咨询与建议

限定检索结果

文献类型

  • 884 篇 会议
  • 27 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 916 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 732 篇 工学
    • 677 篇 计算机科学与技术...
    • 314 篇 软件工程
    • 184 篇 信息与通信工程
    • 51 篇 电气工程
    • 47 篇 生物医学工程(可授...
    • 45 篇 控制科学与工程
    • 38 篇 生物工程
    • 21 篇 电子科学与技术(可...
    • 18 篇 机械工程
    • 18 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
    • 15 篇 仪器科学与技术
    • 15 篇 网络空间安全
    • 12 篇 安全科学与工程
    • 9 篇 建筑学
  • 192 篇 理学
    • 139 篇 数学
    • 47 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 19 篇 物理学
    • 13 篇 化学
  • 158 篇 管理学
    • 89 篇 图书情报与档案管...
    • 74 篇 管理科学与工程(可...
    • 47 篇 工商管理
  • 39 篇 医学
    • 35 篇 基础医学(可授医学...
    • 35 篇 临床医学
    • 27 篇 药学(可授医学、理...
  • 19 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 13 篇 教育学
    • 13 篇 教育学
  • 10 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 71 篇 big data
  • 57 篇 cloud computing
  • 54 篇 data mining
  • 17 篇 security
  • 16 篇 machine learning
  • 13 篇 conferences
  • 13 篇 mapreduce
  • 12 篇 sentiment analys...
  • 11 篇 support vector m...
  • 11 篇 clustering algor...
  • 10 篇 computer archite...
  • 10 篇 data center
  • 10 篇 servers
  • 10 篇 algorithm design...
  • 10 篇 genetic algorith...
  • 10 篇 privacy
  • 10 篇 energy efficienc...
  • 9 篇 computational mo...
  • 9 篇 soft computing
  • 9 篇 forecasting

机构

  • 6 篇 univ chinese aca...
  • 6 篇 college of manag...
  • 5 篇 department of co...
  • 5 篇 nanjing univ inf...
  • 4 篇 department of co...
  • 4 篇 school of transp...
  • 4 篇 pace univ dept c...
  • 4 篇 sun yat sen univ...
  • 4 篇 chinese acad sci...
  • 4 篇 school of manage...
  • 4 篇 wuhan univ techn...
  • 3 篇 wuhan univ techn...
  • 3 篇 pace university ...
  • 3 篇 department of co...
  • 3 篇 school of inform...
  • 3 篇 department of co...
  • 3 篇 pingxiang univer...
  • 3 篇 nanjing univ inf...
  • 3 篇 department of co...
  • 3 篇 northeastern uni...

作者

  • 10 篇 liu xiyu
  • 7 篇 keke gai
  • 6 篇 meikang qiu
  • 6 篇 qiu meikang
  • 5 篇 gai keke
  • 4 篇 liu fang
  • 4 篇 zhang jing
  • 4 篇 zang wenke
  • 4 篇 xiao nong
  • 4 篇 yao lan
  • 4 篇 yap bee wah
  • 3 篇 chen zhengguo
  • 3 篇 zhao dan
  • 3 篇 ahmad tahir
  • 3 篇 guo zhongwen
  • 3 篇 wang pan
  • 3 篇 vijay varadharaj...
  • 3 篇 sun wei
  • 3 篇 kanthan padma su...
  • 3 篇 udaya tupakula

语言

  • 912 篇 英文
  • 4 篇 其他
检索条件"任意字段=2nd International Conference on Soft Computing in Data Science, SCDS 2016"
916 条 记 录,以下是71-80 订阅
排序:
Cloud based Acute Lymphoblastic Leukemia Detection Using Deep Convolutional Neural Networks  2
Cloud based Acute Lymphoblastic Leukemia Detection Using Dee...
收藏 引用
2nd international conference on Inventive Research in computing Applications, ICIRCA 2020
作者: Sankara Nayaki, K. Denny, Jincy Rubeena, M.M. Denny, Jees K Vel Tech Rangarajan Dr. Sagunthala R and D Institute of Science and Technology Department of Computer Science and Engineering India Adi Shankara Institute of Engineering and Technology Computer Science and Engineering Kalady Ernakulam Kerala India MET's School of Engineering Computer Science and Engineering Mala Thrissur Kerala India
Acute lymphoblastic leukemia is a condition that occurs in the bone marrow. Most cases of Acute Lymphoblastic Leukemia (ALL) develop from cells that would turn into white blood cells (other than lymphocytes), but some... 详细信息
来源: 评论
Implementation of the Bidirectional Reflectance Function for Modeling the Spectra Derived from Hyperspectral Images  2nd
Implementation of the Bidirectional Reflectance Function for...
收藏 引用
2nd international conference on soft computing and Signal Processing, ICSCSP 2019
作者: Mohammed Zeeshan, R. Sayyad Shafiyoddin, B. Department of Computer Science Milliya Arts Science & Management Science College BeedMS431122 India
Hapke’s bidirectional reflectance function based on the theory of radiative transfer has been implemented for modeling the spectra derived from Chandrayaan-1 hyperspectral images. The parameter study was done to stud... 详细信息
来源: 评论
Modeling the Chandrayaan-1 Hyperspectral (HySI) data for Mineral Mixing Analysis  2nd
Modeling the Chandrayaan-1 Hyperspectral (HySI) Data for Min...
收藏 引用
2nd international conference on soft computing and Signal Processing, ICSCSP 2019
作者: Mohammed Zeeshan, R. Sayyad Shafiyoddin, B. Department of Computer Science Milliya Arts Science and Management Science College BeedMS431122 India
The study of the lunar surface mineralogy is significant to understand the origin and its evolution. For the first time, an attempt was made to model the Chandrayaan-1 Hyperspectral (HySI) data using Hapke radiative t... 详细信息
来源: 评论
Binary Image Steganalysis Based on Local Residual Patterns  2nd
Binary Image Steganalysis Based on Local Residual Patterns
收藏 引用
2nd international conference on Security with Intelligent computing and Big-data Services (SICBS)
作者: Li, Ruipeng Zeng, Lingwen Lu, Wei Chen, Junjia Sun Yat Sen Univ Key Lab Machine Intelligence & Adv Comp Guangdong Key Lab Informat Secur Technol Sch Data & Comp SciMinist Educ Guangzhou 510006 Guangdong Peoples R China
A binary image steganalysis scheme based on the statistic model of local residual pattern (LRP) is proposed in this paper. LRP means the pattern of a local area of the residual map of the binary image, which is calcul... 详细信息
来源: 评论
A Novel Approach Using Support Vector Machine for Outlier Removal and Multilayer Perceptron in Classifying Medical datasets  2nd
A Novel Approach Using Support Vector Machine for Outlier Re...
收藏 引用
2nd international conference on soft computing and Signal Processing, ICSCSP 2019
作者: Padmavathi, M.S. Sumathi, C.P. Research Department of Computer Science SDNB Viashnav College for Women Chennai600044 India
Healthcare industry contains vast amount of data, where analysis is essential in an optimal manner. data mining provides viable tools and methods to extract knowledge and predict the presence or absence of disease in ... 详细信息
来源: 评论
Twin Security Model—A Machine Learning-Based Approach for DDoS Attack Detection in SDN  1
收藏 引用
2nd international conference on soft computing and Signal Processing, ICSCSP 2019
作者: Singh, Sukhvinder Jayakumar, S.K.V. Department of Computer Science School of Engineering and Technology Pondicherry University Pondicherry India
In the world of emerging network technologies, the software-defined network (SDN) architecture provides the global view of the entire network. Its agility and directly programming ability helped the administrators to ... 详细信息
来源: 评论
Label Assignment and Sentimental Analysis for a Product Review on Twitter data  1
收藏 引用
2nd international conference on soft computing and Signal Processing, ICSCSP 2019
作者: Sengar, Chandra Prakash Singh Nirmala, S. Jaya Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli Tiruchirappalli India
The most popular microblogging social media is Twitter, where people express their point of view toward different things. They bought different products and give their unbiased opinion on Twitter. In this paper, a nov... 详细信息
来源: 评论
Ontology-Driven Clinical data Analyzer of Skin Diseases Based on SVM  2nd
Ontology-Driven Clinical Data Analyzer of Skin Diseases Base...
收藏 引用
2nd international conference on soft computing and Signal Processing, ICSCSP 2019
作者: Hema, D. David, Vasantha Kalyani Avinashilingam Institute for Home Science and Higher Education for Women CoimbatoreTamil Nadu641043 India
This paper describes a methodology for increasing the scope and precision of a diagnostic knowledge-based system. It has been stated that medical knowledge-based systems either are highly specialized and lack accuracy... 详细信息
来源: 评论
Reversible data Hiding in Binary Images by Symmetrical Flipping Degree Histogram Modification  2nd
Reversible Data Hiding in Binary Images by Symmetrical Flipp...
收藏 引用
2nd international conference on Security with Intelligent computing and Big-data Services (SICBS)
作者: Yin, Xiaolin Lu, Wei Liu, Wanteng Zhang, Junhong Sun Yat Sen Univ Sch Data & Comp Sci Guangdong Key Lab Informat Secur Technol Minist EducKey Lab Machine Intelligence & Adv Co Guangzhou 510006 Guangdong Peoples R China
In recent years, reversible data hiding in binary images has become more and more important in the field of data hiding. For the binary property, hiding information in binary images can only be achieved by flipping pi... 详细信息
来源: 评论
Innovative Secure Authentication Interface for Hadoop Cluster Using DNA Cryptography: A Practical Study  1
收藏 引用
2nd international conference on soft computing and Signal Processing, ICSCSP 2019
作者: Balaraju, J. Prasada Rao, P.V.R.D. Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Guntur VaddeswaramAndhra Pradesh522502 India
Big data (BD) handling is a vital task in today’s world where huge amount of data is circulated within a distributed network. To handle BD, Hadoop is being widely used by various organizations, as Hadoop supports bot... 详细信息
来源: 评论