咨询与建议

限定检索结果

文献类型

  • 7,072 篇 会议
  • 48 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 7,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,920 篇 工学
    • 4,107 篇 计算机科学与技术...
    • 2,511 篇 软件工程
    • 1,065 篇 信息与通信工程
    • 791 篇 控制科学与工程
    • 662 篇 生物工程
    • 657 篇 电气工程
    • 423 篇 生物医学工程(可授...
    • 286 篇 交通运输工程
    • 283 篇 机械工程
    • 226 篇 仪器科学与技术
    • 226 篇 安全科学与工程
    • 205 篇 建筑学
    • 199 篇 动力工程及工程热...
    • 184 篇 光学工程
    • 168 篇 化学工程与技术
    • 153 篇 土木工程
  • 1,914 篇 理学
    • 1,080 篇 数学
    • 717 篇 生物学
    • 441 篇 统计学(可授理学、...
    • 284 篇 物理学
    • 252 篇 系统科学
    • 141 篇 化学
  • 1,147 篇 管理学
    • 655 篇 管理科学与工程(可...
    • 578 篇 图书情报与档案管...
    • 314 篇 工商管理
  • 405 篇 医学
    • 351 篇 临床医学
    • 295 篇 基础医学(可授医学...
    • 188 篇 药学(可授医学、理...
  • 244 篇 教育学
    • 243 篇 教育学
  • 209 篇 法学
    • 195 篇 社会学
  • 119 篇 农学
  • 110 篇 经济学
  • 50 篇 文学
  • 7 篇 艺术学
  • 5 篇 军事学

主题

  • 557 篇 machine learning
  • 458 篇 deep learning
  • 262 篇 training
  • 254 篇 data mining
  • 235 篇 data models
  • 220 篇 feature extracti...
  • 215 篇 accuracy
  • 183 篇 support vector m...
  • 178 篇 predictive model...
  • 138 篇 neural networks
  • 138 篇 machine learning...
  • 130 篇 computational mo...
  • 121 篇 reinforcement le...
  • 107 篇 convolutional ne...
  • 103 篇 real-time system...
  • 92 篇 forecasting
  • 90 篇 artificial intel...
  • 89 篇 learning systems
  • 88 篇 transfer learnin...
  • 87 篇 big data

机构

  • 69 篇 chitkara univers...
  • 17 篇 school of electr...
  • 15 篇 computer science...
  • 14 篇 harbin engineeri...
  • 13 篇 graphic era hill...
  • 12 篇 building civil a...
  • 12 篇 uttaranchal inst...
  • 12 篇 computer science...
  • 11 篇 university of ch...
  • 10 篇 school of electr...
  • 10 篇 school of comput...
  • 10 篇 graphic era deem...
  • 10 篇 school of electr...
  • 10 篇 yonsei univ dept...
  • 9 篇 wuhan university...
  • 9 篇 univ chinese aca...
  • 9 篇 school of inform...
  • 8 篇 school of remote...
  • 7 篇 university of sa...
  • 7 篇 microsoft resear...

作者

  • 17 篇 kukreja vinay
  • 15 篇 vinay kukreja
  • 13 篇 yin hujun
  • 12 篇 liu yang
  • 12 篇 corchado emilio
  • 11 篇 mehta shiva
  • 10 篇 shiva mehta
  • 10 篇 hujun yin
  • 10 篇 cho sung-bae
  • 9 篇 notsu akira
  • 9 篇 silva catarina
  • 9 篇 alhajj reda
  • 7 篇 ksieniewicz pawe...
  • 7 篇 hammer barbara
  • 7 篇 zhang byoung-tak
  • 7 篇 wozniak michal
  • 7 篇 hussain abir
  • 7 篇 soubra hassan
  • 7 篇 huang de-shuang
  • 7 篇 camacho david

语言

  • 6,775 篇 英文
  • 373 篇 其他
  • 28 篇 中文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"任意字段=11th International Conference on Intelligent Data Engineering and Automated Learning"
7159 条 记 录,以下是4421-4430 订阅
排序:
Detection of Suspicious Accounts on Twitter Using Word2Vec and Sentiment Analysis  11th
Detection of Suspicious Accounts on Twitter Using Word2Vec a...
收藏 引用
11th international conference on Multimedia and Network Information Systems (MISSI)
作者: Conde-Cespedes, Patricia Chavando, Julie Deberry, Eliza Inst Super Elect Paris 28 Rue Notre Dame Champs Paris France Stanford Univ San Francisco CA USA
Twitter constantly attempts to suspend dangerous or suspicious accounts. this strategy has been questionably ineffective as users continuously recreate their accounts. As a result, there are many accounts that are lef... 详细信息
来源: 评论
Fault Diagnosis of Electrical Equipment through thermal Imaging and Interpretable Machine learning Applied on a Newly-introduced dataset
Fault Diagnosis of Electrical Equipment through Thermal Imag...
收藏 引用
international conference of Signal Processing and intelligent Systems (ICSPIS)
作者: Mohamad Najafi Yasser Baleghi Sayyed Asghar Gholamian Seyyed Mehdi Mirimani Electrical & Computer Engineering Noshivani University of Technology Babol Iran Power System Noshivani University of Technology Babol Iran
In this study, an interpretable, fully automated pipeline for condition monitoring of electrical equipment using thermal imaging is proposed. A wider array of defects in comparison with other thermography surveys is i... 详细信息
来源: 评论
Using Dtrace for Machine learning Solutions in Malware Detection
Using Dtrace for Machine Learning Solutions in Malware Detec...
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: Aiswarya Mohan K.P. Saranya Chandran Gilad Gressel T.U. Arjun Vipin Pavithran Cyber Security Systems and Networks Amrita Viswa Vidhyapeetham Amritapuri India
Malware cannot be ignored today as evidenced by the havoc created by Wannacry[29], [12], [23]. Every day malicious actors are writing more intelligent malware. the attacks evolve as actors learn to evade detection tec... 详细信息
来源: 评论
Deep Reinforcement learning based Multi-Objective Systems for Financial Trading
Deep Reinforcement Learning based Multi-Objective Systems fo...
收藏 引用
Recent Advances and Innovations in engineering (ICRAIE)
作者: Kiran Bisht Arun Kumar G. B. Pant University of Agriculture and Technology Pantnagar Uttarakhand India
Because of the risky nature of stock market, most people do not feel a secure option to invest their money in financial trading. Focusing on this basic concern of investors much research efforts are devoted to develop... 详细信息
来源: 评论
Deep Approaches on Malicious URL Classification
Deep Approaches on Malicious URL Classification
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: Arijit Das Ankita Das Anisha Datta Shukrity Si Subhas Barman Jalpaiguri Government Engineering College Jalpaiguri India
Malicious URLs are one of the biggest threats to this digital world and preventing it is one of the challenging tasks in the domain of cyber security. Previous research to tackle malicious URLs using hard-coded featur... 详细信息
来源: 评论
Improving the Concentration of Students With Attention Deficit Hyperactivity Disorder and Autism Spectrum Disorder: Electroencephalographic Analysis on the Effect of learning Activity Interventions
收藏 引用
international Journal of intelligent Technologies & Applied Statistics 2020年 第1期13卷 49-63页
作者: Ming-Hseuh Tsai Sy-Ruen Huang Shao-Chin Chang Yu-Ling Lo Yun-Chieh Lu Research Center for Education Systems and Policy National Academy f or Educational Research New Taipei City Taiwan Chung Chou University of Science and Technology Changhua County Taiwan Ph.D. Program of Electrical and Communications Engineering Feng-Chia University Taichung City Taiwan Department of Early Childhood Education Asia University Taichung City Taiwan
this study examined whether the learning concentration of students with attention deficit hyperactivity disorder (ADHD) or autism spectrum disorder (ASD) can be improved through participation in one-on-one learning ac... 详细信息
来源: 评论
Interactive Apparel Coordination Recommendation System Reflecting Situation and Preference
Interactive Apparel Coordination Recommendation System Refle...
收藏 引用
international Symposium on Soft Computing and intelligent Systems (SCIS)
作者: Muneyuki Unehara Yui Hasegawa Koichi Yamada Izumi Suzuki Nagaoka University of Technology Japan Undergraduate School of Information and Management Systems Engineering Nagaoka University of Technology Japan
this study proposes an apparel coordination recommendation system, which reflects the user's situation of wearing clothing and individual preference, based on the Interactive Evolutionary Computation. the proposed... 详细信息
来源: 评论
international Joint conference: 13th international conference on Soft Computing Models, SOCO 2018, 11th international conference on Computational Intelligence in Security for Information Systems, CISIS 2018 and 9th international conference on EUropean Transnational Education, ICEUTE 2018
International Joint Conference: 13th International Conferenc...
收藏 引用
international Joint conference: 13th international conference on Soft Computing Models, SOCO 2018, 11th international conference on Computational Intelligence in Security for Information Systems, CISIS 2018 and 9th international conference on EUropean Transnational Education, ICEUTE 2018
the proceedings contain 60 papers. the special focus in this conference is on Soft Computing Models. the topics include: Experimental Study on Modified Radial-Based Oversampling;deep learning for Big data Time Series ...
来源: 评论
Assessing software quality of agile student projects by data-mining software repositories  11
Assessing software quality of agile student projects by data...
收藏 引用
11th international conference on Computer Supported Education, CSEDU 2019
作者: Koetter, Falko Kochanowski, Monika Kintz, Maximilien Kersjes, Benedikt Bogicevic, Ivan Wagner, Stefan Fraunhofer Institute of Industrial Engineering Nobelstr. 12 Stuttgart Germany Institute of Software Technology University of Stuttgart Universitätsstr. 38 Stuttgart Germany
Group student software projects are important in computer science education. Students are encouraged to self-organize and learn technical skills, preparing them for real life software development. However, the project... 详细信息
来源: 评论
Event-Driven data Pipeline for Network Management Systems
Event-Driven Data Pipeline for Network Management Systems
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: Ganesan Ponnuswami Sriram Kailasam Dileep Aroor Dinesh School of Computing and Electrical Engineering Indian Institute of Technology Mandi Himachal Pradesh India
Developing an event-driven applications for network management systems(NMS) requires data-wrangling operations to be performed in a data pipeline with low latency and high throughput. data stream processing engines(SP... 详细信息
来源: 评论