咨询与建议

限定检索结果

文献类型

  • 87 篇 会议
  • 32 篇 期刊文献

馆藏范围

  • 119 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66 篇 工学
    • 52 篇 计算机科学与技术...
    • 39 篇 软件工程
    • 10 篇 信息与通信工程
    • 7 篇 电气工程
    • 6 篇 动力工程及工程热...
    • 5 篇 机械工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 4 篇 环境科学与工程(可...
    • 3 篇 生物工程
    • 3 篇 网络空间安全
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 农业工程
  • 32 篇 理学
    • 17 篇 数学
    • 8 篇 物理学
    • 3 篇 天文学
    • 3 篇 地球物理学
    • 3 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 地质学
    • 2 篇 系统科学
  • 20 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 8 篇 cloud computing
  • 7 篇 feature extracti...
  • 4 篇 convolution
  • 4 篇 servers
  • 4 篇 computational mo...
  • 3 篇 anomaly detectio...
  • 3 篇 resource managem...
  • 3 篇 quality of servi...
  • 3 篇 smart contract
  • 3 篇 semantics
  • 3 篇 machine learning
  • 3 篇 blockchain
  • 3 篇 clustering algor...
  • 3 篇 technological in...
  • 3 篇 training
  • 2 篇 knowledge engine...
  • 2 篇 object detection
  • 2 篇 neurons
  • 2 篇 electric vehicle...
  • 2 篇 software algorit...

机构

  • 21 篇 guangxi cooperat...
  • 8 篇 college of compu...
  • 6 篇 inner mongolia e...
  • 6 篇 center for cloud...
  • 6 篇 school of comput...
  • 5 篇 engineering rese...
  • 5 篇 guangxi key labo...
  • 5 篇 school of inform...
  • 5 篇 cloud computing ...
  • 4 篇 guangxi colleges...
  • 4 篇 inner mongolia e...
  • 4 篇 inner mongolia k...
  • 4 篇 guangxi cooperat...
  • 4 篇 inner mongolia k...
  • 3 篇 school of inform...
  • 3 篇 department of in...
  • 3 篇 cloud computing ...
  • 3 篇 guangxi key labo...
  • 3 篇 china mobile inf...
  • 3 篇 school of comput...

作者

  • 11 篇 dinkar sitaram
  • 9 篇 jian-tao zhou
  • 5 篇 zhou jian-tao
  • 5 篇 sitaram dinkar
  • 5 篇 wen bin
  • 4 篇 sudheendra harwa...
  • 4 篇 phalachandra h.l...
  • 3 篇 zhou jiantao
  • 3 篇 shi aiwu
  • 3 篇 lei xiaochun
  • 3 篇 yang qing
  • 3 篇 xiaochun lei
  • 3 篇 wang zexu
  • 3 篇 wang jianfeng
  • 3 篇 zhang jingwei
  • 3 篇 tao xiaoling
  • 3 篇 miao ye
  • 3 篇 chen junyan
  • 3 篇 feiyu wang
  • 3 篇 junyan chen

语言

  • 119 篇 英文
  • 2 篇 中文
检索条件"机构=Center for Cloud Computing and Big Data"
119 条 记 录,以下是1-10 订阅
排序:
Pothole Detection: A Study of Ensemble Learning and Decision Framework
收藏 引用
International Journal of Advanced Computer Science and Applications 2025年 第4期16卷 67-79页
作者: Gorro, Ken D. Ranolo, Elmo B. Ilano, Anthony S. Balijon, Deofel P. Center for Cloud Computing Big Data and Artificial Intelligence Philippines College of Computing Artificial Intelligence and Sciences of Cebu Normal University Philippines
This study investigates the potential use of ensemble learning (YOLOv9 and Mask R-CNN) and Multi-Criteria Decision Making for pothole detection system. A series of experiments were conducted, including variations in c... 详细信息
来源: 评论
N-Body Simulation Inspired by Metaheuristics Optimization
收藏 引用
Computer Systems Science & Engineering 2022年 第6期41卷 1143-1155页
作者: Muhammad Ali Ismail Maria Waqas Farah Sadiq National Center in Big Data and Cloud Computing Department of Computer and Info Systems EngineeringNED University of Engineering and TechnologyKarachiPakistan
The N-body problem in classical physics, is the calculation of force ofgravitational attraction of heavenly bodies towards each other. Solving this problem for many heavenly bodies has always posed a challenge to phy... 详细信息
来源: 评论
DeepFake Detection Using Deep Learning  1st
DeepFake Detection Using Deep Learning
收藏 引用
1st International Conference on data Science and Artificial Intelligence, DSAI 2023
作者: Rehman, Mariam Rasool, Mehran Safder, Sadaf Government College University Faisalabad Pakistan National Center in Big Data and Cloud Computing University of Agriculture Faisalabad Pakistan
A deepfake is a computer-generated video or image where one person's face is replaced with another face of a person which uses a generative adversarial network (GAN) to create and alter images that are practically... 详细信息
来源: 评论
data Catalogs with Artificial Intelligence and Active Metadata: A Case Study of China Mobile  6
Data Catalogs with Artificial Intelligence and Active Metada...
收藏 引用
6th International Conference on Next Generation data-Driven Networks, NGDN 2024
作者: Wang, Jibin Guo, Yanmei Jiang, Yong Shang, Jing Chen, Zhuo Liu, Yu Hu, Qingyuan Yin, Zheng China Mobile Information Technology Center Beijing China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
In the context of the rapid development of artificial intelligence, telecommunications operators have accumulated an increasing amount of data. China Mobile has developed a set of practical methods of enhanced data ca... 详细信息
来源: 评论
An insider user authentication method based on improved temporal convolutional network
收藏 引用
High-Confidence computing 2023年 第4期3卷 87-95页
作者: Xiaoling Tao Yuelin Yu Lianyou Fu Jianxiang Liu Yunhao Zhang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic TechnologyGuilin 541004China
With the rapid development of information technology,information system security and insider threat detection have become important topics for organizational *** the current network environment,user behavioral bio-dat... 详细信息
来源: 评论
A Reduced State Space Generation Method for Concurrent Systems Based on CPN-PR Model
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2024年 第6期44卷 2328-2342页
作者: Zhong, Wenjie Sun, Tao Zhou, Jian-Tao Wang, Zhuowei Song, Xiaoyu Inner Mongolia Engineering Laboratory for Big Data Analysis Technology College of Computer Science Inner Mongolia University Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot010000 China Guangdong University of Technology School of Computer Science and Technology Guangzhou China Portland State University Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri Nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design... 详细信息
来源: 评论
Research on Blockchain-based Decentralized Federated Learning
Research on Blockchain-based Decentralized Federated Learnin...
收藏 引用
2023 International Conference on Computer Applications Technology, CCAT 2023
作者: Han, Boyuan Liang, Zhihong Qin, Mingming Jiang, Rongxin Dai, Wei Southwest Forestry University School of Big Data and Intelligent Engineering Kunming China Southwest Forestry University Big Data and Cloud Computing Center Kunming China Yunnan Pu'er Technical School Yunnan Pu'er Technical School Kunming China
The integration of blockchain and federated learning exhibits a highly synergistic relationship. Blockchain, with its assurance of trustworthiness in computational processes and data, combined with federated learning&... 详细信息
来源: 评论
Privacy Protection Multi-copy Provable data Possession Supporting data Reliability  5th
Privacy Protection Multi-copy Provable Data Possession Suppo...
收藏 引用
5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023
作者: Zhang, Feng Wen, Bin Yan, Yifei Zeng, Zhaowu Zhou, Wei School of Information Science and Technology Hainan Normal University Haikou571158 China Cloud Computing and Big Data Research Center Hainan Normal University Haikou571158 China Key Laboratory of Data Science and Smart Education Ministry of Education Hainan Normal University Haikou571158 China
With the development of technology, a massive amount of data continues to emerge, and there is still a strong demand for data storage. Outsourcing data to cloud service providers has become a common practice. Although... 详细信息
来源: 评论
Using Rough Sets to Improve the High-dimensional data Anomaly Detection Method Based on Extended Isolation Forest  26
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Hanlin Zhou, Jiantao Li, Hua Inner Mongolia University College of Computer Science Hohhot China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i... 详细信息
来源: 评论
Blockchain-Based Multi-cloud data Storage System Disaster Recovery
Blockchain-Based Multi-Cloud Data Storage System Disaster Re...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Wang, Feiyu Zhou, Jian-Tao College of Computer Science Inner Mongolia University Inner Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
来源: 评论