咨询与建议

限定检索结果

文献类型

  • 8,320 篇 会议
  • 65 篇 期刊文献
  • 37 册 图书
  • 1 篇 学位论文

馆藏范围

  • 8,423 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,724 篇 工学
    • 5,421 篇 计算机科学与技术...
    • 4,734 篇 软件工程
    • 1,288 篇 信息与通信工程
    • 749 篇 生物工程
    • 670 篇 电气工程
    • 670 篇 控制科学与工程
    • 548 篇 生物医学工程(可授...
    • 545 篇 机械工程
    • 415 篇 电子科学与技术(可...
    • 382 篇 光学工程
    • 287 篇 动力工程及工程热...
    • 273 篇 仪器科学与技术
    • 273 篇 安全科学与工程
    • 264 篇 化学工程与技术
    • 211 篇 土木工程
    • 208 篇 材料科学与工程(可...
  • 2,715 篇 理学
    • 1,486 篇 数学
    • 812 篇 生物学
    • 620 篇 物理学
    • 437 篇 统计学(可授理学、...
    • 324 篇 系统科学
    • 226 篇 化学
  • 1,682 篇 管理学
    • 1,034 篇 管理科学与工程(可...
    • 744 篇 图书情报与档案管...
    • 526 篇 工商管理
  • 478 篇 医学
    • 441 篇 临床医学
    • 417 篇 基础医学(可授医学...
    • 275 篇 药学(可授医学、理...
  • 287 篇 法学
    • 209 篇 社会学
  • 236 篇 教育学
    • 228 篇 教育学
  • 208 篇 经济学
  • 152 篇 农学
  • 53 篇 文学
  • 27 篇 军事学
  • 18 篇 艺术学

主题

  • 263 篇 software
  • 202 篇 software enginee...
  • 142 篇 computational mo...
  • 135 篇 computer science
  • 122 篇 internet of thin...
  • 109 篇 machine learning
  • 109 篇 software design
  • 104 篇 feature extracti...
  • 103 篇 application soft...
  • 100 篇 software testing
  • 91 篇 support vector m...
  • 91 篇 computer archite...
  • 89 篇 semantics
  • 86 篇 computer vision
  • 85 篇 deep learning
  • 82 篇 software algorit...
  • 79 篇 computer softwar...
  • 78 篇 data mining
  • 74 篇 convolutional ne...
  • 73 篇 neural networks

机构

  • 41 篇 graphic era deem...
  • 28 篇 school of comput...
  • 25 篇 school of comput...
  • 23 篇 department of co...
  • 20 篇 chitkara univers...
  • 19 篇 college of compu...
  • 17 篇 department of so...
  • 16 篇 school of comput...
  • 15 篇 nitte meenakshi ...
  • 14 篇 school of comput...
  • 13 篇 college of compu...
  • 13 篇 college of softw...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 school of softwa...
  • 12 篇 college of compu...
  • 11 篇 school of comput...
  • 11 篇 software college...
  • 11 篇 school of softwa...
  • 10 篇 university of sc...

作者

  • 13 篇 pant bhasker
  • 12 篇 pareek piyush ku...
  • 12 篇 chakravarthi m. ...
  • 12 篇 gangodkar durgap...
  • 11 篇 wang wei
  • 11 篇 li jing
  • 10 篇 wang jian
  • 9 篇 huang kai
  • 9 篇 kumar yogesh
  • 9 篇 herawan tutut
  • 8 篇 zhang lei
  • 8 篇 liu yang
  • 8 篇 yang yang
  • 8 篇 liu wei
  • 8 篇 mishra debahuti
  • 8 篇 tripathi vikas
  • 7 篇 li yang
  • 7 篇 al-turjman fadi
  • 7 篇 chen chen
  • 7 篇 li heng

语言

  • 8,153 篇 英文
  • 171 篇 其他
  • 112 篇 中文
  • 3 篇 土耳其文
  • 1 篇 西班牙文
检索条件"任意字段=2nd International Conference on Computer Science and Software Engineering, CSASE 2022"
8423 条 记 录,以下是101-110 订阅
排序:
Detecting Fake Political News on Social Media by Support Vector Machine Compared to Naive Bayes  2
Detecting Fake Political News on Social Media by Support Vec...
收藏 引用
2nd international conference Computational and Characterization Techniques in engineering and sciences, IC3TES 2024
作者: Sireesha, M. Tamilselvan, S. Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Tamil Nadu Chennai India Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Cloud Computing and Image Processing Tamil Nadu Chennai India
The primary objective is to enhance the precision of the Support Vector Machine and evaluate it in comparison to the Naive Bayes algorithm in terms of its ability to forecast fake political news on social media networ... 详细信息
来源: 评论
Middle School Architect: Programmatic Modeling and Construction via a 3D Graphics Platform in Elm  2
Middle School Architect: Programmatic Modeling and Construct...
收藏 引用
2nd international conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Parcha, Anurag Mishra, Sanjana Anand, Christopher Kumar Pushparaj, Jagalingam Simon Fraser University BurnabyBC Canada McMaster University Computing and Software HamiltonON Canada School of Computer Science and Engineering Vellore Institute of Technology TN Vellore India
Today, school students are first introduced to geom-etry and advanced mathematical concepts by plotting a graph in 2D and they struggle with 3D concepts since current technologies are either too difficult to grasp or ... 详细信息
来源: 评论
Study on Networking Models of SDN using Mininet and MiniEdit  2
Study on Networking Models of SDN using Mininet and MiniEdit
收藏 引用
2nd international conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Bhaskaran, Sreebha Supriya, M. Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science Engineering Bengaluru India
software Defined Networking (SDN) has brought about a revolutionary shift in network management and control. The driving force behind SDN's development is the need for enhanced network programmability and scalabil... 详细信息
来源: 评论
From Data to Diagnosis: Investigating Approaches in Mental Illness Detection  2
From Data to Diagnosis: Investigating Approaches in Mental I...
收藏 引用
2nd international conference of Intelligent Methods, Systems and Applications, IMSA 2024
作者: Montasser, Reem Kadry Mazen, Sherif A. Helal, Iman M. A. October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt
Mental illness is a considerable global public health problem, impacting both individual well-being and society's health. The growing popularity of social media and the increase of other data sources led to more r... 详细信息
来源: 评论
A Comprehensive Analysis on using Multifactor Authentication System for Three Level Security  2
A Comprehensive Analysis on using Multifactor Authentication...
收藏 引用
2nd international conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Kantipudi, Revathi Kumar Mallavarapu, Ajay Sai Rajagopal, Shinu M Kagolanu, Madhav Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science & Engineering Bengaluru India
In the era of digitalization, authentication is a vital part of modern society's security. Multi-factor authentication (MFA) is a vital solution that offers fast, simple, and trustworthy authentication in a range ... 详细信息
来源: 评论
Research on Human Resource Management and Prediction Model Based on Neural Network Optimized by Genetic Algorithm  2
Research on Human Resource Management and Prediction Model B...
收藏 引用
2nd IEEE international conference on Image Processing and computer Applications, ICIPCA 2024
作者: Qi, Zexuan Yang, Sihan He, Xinjian Shi, Desheng Xinjiang University of Science & Technology Xinjiang Korla China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Engineering Guangzhou Huali College Guangzhou China Modern Agricultural College Honghe Vocational and Technical College Yunnan Mengzi China
This paper investigates the application of artificial neural networks optimized based on genetic algorithms in human resource management in hospital enterprises and constructs a human resource management and predictiv... 详细信息
来源: 评论
Prediction of Brain Tumor Severity with Magnetic Resonance Imaging using Ridge Regression Over Recurrent Neural Network  2
Prediction of Brain Tumor Severity with Magnetic Resonance I...
收藏 引用
2nd IEEE international conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Bilal, D. Mohamed Tamilselvan, S. Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamilnadu Chennai India
The goal of the research work is to predict Brain tumors using the Ridge Regression algorithm and compare it with the Recurrent Neural Network. The research study involves two groups, Ridge Regression and Recurrent Ne... 详细信息
来源: 评论
Stock price prediction research in steel and food industries using random forest algorithm  2
Stock price prediction research in steel and food industries...
收藏 引用
2nd international conference on Big Data, Computational Intelligence, and Applications, BDCIA 2024
作者: Jiang, Yuxiao Yang, Lei Du, Shipei Sun, Yu Guangdong University of Science and Technology Dongguan China Dongguan Key Laboratory of Industrial Software for Intelligent Manufacturing Dongguan China
The application of computer technology in the financial field and the utilization of computer algorithms to enhance the accuracy of stock price prediction have drawn the attention of numerous researchers. Against this... 详细信息
来源: 评论
Performance Evaluation of Digital Traffic Microservice Chain Application of YOLOv5 Model  2
Performance Evaluation of Digital Traffic Microservice Chain...
收藏 引用
2nd international conference on Cloud Computing, Big Data Application and software engineering, CBASE 2023
作者: Zhang, Hang Changchun University of Science and Technology School of Computer Science and Technology Changchun China
In the realm of digital transformation, the utilization of AI-powered digital technology encounters a multitude of challenges, among which lies the imperative need to restructure the IT framework. This endeavor center... 详细信息
来源: 评论
A Study on Financial Time Series Forecasting Based on LSTM-GARCH Modeling  2
A Study on Financial Time Series Forecasting Based on LSTM-G...
收藏 引用
2nd IEEE international conference on Electrical, Automation and computer engineering, ICEACE 2024
作者: Yang, Liu Wu, Qi Liang, Shenrui Mu, Sen Xue, Zilian Yang, Yixuan Peking University School of Software & Microelectronics Beijing China Nanjing University of Information Science and Technology Nanjing China University of Macao China Northeastern University at Qinhuangdao Qinhuangdao China University of Sydney Sydney Australia University of International Business and Economics Beijing China
This paper provides an in-depth study on financial time series forecasting and risk management, utilizing a hybrid approach of LSTM and GARCH models to enhance the forecasting accuracy of financial data volatility. Fi... 详细信息
来源: 评论