咨询与建议

限定检索结果

文献类型

  • 6,385 篇 会议
  • 161 册 图书
  • 46 篇 期刊文献

馆藏范围

  • 6,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,754 篇 工学
    • 4,179 篇 计算机科学与技术...
    • 3,373 篇 软件工程
    • 1,160 篇 信息与通信工程
    • 761 篇 生物工程
    • 562 篇 生物医学工程(可授...
    • 496 篇 控制科学与工程
    • 422 篇 电气工程
    • 327 篇 动力工程及工程热...
    • 267 篇 机械工程
    • 254 篇 光学工程
    • 251 篇 电子科学与技术(可...
    • 242 篇 安全科学与工程
    • 220 篇 化学工程与技术
    • 214 篇 环境科学与工程(可...
  • 2,078 篇 理学
    • 943 篇 数学
    • 830 篇 生物学
    • 413 篇 物理学
    • 399 篇 统计学(可授理学、...
    • 278 篇 系统科学
    • 223 篇 化学
  • 1,417 篇 管理学
    • 785 篇 管理科学与工程(可...
    • 775 篇 图书情报与档案管...
    • 514 篇 工商管理
  • 614 篇 医学
    • 580 篇 临床医学
    • 554 篇 基础医学(可授医学...
    • 331 篇 药学(可授医学、理...
    • 302 篇 公共卫生与预防医...
  • 359 篇 法学
    • 266 篇 社会学
  • 209 篇 农学
    • 199 篇 作物学
  • 197 篇 经济学
    • 196 篇 应用经济学
  • 133 篇 教育学
  • 23 篇 军事学
  • 13 篇 文学

主题

  • 279 篇 internet of thin...
  • 263 篇 machine learning
  • 253 篇 cloud computing
  • 230 篇 big data
  • 219 篇 computational mo...
  • 207 篇 deep learning
  • 182 篇 data mining
  • 157 篇 data models
  • 138 篇 predictive model...
  • 136 篇 artificial intel...
  • 133 篇 training
  • 130 篇 feature extracti...
  • 122 篇 real-time system...
  • 119 篇 blockchain
  • 109 篇 support vector m...
  • 108 篇 accuracy
  • 107 篇 machine learning...
  • 102 篇 convolutional ne...
  • 100 篇 forecasting
  • 97 篇 medical services

机构

  • 54 篇 graphic era deem...
  • 44 篇 chitkara univers...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 21 篇 department of en...
  • 19 篇 school of comput...
  • 19 篇 teerthanker maha...
  • 18 篇 university of ch...
  • 18 篇 school of inform...
  • 17 篇 jaipur national ...
  • 16 篇 uttaranchal inst...
  • 15 篇 fujian provincia...
  • 14 篇 srm institute of...
  • 14 篇 department of co...
  • 14 篇 uttaranchal inst...
  • 13 篇 computer science...
  • 13 篇 school of comput...
  • 11 篇 uttaranchal inst...
  • 10 篇 college of compu...
  • 10 篇 school of manage...

作者

  • 21 篇 pant bhasker
  • 20 篇 chang kuo-chi
  • 13 篇 tripathi vikas
  • 12 篇 kukreja vinay
  • 12 篇 vinay kukreja
  • 11 篇 jacob lija
  • 11 篇 joshi kapil
  • 11 篇 gangodkar durgap...
  • 10 篇 iwendi celestine
  • 10 篇 lourens melanie
  • 10 篇 chu kai-chun
  • 10 篇 sujithra m.
  • 10 篇 alanya-beltran j...
  • 9 篇 rajeswari d.
  • 9 篇 chang fu-hsiang
  • 9 篇 singh rajesh
  • 8 篇 kapil joshi
  • 8 篇 kapila dhiraj
  • 8 篇 pavithra g.
  • 8 篇 sanjay misra

语言

  • 6,256 篇 英文
  • 330 篇 其他
  • 15 篇 中文
检索条件"任意字段=International Conference on Advances in Data Science and Computing Technologies, ASDC 2022"
6592 条 记 录,以下是4621-4630 订阅
排序:
Multi-Class Diagnosis of Skin Cancer Using Residual Networks
Multi-Class Diagnosis of Skin Cancer Using Residual Networks
收藏 引用
advances in computing, Communication Control and Networking (ICAC3N), international conference on
作者: Gagandeep Singh Vikas Jindal Computer Science Chandigarh University Mohali Punjab India
Diagnosis of Skin Cancer is a very challenging domain. Skin Cancer has mainly two types: one is Melanoma and the other one is Non-melanomas, Melanoma or Malignant melanoma is one of the most dangerous types of cancer.... 详细信息
来源: 评论
Expression of Concern for: A Steadfast Approach to perform Face Detection using Feed Forward Neural Networks
Expression of Concern for: A Steadfast Approach to perform F...
收藏 引用
advances in computing, Communication Control and Networking (ICAC3N), international conference on
作者: Gaurav Gupta Sushant N. Suresh Kumar K Anandhan School of Computing Science and Engineering Galgotias University Greater Noida India
Now Presently every day with the monstrous expansion in video and picture data sets there’s a superb requirement for programmed comprehension and assessment of data by canny frameworks as physically it’s becoming fa...
来源: 评论
An Agentless Private Cloud Maintenance System Based on Open Source Toolbox
An Agentless Private Cloud Maintenance System Based on Open ...
收藏 引用
IEEE international conference on Orange technologies (ICOT)
作者: Mingsheng Ling Wenjuan Wang Xiaohua Zou Shih-Pang Tseng School of Software and Big Data Changzhou College of Information Technology Changzhou China Academic Affairs Office Hohai University Changzhou Jiangsu China School of Information Science and Technology Sanda University Shanghai China School of Software and Big Data Changzhou College of Information Technology Changzhou China Changzhou Jiangsu China
The cloud computing provides the more elastic organization of computing resources, and more efficiency of computing works. However, the private cloud is still necessary to various companies and institutions because of... 详细信息
来源: 评论
An Intrusion Detection Model for CICIDS-2017 dataset Using Machine Learning Algorithms
An Intrusion Detection Model for CICIDS-2017 Dataset Using M...
收藏 引用
advances in computing, Communication & Materials (ICACCM), 2020 international conference on
作者: Shailesh Singh Panwar Y. P. Raiwani Lokesh Singh Panwar Dept. of Computer Science and Engg. H.N.B. Garhwal University Srinagar Garhwal Uttarakhand India Dept. of Electronics and Comm. Engg. Graphic Era University Dehradun Uttarakhand India
Due to excessive use of the internet, keeping the network secure and transferring data securely across networks has become a difficult task. To recognize distinct types of network (internet) attacks, need Machine lear... 详细信息
来源: 评论
DB-YOLOv8 Model: Object Detection in Complex Scenarios  10
DB-YOLOv8 Model: Object Detection in Complex Scenarios
收藏 引用
10th international conference on Computer and Communications, ICCC 2024
作者: Yu, Bo Li, Shun Wang, Wei Meng, Yuanze Liu, Dongying Shenyang Institute of Computing Technology Chinese Academy of Science Shenyang China University of Chinese Academy of Sciences Shenyang China School of Computer Science and Engineering Northeastern University Shenyang China
The improved DB-YOLOv8 model aims to address the issues of missed detection and false detection that are prone to occur in object detection tasks under complex scenarios, particu-larly in the case of overlapping objec... 详细信息
来源: 评论
Integration of AI with the Cybersecurity: A detailed Systematic review with the practical issues and challenges
Integration of AI with the Cybersecurity: A detailed Systema...
收藏 引用
international conference on Contemporary computing and Informatics (IC3I)
作者: Melanie Lourens Amar Prakash Dabral Durgaprasad Gangodkar Navjot Rathour Cs Nagabhushanam Tida Anupama Chadha Faculty of Management Sciences Durban University of Technology South Africa Department of Hospitality Management Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Computer Science & Engineering Graphic Era Hill University Dehradun Uttarakhand India Uttaranchal Institute of Technology Uttaranchal University Dehradun Uttarakhand India Department of Law Koneru Lakshmaiah Education Foundation. Guntur Andhra Pradesh India Computer Applications MRIIRS Faridabad
Not only have there been a lot more cyberattacks in recent years, but they have also gotten much more advanced. Therefore, developing a cyber-resilient strategy is of utmost significance. In the event of a cyberattack... 详细信息
来源: 评论
Cross-Media Topic Detection: Approaches, Challenges, and Applications
Cross-Media Topic Detection: Approaches, Challenges, and Ap...
收藏 引用
international conference on Computer Vision and Machine Intelligence, CVMI 2022
作者: Rani, Seema Kumar, Mukesh Computer Science and Engineering Department University Institute of Engineering and Technology Panjab University Chandigarh160014 India
Developing technologies and new social media platforms (Facebook, YouTube, Flickr, and Twitter) are transforming how people communicate with each other and scrutinize information. Different social media users prefer d... 详细信息
来源: 评论
A Filter Approach Based on Binary Integer Programming for Feature Selection
A Filter Approach Based on Binary Integer Programming for Fe...
收藏 引用
IEEE international conference on Research, Innovation and Vision for the Future
作者: Bui Thi Mai Anh Duong Viet Anh Bui Quoc Trung School of Information and Communication Technology Hanoi University of Science and Technology Hanoi Vietnam
Feature Selection (FS) aims to identify the most relevant information from the data in order to boost the overall performance of the learning model in terms of both accuracy and computational cost. Traditional FS meth... 详细信息
来源: 评论
A Review on Machine Learning and Deep Learning Methods to Fortify Cyberspace
A Review on Machine Learning and Deep Learning Methods to Fo...
收藏 引用
international conference on Computational science and Technology (ICCST)
作者: N Junnu Babu J Bhargav Vanapalli Mounica Eedupalli Sai Kumar Department of Computer Science & Technology Madanapalle Institute of Technology & Science (A) Madanapalle Andhra Pradesh Department of Computer Science & Information Technology Chalapathi Institute of Engineering and Technology (A) India Department of Artificial Intelligence & Data Science Vasireddy Venkatadri Institute of Technology (A) India Department of CSE QIS College of Engineering and Technology (A) India
Things that have garnered and sparked a great deal of academic attention in the previous decade are Machine learning (ML) and Deep learning (DL). In most people's daily lives, online communities and social media h... 详细信息
来源: 评论
Mining Frequent Weighted Utility Patterns in Dynamic Quantitative databases
Mining Frequent Weighted Utility Patterns in Dynamic Quantit...
收藏 引用
IEEE international conference on Research, Innovation and Vision for the Future
作者: Nguyen Le Huong Bui Minh Nguyen Ham Nguyen Tuong Le Faculty of Information Technology iSPACE Cybersecurity Vocational Training College Ho Chi Minh City Vietnam Faculty of Computing Fundamentals FPT University Ho Chi Minh City Vietnam Faculty of Mathematics Mechanics and Informatics VNU University of Science Hanoi Vietnam Faculty of Information Technology HUTECH University Ho Chi Minh City Vietnam Informetrics Research Group Ton Duc Thang University Ho Chi Minh City Vietnam
Mining frequent weighted utility patterns (FWUPs) is an important activity in data mining to discover frequent patterns from quantitative databases with considering the weight (mean the importance) of each item. In pr... 详细信息
来源: 评论