咨询与建议

限定检索结果

文献类型

  • 6,378 篇 会议
  • 161 册 图书
  • 47 篇 期刊文献

馆藏范围

  • 6,586 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,749 篇 工学
    • 4,176 篇 计算机科学与技术...
    • 3,369 篇 软件工程
    • 1,157 篇 信息与通信工程
    • 762 篇 生物工程
    • 563 篇 生物医学工程(可授...
    • 497 篇 控制科学与工程
    • 420 篇 电气工程
    • 326 篇 动力工程及工程热...
    • 267 篇 机械工程
    • 254 篇 光学工程
    • 251 篇 电子科学与技术(可...
    • 240 篇 安全科学与工程
    • 219 篇 化学工程与技术
    • 214 篇 环境科学与工程(可...
  • 2,076 篇 理学
    • 942 篇 数学
    • 830 篇 生物学
    • 413 篇 物理学
    • 399 篇 统计学(可授理学、...
    • 278 篇 系统科学
    • 222 篇 化学
  • 1,415 篇 管理学
    • 784 篇 管理科学与工程(可...
    • 774 篇 图书情报与档案管...
    • 514 篇 工商管理
  • 615 篇 医学
    • 580 篇 临床医学
    • 555 篇 基础医学(可授医学...
    • 331 篇 药学(可授医学、理...
    • 302 篇 公共卫生与预防医...
  • 359 篇 法学
    • 266 篇 社会学
  • 208 篇 农学
    • 199 篇 作物学
  • 197 篇 经济学
    • 196 篇 应用经济学
  • 132 篇 教育学
  • 23 篇 军事学
  • 13 篇 文学

主题

  • 278 篇 internet of thin...
  • 262 篇 machine learning
  • 253 篇 cloud computing
  • 230 篇 big data
  • 219 篇 computational mo...
  • 207 篇 deep learning
  • 182 篇 data mining
  • 157 篇 data models
  • 137 篇 predictive model...
  • 136 篇 artificial intel...
  • 133 篇 training
  • 130 篇 feature extracti...
  • 122 篇 real-time system...
  • 119 篇 blockchain
  • 108 篇 support vector m...
  • 107 篇 accuracy
  • 107 篇 machine learning...
  • 102 篇 convolutional ne...
  • 100 篇 forecasting
  • 96 篇 medical services

机构

  • 54 篇 graphic era deem...
  • 44 篇 chitkara univers...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 21 篇 department of en...
  • 19 篇 school of comput...
  • 19 篇 teerthanker maha...
  • 18 篇 school of inform...
  • 17 篇 jaipur national ...
  • 16 篇 university of ch...
  • 16 篇 uttaranchal inst...
  • 15 篇 fujian provincia...
  • 14 篇 srm institute of...
  • 14 篇 department of co...
  • 14 篇 uttaranchal inst...
  • 13 篇 computer science...
  • 13 篇 school of comput...
  • 11 篇 uttaranchal inst...
  • 10 篇 college of compu...
  • 10 篇 school of manage...

作者

  • 21 篇 pant bhasker
  • 20 篇 chang kuo-chi
  • 13 篇 tripathi vikas
  • 12 篇 kukreja vinay
  • 12 篇 vinay kukreja
  • 11 篇 jacob lija
  • 11 篇 joshi kapil
  • 11 篇 gangodkar durgap...
  • 10 篇 iwendi celestine
  • 10 篇 lourens melanie
  • 10 篇 chu kai-chun
  • 10 篇 sujithra m.
  • 10 篇 alanya-beltran j...
  • 9 篇 rajeswari d.
  • 9 篇 chang fu-hsiang
  • 9 篇 singh rajesh
  • 8 篇 kapil joshi
  • 8 篇 kapila dhiraj
  • 8 篇 pavithra g.
  • 8 篇 sanjay misra

语言

  • 6,396 篇 英文
  • 184 篇 其他
  • 15 篇 中文
检索条件"任意字段=International Conference on Advances in Data Science and Computing Technologies, ASDC 2022"
6586 条 记 录,以下是4781-4790 订阅
排序:
A Shared Blockchain Intelligent Public Protection Service Framework  1
A Shared Blockchain Intelligent Public Protection Service Fr...
收藏 引用
1st international conference on advances in Computational science and Engineering, ICACSE 2020
作者: Reddy, Gangireddy Prabhakar Kalaiselvi Geetha, M. Sureshanand, M. Jaanaa Rubavathy, S. Department of Computer Science and Engineering Malla Reddy Institute of Engineering and Technology Telangana Secunderabad India Department of Computer Science and Engineering Annamalai University Tamil Nadu Chidambaram India Department of Computer Science and Engineering Sri Sairam Engineering College Tamil Nadu Chennai India Department of Electrical and Electronics Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India
With accelerated technical advancements in the IoT network, an intelligent scheme of public security is possible with the incorporation of heterogeneous data processing systems, with which public security services wil... 详细信息
来源: 评论
A Methods of Medical Image Security Using Visual-Cryptography Techniques
A Methods of Medical Image Security Using Visual-Cryptograph...
收藏 引用
international conference on computing Communication Control and Automation (ICCUBEA)
作者: Pallavi R. Waghmare Jaishri. M. Waghmare Dept. of Computer Science & Engg. S. G. G. S. IE & T Nanded India
Today in this technology era, most of the information is exchanged across open channels, and the security of such information has been a major concern. Medical Image Security has emerged as a new modern study subject ... 详细信息
来源: 评论
Optimal Analysis for Enterprise Financial Management Based on Artificial Intelligence and Parallel computing Method
Optimal Analysis for Enterprise Financial Management Based o...
收藏 引用
international conference on Contemporary computing and Informatics (IC3I)
作者: M. Rajeswari N. Kumar P. Raman Pramod Kumar Patjoshi Vaishali Singh Sumit Pundir Department of Management Studies SRM Institute of Science and Technology Vadapalani Chennai TamilNadu College of Management SRM Institute of Science and Technology Chennai Kattankulathur TamilNadu Department of MBA Panimalar Engineering College Chennai TamilNadu India School of Management Centurion University of Technology and Management Bhubaneswar Odisha Department of Computer Science and Engineering Ambalika Institute of Management & Technology Luknow Uttar Pradesh India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun Uttrakhand India
To function in today’s society, people need access to information technology for every aspect of their lives, from personal interactions to the creation of goods and services. As the Internet and the In tandem with t... 详细信息
来源: 评论
Analyzing the Behavioral Artifacts for Malicious Software Detection Using Machine Learning Algorithms
Analyzing the Behavioral Artifacts for Malicious Software De...
收藏 引用
advances in computing, Communication Control and Networking (ICAC3N), international conference on
作者: Nikkam Chandini C. Kiran Mai Department of Computer Science and Engineering VNRVJIET Hyderabad India
Malicious software intentionally affects your computer system. Malware is analyzed using static or dynamic analysis techniques. These techniques are used to classify and predict unique patterns for correctly identifyi... 详细信息
来源: 评论
Location-aware Task Offloading in Mobile Edge computing
Location-aware Task Offloading in Mobile Edge Computing
收藏 引用
IEEE international conference on Big data and Cloud computing (BdCloud)
作者: Yongqiang Gao Jixiao Li College of Computer Science Inner Mongolia University Huhhot China
As one of the core technologies of 5G, mobile edge computing (MEC) has attracted wide attention from the academic community in recent years. In the mobile edge computing environment, users can choose to offload tasks ... 详细信息
来源: 评论
Towards intrusion detection of previously unknown network attacks  35
Towards intrusion detection of previously unknown network at...
收藏 引用
35th ECMS international conference on Modelling and Simulation, ECMS 2021
作者: Alzubi, Saif Stahl, Frederic Gaber, Mohamed Medhat Department of Computer Science University of Reading Reading United Kingdom Oldenburg Germany School of Computing and Digital Technology Birmingham City University United Kingdom Faculty of Computer Science and Engineering Galala University Galala City43511 Egypt
advances in telecommunication network technologies have led to an ever more interconnected world. Accordingly, the types of threats and attacks to intrude or disable such networks or portions of it are continuing to d... 详细信息
来源: 评论
Healthcare Design Based on Virtual Reality Technology: Enhance the User's Engagement in the Rehabilitation Process
Healthcare Design Based on Virtual Reality Technology: Enhan...
收藏 引用
10th international conference on Applied Human Factors and Ergonomics / AHFE international conference on Human Factors and Wearable technologies / AHFE international conference on Game Design and Virtual Environments
作者: Qiao, Yu Yang, Siyi Cent S Univ Dept Ind Design Acad Arts & Architecture Changsha Hunan Peoples R China Cent S Univ Sch Publ Adm Changsha Peoples R China
This study on VR technology in healthcare design aims to enhance the engagement and provide an interactive way for the whole rehabilitation process. By presenting the real-time data to the users and collecting their f... 详细信息
来源: 评论
Detection of Malicious Traffic in IoMT Environment Using Intelligent XGboost Approach
Detection of Malicious Traffic in IoMT Environment Using Int...
收藏 引用
Emerging Trends in Industry 4.0 (ETI 4.0)
作者: Yugandhar Manchala Janmenjoy Nayak H. S. Behera Department of Information Technology Veer Surendra Sai University of Technology Burla Odisha India Department of Computer Science Maharaja Sriram Chandra Bhanja Deo University Baripada Odisha India
The paradigm of computing has completely altered as a result of the development of communication and Information technology. The Internet of Things (IoT) is a type of communication environment made up of web-enabled d... 详细信息
来源: 评论
A Generator-based Method for Attacking Embedding-based Text Classifiers
A Generator-based Method for Attacking Embedding-based Text ...
收藏 引用
IEEE international conference on Research, Innovation and Vision for the Future
作者: Kha Do Minh Duc-Anh Nguyen Nguyen Le Minh Pham Ngoc Hung VNU University of Engineering and Technology Japan Advanced Institute of Science and Technology (JAIST)
This paper proposes a method to attack embedding-based text classifiers, namely GenEmC, to reduce the high computational cost of rule-based replacement. GenEmC includes three main steps including data preparation, emb... 详细信息
来源: 评论
Towards a System to Monitor the Virus’s Aerosol-Type Spreading  1
收藏 引用
1st IFIP TC 5 international conference on Computer science Protecting Human Society Against Epidemics, ANTICOVID 2021
作者: Arnicans, Guntis Niedrite, Laila Solodovnikova, Darja Virbulis, Janis Zemnickis, Janis Faculty of Computing University of Latvia Raina bulvaris 19 Riga1586 Latvia Institute of Numerical Modelling University of Latvia Riga Latvia
Recent scientific studies indicate that attention should be paid to the indoor spread of the Covid-19 virus. It is recommended to reduce the number of visitors to the premises and to provide frequent ventilation of th... 详细信息
来源: 评论