咨询与建议

限定检索结果

文献类型

  • 1,389 篇 会议
  • 93 册 图书
  • 21 篇 期刊文献

馆藏范围

  • 1,503 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,213 篇 工学
    • 993 篇 计算机科学与技术...
    • 812 篇 软件工程
    • 270 篇 信息与通信工程
    • 146 篇 生物工程
    • 125 篇 生物医学工程(可授...
    • 121 篇 控制科学与工程
    • 84 篇 电气工程
    • 72 篇 光学工程
    • 71 篇 机械工程
    • 68 篇 电子科学与技术(可...
    • 50 篇 安全科学与工程
    • 48 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 40 篇 土木工程
  • 539 篇 理学
    • 287 篇 数学
    • 166 篇 生物学
    • 123 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 45 篇 化学
  • 345 篇 管理学
    • 183 篇 管理科学与工程(可...
    • 182 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 113 篇 医学
    • 110 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 45 篇 公共卫生与预防医...
  • 71 篇 法学
    • 61 篇 社会学
  • 60 篇 教育学
    • 60 篇 教育学
  • 52 篇 农学
    • 49 篇 作物学
  • 33 篇 经济学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 artificial intel...
  • 28 篇 computer communi...
  • 24 篇 machine learning
  • 22 篇 information syst...
  • 22 篇 students
  • 20 篇 internet of thin...
  • 18 篇 computer vision
  • 17 篇 convolutional ne...
  • 16 篇 support vector m...
  • 15 篇 deep learning
  • 15 篇 computational in...
  • 15 篇 semantics
  • 13 篇 information stor...
  • 12 篇 feature extracti...
  • 12 篇 accuracy
  • 12 篇 technological in...
  • 11 篇 human computer i...
  • 11 篇 wireless sensor ...
  • 11 篇 visualization
  • 11 篇 decision trees

机构

  • 6 篇 department of co...
  • 5 篇 beijing research...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 institute of com...
  • 5 篇 school of comput...
  • 4 篇 university of sc...
  • 4 篇 key laboratory o...
  • 4 篇 gits udaipur
  • 4 篇 jinan university
  • 4 篇 lovely professio...
  • 4 篇 insight sfi rese...
  • 4 篇 department of co...
  • 4 篇 mlr institute of...
  • 4 篇 purdue universit...
  • 4 篇 school of comput...
  • 4 篇 jaypee universit...
  • 4 篇 department of co...

作者

  • 7 篇 sun fuchun
  • 7 篇 harris frederick...
  • 6 篇 bein doina
  • 6 篇 vani v.
  • 6 篇 karthik n.
  • 5 篇 tyagi vipin
  • 5 篇 constantine step...
  • 5 篇 yang yujian
  • 5 篇 margherita anton...
  • 4 篇 rajalakshmi s.
  • 4 篇 de-shuang huang
  • 4 篇 jose joemon m.
  • 4 篇 sharma ajay kuma...
  • 4 篇 ootsu kanemitsu
  • 4 篇 rathore narendra...
  • 4 篇 patel mayank
  • 4 篇 xiaorui zhang
  • 4 篇 yokota takashi
  • 4 篇 baba takanobu
  • 4 篇 elisa bertino

语言

  • 1,440 篇 英文
  • 51 篇 其他
  • 30 篇 中文
检索条件"任意字段=7th IASTED International Conference on Advances in Computer Science and Technology"
1503 条 记 录,以下是471-480 订阅
排序:
Non-singular Finite-Time Consensus Tracking Protocols for Second-Order Multi-agent Systems  12th
Non-singular Finite-Time Consensus Tracking Protocols for Se...
收藏 引用
12th international conference on advances in Swarm Intelligence, ICSI 2021
作者: Zou, Yao Yang, Wenfu Wang, Zixuan Long, Keping He, Wei School of Automation and Electrical Engineering University of Science and Technology Beijing Beijing100083 China Institute of Artificial Intelligence University of Science and Technology Beijing Beijing100083 China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China
this paper surveys non-singular finite-time consensus tracking issues for second-order multi-agent systems subject to external disturbance. the consensus tracking protocol utilizes the sliding mode control methodology... 详细信息
来源: 评论
Discovering Personal Data Security Issues: Insights from "Have I Been Pwned"  8th
Discovering Personal Data Security Issues: Insights from "Ha...
收藏 引用
8th international conference on advances in Computing and Data sciences, ICACDS 2024
作者: Hien, Ton Nguyen Trong Sangsongfa, Adisak Amm-Dee, Noppadol Department of Industrial Technology Management Faculty of Industrial Technology Muban Chom Bueng Rajabhat University Chom Bueng70150 Thailand Faculty of Business Administration Van Lang University Ho Chi Minh City Viet Nam
the complexity of the digital landscape is on the rise. thus, the urgent issue of personal data protection has become a major concern for individuals and businesses in the modern era. this article uses text mining tec... 详细信息
来源: 评论
Update at Your Own Risk: Analysis and Recommendations for Update-Related Vulnerabilities  40th
Update at Your Own Risk: Analysis and Recommendations for...
收藏 引用
40th IFIP international conference on ICT Systems Security and Privacy Protection, SEC 2025
作者: Usman, Ahmad B. Asplund, Mikael Department of Computer and Information Science Linköping University Linköping Sweden
this paper presents an empirical analysis of software and firmware update vulnerabilities in computing systems, resulting in a set of recommendations for implementing more secure update mechanisms. Using a Common Vuln... 详细信息
来源: 评论
Fusion technology and Visualisation to Share STEM Data Using PETS Robots (i-COMEL) for Open Data Readiness Amongst Primary School Children
Fusion Technology and Visualisation to Share STEM Data Using...
收藏 引用
7th international conference on advances in Visual Informatics, IVIC 2021
作者: Badioze Zaman, Halimah Baharin, Hanif Ahmad, Azlina Jalan IKRAM-UNITEN Kajang Selangor43000 Malaysia Institute IR4.0 Universiti Kebangsaan Malaysia Bangi Selangor43600 Malaysia Bandar Baru Bangi Malaysia
the world is seeing rapid and dynamic technological innovations in the form of applications, tools, systems, or software that can help a nation's population, organisations and Government, make their administration... 详细信息
来源: 评论
Application of Internet Plus: TCM Clinical Intelligent Decision Making  12th
Application of Internet Plus: TCM Clinical Intelligent Decis...
收藏 引用
12th international conference on advances in Swarm Intelligence, ICSI 2021
作者: Xie, Jun Dang, Sijie Xu, Xiuyuan Guo, Jixiang Zhang, Xiaozhi Yi, Zhang Chengdu China Machine Intelligence Laboratory College of Computer Science Sichuan University Chengdu China
To improve the electronic medical record database for traditional Chinese medicine (TCM) and pass on the experience of distinguished TCM practitioners using artificial intelligence technology for TCM clinical decision... 详细信息
来源: 评论
Systematic Review of Common Factors Used to Measure Individuals’ Career Choice
Systematic Review of Common Factors Used to Measure Individu...
收藏 引用
7th international conference on advances in Visual Informatics, IVIC 2021
作者: Azman, Feninferina Abdul Ghapar, Azimah Ahmad Faudzi, Masyura Baskaran, Hasventhran Rahim, Fiza Abdul Universiti Tenaga Nasional 43000 Putrajaya Campus Jalan Ikram-Uniten Kajang Selangor43000 Malaysia Razak Faculty of Technology and Informatics Universiti Teknologi Malaysia Jalan Sultan Yahya Petra Kuala Lumpur54100 Malaysia
Many individuals are faced with the challenge of a career choice that is appropriate for them. this is due to the fact that decisions are made up of a variety of subjective judgments. As a result, selecting a career p... 详细信息
来源: 评论
A Hybrid Algorithm for Multi-objective Permutation Flow Shop Scheduling Problem with Setup Times  12th
A Hybrid Algorithm for Multi-objective Permutation Flow Shop...
收藏 引用
12th international conference on advances in Swarm Intelligence, ICSI 2021
作者: Wang, Cuiyu Wang, Shuting Li, Xinyu School of Mechanical Science and Engineering Huazhong University of Science and Technology Wuhan China
this paper studies the multi-objective permutation flow shop scheduling problem (PFSP) with setup times. Firstly, the mathematical model of multi-objective PFSP with setup time is established, then based on the theory... 详细信息
来源: 评论
Multi-Scale Oriented Basic Image Features Column for Handwritten Digit Recognition  12th
Multi-Scale Oriented Basic Image Features Column for Handwri...
收藏 引用
12th international conference on Soft Computing and Pattern Recognition, SoCPaR 2020 and 16th international conference on Information Assurance and Security, IAS 2020
作者: Gattal, Abdeljalil Djeddi, Chawki Jamil, Akhtar Bensefia, Ameur Department of Mathematics and Computer Science Larbi Tebessi University Tebessa Algeria Department of Computer Engineering Istanbul Sabahattin Zaim University Istanbul Turkey Higher Colleges of Technology CIS Division Abu Dhabi United Arab Emirates
Handwritten digits recognition is a key research problem in the domain of image analysis and pattern recognition. Specifically, the appearance approaches based on feature extraction have been proposed to solve many re... 详细信息
来源: 评论
Virtual and Augmented Reality: Enhancing the learning experience in higher education in the U.A.E. Current standing research directions  7
Virtual and Augmented Reality: Enhancing the learning experi...
收藏 引用
7th international conference on Information technology Trends, ITT 2020
作者: Xanthidis, Dimitrios Manolas, Christos Paul, Sujni Xanthidou, Ourania Koutzampasopoulou Computer and Information Science Higher Colleges of Technology Dubai United Arab Emirates Music and Sound Design for Media Ravensbourne University London United Kingdom University of Malaya Computer Science and Information Technology Kuala Lumpur Malaysia
In addition to the established and widespread technological tools and trends of the past decades, such as the surge of mobile computing, high-speed networks and social media, new technologies utilizing the increased p... 详细信息
来源: 评论
Intrusion Detection System Based on an Updated ANN Model  12th
Intrusion Detection System Based on an Updated ANN Model
收藏 引用
12th international conference on advances in Swarm Intelligence, ICSI 2021
作者: Xue, Yu Onzo, Bernard-marie Neri, Ferrante School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Jiangsu Key Laboratory of Data Science and Smart Software Jingling Institute of Technology Nanjing211169 China COL Laboratory School of Computer Science University of Nottingham Jubilee Campus Wollaton Road NottinghamNG8 1BB United Kingdom
An intrusion detection system (IDS) is a software application or hardware appliance that monitors traffic on networks and systems to search for suspicious activity and known threats, sending up alerts when it finds su... 详细信息
来源: 评论