咨询与建议

限定检索结果

文献类型

  • 671 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 592 篇 工学
    • 520 篇 计算机科学与技术...
    • 281 篇 软件工程
    • 155 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 28 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 化学工程与技术
    • 21 篇 光学工程
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 200 篇 理学
    • 133 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 136 篇 管理学
    • 88 篇 图书情报与档案管...
    • 55 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 690 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
694 条 记 录,以下是571-580 订阅
排序:
Handling Imbalanced data in Churn Prediction using ADASYN and Backpropagation Algorithm
Handling Imbalanced Data in Churn Prediction using ADASYN an...
收藏 引用
international conference on science in Information Technology
作者: Annisa Aditsania Adiwijaya Aldo Lionel Saonard School of Computing Telkom University Bandung Indonesia
Customers are important assets for an industry, including telecommunication industry. Customer churn will result in lost revenue. For that reason, a classification model that can predict the customer churn is needed. ... 详细信息
来源: 评论
data processing in semantic sensor web: A survey
Data processing in semantic sensor web: A survey
收藏 引用
international conference on Applied and Theoretical computing and Communication Technology (iCATccT)
作者: Lokesh B. Bhajantri R. Pundalik Department of Information Science and Engineering Basaveshwar Engineering College Bagalkot Karnataka India College of Engineering and Technology Bhubaneswar Orissa IN
Wireless Sensor Network (WSN) has set of wireless sensor nodes that are used to generate or sense the high volume of raw data from the environment, transmits the data to its respective sink node. The processing of raw... 详细信息
来源: 评论
An ephemeral investigation on energy proficiency mechanisms in WSN
An ephemeral investigation on energy proficiency mechanisms ...
收藏 引用
international conference on Applied and Theoretical computing and Communication Technology (iCATccT)
作者: N Achyutha Prasad C D Guruprakash Sri Siddhartha Academy of Higher Education Tumkur Karnataka IN Department of Computer Science and Engineering Sri Siddhartha Institute of Technology Tumakuru India
Encompassing network lifespan and also sensor mote functionality is exceptionally sensitive for the fruitful usage of wireless sensor networks (WSNs) in some applications where supplanting or charging energy repositor... 详细信息
来源: 评论
Preprocessing Matrix Factorization for Solving data Sparsity on Memory-Based Collaborative Filtering
Preprocessing Matrix Factorization for Solving Data Sparsity...
收藏 引用
international conference on science in Information Technology
作者: Mochamad Iqbal Ardimansyah Arief Fatchul Huda Z.K. Abdurahman Baizal School of Computing Telkom University Bandung Indonesia
Collaborative filtering (CF) is one of the techniques in recommender system which utilizes information of user preference in the form of ratings of items and produce recommendation based on the similarity of behaviors... 详细信息
来源: 评论
The VIVA OpenHBM finite element 50th percentile female occupant model: Whole body model development and kinematic validation
The VIVA OpenHBM finite element 50th percentile female occup...
收藏 引用
2017 international Research Council on the Biomechanics of Injury conference, IRCOBI 2017
作者: Östh, Jonas Mendoza-Vazquez, Manuel Linder, Astrid Svensson, Mats Y. Brolin, Karin Chalmers University of Technology Sweden Swedish National Rd. and Transport Research Institute Sweden
Recently, significant progress has been made in the development of Finite Element Human Body Models, and they have been introduced in the development of automotive safety systems. The average female has not been cover... 详细信息
来源: 评论
An efficient method of computing the k-dominant skyline efficiently by partition value
An efficient method of computing the k-dominant skyline effi...
收藏 引用
international conference on Information Management (ICIM)
作者: Guanling Lee Ying-Hao Lee Department of Computer Science and Information Engineering National Dong Hwa University Hualien Taiwan R.O.C
Skyline queries are useful in many applications such as multicriteria decision-making, data mining, and user-preference queries. However, the probability that a point dominates another one reduces significantly as the... 详细信息
来源: 评论
Collaboration-oriented information flow analysis and control for Mobile Cloud
Collaboration-oriented information flow analysis and control...
收藏 引用
IEEE international conference on Computational Intelligence & Communication Technology (CICT)
作者: Ziyi Su Yong Peng Fuyong Ge Changda Song Fangyuan Ma Frédérique Biennier School of Computer Science and Information Technology Northeast Normal University Changchun China Sunshine ensurance co. Ltd Beijing China Lab. LIRIS CNRS University of Lyon Avenue Albert Einstein Villeurbanne France
This paper presents a functional design of a `information flow analysis' service that provides information/data owner with a explicit and end-to-end provenance recording of information/data usage and redissemnatio... 详细信息
来源: 评论
Owner-stipulated data security and privacy for data accessing in Mobile Cloud context
Owner-stipulated data security and privacy for data accessin...
收藏 引用
IEEE international conference on Computational Intelligence & Communication Technology (CICT)
作者: Ziyi Su Yong Pe Changda Song Fuyong Ge Frédérique Biennier Sch. of Comput. Sci. & Inf. Technol. Northeast Normal University Changchun Jilin CN Sunshine ensurance Co. Ltd. China School of Computer Science and Information Technology Sunshine ensurance co. Ltd Beijing China School of Computer Science and Information Technology Northeast Normal University Changchun Jilin CN Lab. LIRIS CNRS INSA-lyon University of Lyon Avenue Albert Einstein Villeurbanne France
A security principle in the collaborative Mobile Cloud contexts is that data recipients to gain owner's approval for usage and redissemination of digital object shared and merged in transactions/interactions. This... 详细信息
来源: 评论
Imprecise constrained covering solid travelling salesman problem with credibility  3rd
Imprecise constrained covering solid travelling salesman pro...
收藏 引用
3rd international conference on Mathematics and computing, ICMC 2017
作者: Mukherjee, Anupam Maity, Samir Panigrahi, Goutam Maiti, Manoranjan Department of Mathematics National Institute of Technology Durgapur DurgapurWest Bengal713209 India Department of Computer Science Vidyasagar University MidnaporeWest Bengal721102 India Department of Applied Mathematics Vidyasagar University MidnaporeWest Bengal721102 India
In this article, we model an "Imprecise Constrained Covering Solid Travelling Salesman Problem with Credibility" (ICCSTSPC), a generalization of Covering Salesman Problem (CSP), in fuzzy environment. A sales... 详细信息
来源: 评论
A security criteria regulation middleware using security policy for Web Services on multi-Cloud tenancies
A security criteria regulation middleware using security pol...
收藏 引用
IEEE international conference on Computational Intelligence & Communication Technology (CICT)
作者: Ziyi Su Changda Song Lin Dai Fuyong Ge Ruopeng Yang Frédérique Biennier School of Computer Science and Information Technology Northeast Normal University Changchun China INSA-lyon University of Lyon Avenue Albert Einstein Villeurbanne France
In the multi-cloud tenancy environments, Web Service offers an standard approach for discovering and using capabilities in an environment that transcends ownership domains. This brings into concern the ownership and s... 详细信息
来源: 评论