咨询与建议

限定检索结果

文献类型

  • 671 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 592 篇 工学
    • 520 篇 计算机科学与技术...
    • 281 篇 软件工程
    • 155 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 28 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 化学工程与技术
    • 21 篇 光学工程
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 200 篇 理学
    • 133 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 136 篇 管理学
    • 88 篇 图书情报与档案管...
    • 55 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 690 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
694 条 记 录,以下是281-290 订阅
排序:
Improved reversible data embedding in medical images using I-IWT and pairwise pixel difference expansion  3rd
Improved reversible data embedding in medical images using I...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Geetha, R. Geetha, S. SENSE VIT University Chennai Campus Chennai India SCSE VIT University Chennai Campus Chennai India
Reversible data Hiding is a tactic of conveying secret message by embedding the same in any of the multimedia content and after extracting the hidden information, original cover can be recovered without any deformatio... 详细信息
来源: 评论
Message from the conference chair
Proceedings - 2018 IEEE/ACIS 3rd International Conference on...
收藏 引用
Proceedings - 2018 IEEE/ACIS 3rd international conference on Big data, Cloud computing, data science and Engineering, BCD 2018 2018年 vii页
作者: Tsunoda, Masateru Kindai University Japan
来源: 评论
Big data analysis - an approach to improve power system data analysis and load research  3rd
Big data analysis - an approach to improve power system data...
收藏 引用
3rd international conference on Cognitive computing and Information Processing, CCIP 2017
作者: Shankarlinga, Sandhya S. Veeramanju, K.T. Nagaraja, R. Karnataka Power Transmission Corporation Limited Bengaluru India Sri Jayachamarajendra College of Engineering Mysuru India Power Research & Development Consultants Pvt. Ltd. Bengaluru India
The introduction of various intelligent electronic devices (IEDs), sensors and other network controls for smarter operation of the electric grid has resulted in massive data explosion. With an exponential growth in vo... 详细信息
来源: 评论
Semantic cloud community framework for services provision  3rd
Semantic cloud community framework for services provision
收藏 引用
3rd international conference on Advanced Intelligent Systems and Informatics, AISI 2017
作者: Al-Mashat, Tamer M. El-Licy, Fatma A. Salah, Akram I. Computer Sciences Department Institute of Statistical Studies and Research Cairo University Giza Egypt Computer Sciences Department Faculty of Computer Science and Information Cairo University Giza Egypt
Cloud computing represents an evolution paradigm that enables information technology (IT) capabilities to be delivered "as a service". In the last decade number of cloud-based services has grown intensely an... 详细信息
来源: 评论
Deep learning based adaptive linear collaborative discriminant regression classification for face recognition  3rd
Deep learning based adaptive linear collaborative discrimina...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Shailaja, K. Anuradha, B. Venkatapur HyderabadTelangana501301 India Computer Science Engineering Abhinav Hi-Tech College of Engineering Chilkur Balaji Temple Rd Himayat Nagar HyderabadTelangana501301 India
Face recognition is a popular research problem in the domain of image analysis. The steps involved in face recognition are mainly face verification and face classification. Face verification algorithms have been well-... 详细信息
来源: 评论
Cluster based mechanism for avoidance of duplicate tag data in RFID networks  3rd
Cluster based mechanism for avoidance of duplicate tag data ...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Bagirathi, S. Sankar, Sharmila Sandhya B.S Abdur Rahman University Chennai India
Radio Frequency Identification (RFID) is a wireless technology that is used to determine the objects that has been lost or that has to be tracked through the use of radio waves. These objects contain electronically st... 详细信息
来源: 评论
Tumor Segmentation from Multimodal MRI Using Random Forest with Superpixel and Tensor Based Feature Extraction  3rd
收藏 引用
3rd international Workshop on Brain-Lesion (BrainLes) held jointly at the conference on Medical Image computing for Computer Assisted Intervention (MICCAI)
作者: Bharath, H. N. Colleman, S. Sima, D. M. Van Huffel, S. Katholieke Univ Leuven STADIUS Ctr Dynam Syst Signal Proc & Data Analyt Dept Elect Engn ESAT Leuven Belgium IMEC Leuven Belgium Katholieke Univ Leuven Dept Elect Engn ESAT Leuven Belgium
Identification and localization of brain tumor tissues plays an important role in diagnosis and treatment planning of gliomas. A fully automated superpixel wise two-stage tumor tissue segmentation algorithm using rand... 详细信息
来源: 评论
Quantified self using IoT wearable devices  3rd
Quantified self using IoT wearable devices
收藏 引用
3rd international conference on Advanced Intelligent Systems and Informatics, AISI 2017
作者: Shehab, Abdulaziz Ismail, Ahmed Osman, Lobna Elhoseny, Mohamed El-Henawy, I.M. Information Systems Department Faculty of Computers and Information Mansoura University Mansoura Egypt Department of Electronics and Communications Engineering Delta Higher Institute of Engineering and Technology Talkha Egypt Faculty of Computer Science and Information Systems Zagazig University Zagazig Egypt Cairo Egypt
Nowadays, designing and developing wearable devices that could detect many types of diseases has become inevitable for E-health field. The decision-making of those wearable devices is done by various levels of analysi... 详细信息
来源: 评论
A data mining approach towards healthcare recommender system  3rd
A data mining approach towards healthcare recommender system
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Sharma, Mugdha Ahuja, Laxmi Amity School of Engineering and Technology Amity University NoidaUP201313 India Amity Institute of Information Technology Amity University NoidaUP201313 India
Healthcare recommender systems are meant to provide accurate and relevant predictions to the patients. It is very difficult for people to explore various online sources to find some useful recommendations as per their... 详细信息
来源: 评论
Controlled replication based bubble rap routing algorithm in delay tolerant network  3rd
Controlled replication based bubble rap routing algorithm in...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Jain, Sweta Yadav, Pavan Department of Computer Science and Engineering Maulana Azad National Institute of Technology BhopalMadhya Pradesh462051 India
Delay-tolerant or opportunistic networks (DTNs) [1, 2] are special types of networks which allow transmission of data where there may be no end to end connection between source and destination. DTNs may lack continuou... 详细信息
来源: 评论