咨询与建议

限定检索结果

文献类型

  • 1,091 篇 会议
  • 15 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 1,120 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 819 篇 工学
    • 731 篇 计算机科学与技术...
    • 613 篇 软件工程
    • 197 篇 信息与通信工程
    • 163 篇 生物工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 控制科学与工程
    • 63 篇 电气工程
    • 62 篇 安全科学与工程
    • 58 篇 动力工程及工程热...
    • 51 篇 光学工程
    • 46 篇 机械工程
    • 40 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 31 篇 仪器科学与技术
    • 31 篇 电子科学与技术(可...
  • 409 篇 理学
    • 196 篇 数学
    • 177 篇 生物学
    • 83 篇 统计学(可授理学、...
    • 71 篇 物理学
    • 58 篇 系统科学
    • 43 篇 化学
  • 253 篇 管理学
    • 151 篇 图书情报与档案管...
    • 128 篇 管理科学与工程(可...
    • 81 篇 工商管理
  • 99 篇 医学
    • 93 篇 临床医学
    • 91 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
    • 43 篇 公共卫生与预防医...
  • 70 篇 法学
    • 50 篇 社会学
  • 33 篇 经济学
    • 33 篇 应用经济学
  • 30 篇 农学
  • 23 篇 教育学
  • 5 篇 军事学

主题

  • 53 篇 computational mo...
  • 45 篇 big data
  • 44 篇 machine learning
  • 38 篇 deep learning
  • 38 篇 cloud computing
  • 35 篇 predictive model...
  • 31 篇 feature extracti...
  • 28 篇 machine learning...
  • 26 篇 internet of thin...
  • 25 篇 neural networks
  • 24 篇 data mining
  • 23 篇 blockchain
  • 23 篇 data models
  • 22 篇 support vector m...
  • 21 篇 forecasting
  • 21 篇 training
  • 20 篇 covid-19
  • 20 篇 sentiment analys...
  • 17 篇 technological in...
  • 15 篇 object detection

机构

  • 13 篇 teerthanker maha...
  • 11 篇 jain university ...
  • 9 篇 school of comput...
  • 6 篇 galgotias univer...
  • 4 篇 galgotias univer...
  • 4 篇 department of in...
  • 4 篇 kite group of in...
  • 4 篇 department of co...
  • 4 篇 chandigarh unive...
  • 4 篇 department of ne...
  • 4 篇 school of cyber ...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 college of compu...
  • 3 篇 college of compu...
  • 3 篇 university of en...
  • 3 篇 department of co...
  • 3 篇 china academy of...
  • 3 篇 christ universit...
  • 3 篇 institute of art...

作者

  • 6 篇 jacob lija
  • 6 篇 n. suresh kumar
  • 6 篇 joshi kapil
  • 6 篇 lija jacob
  • 5 篇 vishal bharti
  • 5 篇 aruna bhat
  • 5 篇 bhat aruna
  • 5 篇 naohiro ishii
  • 4 篇 li yang
  • 4 篇 annamalai suresh
  • 4 篇 sharma vishnu
  • 4 篇 ippei torii
  • 4 篇 s. vijayalakshmi
  • 4 篇 vishnu sharma
  • 4 篇 wang tao
  • 4 篇 bharti vishal
  • 4 篇 malik aruna
  • 4 篇 gupta gaurav
  • 4 篇 vijayalakshmi s.
  • 4 篇 li wei

语言

  • 1,111 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=4th International Conference on Computing and Data Science, CONF-CDS 2022"
1120 条 记 录,以下是271-280 订阅
排序:
4th international conference on Innovative data Communication Technology and Application, ICIDCA 2022
4th International Conference on Innovative Data Communicatio...
收藏 引用
4th international conference on Innovative data Communication Technologies and Application, ICIDCA 2022
the proceedings contain 100 papers. the topics discussed include: security and privacy preservation for data communication network;insights into NoSQL databases using financial data: a comparative analysis;a dynamic f...
来源: 评论
ABC-DE-WOA: A New Hybrid Algorithm for Optimization Problems  4
ABC-DE-WOA: A New Hybrid Algorithm for Optimization Problems
收藏 引用
4th international conference on Circuits, Control, Communication and computing, I4C 2022
作者: Pradeep Kumar, D. Sowmya, B.J. Kanavalli, Anita Vincent, Annvin Dept. of Computer Science and Engineering Bangalore India Dept. of Artificial Intelligence and Data Science Bangalore India
One of the most effective swarm intelligence-based algorithms for many global optimization issues is the Artificial Bee Colony (ABC) strategy. Despite the fact that there are many Artificial Bee Colony (ABC) variants,... 详细信息
来源: 评论
Decentralized Voting System  4
Decentralized Voting System
收藏 引用
4th international conference on Advances in computing, Communication Control and Networking, ICAC3N 2022
作者: Kumar, Sachin Akhtar, Shoaib Ghosh, Soumalya Saini, Kavita Galgotias University School of Computing Science and Engineering Delhi NCR India
the evolution of Blockchain has given way to a Smart World where there is improved security and integration of devices, systems, and processes with humans through all-pervasive connectivity. there are numerous secure ... 详细信息
来源: 评论
Efficient Node Placement Approach in Fog computing Environment Using Machine Learning Model  4th
Efficient Node Placement Approach in Fog Computing Environme...
收藏 引用
4th international conference on Communications and Cyber-Physical Engineering, ICCCE 2021
作者: Prakash, P. Sakthivel, V. School of Computer Science and Engineering Vellore Institute of Technology Chennai India
the evolution of fog computing plays a vital role in the field of computing paradigms. the fog computing alone cannot do all the processes so that to be interlinked with cloud computing. One of the significant drawbac... 详细信息
来源: 评论
A Comparative Review on Image Interpolation-Based Reversible data Hiding  4th
A Comparative Review on Image Interpolation-Based Reversible...
收藏 引用
4th international conference on computing, Communications, and Cyber-Security, IC4S 2022
作者: Sharma, Raju Pratap Malik, Aruna Department of Computer Science and Engineering Dr. BR Ambedkar National Institute of Technology Jalandhar Punjab India
Reversible data hiding (RDH) is one of the most crucial issues in the field of information security in the modern world, as it enables us for securing communication by hiding secret data in a cover media. With the hel... 详细信息
来源: 评论
Cardiac data Compression for Reduced Traffic on Application of IoMT  4
Cardiac Data Compression for Reduced Traffic on Application ...
收藏 引用
4th IEEE international conference on Emerging Smart computing and Informatics, ESCI 2022
作者: Baliarsingh, Sudeshna Mohapatra, Saumendra Kumar Panda, Prakash Kumar Mohanty, Mihir Narayan Iter Odisha Bhubaneswar India Institute of Computer Science and Engineering Saveetha School of Engineering Tamilnadu Chennai India Odisha Bhubaneswar India
the Internet of things (IoT) has a great role to provide the recent technology including the applications in the area of Health care, Engineering, smart societies and many different human activities. It needs the comp... 详细信息
来源: 评论
A Robust Deep Learning Techniques for Alzheimer’s Prediction  4th
A Robust Deep Learning Techniques for Alzheimer’s Predictio...
收藏 引用
4th international conference on computing, Communications, and Cyber-Security, IC4S 2022
作者: Locharla, Jayesh Kolanuvada, Haswanth Ashrith, Kona Venkata Sai Suchitra, S. Department of Data Science and Business Systems SRM Institute of Science and Technology Tamil Nadu Kattankulathur Chengalpattu Dist 603203 India
Alzheimer’s disease is a neurological condition that gradually reduces brain size and destroys brain neurons. the most common varieties of dementia, Alzheimer’s disease limits a person’s ability to operate independ... 详细信息
来源: 评论
TinyML: A Systematic Review and Synthesis of Existing Research  4
TinyML: A Systematic Review and Synthesis of Existing Resear...
收藏 引用
4th international conference on Artificial Intelligence in Information and Communication, ICAIIC 2022
作者: Han, Hui Siebert, Julien Fraunhofer Institute for Experimental Software Engineering IESE Data Science Department Kaiserslautern Germany
Tiny Machine Learning (TinyML), a rapidly evolving edge computing concept that links embedded systems (hardware and software) and machine learning, with the purpose of realizing ultra-low-power and low-cost and effici... 详细信息
来源: 评论
A Real-Time Distribution Algorithm of Face-Recognition data Based Tourist Volume at Tourist Attractions  4
A Real-Time Distribution Algorithm of Face-Recognition Data ...
收藏 引用
2022 4th international conference on Electronic Engineering and Informatics, EEI 2022
作者: He, Huaping Zhang, Xiuying Zhang, Min Sichuan University of Science & Engineering School of Computer Science and Engineering Zigong China Zigong Vocational and Technical School Zigong China Chengdu Shuxing Vocational Middle School Chengdu China
It has become a common goal that the tourist volume control at a tourist attraction can promote the healthy development of tourism. the number of on-site visitors is intelligently controlled by the application of the ... 详细信息
来源: 评论
Named Entity Recognition in XLNet Cyberspace Security Domain Based on Dictionary Embedding  4
Named Entity Recognition in XLNet Cyberspace Security Domain...
收藏 引用
4th international conference on Advances in Computer Technology, Information science and Communications, CTISC 2022
作者: Yang, Danyang Wan, Fangjie Zhang, Yonggan Zhengzhou University School of Cyber Science and Engineering Zhengzhou China
With the increase of network security incidents, network security analysts need to analyze massive log information. the introduction of knowledge graph into the field of network security can facilitate analysis by sec... 详细信息
来源: 评论