咨询与建议

限定检索结果

文献类型

  • 1,390 篇 会议
  • 93 册 图书
  • 21 篇 期刊文献

馆藏范围

  • 1,504 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,214 篇 工学
    • 994 篇 计算机科学与技术...
    • 813 篇 软件工程
    • 269 篇 信息与通信工程
    • 147 篇 生物工程
    • 125 篇 生物医学工程(可授...
    • 120 篇 控制科学与工程
    • 82 篇 电气工程
    • 74 篇 光学工程
    • 72 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 50 篇 安全科学与工程
    • 49 篇 化学工程与技术
    • 44 篇 仪器科学与技术
    • 40 篇 土木工程
  • 540 篇 理学
    • 286 篇 数学
    • 167 篇 生物学
    • 124 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 45 篇 化学
  • 346 篇 管理学
    • 184 篇 管理科学与工程(可...
    • 182 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 113 篇 医学
    • 110 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 45 篇 公共卫生与预防医...
  • 71 篇 法学
    • 61 篇 社会学
  • 60 篇 教育学
    • 60 篇 教育学
  • 52 篇 农学
    • 49 篇 作物学
  • 33 篇 经济学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 artificial intel...
  • 28 篇 computer communi...
  • 24 篇 machine learning
  • 22 篇 information syst...
  • 22 篇 students
  • 20 篇 internet of thin...
  • 18 篇 computer vision
  • 17 篇 convolutional ne...
  • 16 篇 support vector m...
  • 15 篇 computational in...
  • 15 篇 semantics
  • 14 篇 deep learning
  • 13 篇 information stor...
  • 12 篇 feature extracti...
  • 12 篇 accuracy
  • 12 篇 technological in...
  • 11 篇 human computer i...
  • 11 篇 wireless sensor ...
  • 11 篇 visualization
  • 11 篇 decision trees

机构

  • 6 篇 department of co...
  • 5 篇 beijing research...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 institute of com...
  • 5 篇 school of comput...
  • 4 篇 university of sc...
  • 4 篇 key laboratory o...
  • 4 篇 gits udaipur
  • 4 篇 jinan university
  • 4 篇 lovely professio...
  • 4 篇 insight sfi rese...
  • 4 篇 department of co...
  • 4 篇 mlr institute of...
  • 4 篇 purdue universit...
  • 4 篇 school of comput...
  • 4 篇 jaypee universit...
  • 4 篇 department of co...

作者

  • 7 篇 sun fuchun
  • 7 篇 harris frederick...
  • 6 篇 bein doina
  • 6 篇 vani v.
  • 6 篇 karthik n.
  • 5 篇 tyagi vipin
  • 5 篇 constantine step...
  • 5 篇 yang yujian
  • 5 篇 margherita anton...
  • 4 篇 rajalakshmi s.
  • 4 篇 de-shuang huang
  • 4 篇 jose joemon m.
  • 4 篇 sharma ajay kuma...
  • 4 篇 ootsu kanemitsu
  • 4 篇 rathore narendra...
  • 4 篇 patel mayank
  • 4 篇 xiaorui zhang
  • 4 篇 yokota takashi
  • 4 篇 baba takanobu
  • 4 篇 elisa bertino

语言

  • 1,442 篇 英文
  • 50 篇 其他
  • 30 篇 中文
检索条件"任意字段=7th IASTED International Conference on Advances in Computer Science and Technology"
1504 条 记 录,以下是581-590 订阅
排序:
Semi-Supervised Outlier Detection and Deep Feature Extraction for Detecting Cyber-Attacks in Smart Grids Using PMU Data  17th
Semi-Supervised Outlier Detection and Deep Feature Extractio...
收藏 引用
17th international conference on Information technology: New Generations, ITNG 2020
作者: Qi, Ruobin Rasband, Craig Zheng, Jun Longoria, Raul Department of Computer Science and Engineering New Mexico Institute of Mining and Technology SocorroNM United States Department of Computer Science Prairie View A&M University PrairieTX United States
Smart grids are facing many challenges including cyber-attacks which can cause devastating damages to the grids. Existing machine learning based approaches for detecting cyber-attacks in smart grids are mainly based o... 详细信息
来源: 评论
An application of WSN in smart aquaculture farming  4th
An application of WSN in smart aquaculture farming
收藏 引用
4th international conference on Research in Intelligent and Computing in Engineering, RICE 2019
作者: Huy, thong Nguyen Tuan, Khanh Nguyen Trung, thanh Tran Department of Global Production Engineering and Management Faculty of Engineering Vietnamese-German University Thu Dau MotBinh Duong Viet Nam Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taipei Taiwan
Aquaculture farming carries one of the most important roles in the Vietnam economy. this paper focuses on the implementation of wireless sensor network (WSN) in shrimp farms, including the automation, remote control, ... 详细信息
来源: 评论
Adaptive thresholding skin lesion segmentation with gabor filters and principal component analysis  4th
Adaptive thresholding skin lesion segmentation with gabor fi...
收藏 引用
4th international conference on Research in Intelligent and Computing in Engineering, RICE 2019
作者: thanh, Dang N. H. Hien, Nguyen Ngoc Surya Prasath, V.B. Erkan, Uğur Khamparia, Aditya Department of Information Technology Hue College of Industry Hue Viet Nam Center of Occupational Skills Development Dong Thap University Cao Lanh Viet Nam Division of Biomedical Informatics Cincinnati Children’s Hospital Medical Center Cincinnati United States Department of Pediatrics University of Cincinnati CincinnatiOH United States Department of Biomedical Informatics College of Medicine University of Cincinnati Cincinnati United States Department of Electrical Engineering and Computer Science University of Cincinnati Cincinnati United States Computer Engineering Faculty of Engineering Karamanoğlu Mehmetbey University Karaman Turkey School of Computer Science and Engineering Lovely Professional University PhagwaraPunjab India
In this article, we study and propose an adaptive thresholding segmentation method for dermoscopic images with Gabor filters and Principal Component Analysis. the Gabor filters is used for extracting statistical featu... 详细信息
来源: 评论
Ensemble Recognition Based on the Harmonic Information Gain Ratio for Unsafe Behaviors in Coal Mines  12th
Ensemble Recognition Based on the Harmonic Information Gain ...
收藏 引用
12th international conference on advances in Swarm Intelligence, ICSI 2021
作者: Cheng, Jian Jiao, Botao Guo, Yinan Wang, Shijie Research Institute of Mine Big Data China Coal Research Institute Beijing100013 China State Key Laboratory of Coal Mining and Clean Utilization Beijing100013 China School of Information and Control Engineering China University of Mining and Technology Xuzhou221116 China Beijing100083 China Shandong Energy Group Co. Ltd. Jinan250014 China
More than 90% accidents occurred in coal mine are caused by unsafe behaviors of human. How to effectively identify unsafe behaviors and decrease the possibility of their occurrence is the fundamental of avoiding accid... 详细信息
来源: 评论
Multi-label Classification of Short Text Based on Similarity Graph and Restart Random Walk Model  11th
Multi-label Classification of Short Text Based on Similarity...
收藏 引用
11th IFIP TC 12 international conference on Intelligent Information Processing, IIP 2020
作者: Li, Xiaohong Yang, Fanyi Ma, Yuyin Ma, Huifang College of Computer Science and Engineering Northwest Normal University Lanzhou China
A multi-label classification method of short text based on similarity graph and restart random walk model is proposed. Firstly, the similarity graph is created by using data and labels as the node, and the weights on ... 详细信息
来源: 评论
An Evaluation of One-Class Feature Selection and Classification for Zero-Day Android Malware Detection  17th
An Evaluation of One-Class Feature Selection and Classificat...
收藏 引用
17th international conference on Information technology: New Generations, ITNG 2020
作者: Wang, Yang Zheng, Jun Ultramain Systems Inc. AlbuquerqueNM United States Department of Computer Science and Engineering New Mexico Institute of Mining and Technology SocorroNM United States
Security has become a serious problem for Android system as the number of Android malware increases rapidly. A great amount of effort has been devoted to protect Android devices against the threats of malware. Majorit... 详细信息
来源: 评论
A study of epidemic approach for worm propagation in wireless sensor network  4th
A study of epidemic approach for worm propagation in wireles...
收藏 引用
4th international conference on Research in Intelligent and Computing in Engineering, RICE 2019
作者: Awasthi, Shashank Kumar, Naresh Srivastava, Pramod Kumar Department of Computer Science Engineering Galgotia’s University Greater Noida India Department of Computer Science Engineering G. L. Bajaj Institute of Technology & Management Greater Noida India Department of Computer Science Engineering Rajkiya Engineering College Azamagarh India
Wireless sensor networks (WSNs) are novel expansive-scale wireless network systems that comprise conveyed, self-sorting out, low-control, ease, small-sensor gadgets that help to gather data through framework-less wire... 详细信息
来源: 评论
Deriving Scalability Tactics for Development of Data-Intensive Systems  17th
Deriving Scalability Tactics for Development of Data-Intensi...
收藏 引用
17th international conference on Information technology: New Generations, ITNG 2020
作者: Nanda, Smruti Priyambada Reza, Hassan School of Electrical Engineering and Computer Science University of North Dakota Grand Forks United States
Enforcing scalability quality attribute to an existing developed data-intensive software system is a difficult task. this paper proposes a methodology that reverses the traditional procedure by reframing scalability t... 详细信息
来源: 评论
Understanding Security Risks When Exchanging Medical Records Using IHE  17th
Understanding Security Risks When Exchanging Medical Records...
收藏 引用
17th international conference on Information technology: New Generations, ITNG 2020
作者: Bhatia, Simranjit Ibrahim, Ahmed Department of Computer Science University of Virginia CharlottesvilleVA United States
In today’s digital world, it is common to exchange sensitive data between different parties. As technology continues to advance, electronic health records (EHRs) are just one of several types of information that is b... 详细信息
来源: 评论
A Robust Lightweight ECC-Based three-Way Authentication Scheme for IoT in Cloud  6th
A Robust Lightweight ECC-Based Three-Way Authentication Sche...
收藏 引用
6th international conference on Advanced Computing, Networking, and Informatics, ICACNI 2018
作者: Chatterjee, Sayantan Samaddar, Shefalika Ghosh Department of Computer Science and Engineering National Institute of Technology Sikkim737139 India
Internet of things is an evolving technology which connects multiple embedded devices with a remote server over Internet. Due to limited capacity of embedded devices, it is important to delegate resources from third-p... 详细信息
来源: 评论