咨询与建议

限定检索结果

文献类型

  • 670 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 693 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 592 篇 工学
    • 520 篇 计算机科学与技术...
    • 281 篇 软件工程
    • 155 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 28 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 化学工程与技术
    • 21 篇 光学工程
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 200 篇 理学
    • 133 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 136 篇 管理学
    • 88 篇 图书情报与档案管...
    • 55 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 689 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
693 条 记 录,以下是1-10 订阅
排序:
3rd international conference on soft computing in data science, scds 2017
收藏 引用
3rd international conference on soft computing in data science, scds 2017
The proceedings contain 26 papers. The special focus in this conference is on soft computing in data science. The topics include: Time series machine learning: Implementing ARIMA and hybrid ARIMA-ANN for electricity f...
来源: 评论
Recent Trends in data science and soft computing: Proceedings of the 3rd international conference of Reliable Information and Communication Technology
收藏 引用
2018年
作者: Faisal Saeed Nadhmi Gazem Fathey Mohammed Abdelsalam H Busalim
This book presents the proceedings of the 3rd international conference of Reliable Information and Communication Technology 2018 (IRICT 2018), which was held in Kuala Lumpur, Malaysia, on July 2324, 2018. The main the...
来源: 评论
Iterative Turbo Receiver for FTN Based on Semi-Definite Relaxation  3
Iterative Turbo Receiver for FTN Based on Semi-Definite Rela...
收藏 引用
3rd international conference on Cloud computing, Big data Application and software Engineering, CBASE 2024
作者: Jiang, YuTao Gong, WenBin Chen, Honghao Gu, Yu Yuan, Tangju Su, Yu School of Electronic and Information Engineering Chongqing Three Gorges University Chongqing Wanzhou China School of Computer Science and Engineering Chongqing Three Gorges University Chongqing Wanzhou China
Faster-than-Nyquist (FTN) technology, as a transmission technique that can improve spectrum efficiency, has received widespread attention. However, it introduces severe Inter-Symbol Interference (ISI), leading to incr... 详细信息
来源: 评论
AI-enabled digital twins: soft computing methods for industrial data mining  3
AI-enabled digital twins: soft computing methods for industr...
收藏 引用
3rd international conference on Intelligent computing and Next Generation Networks, ICNGN 2024
作者: Kunelbayev, Murat Amirkhanov, Bauyrzhan Zauranbek, Madiyar Abdulkhamit, Nazargozha Adilzhanova, Saltanat Nurgazy, Tomiris Artificial Intelligent and Big Data department Al-Farabi Kazakh National University Almaty Kazakhstan Cybersecurity and cryptology department Al-Farabi Kazakh National University Almaty Kazakhstan Artificial Intelligence and Big Data department Al-Farabi Kazakh National University Almaty Kazakhstan
Digital twins (DTs) have become a critical constituent in the continuous digital evolution of industrial systems, enabling instantaneous insight, anticipatory analytics, and tactical enhancement across various sectors... 详细信息
来源: 评论
Segmenting the Brain Tumor using Deep Learning Techniques  3
Segmenting the Brain Tumor using Deep Learning Techniques
收藏 引用
3rd international conference on Electronics and Renewable Systems, ICEARS 2025
作者: Pranitha, Ch. Lakshmi Sumathi, R. Harshitha, V. Kavya, N. Soni, A. Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu India Kalasalingam Academy of Research and Education School of Computing Department of Computer Science and Engineering Tamil Nadu India
This study presents a U-Net architecture with EfficientNet-B7 as the feature extraction backbone is used to propose a robust brain tumor segmentation method. Using cutting-edge deep learning techniques, the suggested ... 详细信息
来源: 评论
Network Intrusion Detection System Using Decision Tree and KNN Algorithm  3
Network Intrusion Detection System Using Decision Tree and K...
收藏 引用
3rd international conference on Power Electronics and IoT Applications in Renewable Energy and its Control, PARC 2024
作者: Singh, Km Shivani Singh, Khundrapam Johnson National Institute of Technology Dept. of Computer Science and Engineering Manipur Imphal India
The complexity of attacks is increasing, making it increasingly difficult to effectively discover breaches. A network intrusion detection system is needed to handle the aforementioned problem. An automated software pr... 详细信息
来源: 评论
Encrypted video identification - Normalization and activation function perspective  3
Encrypted video identification - Normalization and activatio...
收藏 引用
3rd international conference on Communication, computing and Digital Systems, C-CODE 2023
作者: Bukhari, Syed M. A. H. Afandi, Waleed Maqsood, Tahir Khan, Muhammad U. S. Comsats University Islamabad Department of Computer Science Abbottabad Pakistan Comsats University Islamabad Department of Computer Science Lahore Pakistan
Video identification in encrypted network traffic has become a challenge for researchers in the past few years. However, the accuracy of the identification depends on various factors. This paper highlight the impact o... 详细信息
来源: 评论
Adaptive SOM neural network algorithm  3
Adaptive SOM neural network algorithm
收藏 引用
3rd international conference on Artificial Intelligence, Automation, and High-Performance computing, AIAHPC 2023
作者: Wang, Xin Yan, Taishan School of Information Science and Engineering Hunan Institute of Science and Technology Hunan Yueyang China Hunan Institute of Science and Technology School of Information Science and Engineering China Key Laboratory of Hunan Province on Intelligent Control and Optimization of Complex Industrial Logistics System Hunan Yueyang China
In order to improve the performance of traditional SOM model, an adaptive SOM neural network algorithm is proposed. By introducing the error square sum solution formula, the clustering error of the model sub-data set ... 详细信息
来源: 评论
IoT Security Detection and Evaluation for Smart Cyber Infrastructures Using LSTMs with Attention Mechanism  3
IoT Security Detection and Evaluation for Smart Cyber Infras...
收藏 引用
3rd IEEE international conference on Distributed computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Pillai, Sanjaikanth E Vadakkethil Somanathan Polimetla, Kiran Prakash, Chidurala Sai Pareek, Piyush Kumar Pawar, Priyanka Pramod School Of Electrical Engineering And Computer Science University Of North Dakota Grand Forks United States Adobe Inc. Dept. Of Information Technology AustinTX United States Sr University Department Of Electrical And Electronics Engineering Warangal India Nitte Meenakshi Institute Of Technology Department Of Aiml And Ipr Cell Bengaluru India University Of The Cumberlands Department Of Information Technology WilliamsburgKY United States
A computer network may be impacted by malware, computer viruses, and other hostile attacks. One of the most important elements of network security as an active defence technology is Intrusion Detection System (IDS). I... 详细信息
来源: 评论
Blockchain and Machine Learning Security for the Internet of Things: A Bibliometric Analysis  3
Blockchain and Machine Learning Security for the Internet of...
收藏 引用
3rd international conference on Pervasive computing and Social Networking, ICPCSN 2023
作者: Mudhar, Jaideep Kaur Malhotra, Jyoteesh Singh, Ajay Kumar Anand, Monika Guru Nanak Dev University Computer Engineering Amritsar India Guru Nanak Dev University Electronics Engineering Regional Campus Jalandhar India Chandigarh University Computer Science and Engineering Mohali India
The Internet of Things has developed as a catalyst for innovation across numerous industries, from home automation to smart cities to 4IR primarily Industry 4.0. Through the internet, IoT devices interact and exchange... 详细信息
来源: 评论