咨询与建议

限定检索结果

文献类型

  • 995 篇 会议
  • 23 册 图书
  • 13 篇 期刊文献

馆藏范围

  • 1,031 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 789 篇 工学
    • 684 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 198 篇 信息与通信工程
    • 76 篇 电气工程
    • 52 篇 生物工程
    • 48 篇 控制科学与工程
    • 48 篇 生物医学工程(可授...
    • 34 篇 机械工程
    • 29 篇 化学工程与技术
    • 24 篇 安全科学与工程
    • 23 篇 交通运输工程
    • 22 篇 光学工程
    • 22 篇 动力工程及工程热...
    • 19 篇 仪器科学与技术
    • 18 篇 土木工程
    • 17 篇 电子科学与技术(可...
  • 256 篇 理学
    • 176 篇 数学
    • 68 篇 统计学(可授理学、...
    • 59 篇 生物学
    • 43 篇 物理学
    • 42 篇 系统科学
    • 27 篇 化学
  • 176 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 89 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 40 篇 医学
    • 38 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 22 篇 法学
    • 17 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 16 篇 教育学
  • 13 篇 农学
  • 4 篇 军事学

主题

  • 71 篇 big data
  • 46 篇 cloud computing
  • 44 篇 data mining
  • 35 篇 machine learning
  • 31 篇 security
  • 29 篇 deep learning
  • 29 篇 feature extracti...
  • 27 篇 data models
  • 22 篇 computational mo...
  • 21 篇 accuracy
  • 21 篇 training
  • 20 篇 predictive model...
  • 19 篇 servers
  • 18 篇 internet of thin...
  • 17 篇 blockchain
  • 15 篇 protocols
  • 15 篇 soft sensors
  • 14 篇 support vector m...
  • 14 篇 medical services
  • 13 篇 real-time system...

机构

  • 12 篇 jiangsu high tec...
  • 11 篇 henan univ inst ...
  • 9 篇 school of inform...
  • 8 篇 nanjing univ pos...
  • 6 篇 henan univ sch c...
  • 6 篇 nanjing universi...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 5 篇 school of comput...
  • 5 篇 college of compu...
  • 4 篇 beihang univ bei...
  • 4 篇 univ exeter coll...
  • 4 篇 school of comput...
  • 3 篇 university of sc...
  • 3 篇 school of mathem...
  • 3 篇 soochow univ sch...
  • 3 篇 chinese acad sci...
  • 3 篇 national demonst...
  • 3 篇 univ chinese aca...
  • 3 篇 chinese acad sci...

作者

  • 17 篇 han zhijie
  • 10 篇 pan jeng-shyang
  • 8 篇 elisa bertino
  • 7 篇 liu pingzeng
  • 7 篇 wenchao huang
  • 6 篇 yan xiong
  • 5 篇 li peng
  • 5 篇 zhaoqing pan
  • 5 篇 xingming sun
  • 5 篇 wang ruchuan
  • 5 篇 zhang jing
  • 4 篇 hao zhou
  • 4 篇 panlong yang
  • 4 篇 zhang xinpeng
  • 3 篇 zhang lei
  • 3 篇 fuyou miao
  • 3 篇 radha krishna ra...
  • 3 篇 zhang chao
  • 3 篇 jianmeng huang
  • 3 篇 ge jingguo

语言

  • 1,017 篇 英文
  • 10 篇 其他
  • 4 篇 中文
检索条件"任意字段=4th International Conference on Soft Computing in Data Science, SCDS 2018"
1031 条 记 录,以下是81-90 订阅
排序:
Pixel Similarity-Based Steganography in Bit Planes: An Optimization-Driven Approach
Pixel Similarity-Based Steganography in Bit Planes: An Optim...
收藏 引用
soft computing for Security Applications (ICSCSA), international conference on
作者: R.RoselinKiruba J. Jude Moses Anto Devakanth L.Sharmila Vasumathy M M Misba C.Saranya Jothi Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology Chennai Department of Computer Applications Madanapalle Institute of Technology and Science Andra Pradesh India Department of Information Technology Kingston Engineering College Vellore
Steganography is the method that convert data into bits to make it suitable for hiding. While embedding data the factors such as stego image quality and distortion which cannot be observed by the human eyes. the aim o... 详细信息
来源: 评论
Critical Disaster Prediction using Machine Learning Algorithms
Critical Disaster Prediction using Machine Learning Algorith...
收藏 引用
soft computing for Security Applications (ICSCSA), international conference on
作者: E. Nirmala M. Suresh M. Maragatharajan Riya Dadlani School of Computing Science and Engineering VIT Bhopal University Kothrikalan Madhya Pradesh India School of Computing Sciences and Artificial Intelligence VIT Bhopal University Kothrikalan Madhya Pradesh India
Prediction of earthquake is a challenging factor in the early warning system. there are a number of geographical locations that cause earthquake very often due to climatic changes. Earthquake is one among the natural ... 详细信息
来源: 评论
PointAF: A Novel Semantic Segmentation Network for Point Cloud  1
收藏 引用
Proceedings of the 4th international conference on Neural computing for Advanced Applications, NCAA 2023
作者: Chen, Tianze Wang, Xuhong Li, Dongsheng Liu, Jiepeng Wu, Zhou College of Automation Chongqing University Chongqing China The Hong Kong University of Science and Technology Hong Kong School of Civil Engineering Chongqing University Chongqing China
Point cloud semantic segmentation is a crucial problem in computer vision, which aims to assign semantic labels to each point in a point cloud. However, the sparsity and irregularity of point cloud data pose significa... 详细信息
来源: 评论
Application of Deep Learning for Wildfire Risk Management: Preliminary Results  4th
Application of Deep Learning for Wildfire Risk Management:...
收藏 引用
4th international conference on Numerical Computations: theory and Algorithms, NUMTA 2023
作者: De Rango, Alessio D’Ambrosio, Donato Mendicino, Giuseppe Department of Environmental Engineering University of Calabria Ponte Pietro Bucci Rende87036 Italy Department of Mathematics and Computer Science University of Calabria Ponte Pietro Bucci Rende87036 Italy
Due to ongoing climate change and the related increased risk of drought, wildfires in the Mediterranean are expected to become more frequent and intense. this note introduces the use of Deep Learning to produce suscep... 详细信息
来源: 评论
Entropy-Based Fuzzy Weighted Logistic Regression for Classifying Imbalanced data  6th
Entropy-Based Fuzzy Weighted Logistic Regression for Classif...
收藏 引用
6th international conference on soft computing in data science (scds)
作者: Harumeka, Ajiwasesa Purnami, Santi Wulan Rahayu, Santi Puteri Inst Teknol Sepuluh Nopember Dept Stat Surabaya Indonesia Cent Bur Stat East Java Surabaya Indonesia
Logistic regression is a popular classification method that has disadvantages when it is applied to large data. Truncated Regularized Iteratively Reweighted Least Square (TR-IRLS) is a method that overcomes this probl... 详细信息
来源: 评论
Enhancing Automated Payments: Impact of Iris Technology's in UPI Transactions
Enhancing Automated Payments: Impact of Iris Technology's in...
收藏 引用
soft computing for Security Applications (ICSCSA), international conference on
作者: Bhavna Galhotra Shalini Bhaskar Bajaj Aman Jatain Vivek Jaglan Computer Science Dept Amity University Haryana Jagan Institute of Management Studies Department of Computer Science SOET K.R. Mangalam University Gurgaon ASET Amity University Gwalior MP
In the era of cashless transactions, security has become a significant concern for users. this research explores the various models and technologies employed to enhance authentication and payment security in wallets a... 详细信息
来源: 评论
Deep Reinforcement Learning Based Approach for Balanced data Deduplication in Mobile Edge computing
Deep Reinforcement Learning Based Approach for Balanced Data...
收藏 引用
Information Technology,Big data and Artificial Intelligence (ICIBA), international conference on IEEE international conference on
作者: Yitong Sun Yun Wu School of Information Science and Technology Donghua University Shanghai China
Mobile edge computing (MEC) migrates computing, storage, and network resources to the network edge, providing users with low-latency data access. As a crucial part of MEC, edge storage systems (ESS) offer storage capa... 详细信息
来源: 评论
A Study of Optimizations in Rainfall Prediction using Machine Learning Models
A Study of Optimizations in Rainfall Prediction using Machin...
收藏 引用
soft computing for Security Applications (ICSCSA), international conference on
作者: Chaitanya Kumar Sinha Udit Sharma M. Maragatharajan J. Manikandan School of Computing Science and Engineering VIT Bhopal University Madhya Pradesh India
Rainfall prediction is essential for many industries, such as agriculture, water resource management, and disaster relief. Recently, there has been a lot of interest in machine learning techniques to increase the accu... 详细信息
来源: 评论
An Object Detection Algorithm with Multi-scale Context Information Based on YOLOv4  4
An Object Detection Algorithm with Multi-scale Context Infor...
收藏 引用
4th international conference on Natural Language Processing, ICNLP 2022
作者: Ma, Sugang An, Wen Yang, Xiaobao Hou, Zhiqiang Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an China Xi'an University of Posts and Telecommunications School of Computer Science and Technology Xi'an China Xi'an University of Posts and Telecommunications Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an China
Most current object detection algorithms have the issue of missing objects due to occlusion. As the great difference of scale between occlusion objects and their integrity is affected, how to reduce the missing rate o... 详细信息
来源: 评论
Security and Privacy-Preserving Techniques of Federated Learning in Edge computing: A Comparative Study
Security and Privacy-Preserving Techniques of Federated Lear...
收藏 引用
Innovative Research in Applied science, Engineering and Technology (IRASET),conference on
作者: Nouhaila Aasoum Ismail Jellouli Souad Amjad Yahya M.A. Mohammed Department of Emerging Computer Technologies Faculty of Science Abdelmalek Essaadi University Tetouan Morocco
Edge computing (EC) is an innovative architecture that aims to provide cloud computing services near data sources. In conventional deep learning systems that use edge computing, data producers frequently need to trans... 详细信息
来源: 评论