咨询与建议

限定检索结果

文献类型

  • 7,090 篇 会议
  • 47 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 7,176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,912 篇 工学
    • 4,098 篇 计算机科学与技术...
    • 2,520 篇 软件工程
    • 1,048 篇 信息与通信工程
    • 789 篇 控制科学与工程
    • 663 篇 生物工程
    • 642 篇 电气工程
    • 424 篇 生物医学工程(可授...
    • 285 篇 交通运输工程
    • 281 篇 机械工程
    • 226 篇 仪器科学与技术
    • 226 篇 安全科学与工程
    • 206 篇 建筑学
    • 197 篇 动力工程及工程热...
    • 185 篇 光学工程
    • 166 篇 化学工程与技术
    • 154 篇 土木工程
  • 1,899 篇 理学
    • 1,065 篇 数学
    • 717 篇 生物学
    • 442 篇 统计学(可授理学、...
    • 285 篇 物理学
    • 252 篇 系统科学
    • 140 篇 化学
  • 1,151 篇 管理学
    • 655 篇 管理科学与工程(可...
    • 582 篇 图书情报与档案管...
    • 315 篇 工商管理
  • 407 篇 医学
    • 353 篇 临床医学
    • 297 篇 基础医学(可授医学...
    • 188 篇 药学(可授医学、理...
  • 244 篇 教育学
    • 243 篇 教育学
  • 211 篇 法学
    • 197 篇 社会学
  • 119 篇 农学
  • 111 篇 经济学
  • 50 篇 文学
  • 7 篇 艺术学
  • 5 篇 军事学

主题

  • 557 篇 machine learning
  • 456 篇 deep learning
  • 269 篇 training
  • 253 篇 data mining
  • 240 篇 data models
  • 220 篇 feature extracti...
  • 218 篇 accuracy
  • 184 篇 support vector m...
  • 178 篇 predictive model...
  • 138 篇 neural networks
  • 137 篇 machine learning...
  • 133 篇 computational mo...
  • 131 篇 reinforcement le...
  • 108 篇 convolutional ne...
  • 103 篇 real-time system...
  • 92 篇 forecasting
  • 90 篇 artificial intel...
  • 89 篇 learning systems
  • 88 篇 transfer learnin...
  • 86 篇 big data

机构

  • 69 篇 chitkara univers...
  • 17 篇 school of electr...
  • 15 篇 computer science...
  • 14 篇 harbin engineeri...
  • 13 篇 graphic era hill...
  • 12 篇 building civil a...
  • 12 篇 uttaranchal inst...
  • 12 篇 computer science...
  • 11 篇 university of ch...
  • 10 篇 school of electr...
  • 10 篇 school of comput...
  • 10 篇 graphic era deem...
  • 10 篇 school of electr...
  • 10 篇 yonsei univ dept...
  • 9 篇 wuhan university...
  • 9 篇 univ chinese aca...
  • 9 篇 school of inform...
  • 8 篇 school of remote...
  • 7 篇 university of sa...
  • 7 篇 microsoft resear...

作者

  • 17 篇 kukreja vinay
  • 15 篇 vinay kukreja
  • 13 篇 yin hujun
  • 12 篇 liu yang
  • 12 篇 corchado emilio
  • 11 篇 mehta shiva
  • 10 篇 shiva mehta
  • 10 篇 hujun yin
  • 10 篇 cho sung-bae
  • 9 篇 notsu akira
  • 9 篇 silva catarina
  • 9 篇 alhajj reda
  • 7 篇 ksieniewicz pawe...
  • 7 篇 hammer barbara
  • 7 篇 zhang byoung-tak
  • 7 篇 wozniak michal
  • 7 篇 hussain abir
  • 7 篇 soubra hassan
  • 7 篇 huang de-shuang
  • 7 篇 camacho david

语言

  • 6,194 篇 英文
  • 971 篇 其他
  • 31 篇 中文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"任意字段=11th International Conference on Intelligent Data Engineering and Automated Learning"
7176 条 记 录,以下是4191-4200 订阅
排序:
User Behavior Analytics for Anomaly Detection Using LSTM Autoencoder-Insider threat Detection  20
User Behavior Analytics for Anomaly Detection Using LSTM Aut...
收藏 引用
11th international conference on Advances in Information Technology, IAIT 2020
作者: Sharma, Balaram Pokharel, Prabhat Joshi, Basanta LogPoint Lalitpur Nepal Institute of Engineering Lalitpur Nepal
Identifying anomalies from log data for insider threat detection is practically a very challenging task for security analysts. User behavior modeling is very important for the identification of these anomalies. this p... 详细信息
来源: 评论
Kannada Character Recognition Using Multi-Class SVM Method
Kannada Character Recognition Using Multi-Class SVM Method
收藏 引用
international conference on Confluence the Next Generation Information Technology Summit (Confluence)
作者: Kusumika Krori Dutta Sunny Arokia Swamy Anushua Banerjee Divya Rashi B Chandan R Deepak Vaprani M.S. Ramaiah Institute of Technology Bangalore India Engineer/Scientist II Electric Power Research Institute North Carolina USA
Character recognition also truncated to OCR (Optical Character Recognition), is the translation of images: hand-written, typewritten (either mechanically or electronically), or even just a simple text printed into a m... 详细信息
来源: 评论
Adversarial Edit Attacks for Tree data  20th
Adversarial Edit Attacks for Tree Data
收藏 引用
20th international conference on intelligent data engineering and automated learning (IDEAL)
作者: Paassen, Benjamin Bielefeld Univ CITEC Inspirat 1 D-33619 Bielefeld Germany
Many machine learning models can be attacked with adversarial examples, i.e. inputs close to correctly classified examples that are classified incorrectly. However, most research on adversarial attacks to date is limi... 详细信息
来源: 评论
A Blockchain-based Solution for Reputation Management in IoV
A Blockchain-based Solution for Reputation Management in IoV
收藏 引用
international Wireless Communications and Mobile Computing conference, IWCMC
作者: Slim Abbes Slim Rekhis University of Carthage Higher School of Communication Engineering (SUP'COM) LR11TIC04 Communication Networks and Security Research Lab Tunisia
Internet of Vehicles (IoV) is an emerging paradigm in intelligent Transportation Systems (ITS). It represents a promised solution to handle the massive amount of exchanged information and the continuous demand for ser... 详细信息
来源: 评论
A Novel Approach for data Collection and Network Attack Warning  11
A Novel Approach for Data Collection and Network Attack Warn...
收藏 引用
11th international conference on Knowledge and Systems engineering (KSE)
作者: Van Kha Nguyen Minh Nhat Quang Truong Van Lam Le Quyet thang Le thanh Hai Nguyen Can Tho Dept Sci & Technol Can Tho Vietnam Can Tho Univ Technol Coll Informat Technol Can Tho Vietnam Can Tho Univ Dept Int Relat Can Tho Vietnam Can Tho Univ Coll Informat & Commun Technol Can Tho Vietnam
Network security in general, research on detecting and finding attacks in computer networks in particular, has become a very hot topic. there are a variety of studies on machine learning models to attempt to detect ne... 详细信息
来源: 评论
Forecasting with Recurrent Neural Network in Intermittent Demand data
Forecasting with Recurrent Neural Network in Intermittent De...
收藏 引用
international conference on Confluence the Next Generation Information Technology Summit (Confluence)
作者: Amri Muhaimin Dedy Dwi Prastyo Henry Horng-Shing Lu Institut Teknologi Sepuluh Nopember Institute of Statistics National Chiao Tung University Surabaya Indonesia Institut Teknologi Sepuluh Nopember Surabaya Indonesia Institute of Statistics National Chiao Tung University Hsinchu ROC Taiwan
Intermittent demand data is one of the data types with a very random pattern, for example demand data. the data will have value (not zero) if there is a demand. If there is no demand, the data is zero. Intermittent de... 详细信息
来源: 评论
Workload Prediction over Cloud Server using Time Series data
Workload Prediction over Cloud Server using Time Series Data
收藏 引用
international conference on Confluence the Next Generation Information Technology Summit (Confluence)
作者: Mahendra Pratap Yadav Nisha Pal Dharmendar Kumar Yadav MNNIT Allahabad Prayagraj India
Analyzing and interpreting the real time data is a challenging task for cloud analysts (e.g. cloud providers) in cur-rent scenario for allocating computing resources in applications. Availability of a massive amount o... 详细信息
来源: 评论
Research on training-mode of intelligent technical talents in the local application-oriented university  2021
Research on training-mode of intelligent technical talents i...
收藏 引用
2nd international conference on Computers, Information Processing and Advanced Education, CIPAE 2021
作者: Chen, Chunlei Wang, Chengduan Hou, Jinkui Zhang, Peng Wang, Lei Dai, Jiangyan School of Computer Engineering Weifang University Weifang China
Weifang is an emerging electronic-information-industry city in China. the fast development of local industries raise huge demands on application-oriented technical talents of various fields, among which-artificial int... 详细信息
来源: 评论
Classification of Brain MRI Images Using Convolution Neural Network and Transfer learning
Classification of Brain MRI Images Using Convolution Neural ...
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: N Ambily K Suresh Government Engineering College Barton Hill Thiruvananthapuram
Magnetic Resonance Image (MRI) is a non intrusive procedure for obtaining high resolution images of living tissues. Varieties of tissue contrast images that MRI modalities produce provide important structural informat... 详细信息
来源: 评论
Physiological-Based Smart Stress Detector using Machine learning Algorithms  11
Physiological-Based Smart Stress Detector using Machine Lear...
收藏 引用
11th IEEE international conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management ( HNICEM )
作者: Rosales, Marife A. Bandala, Argel A. Vicerra, Ryan Rhay Dadios, Elmer P. De La Salle Univ Elect & Commun Engn Dept Manila Philippines De La Salle Univ Mfg Engn Amd Management Dept Manila Philippines
this paper is focused on the development of an intelligent system to identify if one person is stress or not stress using physiological parameters through machine learning. In this study, the dataset was acquired from... 详细信息
来源: 评论