咨询与建议

限定检索结果

文献类型

  • 1,390 篇 会议
  • 93 册 图书
  • 21 篇 期刊文献

馆藏范围

  • 1,504 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,214 篇 工学
    • 994 篇 计算机科学与技术...
    • 813 篇 软件工程
    • 269 篇 信息与通信工程
    • 147 篇 生物工程
    • 125 篇 生物医学工程(可授...
    • 120 篇 控制科学与工程
    • 82 篇 电气工程
    • 74 篇 光学工程
    • 72 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 50 篇 安全科学与工程
    • 49 篇 化学工程与技术
    • 44 篇 仪器科学与技术
    • 40 篇 土木工程
  • 540 篇 理学
    • 286 篇 数学
    • 167 篇 生物学
    • 124 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 45 篇 化学
  • 346 篇 管理学
    • 184 篇 管理科学与工程(可...
    • 182 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 113 篇 医学
    • 110 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 45 篇 公共卫生与预防医...
  • 71 篇 法学
    • 61 篇 社会学
  • 60 篇 教育学
    • 60 篇 教育学
  • 52 篇 农学
    • 49 篇 作物学
  • 33 篇 经济学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 artificial intel...
  • 28 篇 computer communi...
  • 24 篇 machine learning
  • 22 篇 information syst...
  • 22 篇 students
  • 20 篇 internet of thin...
  • 18 篇 computer vision
  • 17 篇 convolutional ne...
  • 16 篇 support vector m...
  • 15 篇 computational in...
  • 15 篇 semantics
  • 14 篇 deep learning
  • 13 篇 information stor...
  • 12 篇 feature extracti...
  • 12 篇 accuracy
  • 12 篇 technological in...
  • 11 篇 human computer i...
  • 11 篇 wireless sensor ...
  • 11 篇 visualization
  • 11 篇 decision trees

机构

  • 6 篇 department of co...
  • 5 篇 beijing research...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 institute of com...
  • 5 篇 school of comput...
  • 4 篇 university of sc...
  • 4 篇 key laboratory o...
  • 4 篇 gits udaipur
  • 4 篇 jinan university
  • 4 篇 lovely professio...
  • 4 篇 insight sfi rese...
  • 4 篇 department of co...
  • 4 篇 mlr institute of...
  • 4 篇 purdue universit...
  • 4 篇 school of comput...
  • 4 篇 jaypee universit...
  • 4 篇 department of co...

作者

  • 7 篇 sun fuchun
  • 7 篇 harris frederick...
  • 6 篇 bein doina
  • 6 篇 vani v.
  • 6 篇 karthik n.
  • 5 篇 tyagi vipin
  • 5 篇 constantine step...
  • 5 篇 yang yujian
  • 5 篇 margherita anton...
  • 4 篇 rajalakshmi s.
  • 4 篇 de-shuang huang
  • 4 篇 jose joemon m.
  • 4 篇 sharma ajay kuma...
  • 4 篇 ootsu kanemitsu
  • 4 篇 rathore narendra...
  • 4 篇 patel mayank
  • 4 篇 xiaorui zhang
  • 4 篇 yokota takashi
  • 4 篇 baba takanobu
  • 4 篇 elisa bertino

语言

  • 1,442 篇 英文
  • 50 篇 其他
  • 30 篇 中文
检索条件"任意字段=7th IASTED International Conference on Advances in Computer Science and Technology"
1504 条 记 录,以下是491-500 订阅
排序:
Artificial Fish Swarm Algorithm for Mining High Utility Itemsets  12th
Artificial Fish Swarm Algorithm for Mining High Utility Item...
收藏 引用
12th international conference on advances in Swarm Intelligence, ICSI 2021
作者: Song, Wei Li, Junya Huang, Chaomin School of Information Science and Technology North China University of Technology Beijing100144 China
the discovery of high utility itemsets (HUIs) is an attractive topic in data mining. Because of its high computational cost, using heuristic methods is a promising approach to rapidly discovering sufficient HUIs. the ... 详细信息
来源: 评论
Study of PSO Optimized BP Neural Network and Smith Predictor for MOCVD Temperature Control in 7nm 5G Chip Process  6th
Study of PSO Optimized BP Neural Network and Smith Predictor...
收藏 引用
6th international conference on Advanced Intelligent Systems and Informatics, AISI 2020
作者: Chang, Kuo-Chi Zhou, Yu-Wen Wang, Hsiao-Chuan Lin, Yuh-Chung Chu, Kai-Chun Hsu, Tsui-Lien Pan, Jeng-Shyang School of Information Science and Engineering Fujian University of Technology Fuzhou China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou China Institute of Environmental Engineering National Taiwan University Taipei Taiwan Department of Business Management Fujian University of Technology Fuzhou China Institute of Construction Engineering and Management National Central University Taoyuan Taiwan College of Computer Science and Engineering Shandong University of Science and Technology Shandong China College of Mechanical and Electrical Engineering National Taipei University of Technology Taipei Taiwan
the key industries of information technology in the semiconductor integrated circuit industry will have an important role after 2020, In the third generation of advanced semiconductor of 7nm 5G chips GaN is be used, M... 详细信息
来源: 评论
Number theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications  16th
Number Theoretic Transform: Generalization, Optimization, Co...
收藏 引用
16th international conference on Information Security and Cryptology, Inscrypt 2020
作者: Liang, Zhichuang Shen, Shiyu Shi, Yuantao Sun, Dongni Zhang, Chongxuan Zhang, Guoyun Zhao, Yunlei Zhao, Zhixiang School of Computer Science Fudan University Shanghai China School of Mathematical Sciences Fudan University Shanghai China State Key Laboratory of Integrated Services Networks Xidian University Xi’an China Department of Applied Mathematics Reading Academy Nanjing University of Information Science and Technology Nanjing China
Number theoretic transform (NTT) is a basic mathematic operation, and is particularly fundamental to the practical implementations of cryptographic algorithms based on lattices with algebraic structures. In this work,... 详细信息
来源: 评论
Anonymous Fine-Grained User Access Control Scheme for Internet of things Architecture  5th
Anonymous Fine-Grained User Access Control Scheme for Intern...
收藏 引用
5th international conference on Mathematics and Computing, ICMC 2019
作者: Banerjee, Soumya Odelu, Vanga Das, Ashok Kumar Chattopadhyay, Samiran Giri, Debasis Department of Information Technology Jadavpur University Salt Lake CityKolkata700 098 India Department of Computer Science and Information Systems Birla Institute of Technology and Science Pilani Hyderabad Campus Hyderabad500 078 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India Department of Information Technology Maulana Abul Kalam Azad University of Technology Kolkata700064 India
With the rapid growth of wireless technology, Internet of things (IoT) became very popular in both industrial as well as consumer product domains. While there is a lot of available platforms and technologies for IoT, ... 详细信息
来源: 评论
Pixel Based Adversarial Attacks on Convolutional Neural Network Models  4th
Pixel Based Adversarial Attacks on Convolutional Neural Netw...
收藏 引用
4th IFIP TC 12 international conference on Computational Intelligence in Data science, ICCIDS 2021
作者: Srinivasan, Kavitha Jello Raveendran, Priyadarshini Suresh, Varun Anna Sundaram, Nithya Rathna Department of Computer Science and Engineering Sri Sivasubramaniya Nadar College of Engineering Kalavakkam603 110 India
Deep Neural Networks (DNN) has found their applications in the real time, for example, facial recognition for security in ATMs and self-driving cars. A major security threat to DNN is through adversarial attacks. An a... 详细信息
来源: 评论
the Impact of Wechat Red Packet Feature at Achieving Users Satisfaction and Loyalty: Wechat Users in China  12th
The Impact of Wechat Red Packet Feature at Achieving Users S...
收藏 引用
12th international conference on advances in Swarm Intelligence, ICSI 2021
作者: Sleiman, Kamal Abubker Abrahim Juanli, Lan Cai, Xiangyu Yubo, Wang Hongzhen, Lei Liu, Ru School of Economics and Management Yan’an University Yan’an716000 China International School of Business Shaanxi Normal University Xi’an710062 China Xian University of Finance and Economics Xi’an Changan District710062 China
WeChat has become an essential social media platform in China. this research investigates the importance of the WeChat Red packet as a motivator at achieving user’s satisfaction and loyalty in China. To investigate i... 详细信息
来源: 评论
three Dimensional Wireframe Model of Medical and Complex Images Using Cellular Logic Array Processing Techniques  12th
Three Dimensional Wireframe Model of Medical and Complex Ima...
收藏 引用
12th international conference on Soft Computing and Pattern Recognition, SoCPaR 2020 and 16th international conference on Information Assurance and Security, IAS 2020
作者: Rani, Shilpa Lakhwani, Kamlesh Kumar, Sandeep School of Computer Science and Engineering Lovely Professional University Phagwara India Sreyas Institute of Engineering and Technology Hyderabad India
the main aim of computer vision is to provide the representation of images which is helpful for a better understanding of Two Dimensional and three-dimensional world. Considering this, in this paper we proposed a meth... 详细信息
来源: 评论
Hard-Mining Loss Based Convolutional Neural Network for Face Recognition  1
收藏 引用
5th international conference on computer Vision and Image Processing, CVIP 2020
作者: Srivastava, Yash Murali, Vaishnav Dubey, Shiv Ram Computer Vision Group Indian Institute of Information Technology Sri City Chittoor Andhra Pradesh India
Face Recognition is one of the prominent problems in the computer vision domain. Witnessing advances in deep learning, significant work has been observed in face recognition, which touched upon various parts of the re... 详细信息
来源: 评论
Developing a Framework for Acquisition and Analysis of Speeches  4th
Developing a Framework for Acquisition and Analysis of Speec...
收藏 引用
4th international conference on Advanced Computing and Intelligent Engineering, ICACIE 2019
作者: Hossain, Md. Billal Arefin, Mohammad Shamsul Habib, Mohammad Ashfak Department of Computer Science & Engineering Chittagong University of Engineering & Technology Chattogram4349 Bangladesh
Speech plays a vital role for human communication. Proper delivery of speech can enable a person to connect with a large number of people. Nowadays, a lot of valuable speeches are being provided by many popular people... 详细信息
来源: 评论
A Cell Tracking Method with Deep Learning Mitosis Detection in Microscopy Images  12th
A Cell Tracking Method with Deep Learning Mitosis Detection ...
收藏 引用
12th international conference on advances in Swarm Intelligence, ICSI 2021
作者: Wu, Di Xu, Benlian Lu, Mingli Shi, Jian Li, Zhen Guan, Fei Yang, Zhicheng School of Electrical and Power Engineering China University of Mining and Technology Xuzhou China School of Mechanical Engineering Changshu Institute of Technology Changshu China School of Electrical and Automatic Engineering Changshu Institute of Technology Changshu China
Cell motion analysis plays an important role in biomedical fields such as disease diagnosis and drug development. A crucial step in quantifying cell dynamics is to detect mitosis, which is the process that a mother ce... 详细信息
来源: 评论