咨询与建议

限定检索结果

文献类型

  • 671 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 592 篇 工学
    • 520 篇 计算机科学与技术...
    • 281 篇 软件工程
    • 155 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 28 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 化学工程与技术
    • 21 篇 光学工程
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 200 篇 理学
    • 133 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 136 篇 管理学
    • 88 篇 图书情报与档案管...
    • 55 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 690 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
694 条 记 录,以下是221-230 订阅
排序:
Transfer pretrained sentence encoder to sentiment classification  3
Transfer pretrained sentence encoder to sentiment classifica...
收藏 引用
3rd IEEE international conference on data science in Cyberspace, DSC 2018
作者: Bai, Man Han, Xu Jia, Haoran Wang, Cong Sun, Yawei School of Software Engineering Beijing University of Posts and Telecommunications Beijing100876 China International School Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing100876 China
Deep learning has been demonstrated to be very effective in many difficult tasks of computer vision(CV) and natural language processing(NLP). But this usually depends on a large number of available training samples to... 详细信息
来源: 评论
Research on the Engineer of Financial System Process in Power Enterprises Based on "big data" + "cloud computing"  3
Research on the Engineer of Financial System Process in Powe...
收藏 引用
2018 3rd international conference on Insulating Materials, Material Application and Electrical Engineering, IMMAEE 2018
作者: Li, Chunyang Qu, Huanbo Jilin Technology College of Electronic Information Jilin132000 China
Big data generation in power companies is particularly prominent in financial accounting, which is particularly prominent in financial accounting. According to the traditional financial accounting process and system, ... 详细信息
来源: 评论
Evaluation of business english majors teaching quality based on the attribute importance of rough set  2019
Evaluation of business english majors teaching quality based...
收藏 引用
3rd international Workshop on Education, Big data and Information Technology, EBDIT 2019
作者: Fan, Yanying Jiang, Suping Zhang, Zimin Chen, Guanping Chen, Yangming Li, Biqing College of Mathematics and Computer Hezhou University Hezhou Guangxi542899 China Guangxi Talent International College Qinzhou Guangxi535000 China College of Tourism and Sports Hezhou University Hezhou542899 China School of Mathematics and Computer Science Hezhou University Hezhou542899 China School of Information and Communication Engineering Hezhou University Hezhou Guangxi542899 China
Aiming at the unreasonable weight allocation in traditional teaching evaluation, rough set theory (RST) is applied to the process of teaching evaluation. Using the Teaching Quality evaluation data of Business English ... 详细信息
来源: 评论
Spark based ANFIS approach for anomaly detection using big data  3rd
Spark based ANFIS approach for anomaly detection using big d...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Santosh, Thakur Ramesh, Dharavath Dhanbad DhanbadJharkhand826004 India
Business intelligence is one of the applications that can benefit from various techniques and methodologies to patronize the unlablled big data anomalies. To address this issue, in this paper, we present a model to id... 详细信息
来源: 评论
Quantified Self: Big data Analysis Platform for Human Factor Efficacy Evaluation of Complex System  3rd
收藏 引用
3rd international conference on Human Centered computing (HCC)
作者: Li, Chaoqiang Hou, Wenjun Chen, Xiaoling Li, Hao China Elect Sci Res Inst Beijing Peoples R China Beijing Univ Post & Telecommun Sch Digital Media & Design Arts Beijing 100876 Peoples R China Beijing Univ Post & Telecommun Beijing Key Lab Network & Network Culture Beijing 100876 Peoples R China
By analyzing the factors affecting the airborne mission system, this paper applied the method of Quantified Self to the evaluation of human effectiveness in the military airborne mission system. According to the depth... 详细信息
来源: 评论
Anti-data Mining on Group Privacy Information  3rd
收藏 引用
3rd international conference on Human Centered computing (HCC)
作者: Yang, Fan Tian, Tian Yao, Hong Zhao, Xiuyu Zheng, Tinggang Ning, Min China Univ Geosci Comp Sch Wuhan 430074 Hubei Peoples R China Founder Int Software Beijing Co Ltd Beijing 100080 Peoples R China
In the big data era, privacy preserving is a vital security challenge for data mining. Common object of privacy preserving is personal privacy, which should be kept unrevealed while data mining on group information. H... 详细信息
来源: 评论
A Clothes Classification Method Based on the gcForest  3
A Clothes Classification Method Based on the gcForest
收藏 引用
3rd IEEE international conference on Image, Vision and computing, ICIVC 2018
作者: Han, Li Haihong, Zhao Erxin, Yu Yuming, Bai Huiying, Li College of Software Jilin University Changchun Jilin province130012 China College of Computer Science and Technology Jilin University Symbol Computation and Knowledge Engineer of Ministry of Education Jilin University Changchun Jilin province130012 China
In this paper, we propose a clothes classification method, an application of the gcForest. The gcForest, a novel decision tree ensemble method proposed by Zhou and Feng, performs excellently in many experiments. Moreo... 详细信息
来源: 评论
A CFD Heterogeneous Parallel Solver Based on Collaborating CPU and GPU  3
A CFD Heterogeneous Parallel Solver Based on Collaborating C...
收藏 引用
3rd international conference on Mechanical and Aeronautical Engineering (ICMAE)
作者: Lai, Jianqi Tian, Zhengyu Li, Hua Pan, Sha Natl Univ Def Technol Coll Aerosp Sci & Engn Deya Rd Changsha Hunan Peoples R China
Since Graphic Processing Unit (GPU) has a strong ability of floating-point computation and memory bandwidth for data parallelism, it has been widely used in the areas of common computing such as molecular dynamics (MD... 详细信息
来源: 评论
Information Security Technology and Application in Logistics Traceability System of Aquatic Products Based on QR Code  3rd
收藏 引用
3rd international conference on Human Centered computing (HCC)
作者: Zu, Qiaohong Chen, Rui Wuhan Univ Technol Sch Logist Engn Wuhan 430063 Hubei Peoples R China
In view of the security hidden danger of the business data in the logistics traceability system of aquatic product, the design of the information security strategy is carried out from the two angles, which are data co... 详细信息
来源: 评论
Research on discrete emotion classification of Chinese online product reviews based on OCC model  3
Research on discrete emotion classification of Chinese onlin...
收藏 引用
3rd IEEE international conference on data science in Cyberspace, DSC 2018
作者: Liu, Lina Qi, Jiayin School of Economics and Management Key Laboratory of Trustworthy Distributed Computing and Service School of Ethnic Minority Education Beijing University of Posts and Telecommunication Beijing China School of Management Shanghai University of International Business and Economics Shanghai China
There are many rich and multi-dimensional discrete emotional information in online reviews. The research of discrete emotion analysis in English online reviews is relatively early and has made some achievements, but t... 详细信息
来源: 评论