咨询与建议

限定检索结果

文献类型

  • 6,387 篇 会议
  • 162 册 图书
  • 47 篇 期刊文献

馆藏范围

  • 6,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,754 篇 工学
    • 4,178 篇 计算机科学与技术...
    • 3,372 篇 软件工程
    • 1,157 篇 信息与通信工程
    • 763 篇 生物工程
    • 562 篇 生物医学工程(可授...
    • 496 篇 控制科学与工程
    • 420 篇 电气工程
    • 327 篇 动力工程及工程热...
    • 267 篇 机械工程
    • 253 篇 光学工程
    • 250 篇 电子科学与技术(可...
    • 241 篇 安全科学与工程
    • 220 篇 化学工程与技术
    • 214 篇 环境科学与工程(可...
  • 2,078 篇 理学
    • 943 篇 数学
    • 832 篇 生物学
    • 412 篇 物理学
    • 400 篇 统计学(可授理学、...
    • 278 篇 系统科学
    • 223 篇 化学
  • 1,416 篇 管理学
    • 784 篇 管理科学与工程(可...
    • 775 篇 图书情报与档案管...
    • 514 篇 工商管理
  • 613 篇 医学
    • 580 篇 临床医学
    • 555 篇 基础医学(可授医学...
    • 331 篇 药学(可授医学、理...
    • 302 篇 公共卫生与预防医...
  • 359 篇 法学
    • 266 篇 社会学
  • 209 篇 农学
    • 199 篇 作物学
  • 197 篇 经济学
    • 196 篇 应用经济学
  • 132 篇 教育学
  • 23 篇 军事学
  • 13 篇 文学

主题

  • 279 篇 internet of thin...
  • 264 篇 machine learning
  • 253 篇 cloud computing
  • 230 篇 big data
  • 221 篇 computational mo...
  • 208 篇 deep learning
  • 182 篇 data mining
  • 158 篇 data models
  • 139 篇 predictive model...
  • 136 篇 artificial intel...
  • 132 篇 training
  • 130 篇 feature extracti...
  • 124 篇 real-time system...
  • 119 篇 blockchain
  • 111 篇 accuracy
  • 109 篇 support vector m...
  • 108 篇 machine learning...
  • 102 篇 convolutional ne...
  • 100 篇 forecasting
  • 99 篇 medical services

机构

  • 54 篇 graphic era deem...
  • 44 篇 chitkara univers...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 21 篇 department of en...
  • 19 篇 school of comput...
  • 19 篇 teerthanker maha...
  • 18 篇 university of ch...
  • 18 篇 school of inform...
  • 17 篇 jaipur national ...
  • 16 篇 uttaranchal inst...
  • 15 篇 fujian provincia...
  • 14 篇 srm institute of...
  • 14 篇 department of co...
  • 14 篇 uttaranchal inst...
  • 13 篇 computer science...
  • 13 篇 school of comput...
  • 11 篇 uttaranchal inst...
  • 10 篇 college of compu...
  • 10 篇 school of manage...

作者

  • 21 篇 pant bhasker
  • 20 篇 chang kuo-chi
  • 13 篇 tripathi vikas
  • 12 篇 kukreja vinay
  • 12 篇 vinay kukreja
  • 11 篇 jacob lija
  • 11 篇 joshi kapil
  • 11 篇 gangodkar durgap...
  • 10 篇 iwendi celestine
  • 10 篇 lourens melanie
  • 10 篇 chu kai-chun
  • 10 篇 sujithra m.
  • 10 篇 alanya-beltran j...
  • 9 篇 rajeswari d.
  • 9 篇 chang fu-hsiang
  • 9 篇 singh rajesh
  • 8 篇 kapil joshi
  • 8 篇 kapila dhiraj
  • 8 篇 pavithra g.
  • 8 篇 sanjay misra

语言

  • 5,681 篇 英文
  • 909 篇 其他
  • 58 篇 中文
检索条件"任意字段=International Conference on Advances in Data Science and Computing Technologies, ASDC 2022"
6596 条 记 录,以下是4331-4340 订阅
排序:
Fusion Biometric Deep Features Blended in Its Authentication
Fusion Biometric Deep Features Blended in Its Authentication
收藏 引用
Advanced technologies in Intelligent Control, Environment, computing & Communication Engineering (ICATIECE), international conference on
作者: Manjula Gururaj Rao Sumathi Pawar H Priyanka K Hemant Kumar Reddy Usha Divakarala NITTE (Deemed to be University) NMAM Institute of Technology Nitte Karkala Computer Science & Engineering PES University Bangaluru Computer Science & Engineering VIT AP University AP
Information security is a key factor in a world where technology is developing quickly in terms of data and data interpretations. The most important objective is to have a secure system. Biometrics, OTP generation, ir... 详细信息
来源: 评论
IPFS-Based Image Sharing Using Perceptual Hash Code with Digital Right Management  2nd
IPFS-Based Image Sharing Using Perceptual Hash Code with Dig...
收藏 引用
2nd international conference on Emerging technologies for computing, Communications, and Smart Cities, ETCCS 2021
作者: Geethanjali, D. Priya, R. Bhavani, R. Department of Computer Science and Engineering Annamalai University Tamilnadu Chidambaram India
In the current scenario, a large amount of information is exchanged over the Internet. An unauthorized user access may cause the information to be modified, disseminated, misused, detected, and used. Digital rights ma... 详细信息
来源: 评论
Cryptochain approach to Cloud computing Security: Case study, Challenges, and Solutions  1
Cryptochain approach to Cloud Computing Security: Case study...
收藏 引用
1st international conference on advances in Computational science and Engineering, ICACSE 2020
作者: Mukherjee, Subham Sandane, Raghav Maharashtra Pune India Maharashtra Pune India
Cryptochain has attracted the new generation of FinTech technologies because of its disruptive security that adapts to teaching time. In particular, it provides security with peer-to-peer authentication, encryption, a... 详细信息
来源: 评论
EEG-Based Emotion Recognition Using Similarity Measures of Brain Rhythm Entropy Matrix  1
收藏 引用
14th international conference on Brain Inspired Cognitive Systems, BICS 2024
作者: Feng, Guanyuan Wang, Peixian Wu, Xinyu Ren, Ximing Ling, Chen Huang, Yuesheng Wang, Leijun Lv, Jujian Li, Jiawen Chen, Rongjun School of Computer Science Guangdong Polytechnic Normal University Guangzhou510665 China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University Hefei230601 China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data Guangdong Polytechnic Normal University Guangzhou510665 China
Constructing the Brain Rhythm Entropy Matrix (BREM) as a feature for emotion recognition is feasible due to the correlation between brain rhythm activities and arousal/valence levels, as well as the effectiveness of e... 详细信息
来源: 评论
A Methodological Proposal to Foster the Development of Team Work Mediated by ICT in the Subject Software Engineering  17th
A Methodological Proposal to Foster the Development of Team ...
收藏 引用
17th Annual conference of the international-Association-of-Online-Engineering (IAOE) and the Global-Online-Laboratory-Consortium (GOLC) on Remote Engineering and Virtual Instrumentation (REV) - Cross Reality and data science in Engineering
作者: Granda Dihigo, Ailec Colome Cedeno, Dunia Maria Perez Pino, Maria Teresa Patterson Pena, Marisol de la Caridad Casar Espino, Liliana Argelia Diaz Bravo, Tito Univ Informat Sci Havana Cuba
The purpose of this study is to show some experiences in the methodological development of Software Engineering professors at the University of Informatics sciences by designing a set of group-work methodological and ... 详细信息
来源: 评论
Federated Learning with Blockchain: A Study of the Latest Decentralized Couple
Federated Learning with Blockchain: A Study of the Latest De...
收藏 引用
international conference on computing, Communication, and Intelligent Systems (ICCCIS)
作者: Arman Rasool Faridi Aiman Hafeez Faraz Masood Department of Computer Science Aligarh Muslim University Aligarh India
Federated learning is a method for machine learning that avoids the need to move data by training an algorithm in parallel on a large number of edge devices or servers that hold copies of the training data in their ow... 详细信息
来源: 评论
Analysis of Safety-Critical Communication Protocols for On-Premise SIL4 Cloud in Railways  4th
Analysis of Safety-Critical Communication Protocols for On-P...
收藏 引用
4th international conference on Reliability, Safety, and Security of Railway Systems (RSSRail)
作者: Rother, Benjamin Golatowski, Frank Ansar, Zeeshan Kuzhiyelil, Don Resch, Stefan Hametner, Reinhard Pathak, Prashant Univ Rostock D-18051 Rostock Germany SYSGO GmbH Pfaffenstein 8 D-55270 Klein Winterheim Germany Thales Austria GmbH Handelskai 92 A-1200 Vienna Austria DB Netz AG Stresemannstr 123 D-10963 Berlin Germany
In this paper, we address the question of how SIL4 railway applications within on-premise cloud environments can communicate safely with internal and external systems. The EN 50159 standard is the railway standard app... 详细信息
来源: 评论
Reimagining Algorithmic Governance Cultural expressions and the negotiation of social imaginaries  22
Reimagining Algorithmic Governance Cultural expressions and ...
收藏 引用
12th Nordic conference on Human-Computer Interaction: Participative computing for Sustainable Futures, NordiCHI 2022
作者: Pötzsch, Holger Pereira, Gabriel UiT The Arctic University of Norway Norway Dept of Media and Communications London School of Economics and Political Science United Kingdom
This paper investigates the means through which a series of artistic works invite critical responses to algorithmic governance and the systems of surveillance and data capture these draw upon. In combining the theoret... 详细信息
来源: 评论
Bug Recognition using Hybrid Fuzzy Logic algorithm and Support Vector Machine classification
Bug Recognition using Hybrid Fuzzy Logic algorithm and Suppo...
收藏 引用
advances in computing, Communication Control and Networking (ICAC3N), international conference on
作者: K. Ananthi M. Balakrishnan M. Pandi N. Senthil Madasamy Artificial Intelligence &Data Science Dr.Mahalingam College of Engineering and Technology Coimbatore Tamil Nadu India Computer Science and Engineering Dr.Mahalingam College of Engineering and Technology Coimbatore Tamil Nadu India
In data mining and pattern recognition, the Support Vector Machine is an extensively used classification technique. The tuning weight methods and the distance of the metrics used in a Support Vector based classificati... 详细信息
来源: 评论
A comprehensive survey of state-of-art techniques in digital watermarking
A comprehensive survey of state-of-art techniques in digital...
收藏 引用
advances in computing, Communication Control and Networking (ICAC3N), international conference on
作者: Sachin Allwadhi Kamaldeep Joshi Ashok Kumar Yadav Rainu Nandal Rishabh Jain Deptt. of Computer Science & Engg M.D.University Rohtak Haryana India Amity School of Engg. & Technology Amity University Noida U.P India Deptt. of Computer Science & Engg Galgotias College of Engineering and Technology Greater Noida India
Digital image watermarking refers to implanting secret information for copyright protection, content authentication of a given media to avoid future conflicts or illegal possession of data. A number of applications ar... 详细信息
来源: 评论