咨询与建议

限定检索结果

文献类型

  • 7,033 篇 会议
  • 48 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 7,094 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,888 篇 工学
    • 4,081 篇 计算机科学与技术...
    • 2,508 篇 软件工程
    • 1,041 篇 信息与通信工程
    • 787 篇 控制科学与工程
    • 662 篇 生物工程
    • 632 篇 电气工程
    • 423 篇 生物医学工程(可授...
    • 284 篇 交通运输工程
    • 280 篇 机械工程
    • 225 篇 仪器科学与技术
    • 224 篇 安全科学与工程
    • 205 篇 建筑学
    • 195 篇 动力工程及工程热...
    • 183 篇 光学工程
    • 166 篇 化学工程与技术
    • 153 篇 土木工程
  • 1,886 篇 理学
    • 1,057 篇 数学
    • 717 篇 生物学
    • 440 篇 统计学(可授理学、...
    • 280 篇 物理学
    • 252 篇 系统科学
    • 140 篇 化学
  • 1,142 篇 管理学
    • 651 篇 管理科学与工程(可...
    • 577 篇 图书情报与档案管...
    • 313 篇 工商管理
  • 405 篇 医学
    • 351 篇 临床医学
    • 295 篇 基础医学(可授医学...
    • 188 篇 药学(可授医学、理...
  • 242 篇 教育学
    • 241 篇 教育学
  • 209 篇 法学
    • 195 篇 社会学
  • 119 篇 农学
  • 110 篇 经济学
  • 50 篇 文学
  • 7 篇 艺术学
  • 5 篇 军事学

主题

  • 553 篇 machine learning
  • 452 篇 deep learning
  • 264 篇 training
  • 253 篇 data mining
  • 234 篇 data models
  • 219 篇 feature extracti...
  • 214 篇 accuracy
  • 183 篇 support vector m...
  • 178 篇 predictive model...
  • 138 篇 neural networks
  • 136 篇 machine learning...
  • 130 篇 computational mo...
  • 120 篇 reinforcement le...
  • 108 篇 convolutional ne...
  • 102 篇 real-time system...
  • 92 篇 forecasting
  • 90 篇 learning systems
  • 87 篇 transfer learnin...
  • 86 篇 big data
  • 78 篇 internet of thin...

机构

  • 69 篇 chitkara univers...
  • 17 篇 school of electr...
  • 15 篇 computer science...
  • 14 篇 harbin engineeri...
  • 13 篇 graphic era hill...
  • 12 篇 building civil a...
  • 12 篇 uttaranchal inst...
  • 12 篇 computer science...
  • 11 篇 university of ch...
  • 10 篇 school of electr...
  • 10 篇 school of comput...
  • 10 篇 graphic era deem...
  • 10 篇 school of electr...
  • 10 篇 yonsei univ dept...
  • 9 篇 wuhan university...
  • 9 篇 univ chinese aca...
  • 8 篇 school of remote...
  • 8 篇 school of inform...
  • 7 篇 university of sa...
  • 7 篇 microsoft resear...

作者

  • 17 篇 kukreja vinay
  • 15 篇 vinay kukreja
  • 13 篇 yin hujun
  • 12 篇 liu yang
  • 12 篇 corchado emilio
  • 11 篇 mehta shiva
  • 10 篇 shiva mehta
  • 10 篇 cho sung-bae
  • 9 篇 notsu akira
  • 9 篇 silva catarina
  • 9 篇 alhajj reda
  • 7 篇 ksieniewicz pawe...
  • 7 篇 hammer barbara
  • 7 篇 zhang byoung-tak
  • 7 篇 wozniak michal
  • 7 篇 hussain abir
  • 7 篇 soubra hassan
  • 7 篇 huang de-shuang
  • 7 篇 camacho david
  • 6 篇 tang ke

语言

  • 6,912 篇 英文
  • 171 篇 其他
  • 15 篇 中文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"任意字段=11th International Conference on Intelligent Data Engineering and Automated Learning"
7094 条 记 录,以下是4941-4950 订阅
排序:
Cost Sensitive Matrix Factorization for Face Recognition  1
收藏 引用
18th international conference on intelligent data engineering and automated learning (IDEAL)
作者: Wan, Jianwu Yang, Ming Wang, Hongyuan Changzhou Univ Sch Informat Sci & Engn Changzhou Peoples R China Nanjing Normal Univ Sch Comp Sci & Technol Nanjing Jiangsu Peoples R China
In this paper, we propose a cost sensitive matrix factorization (CSMF) for face recognition. To make the face representation cost sensitive, CSMF adopts a more flexible feature embedding strategy. It contains two main... 详细信息
来源: 评论
Understanding Matching data through their Partial Components  18th
Understanding Matching Data Through Their Partial Components
收藏 引用
18th international conference on intelligent data engineering and automated learning (IDEAL)
作者: Alvarez de Toledo, Pablo Nunez, Fernando Usabiaga, Carlos Tallon-Ballesteros, Antonio J. Univ Seville Dept Ind Org & Business Management 1 Seville Spain Pablo Olavide Univ Dept Econ Quantitat Methods & Econ Hist Seville Spain Univ Seville Dept Languages & Comp Syst Seville Spain
In this paper we develop a previous work on matching data [2], inserting their contents in the more general framework of contingency tables and dealing with the dimensions problem generated by the combination of the m... 详细信息
来源: 评论
Energy Cooperation in Co MP System Based on Q-learning  11
Energy Cooperation in Co MP System Based on Q-learning
收藏 引用
2017 11th IEEE international conference on Anti-counterfeiting,Security,and Identification(ASID)
作者: Yabo Lv Baogang Li Yuanbin Yao Dandan Guo Department of Electric and Communication Engineering North China Electric Power University
this paper studies energy harvesting communication systems in which the base station sends data packets using the energy harvested from the surrounding natural environment. We assume that at each time slot only inform... 详细信息
来源: 评论
Anonymous data Sharing Between Organisations with Elliptic Curve Cryptography  16
Anonymous Data Sharing Between Organisations with Elliptic C...
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in Computing and Communications / the 11th IEEE international conference on Big data Science and engineering / the 14th IEEE international conference on Embedded Software and Systems
作者: Will, Mark A. Ko, Ryan K. L. Schlickmann, Silvino J. Univ Waikato Cyber Secur Lab Hamilton New Zealand INTERPOL Global Complex Innovat IGCI Innovat Directorate Singapore Singapore
Promoting data sharing between organisations is challenging, without the added concerns over having actions traced. Even with encrypted search capabilities, the entities digital location and downloaded information can... 详细信息
来源: 评论
Co-clustering with Manifold and Double Sparse Representation  18th
Co-clustering with Manifold and Double Sparse Representation
收藏 引用
18th international conference on intelligent data engineering and automated learning (IDEAL)
作者: Li, Fang Zhang, Sanyuan Zhejiang Univ Coll Comp Sci & Technol Hangzhou Zhejiang Peoples R China Guilin Univ Elect Technol Key Lab Image & Graph Intelligent Proc Higher Edu Guilin Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Trusted Software Guilin Peoples R China
Clustering is a fundamental tool that has been applied in dealing with huge volumes of text documents and images. For extracting relevant information from the enormous volumes of available data, some co-clustering alg... 详细信息
来源: 评论
Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks
Malware Detection in Cloud Infrastructures Using Convolution...
收藏 引用
IEEE international conference on Cloud Computing, CLOUD
作者: Mahmoud Abdelsalam Ram Krishnan Yufei Huang Ravi Sandhu Department of Computer Science Institute for Cyber Security and Center for Security and Privacy Enhanced Cloud Computing Department of Electrical and Computer Engineering University of Texas at San Antonio San Antonio Texas USA
A major challenge in Infrastructure as a Service (IaaS) clouds is its exposure to malware. Malware can spread rapidly within a datacenter and can cause major disruption to a cloud service provider and its clients. thi... 详细信息
来源: 评论
Deep learning Approach for QRS Wave Detection in ECG Monitoring  11
Deep Learning Approach for QRS Wave Detection in ECG Monitor...
收藏 引用
11th IEEE international conference on Application of Information and Communication Technologies (AICT)
作者: Mitrokhin, Maxim Kuzmin, Andrey Mitrokhina, Natalia Zakharov, Sergey Rovnyagin, Mikhail Penza State Univ Polytech Inst Penza Russia Natl Res Nucl Univ Intelligent Cybernet Syst Inst MEPhI Moscow Russia
Paper describes an approach of deep learning for QRS wave detection for using in mobile heart monitoring systems. Authors analyze a deep learning approach and its advantages in the field of feature extraction and dete... 详细信息
来源: 评论
Sparse Representation Based on Discriminant Locality Preserving Dictionary learning for Face Recognition  18th
Sparse Representation Based on Discriminant Locality Preserv...
收藏 引用
18th international conference on intelligent data engineering and automated learning (IDEAL)
作者: Feng, Guang Li, Hengjian Dong, Jiwen Chen, Xi Univ Jinan Sch Informat Sci & Engn Jinan 250022 Shandong Peoples R China Shandong Prov Key Lab Network Based Intelligent C Jinan 250022 Shandong Peoples R China Guizhou Normal Univ Sch Bigdata & Comp Sci Guiyang Guizhou Peoples R China
A novel discriminant locality preserving dictionary learning (DLPDL) algorithm for face recognition is proposed in this paper. In order to achieve better performance and less computation, dimensionality reduction is a... 详细信息
来源: 评论
A Pay as You Use Resource Security Provision Approach Based on data Graph, Information Graph and Knowledge Graph  18th
A Pay as You Use Resource Security Provision Approach Based ...
收藏 引用
18th international conference on intelligent data engineering and automated learning (IDEAL)
作者: Shao, Lixu Duan, Yucong Cui, Lizhen Zou, Quan Sun, Xiaobing Hainan Univ Coll Informat Sci & Technol State Key Lab Marine Resource Utilizat South Chin Haikou Hainan Peoples R China Shandong Univ Coll Comp Sci & Technol Jinan Shandong Peoples R China Tianjin Univ Coll Comp Sci Tianjin Peoples R China Yangzhou Univ Sch Informat Engn Yangzhou Jiangsu Peoples R China
With the development of data mining technology, lack of private resource protection has become a serious challenge. We propose to clarify the expression of Knowledge Graph in three layers including data Graph, Informa... 详细信息
来源: 评论
Consensus-based Parallel Algorithm for Robust Convex Optimization with Scenario Approach in Colored Network  18th
Consensus-based Parallel Algorithm for Robust Convex Optimiz...
收藏 引用
18th international conference on intelligent data engineering and automated learning (IDEAL)
作者: Feng, Fan Cao, Feilong China Jiliang Univ Coll Sci Hangzhou 310018 Zhejiang Peoples R China
this paper mainly proposes an parallel distributed learning algorithm for the robust convex optimization (RCO). Firstly, the scenario approach is used to transform RCO into its probabilistic approximation Scenario Pro... 详细信息
来源: 评论