咨询与建议

限定检索结果

文献类型

  • 18,646 篇 会议
  • 110 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 18,772 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,050 篇 工学
    • 9,584 篇 计算机科学与技术...
    • 5,506 篇 软件工程
    • 3,080 篇 电气工程
    • 2,947 篇 控制科学与工程
    • 2,523 篇 信息与通信工程
    • 955 篇 仪器科学与技术
    • 939 篇 交通运输工程
    • 934 篇 机械工程
    • 643 篇 生物工程
    • 629 篇 电子科学与技术(可...
    • 557 篇 动力工程及工程热...
    • 550 篇 生物医学工程(可授...
    • 490 篇 安全科学与工程
    • 390 篇 石油与天然气工程
    • 390 篇 网络空间安全
    • 259 篇 光学工程
  • 3,008 篇 管理学
    • 2,262 篇 管理科学与工程(可...
    • 1,138 篇 图书情报与档案管...
    • 869 篇 工商管理
  • 2,964 篇 理学
    • 1,522 篇 数学
    • 791 篇 生物学
    • 506 篇 统计学(可授理学、...
    • 489 篇 物理学
    • 401 篇 系统科学
    • 390 篇 化学
  • 621 篇 医学
    • 510 篇 临床医学
    • 445 篇 基础医学(可授医学...
    • 264 篇 公共卫生与预防医...
  • 335 篇 法学
    • 274 篇 社会学
  • 279 篇 经济学
    • 274 篇 应用经济学
  • 175 篇 教育学
  • 150 篇 农学
  • 33 篇 文学
  • 31 篇 军事学
  • 12 篇 艺术学

主题

  • 1,158 篇 data acquisition
  • 760 篇 data mining
  • 586 篇 data models
  • 583 篇 real-time system...
  • 439 篇 intelligent syst...
  • 423 篇 conferences
  • 420 篇 big data
  • 407 篇 cloud computing
  • 376 篇 internet of thin...
  • 374 篇 computational mo...
  • 344 篇 monitoring
  • 324 篇 computer archite...
  • 319 篇 sensor systems
  • 311 篇 training
  • 307 篇 deep learning
  • 304 篇 feature extracti...
  • 301 篇 control systems
  • 290 篇 robot sensing sy...
  • 283 篇 machine learning
  • 269 篇 neural networks

机构

  • 49 篇 university of ch...
  • 42 篇 lviv polytechnic...
  • 30 篇 hubei key labora...
  • 25 篇 school of comput...
  • 20 篇 west ukrainian n...
  • 18 篇 beijing key labo...
  • 17 篇 shenzhen institu...
  • 17 篇 chitkara univers...
  • 16 篇 university of el...
  • 15 篇 school of comput...
  • 15 篇 institute of aut...
  • 14 篇 faculty of compu...
  • 14 篇 school of artifi...
  • 14 篇 shenzhen institu...
  • 13 篇 ieee
  • 13 篇 peng cheng labor...
  • 13 篇 college of compu...
  • 12 篇 key laboratory o...
  • 12 篇 beijing univ pos...
  • 12 篇 yeshwantrao chav...

作者

  • 26 篇 anatoliy sachenk...
  • 22 篇 wu xinyu
  • 17 篇 anatoly sachenko
  • 16 篇 a. sachenko
  • 16 篇 liu yang
  • 16 篇 xiong gang
  • 15 篇 chen chen
  • 12 篇 xinyu wu
  • 12 篇 li yang
  • 12 篇 yang yang
  • 11 篇 zhang tao
  • 11 篇 wang lei
  • 11 篇 li peng
  • 11 篇 li li
  • 11 篇 kurosh madani
  • 11 篇 sachenko a.
  • 11 篇 wu bin
  • 11 篇 iryna turchenko
  • 11 篇 golovko vladimir
  • 11 篇 wang wei

语言

  • 16,743 篇 英文
  • 1,962 篇 其他
  • 86 篇 中文
  • 2 篇 西班牙文
检索条件"任意字段=IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems"
18772 条 记 录,以下是1391-1400 订阅
排序:
Optimization Accuracy of Secured Cloud systems Using Deep Learning Model  4
Optimization Accuracy of Secured Cloud Systems Using Deep Le...
收藏 引用
4th international conference on intelligent Technologies, CONIT 2024
作者: Hindka, Mayank Texas A&m University-Central Texas MBA-Information Systems United States
Cloud security is vital in attracting data security and privacy customers. The online attackers disrupt the use of the on-demand services provided by the cloud service providers for their clients. It is distributed in... 详细信息
来源: 评论
intelligent Method of Predicting the Discount Rate Trend  11
Intelligent Method of Predicting the Discount Rate Trend
收藏 引用
11th ieee international conference on intelligent data acquisition and advanced computing systems - Technology and Applications (IDAACS)
作者: Koziuk, Viktor Lipyanina-Goncharenko, Hrystyna West Ukrainian Natl Univ Ternopol Ukraine
the predictability of National Bank of Ukraine (NBU) monetary policy is an important point to gain credibility as an inflation targeter. Basing on the theoretical and empirical literature the direct tool - expert expe... 详细信息
来源: 评论
AceMiner: Accelerating Graph Pattern Matching using PIM with Optimized Cache System  42
AceMiner: Accelerating Graph Pattern Matching using PIM with...
收藏 引用
42nd international conference on Computer Design
作者: Yan, Liang Lu, Xiaoyang Chen, Xiaoming Xu, Sheng Zou, Xingqi Han, Yinhe Sun, Xian-He Chinese Acad Sci Ctr Intelligent Comp Syst Inst Comp Technol Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China IIT Dept Compute Sci Chicago IL 60616 USA Anhui Normal Univ Sch Comp & Informat Wuhu Peoples R China
Graph pattern matching (GPM), a critical algorithm for discovering specific patterns within complex structures, is becoming increasingly important in the data-driven world. GPM applications are memory-bound and can be... 详细信息
来源: 评论
data-Driven Modeling of WPT systems with Secondary Voltage Control  5
Data-Driven Modeling of WPT Systems with Secondary Voltage C...
收藏 引用
5th ieee international conference on Power, intelligent computing and systems, ICPICS 2023
作者: Wu, Xiaorui Xiao, Jing Wu, Ning Gong, Wenlan Mo, Yuhong Duan, Chanzhen Electric Power Research Institute of Guangxi Power Grid Co. Ltd Southern Power Grid Corporation Wireless Power Transmission Joint Laboratory Nanning China School of Automation Chongqing University Chongqing China
Dynamic models are of great importance for the analysis, design, and control of wireless power transfer (WPT) systems. This study concentrates on the WPT system with active rectifiers on the secondary side, and uses a... 详细信息
来源: 评论
Enhanced Traffic Collision Avoidance System Using Single Photon LiDAR in Aviation Operations
Enhanced Traffic Collision Avoidance System Using Single Pho...
收藏 引用
2024 international conference on Information Technology and computing, ICITCOM 2024
作者: El Messaoudi, Imane El Allami, Nissrine Alj, Yassine Salih School of Science and Engineering Al Akhawayn University Ifrane Morocco
This paper introduces a novel approach to enhance aviation safety by integrating Single-photon Light Detection and Ranging (LiDAR) technology into the existing Traffic Collision Avoidance systems (TCAS). This integrat... 详细信息
来源: 评论
Marker-less Kendo Motion Prediction Using High-speed Dual-camera System and LSTM Method
Marker-less Kendo Motion Prediction Using High-speed Dual-ca...
收藏 引用
ieee/ASME international conference on advanced intelligent Mechatronics (AIM)
作者: Cao, Yongpeng Yamakawa, Yuji Univ Tokyo Inst Ind Sci 4-6-1 KomabaMeguro Ku Tokyo 1538505 Japan
Kendo is becoming popular worldwide nowadays. This research aims to develop a high-speed vision system to capture Kendo motions clearly and predict the intent attacking target of the trainee. We proposed a method to i... 详细信息
来源: 评论
Improved Hierarchical Agglomerative Clustering Based Multivariate Gaussian Outlier Detection for Education data  4
Improved Hierarchical Agglomerative Clustering Based Multiva...
收藏 引用
4th international conference on Ubiquitous computing and intelligent Information systems, ICUIS 2024
作者: Sivasankari, S. Sukumaran, S. Erode Arts and Science College Tamilnadu Erode India
data Mining is the procedure of analyzing dataset in any field to have meaningful patterns or relationship from the variables. Outliers refer to the data that has special insight and valuable information which deviate... 详细信息
来源: 评论
Digital Application Akelius as a Blended Learning Tool
Digital Application Akelius as a Blended Learning Tool
收藏 引用
ieee international Workshop on intelligent data acquisition and advanced computing systems: Technology and Applications
作者: Zhannura Manapbayeva Dinara Aliyeva International Information Technology University Almaty Kazakhstan
The article deals with modern approaches to the problem of blended learning, which are based on different criteria for organizing the learning environment depending on the expected learning outcomes. The advantages of...
来源: 评论
Construction of Anti-Terrorism Intelligence Graph Based on DIKW Framework  25
Construction of Anti-Terrorism Intelligence Graph Based on D...
收藏 引用
25th ieee international conferences on High Performance computing and Communications, 9th international conference on data Science and systems, 21st ieee international conference on Smart City and 9th ieee international conference on Dependability in Sensor, Cloud and Big data systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Gao, Peng Yuan, Haoran Liu, Yanfei Mao, Bowen Duan, Yucong Wang, Zhenhua Gansu Police Vocational College Gansu China Chongqing City Science and Technology College Artificial Intelligence and Big Data Academy Chongqing China Tianjin University Chongqing Police College Department of Intelligence and Computing Department of Infor Security Chongqing China Tianjin University Department of Intelligence and Computing Tianjin China School of Computer Science and Technology Hainan University Haikou China Chongqing Police College Department of Tactics Chongqing China
'Construction of anti-Terrorism Intelligence Graph Based on the DIKW Framework' simplifies the process of handling decentralized and diverse sources of intelligence in counter-terrorism. It uses the DIKW model... 详细信息
来源: 评论
BandX : An intelligent IoT-band for Human Activity Recognition based on TinyML  23
BandX : An Intelligent IoT-band for Human Activity Recogniti...
收藏 引用
24th international conference on Distributed computing and Networking (ICDCN)
作者: Saha, Bidyut Samanta, Riya Ghosh, Soumya K. Roy, Ram Babu Indian Inst Technol Kharagpur Kharagpur W Bengal India
Human Activity Recognition (HAR) is used in several human-centric real-world situations. In many learning-based systems, sensors capture situational data and transfer it to adjacent computing devices for processing an... 详细信息
来源: 评论