咨询与建议

限定检索结果

文献类型

  • 12,807 篇 会议
  • 36 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 12,848 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,222 篇 工学
    • 7,091 篇 计算机科学与技术...
    • 5,696 篇 软件工程
    • 2,382 篇 信息与通信工程
    • 1,277 篇 控制科学与工程
    • 930 篇 电气工程
    • 760 篇 生物工程
    • 714 篇 机械工程
    • 661 篇 生物医学工程(可授...
    • 636 篇 电子科学与技术(可...
    • 544 篇 安全科学与工程
    • 541 篇 仪器科学与技术
    • 485 篇 网络空间安全
    • 451 篇 光学工程
    • 437 篇 交通运输工程
    • 347 篇 动力工程及工程热...
    • 347 篇 环境科学与工程(可...
    • 334 篇 土木工程
  • 3,435 篇 理学
    • 1,792 篇 数学
    • 883 篇 生物学
    • 678 篇 统计学(可授理学、...
    • 602 篇 物理学
    • 446 篇 系统科学
  • 3,157 篇 管理学
    • 1,949 篇 管理科学与工程(可...
    • 1,533 篇 图书情报与档案管...
    • 1,107 篇 工商管理
  • 747 篇 医学
    • 652 篇 临床医学
    • 627 篇 基础医学(可授医学...
    • 449 篇 公共卫生与预防医...
  • 526 篇 法学
    • 418 篇 社会学
  • 415 篇 经济学
    • 411 篇 应用经济学
  • 315 篇 农学
  • 266 篇 教育学
  • 89 篇 文学
  • 56 篇 军事学
  • 23 篇 艺术学
  • 2 篇 哲学

主题

  • 384 篇 accuracy
  • 333 篇 data mining
  • 322 篇 big data
  • 287 篇 deep learning
  • 275 篇 data models
  • 268 篇 real-time system...
  • 241 篇 predictive model...
  • 240 篇 feature extracti...
  • 237 篇 machine learning
  • 236 篇 internet of thin...
  • 221 篇 computational mo...
  • 194 篇 support vector m...
  • 194 篇 monitoring
  • 167 篇 convolutional ne...
  • 163 篇 analytical model...
  • 156 篇 training
  • 137 篇 information mana...
  • 129 篇 security
  • 117 篇 adversarial mach...
  • 117 篇 data acquisition

机构

  • 53 篇 shenyang ligong ...
  • 52 篇 school of inform...
  • 47 篇 the islamic univ...
  • 38 篇 beijing institut...
  • 30 篇 chitkara univers...
  • 29 篇 college of infor...
  • 27 篇 university of el...
  • 25 篇 beijing institut...
  • 23 篇 national univers...
  • 22 篇 pune
  • 21 篇 the islamic univ...
  • 20 篇 college of techn...
  • 19 篇 beijing institut...
  • 18 篇 tsinghua univers...
  • 17 篇 chitkara univers...
  • 16 篇 chennai
  • 16 篇 jiangxi universi...
  • 16 篇 school of comput...
  • 16 篇 beijing institut...
  • 16 篇 university of ch...

作者

  • 22 篇 liu yang
  • 19 篇 pareek piyush ku...
  • 19 篇 liu quanhua
  • 18 篇 li yang
  • 16 篇 kukreja vinay
  • 16 篇 wang wei
  • 15 篇 yang yang
  • 15 篇 raman ramakrishn...
  • 14 篇 li xin
  • 14 篇 wang yan
  • 13 篇 wang lei
  • 13 篇 wang jian
  • 12 篇 dong zhen
  • 12 篇 srinivasan c.
  • 11 篇 li li
  • 11 篇 singh teekam
  • 11 篇 chen liang
  • 10 篇 zhang lei
  • 10 篇 li yan
  • 9 篇 soni mukesh

语言

  • 11,921 篇 英文
  • 794 篇 其他
  • 287 篇 中文
  • 3 篇 俄文
  • 2 篇 西班牙文
检索条件"任意字段=2nd International Conference on Data Science and Information System, ICDSIS 2024"
12848 条 记 录,以下是31-40 订阅
排序:
Research on AI-Based Techniques for Detecting Complex Malicious Code Behavior  24
Research on AI-Based Techniques for Detecting Complex Malici...
收藏 引用
2nd international conference on Communication Networks and Machine Learning, CNML 2024
作者: Han, Yijun Information Engineering College Shanxi College of Applied Science and Technology Shanxi Taiyuan China
Detecting complex malware poses a significant challenge to cybersecurity, as traditional methods face limitations when dealing with diverse and evolving attacks. This paper proposes an AI-based framework for detecting... 详细信息
来源: 评论
Research on Industrial Control system Security Protection Based on Cryptographic Technology  24
Research on Industrial Control System Security Protection Ba...
收藏 引用
2nd international conference on Artificial Intelligence, systems and Network Security, AISNS 2024
作者: Zhou, Junping Zhang, Chen Gao, Fei Wang, Sai Chengdu Weishitong Information Security Technology Co. Ltd Beijing China China Electric Power Research Institute Beijing China CNNC Control System Engineering Co. Ltd Beijing China
With the application of new technologies such as the Internet of Things, cloud computing, and big data, industrial control systems are increasingly becoming digitalized, networked, and intelligent, which injects vital... 详细信息
来源: 评论
Fixed-time cooperative control dichotomous consistency of multi-agent system with perturbations  24
Fixed-time cooperative control dichotomous consistency of mu...
收藏 引用
2nd international conference on Frontiers of Intelligent Manufacturing and Automation, CFIMA 2024
作者: Qin, Wei Ren, Yan Liu, Shangyuan Wang, Qi Li, Xinwei Inner Mongolia University of Science and Technology Baotou China Inner Mongolia Normal University Tourism College Baotou China
Aiming at the fixed-time dichotomous consistency control problem of a first-order nonlinear multi-intelligence body system with external interference, this paper designs a fixed-time dichotomous consistency control al... 详细信息
来源: 评论
2nd international conference on Computer information science and Application Technology, CISAT 2019 - 1. Computer Vision and data Mining Technology
2nd International Conference on Computer Information Science...
收藏 引用
2nd international conference on Computer information science and Application Technology, CISAT 2019
The proceedings contain 419 papers. The topics discussed include: analysis of the relationship between international service trade and economic growth based on VAR model;building a reference model for a manufacturing ...
来源: 评论
Enhancing Horticulture Field Security: Intruder Detection Utilizing Wi-Fi-CSI Technology with ESP32 Modules  2nd
Enhancing Horticulture Field Security: Intruder Detection Ut...
收藏 引用
2nd international conference on Agriculture-Centric Computation
作者: Sen, Prasanta Kr Sharad, Mrigank Roy, Ram Babu IIT Kharagpur RMSoEE Kharagpur W Bengal India
This study applies Wi-Fi Channel State information (CSI) technology using ESP32 modules to detect intruders in horticulture areas. The ESP32-based horticulture field intruder detection system utilises the ESP32 microc... 详细信息
来源: 评论
A Multi-feature Co-distillation Algorithm Based on Human Skeletal Point Behavior Recognition  24
A Multi-feature Co-distillation Algorithm Based on Human Ske...
收藏 引用
2nd international conference on Advances in Artificial Intelligence and Applications, AAIA 2024
作者: Pan, Xuefeng Tian, Zhiqiang School of Computer Wuhan Qingchuan University Wuhan China School of Information Wuhan Software Engineering Vocational College Wuhan Open University Wuhan China School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China
Depth model-based behavior estimation of human skeletal points is widely used in the field of behavior recognition. In order to improve the accuracy of behavior recognition, the complexity and computation of the desig... 详细信息
来源: 评论
Handwritten digit recognition based on SVM  24
Handwritten digit recognition based on SVM
收藏 引用
2nd international conference on Frontiers of Intelligent Manufacturing and Automation, CFIMA 2024
作者: Tang, Wendi Fei, Li Beijing Information Science and Technology University Beijing China
Handwritten digit recognition (HDR) is one of the most classic application scenarios in machine learning and is often employed to validate algorithms and techniques. The task poses multiple challenges due to variation... 详细信息
来源: 评论
Research and Application of C4.5 Combined with Naive Bayes in the Identification of Poverty among University Students  24
Research and Application of C4.5 Combined with Naive Bayes i...
收藏 引用
2nd international conference on Advances in Artificial Intelligence and Applications, AAIA 2024
作者: Xu, Tianhe Liu, Jinjun Zhou, Yvhan Huang, Haitao Chengdu College of University of Electronic Science and Technology of China Sichuan Chengdu China Hangzhou Laifute Wines Industry Co. Ltd. Zhejiang Hangzhou China
Higher education occupies an important position in China’s education system, but the high poverty rate results in a heavy workload for poverty identification. The current poverty identification process mainly relies ... 详细信息
来源: 评论
Hierarchical data-driven Scheduling-Control Framework for Energy-efficient Industrial Flexible Production  24
Hierarchical Data-driven Scheduling-Control Framework for En...
收藏 引用
2nd international conference on Frontiers of Intelligent Manufacturing and Automation, CFIMA 2024
作者: Jiang, Yuliang Zhu, Shanying Guan, Xinping Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai China
This paper proposes a hierarchical data-driven scheduling-control framework for a multi-machine/mode production system to operate in an energy-efficient manner. At the scheduling layer, the scheduling problem incorpor... 详细信息
来源: 评论
Privacy-preserving attribute-based searchable encryption scheme in intelligent transportation system  24
Privacy-preserving attribute-based searchable encryption sch...
收藏 引用
2nd international conference on Artificial Intelligence, systems and Network Security, AISNS 2024
作者: Niu, Shufen Nan, Xingxing Ge, Peng Zhang, Yan School of Computer Science and Engineering Northwest Normal University Gansu Lanzhou China
With the rapid advancement of the Internet of Things (IoT) and intelligence, traditional attribute based searchable encryption (ABSE) schemes has been unable to satisfy the data privacy and security requirements of In... 详细信息
来源: 评论