咨询与建议

限定检索结果

文献类型

  • 883 篇 会议
  • 17 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 907 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 771 篇 工学
    • 694 篇 计算机科学与技术...
    • 559 篇 软件工程
    • 199 篇 信息与通信工程
    • 126 篇 生物工程
    • 85 篇 控制科学与工程
    • 83 篇 生物医学工程(可授...
    • 80 篇 电气工程
    • 67 篇 动力工程及工程热...
    • 59 篇 安全科学与工程
    • 55 篇 仪器科学与技术
    • 47 篇 网络空间安全
    • 46 篇 交通运输工程
    • 36 篇 电子科学与技术(可...
    • 36 篇 化学工程与技术
    • 32 篇 机械工程
    • 29 篇 环境科学与工程(可...
  • 375 篇 理学
    • 178 篇 数学
    • 138 篇 生物学
    • 65 篇 化学
    • 63 篇 统计学(可授理学、...
    • 54 篇 物理学
    • 50 篇 系统科学
  • 259 篇 管理学
    • 168 篇 图书情报与档案管...
    • 140 篇 管理科学与工程(可...
    • 73 篇 工商管理
  • 75 篇 医学
    • 70 篇 临床医学
    • 68 篇 基础医学(可授医学...
    • 47 篇 药学(可授医学、理...
    • 38 篇 公共卫生与预防医...
  • 65 篇 法学
    • 51 篇 社会学
  • 20 篇 经济学
  • 17 篇 农学
  • 15 篇 教育学
  • 9 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 57 篇 big data
  • 30 篇 internet of thin...
  • 30 篇 cloud computing
  • 24 篇 deep learning
  • 24 篇 data mining
  • 23 篇 smart cities
  • 21 篇 machine learning
  • 15 篇 covid-19
  • 13 篇 visualization
  • 12 篇 support vector m...
  • 12 篇 students
  • 12 篇 machine learning...
  • 11 篇 sentiment analys...
  • 10 篇 decision trees
  • 10 篇 data science
  • 10 篇 social networkin...
  • 10 篇 blockchain
  • 10 篇 data visualizati...
  • 10 篇 data models
  • 10 篇 cryptography

机构

  • 8 篇 university of el...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 galgotias univer...
  • 6 篇 zhengzhou univer...
  • 6 篇 key laboratory o...
  • 6 篇 department of co...
  • 5 篇 koneru lakshmaia...
  • 4 篇 faculty of infor...
  • 4 篇 school of comput...
  • 4 篇 school of inform...
  • 4 篇 chandigarh unive...
  • 4 篇 liaoning jianzhu...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 co. ltd. sugon b...
  • 4 篇 department of co...

作者

  • 7 篇 zhang tao
  • 5 篇 zhang jing
  • 5 篇 gao yanxia
  • 5 篇 liu yiwen
  • 4 篇 sharma vishnu
  • 4 篇 wang wei
  • 4 篇 shridevi s.
  • 4 篇 shi yuanquan
  • 4 篇 maatuk abdelsala...
  • 4 篇 sood manu
  • 4 篇 naohiro ishii
  • 3 篇 cai ying
  • 3 篇 li peng
  • 3 篇 fan yanfang
  • 3 篇 ippei torii
  • 3 篇 pippal sanjeev
  • 3 篇 akilan t.
  • 3 篇 senthil kumar th...
  • 3 篇 minyong shi
  • 3 篇 peng xiaoning

语言

  • 858 篇 英文
  • 49 篇 其他
  • 5 篇 中文
检索条件"任意字段=3rd International Conference on Computing and Data Science, CONF-CDS 2021"
907 条 记 录,以下是111-120 订阅
排序:
Enterprise Taxation Smart Monitoring System Based on Intelligent Background data Extraction  3
Enterprise Taxation Smart Monitoring System Based on Intelli...
收藏 引用
3rd international conference on Inventive Research in computing Applications, ICIRCA 2021
作者: Jiang, Shaobo School of Business Guangxi University Xingjian College of Science and Liberal Arts Nanning China
Enterprise taxation smart monitoring system based on intelligent background data extraction is designed in the proposed study. At present, the commonly used core volume rendering technology can display high-quality th... 详细信息
来源: 评论
Research on Twitter data Crawling and data Visualization Analysis Based on Python  3rd
Research on Twitter Data Crawling and Data Visualization Ana...
收藏 引用
3rd international conference on computing and data science, conf-cds 2021
作者: Ma, Ziyuan Dalian University of Technology Dalian116033 China
In this era of rapid development of the Internet, there will always be a large amount of new and innovative information. For Internet users, it is very tedious and impractical for them to filter out interesting and hi... 详细信息
来源: 评论
Detecting Software Vulnerabilities Based on Hierarchical Graph Attention Network  1
收藏 引用
3rd CAAI international conference on Artificial Intelligence (CICAI)
作者: Xu, Wenlin Li, Tong Wang, Jinsong Fu, Tao Tang, Yahui Yunnan Univ Sch Informat Sci & Engn Kunming Yunnan Peoples R China Yunnan Agr Univ Sch Big Data Kunming Yunnan Peoples R China Yunnan Univ Finance & Econ Informat Management Ctr Kunming Yunnan Peoples R China Chongqing Univ Posts & Telecommun Sch Software Chongqing Peoples R China
Detecting software vulnerabilities is a crucial part of software security. At present, the most commonly used methods are to train supervised classification or regression models from the source code to detect vulnerab... 详细信息
来源: 评论
iGuard: An Intelligent Sitting Posture Monitoring System with Pressure Sensors  3
iGuard: An Intelligent Sitting Posture Monitoring System wit...
收藏 引用
3rd international conference on Computer Vision and Pattern Analysis, ICCPA 2023
作者: Yan, Jingyu Wang, Aiguo School of Electronic Information Engineering Foshan University Guangyun Road 33 Guangdong Foshan528000 China
Prolonged and poor sitting postures are major causes of many musculoskeletal disorders, such as herniated discs, cervical spondylosis, back fasciitis, and scoliosis, and hence proper postures are essential for maintai... 详细信息
来源: 评论
Study on Improved YOLOv7-based Algorithm for Detecting Crack Defects in Ancient Buildings  24
Study on Improved YOLOv7-based Algorithm for Detecting Crack...
收藏 引用
3rd international conference on Computer, Artificial Intelligence and Control Engineering, CAICE 2024
作者: Fang, Tianke Hui, Zhenxing Rey, William P Xie, Zhiying Yang, Aihua He, Yuanrong School of Information Technology Mapua University Manila1200 Philippines Big Data Institute of Digital Natural Disaster Monitoring in Fujian Xiamen University of Technology Xiamen Fujian361024 China School of Computing and Information Engineering Xiamen University of Technology Xiamen Fujian361024 China School of Information Media Zhangzhou Vocational College of Science and Technology Zhangzhou Fujian363200 China Hunan Key Laboratory of Remote Sensing Monitoring of Ecological Environment Dongting Lake Area Changsha Hunan410004 China
In the protection and restoration work of ancient buildings, the detection and analysis of the cracks and defects of the exterior walls of ancient buildings is a crucial task. In this paper, an improved YOLOv7 algorit... 详细信息
来源: 评论
Goodness Ratio and Throughput Improvement Using Multi-criteria LEACH Method in Group Sensing Device Network  3rd
Goodness Ratio and Throughput Improvement Using Multi-criter...
收藏 引用
3rd international conference on data science, Machine Learning and Applications, IcdsMLA 2021
作者: Rekha, V.S. Siddaraju DrAmbedkar Institute of Technology Karnataka Bangalore India Department of Computer Science and Engineering Dr Ambedkar Institute of Technology Karnataka Bangalore India
In wireless sensor networks, the entire region is disbursed with a set of sensing devices (SDs), and then, multiple sets are formed. For controlling each set, a unique SD is selected for inter-set communication. The s... 详细信息
来源: 评论
A Review of End-to-End Chinese – Mandarin Speech Synthesis Techniques  3rd
A Review of End-to-End Chinese – Mandarin Speech Synthesis ...
收藏 引用
3rd international conference on computing and data science, conf-cds 2021
作者: Gong, Wenzhuo Hong, Yang Liu, Hancheng He, Yutong School of Cyber Science and Engineering Sichuan University Chengdu610207 China
Text-to-speech (TTS) is currently a significant research field of speech synthesis. It has been used in intelligent conversational artificial intelligence (AI), chatbot, speech interaction, and a large variety of othe... 详细信息
来源: 评论
Big data Case Study: E-Commerce Statistics Study Using Hadoop  3
Big Data Case Study: E-Commerce Statistics Study Using Hadoo...
收藏 引用
3rd international conference on Inventive Research in computing Applications, ICIRCA 2021
作者: Jogendra Kumar, M. Bhadraja, M. Reddy, R. Vijaya Kumar Thriveni, A. Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering AP Vaddeswaram India Pb Siddhartha College of Arts and Science Computer Science Department Vijayawada India Prasad v Potluri Siddhartha Institute of Technology Department of Information Technology A.P Vijayawada India
Today, data governs all parts of life, making it critical for companies to comprehend and apply relevant data in their operations. The fundamental target of this research work is to arrange the world's information... 详细信息
来源: 评论
Application and method analysis of cloud education technology in product art design education  3
Application and method analysis of cloud education technolog...
收藏 引用
3rd international conference on Internet Technology and Educational Informization, ITEI 2021
作者: Yang, Yan Chengdu College of University of Electronic Science and Technology of China Sichuan Chengdu611700 China
Cloud computing technology is a kind of intensive computing mode with data and processing capability as the core. It mainly integrates various ICT technologies and is the product of traditional technologies. Cloud com... 详细信息
来源: 评论
A Review Towards Machine Learning Spectrum for Bioinformatics  3
A Review Towards Machine Learning Spectrum for Bioinformatic...
收藏 引用
3rd international conference on Advances in computing, Communication Control and Networking, ICAC3N 2021
作者: Sharma, Richa Bharti, Vishal Chandigarh University Department of Computer Science and Engineering India
Machine Learning is a science developed as a subfield of Artificial Intelligence in late 90's. It is a science that will improve in the future. The development in Machine Learning is just because of the difficulty... 详细信息
来源: 评论