 篇 化学工程与技术
    • 326 篇 安全科学与工程
    • 316 篇 动力工程及工程热...
    • 315 篇 网络空间安全
    • 279 篇 交通运输工程
  • 3,281 篇 理学
    • 1,894 篇 数学
    • 785 篇 生物学
    • 742 篇 统计学(可授理学、...
    • 512 篇 物理学
    • 376 篇 系统科学
    • 296 篇 化学
  • 2,596 篇 管理学
    • 1,504 篇 管理科学与工程(可...
    • 1,281 篇 图书情报与档案管...
    • 800 篇 工商管理
  • 543 篇 医学
    • 464 篇 临床医学
    • 450 篇 基础医学(可授医学...
    • 309 篇 公共卫生与预防医...
  • 447 篇 法学
    • 368 篇 社会学
  • 374 篇 经济学
    • 373 篇 应用经济学
  • 242 篇 农学
  • 211 篇 教育学
  • 130 篇 文学
  • 51 篇 军事学
  • 13 篇 艺术学
  • 1 篇 哲学

主题

  • 272 篇 data mining
  • 247 篇 big data
  • 155 篇 internet of thin...
  • 122 篇 convolutional ne...
  • 108 篇 machine learning
  • 105 篇 support vector m...
  • 103 篇 feature extracti...
  • 100 篇 deep learning
  • 99 篇 blockchain
  • 92 篇 data models
  • 87 篇 forecasting
  • 84 篇 data acquisition
  • 84 篇 classification (...
  • 82 篇 information mana...
  • 80 篇 cryptography
  • 75 篇 students
  • 61 篇 cloud computing
  • 59 篇 semantics
  • 58 篇 adversarial mach...
  • 58 篇 wireless sensor ...

机构

  • 59 篇 beijing institut...
  • 40 篇 the islamic univ...
  • 35 篇 chitkara univers...
  • 29 篇 beijing institut...
  • 27 篇 graphic era deem...
  • 25 篇 university of el...
  • 24 篇 national univers...
  • 24 篇 beijing institut...
  • 22 篇 applied science ...
  • 22 篇 graphic era deem...
  • 22 篇 karpagam academy...
  • 19 篇 vishwakarma inst...
  • 19 篇 beijing institut...
  • 18 篇 chitkara univers...
  • 18 篇 shenyang ligong ...
  • 17 篇 pune
  • 16 篇 tsinghua univers...
  • 16 篇 college of techn...
  • 15 篇 department of co...
  • 15 篇 ncba&e school of...

作者

  • 22 篇 liu yang
  • 21 篇 pareek piyush ku...
  • 20 篇 liu quanhua
  • 18 篇 li yang
  • 15 篇 wang jian
  • 15 篇 kukreja vinay
  • 14 篇 raman ramakrishn...
  • 14 篇 ding zegang
  • 13 篇 wang wei
  • 12 篇 li jun
  • 12 篇 chen yen-wei
  • 11 篇 dong zhen
  • 11 篇 chen liang
  • 11 篇 yang jian
  • 10 篇 zhang lei
  • 10 篇 wang jing
  • 10 篇 srinivasan c.
  • 10 篇 china
  • 9 篇 wang tao
  • 9 篇 huang pingping

语言

  • 8,168 篇 英文
  • 367 篇 其他
  • 285 篇 中文
检索条件"任意字段=2nd IEEE Conference on Information Technology and Data Science, CITDS 2022"
8820 条 记 录,以下是71-80 订阅
排序:
A Wireless Sensor Based Multi-layer Hybrid Deep Learning Model for Highly Correlated Human Activity Recognition  2
A Wireless Sensor Based Multi-layer Hybrid Deep Learning Mod...
收藏 引用
2nd ieee conference on information technology and data science, citds 2022
作者: Perez-Gamboa, Sonia Sun, Qingquan Ghasemkhani, Amir California State University Sch. of Computer Science and Eng. San Bernardino United States
Sensor based human activity recognition has obtained more attentions due to its low-cost, low-data throughput, and immunity to environmental effects. However, traditional work in this field mainly focuses on the recog... 详细信息
来源: 评论
Anomaly Detection Using Hybrid Learning for Industrial IoT  2
Anomaly Detection Using Hybrid Learning for Industrial IoT
收藏 引用
2nd ieee conference on information technology and data science, citds 2022
作者: Takele, Atallo Kassaw Villanyi, Balazs Budapest University of Technology and Economics Department of Electronics Technology Budapest Hungary
The industrial internet of things (IIoT) enhances industrial and manufacturing operations by using smart sensors and actuators. However, it is hampered due to the energy efficiency requirements, real time performance ... 详细信息
来源: 评论
Leveraging Fog Computing for Geographically Distributed Smart Cities  2
Leveraging Fog Computing for Geographically Distributed Smar...
收藏 引用
2nd ieee conference on information technology and data science, citds 2022
作者: Gargees, Rasha S. University of Missouri Department of Electrical Engineering & Computer Science ColumbiaMO United States
Recently, the emergence of smart cities (SC), where data streams come from various geographically distributed places, has posed new challenges. Cloud Computing provides excellent services for smart cities, such as pow... 详细信息
来源: 评论
Deep learning-based anomaly detection for imaging in autonomous vehicles  2
Deep learning-based anomaly detection for imaging in autonom...
收藏 引用
2nd ieee conference on information technology and data science, citds 2022
作者: Kapusi, Tibor Peter Kovacs, Laszlo Hajdu, Andras University of Debrecen Faculty of Informatics Department of Data Science and Visualization Debrecen Hungary Nvidia Deep Learning Institute Certified Instructor Hungary
Autonomous driving and self-driven vehicles have become among the most pursued research areas in recent years. Nowadays, various driving tasks can be solved by applying the newest machine learning techniques such as l... 详细信息
来源: 评论
Towards an in-network GPU-accelerated packet processing framework  2
Towards an in-network GPU-accelerated packet processing fram...
收藏 引用
2nd ieee conference on information technology and data science, citds 2022
作者: Voros, Peter Kis, David Hudoba, Peter Pongracz, Gergely Laki, Sandor Elte Eötvös Loránd University Hungary Ericsson Research Hungary
Software-defined networking and data-plane programmability have opened up the possibilities for switches to be used for novel applications that are different than simple packet forwarding. Various tasks from low-level... 详细信息
来源: 评论
Sensor design and integration into small sized autonomous vehicle  2
Sensor design and integration into small sized autonomous ve...
收藏 引用
2nd ieee conference on information technology and data science, citds 2022
作者: Kovacs, Laszlo Baranyai, David Giraszi, Tamas Majoros, Tamas Kovacs, Adam Vagner, Mate Palkovics, Denes Berczes, Tamas University of Debrecen Nvidia Deep Learning Institute Certified Instructor Department of Data Science and Visualization Faculty of Informatics Debrecen Hungary University of Debrecen Department of Data Science and Visualization Faculty of Informatics Debrecen Hungary University of Debrecen Faculty of Informatics Debrecen Hungary University of Debrecen Department of It Systems and Networks Faculty of Informatics Debrecen Hungary
Autonomous vehicles use several different kinds of sensors to get information about the surrounding area. With sensors and artificial intelligence, the autonomous vehicle tries to find the optimal decision as close as... 详细信息
来源: 评论
Joint Transmission Coordinated Multipoint on Mobile Users in 5G Heterogeneous Network  2
Joint Transmission Coordinated Multipoint on Mobile Users in...
收藏 引用
2nd ieee conference on information technology and data science, citds 2022
作者: Tandra, Tahmina Khanom Tajrian, Fehima Hossain, Afia Kawser, Mohammad Tawhid Akram, Mohammad Rubbyat Shams, Abdullah Bin Islamic University of Technology Gazipur1704 Bangladesh Robi Axiata Ltd Dhaka1212 Bangladesh University of Toronto TorontoONM5S 3G8 Canada
To broaden user experience and support a wide range of bandwidth hungry devices cellular operators are adopting 5G network. However, the predominance of Inter-Cell Interference (ICI) in 5G stands as a hurdle for cell ... 详细信息
来源: 评论
Frequent Itemsets Mining Using Vertical Index List
Frequent Itemsets Mining Using Vertical Index List
收藏 引用
2009 2nd ieee International conference on Computer science and information technology(ICCSIT 2009)
作者: Supatra Sahaphong Department of Computer Science Faculty of ScienceRamkhamhaeng University
In this paper,I propose a new approach to mine all frequent itemsets that performs database scanning only once to construct data *** structure uses the conceptual of vertical data layout to contain transaction *** cha... 详细信息
来源: 评论
Detection of false data injection attack in power information physical system based on SVM-GAB algorithm
收藏 引用
ENERGY REPORTS 2022年 8卷 1156-1164页
作者: Xiong, Xiaoping Hu, Siding Sun, Di Hao, Shaolei Li, Hang Lin, Guangyang Univ Guangxi Univ Sch Elect Engn Nanning 530004 Guangxi Peoples R China
Cyber physical power system (CPPS) is highly dependent on information and communication technology, which makes it vulnerable to network attacks. Among them, false data injection attack (FDIA) is not easy to be found ... 详细信息
来源: 评论
An Algorithm for Secure Deletion in Flash Memories
An Algorithm for Secure Deletion in Flash Memories
收藏 引用
2009 2nd ieee International conference on Computer science and information technology(ICCSIT 2009)
作者: S.Subha 3-1-100 Vidyanagar Colony Tirupati-517502 A.P.India
Flash memories find wide use in storing data in any *** deletion in flash memories involves making the data unreliable on the *** contents get deleted in the flash memory,time is consumed in deleting the data on the f... 详细信息
来源: 评论