咨询与建议

限定检索结果

文献类型

  • 6,378 篇 会议
  • 161 册 图书
  • 47 篇 期刊文献

馆藏范围

  • 6,586 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,749 篇 工学
    • 4,176 篇 计算机科学与技术...
    • 3,369 篇 软件工程
    • 1,157 篇 信息与通信工程
    • 762 篇 生物工程
    • 563 篇 生物医学工程(可授...
    • 497 篇 控制科学与工程
    • 420 篇 电气工程
    • 326 篇 动力工程及工程热...
    • 267 篇 机械工程
    • 254 篇 光学工程
    • 251 篇 电子科学与技术(可...
    • 240 篇 安全科学与工程
    • 219 篇 化学工程与技术
    • 214 篇 环境科学与工程(可...
  • 2,076 篇 理学
    • 942 篇 数学
    • 830 篇 生物学
    • 413 篇 物理学
    • 399 篇 统计学(可授理学、...
    • 278 篇 系统科学
    • 222 篇 化学
  • 1,415 篇 管理学
    • 784 篇 管理科学与工程(可...
    • 774 篇 图书情报与档案管...
    • 514 篇 工商管理
  • 615 篇 医学
    • 580 篇 临床医学
    • 555 篇 基础医学(可授医学...
    • 331 篇 药学(可授医学、理...
    • 302 篇 公共卫生与预防医...
  • 359 篇 法学
    • 266 篇 社会学
  • 208 篇 农学
    • 199 篇 作物学
  • 197 篇 经济学
    • 196 篇 应用经济学
  • 132 篇 教育学
  • 23 篇 军事学
  • 13 篇 文学

主题

  • 278 篇 internet of thin...
  • 262 篇 machine learning
  • 253 篇 cloud computing
  • 230 篇 big data
  • 219 篇 computational mo...
  • 207 篇 deep learning
  • 182 篇 data mining
  • 157 篇 data models
  • 137 篇 predictive model...
  • 136 篇 artificial intel...
  • 133 篇 training
  • 130 篇 feature extracti...
  • 122 篇 real-time system...
  • 119 篇 blockchain
  • 108 篇 support vector m...
  • 107 篇 accuracy
  • 107 篇 machine learning...
  • 102 篇 convolutional ne...
  • 100 篇 forecasting
  • 96 篇 medical services

机构

  • 54 篇 graphic era deem...
  • 44 篇 chitkara univers...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 21 篇 department of en...
  • 19 篇 school of comput...
  • 19 篇 teerthanker maha...
  • 18 篇 school of inform...
  • 17 篇 jaipur national ...
  • 16 篇 university of ch...
  • 16 篇 uttaranchal inst...
  • 15 篇 fujian provincia...
  • 14 篇 srm institute of...
  • 14 篇 department of co...
  • 14 篇 uttaranchal inst...
  • 13 篇 computer science...
  • 13 篇 school of comput...
  • 11 篇 uttaranchal inst...
  • 10 篇 college of compu...
  • 10 篇 school of manage...

作者

  • 21 篇 pant bhasker
  • 20 篇 chang kuo-chi
  • 13 篇 tripathi vikas
  • 12 篇 kukreja vinay
  • 12 篇 vinay kukreja
  • 11 篇 jacob lija
  • 11 篇 joshi kapil
  • 11 篇 gangodkar durgap...
  • 10 篇 iwendi celestine
  • 10 篇 lourens melanie
  • 10 篇 chu kai-chun
  • 10 篇 sujithra m.
  • 10 篇 alanya-beltran j...
  • 9 篇 rajeswari d.
  • 9 篇 chang fu-hsiang
  • 9 篇 singh rajesh
  • 8 篇 kapil joshi
  • 8 篇 kapila dhiraj
  • 8 篇 pavithra g.
  • 8 篇 sanjay misra

语言

  • 6,396 篇 英文
  • 184 篇 其他
  • 15 篇 中文
检索条件"任意字段=International Conference on Advances in Data Science and Computing Technologies, ASDC 2022"
6586 条 记 录,以下是4931-4940 订阅
排序:
Towards Smart Farming: Simulation Framework to Exploit Network Connectivity for End-to-End data Transmission
Towards Smart Farming: Simulation Framework to Exploit Netwo...
收藏 引用
international conference on Software, Knowledge Information, Industrial Management and Applications (SKIMA)
作者: Dongyang Huo Sri Devi Ravana Asad Waqar Malik Anis Ur Rahman Ismail Ahmedy Department of Information Systems Faculty of Computer Science & Information Technology University of Malaya Kuala Lumpur Malaysia Department of Computing National University of Sciences and Technology (NUST) Islamabad Pakistan Department of Computer Systems & Technology Faculty of Computer Science & Information Technology University of Malaya Kuala Lumpur Malaysia
Traditional agriculture is highly dependent on human participation and experience. Therefore, it is not possible to guarantee crop yield and quality while expanding the production scale. In recent years, based on the ... 详细信息
来源: 评论
Improved Image Encryption Technique for Reversible data Hiding using Binary Block Embedding
Improved Image Encryption Technique for Reversible Data Hidi...
收藏 引用
advances in computing and Future Communication technologies (ICACFCT), international conference on
作者: Subodh Kumar Rajendra Kumar Department of Computer Science Jamia Millia Islamia University Delhi India
This paper proposed an improved binary block embedding approach for embedding the “secret data” into any “binary image”. In this approach we propose an algorithm which embeds the secret information into an image a... 详细信息
来源: 评论
A Survey on Blockchain Technology Supported Approaches for Healthcare System, Open Issues and Challenges
A Survey on Blockchain Technology Supported Approaches for H...
收藏 引用
international conference on Mathematics, Actuarial science, Computer science and Statistics (MACS)
作者: Sumit Kumar Rana Sanjeev Kumar Rana Arun Kumar Rana Kashif Nisar Tariq Rahim Soomro Sana Nisar Computer Science and Engineering Maharishi Markandeshwar (deemed to be University) Ambala Haryana India Electronics and Communication Engineering Panipat Institute of Engineering and Technology Panipat Haryana India Victorian Institute of Technology (VIT) Adelaide South Australia College of Computer Science and Information Systems Institute of Business Management Karachi Sindh Pakistan Faculty of Computing and Informatics University Malaysia Sabah Kota Kinabalu Sabah Malaysia
In the last few years, technological development has multiplied. New technologies are affecting almost every industry. One of these which noticed the abrupt change in their ecosystem is the healthcare industry. As thi... 详细信息
来源: 评论
Secure ciphertext policy using blowfish hybridized weighted attribute-based encryption  1st
Secure ciphertext policy using blowfish hybridized weighted ...
收藏 引用
1st international conference on Frontiers in Smart Systems technologies, ICFSST 2019
作者: Porkodi, S. Kesavaraja, D. Department of Computer Science and Engineering Dr. Sivanthi Aditanar College of Engineering TiruchendurTamil Nadu India
There are lots of application which are been used by the people where a user’s data has to be protected from the attackers who steal the data by using fake identities which makes difficult to find the real culprit. T... 详细信息
来源: 评论
Detection of Abnormal Crowd Behavior Based on Graph Convolutional Neural Network
Detection of Abnormal Crowd Behavior Based on Graph Convolut...
收藏 引用
IEEE international Symposium on Information (IT) in Medicine and Education, ITME
作者: Xiang Zhou Ruliang Xiao Department of Computing and Information Science Fuzhou Institute of Technology Fuzhou Fujian China College of Computer and Cyber Security Fujian Normal University Fuzhou Fujian China
With the increasing demand for public safety precautions, the accuracy and timeliness of abnormal crowd behavior detection is gradually improving. Therefore, with the development of the technology for the abnormal cro... 详细信息
来源: 评论
Security Analysis for Virtual Machine Allocation in Cloud computing
Security Analysis for Virtual Machine Allocation in Cloud Co...
收藏 引用
Cyber Resilience (ICCR), international conference on
作者: Tahir Alyas Karamath Ateeq Mohammed Alqahtani Saigeeta Kukunuru Nadia Tabassum Rukshanda Kamran Department of Computer Science Lahore Garrison University Lahore Pakistan School of Information Technology Skyline University College University City Sharjah Sharjah UAE Department of Computer Information Systems College of Computer Science and Information Technology Abdulrahman Bin Faisal University Dammam Saudi Arabia Assistant professor in management Faculty Swiss Business school. RAK. UAE Department of Computer Science Virtual University of Pakistan Pakistan Faculty of Compter science and Information Technology Universiti Kota Samarahan Sarawak East Malaysia
A huge number of cloud users and cloud providers are threatened of security issues by cloud computing adoption. Cloud computing is a hub of virtualization that provides virtualization-based infrastructure over physica... 详细信息
来源: 评论
CANBERT: A Language-based Intrusion Detection Model for In-vehicle Networks
CANBERT: A Language-based Intrusion Detection Model for In-v...
收藏 引用
international conference on Machine Learning and Applications (ICMLA)
作者: Ebelechukwu Nwafor Habeeb Olufowobi Department of Computing Sciences Villanova University Villanova PA USA Department Computer Science and Engineering University of Texas at Arlington Arlington TX USA
Controller Area networks (CAN) provide a standard means of communicating across vehicular electronic units without a centralized computing unit or complex dedicated wiring. Despite the benefits offered by in-vehicle n... 详细信息
来源: 评论
Cryptanalysis of Lightweight Block Ciphers using Metaheuristic Algorithms in Cloud of Things (CoT)
Cryptanalysis of Lightweight Block Ciphers using Metaheurist...
收藏 引用
data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI), international conference on
作者: Md Saquib Jawed Mohammad Sajid Department of Computer Science Aligarh Muslim University Aligarh India
The Cloud of Things (CoT) has transformed communication and network technologies by expanding the Iimitation of IoT devices. The Cloud of Things is a fusion of Cloud computing with IoT that provides endless storage, n... 详细信息
来源: 评论
A brief review on wearable ECG devices and processing techniques for fall risk assessment, prevention and detection
A brief review on wearable ECG devices and processing techni...
收藏 引用
Mediterranean conference on Embedded computing (MECO)
作者: Amar Silajdž Anja Trkulja Asja Muharemović Lejla Gurbeta-Pokvić Edin Begić Almir Badnjević Faculty of Engineering and Natural Sciences International Burch University Sarajevo Bosnia and Herzegovina Sarajevo Medical School Sarajevo School of Science and Technology &#x0026 General Hospital Prim. Dr. Abdulah Naka&#x0161 &#x201D Sarajevo Bosnia and Herzegovina Faculty of Pharmacy University of Sarajevo Sarajevo Bosnia and Herzegovina
As a consequence of the progress of the modern mobile medicine, wearable technologies, especially ECG wearables tend to become indispensable part of peoples' lives. As applications and devices for tracking cardiac... 详细信息
来源: 评论
Edge-Based Infrared-Ultrasonic Anti-Collision Radar System for Robotic Navigation: *Applications of Cost-effective Bisensory System for Obstacle Detection, Tracking, and Avoidance
Edge-Based Infrared-Ultrasonic Anti-Collision Radar System f...
收藏 引用
IEEE conference on technologies for Homeland Security
作者: Kosisochukwu Pal Nnoli Mbadiwe Samuel Benyeogor Jones Ifeanyi Bolu Oladayo Olufemi Olakanmi Dept. of Computer Science and Electrical Engineering Jacobs University Bremen Germany Dept. of Physics Westfälische Wilhelms-Universität Münster Münster Germany Junior Information Technology Analyst Program NPower Canada Toronto Canada Dept. of Electrical and Electronics Engineering University of Ibadan Ibadan Nigeria
Significant progress has been made in the development of an edge computing system for the fusion, representation, and visualization of dual-sensor data for obstacle avoidance control of mobile robots. This involves th... 详细信息
来源: 评论