咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 488 篇 电气工程
    • 437 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 537 篇 理学
    • 279 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 108 篇 系统科学
    • 108 篇 统计学(可授理学、...
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是151-160 订阅
排序:
One-Dimensional Dilated Hypothesized learning Method for Intrusion Detection System Under Constraint Resource Environment  2
One-Dimensional Dilated Hypothesized Learning Method for Int...
收藏 引用
2nd international conference on Advancements in Electrical, Electronics, Communication, computing and Automation, ICAECA 2023
作者: Shuriya, B. Umamaheswari, S. Rajendran, A. Sivaprakash, P. Ppg Institute of Technology Dept of Computer Science and Engineering Coimbatore India Kumaraguru College of Technology Dept of Electronics and Communication Engineering Coimbatore India Rathinam College of Arts and Science Dept of Computer Science and Engineering Coimbatore India
When a breach is discovered, intrusion detection systems can alert server administrators and researchers and channel packets for cyber security incidents. In complex systems, these reports are becoming uncontrollable.... 详细信息
来源: 评论
Training and Serving machine learning Models at Scale  20th
Training and Serving Machine Learning Models at Scale
收藏 引用
20th international conference on Service-Oriented computing (ICSOC)
作者: Baresi, Luciano Quattrocchi, Giovanni Politecn Milan Informaz Bioingn Dipartimento Elettron Milan Italy
In recent years, Web services are becoming more and more intelligent (e.g., in understanding user preferences) thanks to the integration of components that rely on machine learning (ML). Before users can interact (inf... 详细信息
来源: 评论
A Hybrid Deep learning Network for Skin Lesion Extraction  1
收藏 引用
14th international conference on soft computing and Pattern Recognition, SoCPaR 2022, and the 14th World Congress on Nature and Biologically Inspired computing, NaBIC 2022
作者: Rout, Ranjita Parida, Priyadarsan Dash, Sonali Department of Electronics and Communication Engineering School of Engineering and Technology GIET University Odisha Gunupur India Department of Electronics and Communication Engineering Chandigarh University Punjab Chandigarh India
Melanoma is one of the dangerous skin cancer worldwide. Manual detection generally takes more time and difficult to obtain accurate results due to various factors such as change in shape, size and color. In the recent... 详细信息
来源: 评论
machine learning-based Inversion of Wireless Signals for Real-Time Gesture Recognition  12
Machine Learning-based Inversion of Wireless Signals for Rea...
收藏 引用
12th international conference on Modern Circuits and Systems Technologies, MOCAST 2023
作者: Polo, Alessandro Capra, Federico Lusa, Samantha Rocca, Paolo Salas-Sanchez, Aaron A. Salucci, Marco ELEDIA@UniTN - University of Trento DICAM ELEDIA Research Center Trento Italy ELEDIA@XIDIAN Xidian University ELEDIA Research Center Xi'an China
This work presents the latest results on the development and experimental validation of a human-machine interaction systems based on the use of Wi-Fi commodity devices and the processing of the channel state informati... 详细信息
来源: 评论
Evaluation of Vietnamese Speech Recognition Platforms  21
Evaluation of Vietnamese Speech Recognition Platforms
收藏 引用
5th international conference on machine learning and soft computing, icmlsc 2021
作者: Diep, Hai Thanh Nguyen, Thi-My-Thanh Le, Bich Ngoc Dao, Quy Xuan Eastern International University Viet Nam
The purpose of this paper is to evaluate the performance of Vietnamese speech recognition systems provided by top Vietnamese companies such as Vais, Vtcc, Fpt, and Google. This paper presents the results in applying V... 详细信息
来源: 评论
Leveraging Fine-Tuned LightGBM for Advanced AI-Driven Android Malware Detection
Leveraging Fine-Tuned LightGBM for Advanced AI-Driven Androi...
收藏 引用
Advancements in Electrical, Electronics, Communication, computing and Automation (ICAECA), international conference on
作者: Rajasekar Kanniappan V. Jamuna Anna University Chennai Tamil Nadu India Department of Electrical and Electronics Engineering Jerusalem College of Engineering Chennai Tamil Nadu India
Increasing instances of cyber threats, specifically malware, require faster creation of proper detection systems that utilize higher learning algorithms. This paper examines the effectiveness of an AI-malware detectio... 详细信息
来源: 评论
Differential Residual learning for Facial Expression Recognition  21
Differential Residual Learning for Facial Expression Recogni...
收藏 引用
5th international conference on machine learning and soft computing, icmlsc 2021
作者: Pu, Lipeng Zhu, Lingyun Chongqing University of Technology Liangjiang International College China
The facial expression recognition algorithm based on convolution neural network (Convolutional Neural Network) still has the problem of imperfect feature point extraction. Therefore, a facial expression recognition al... 详细信息
来源: 评论
ADVANCING INTRUSION DETECTION WITH ML AND DEEP learning: A COMPARATIVE APPROACH
ADVANCING INTRUSION DETECTION WITH ML AND DEEP LEARNING: A C...
收藏 引用
2025 international conference on Energy, Power, Environment, Control and computing, ICEPECC 2025
作者: Shahid, Mashaal Arafat, Syed Yasser Tariq, Fahad Department of CSIT Mirpur University of Science and Technology AJ&K Pakistan Department of Training Fauji Foundation Head office Rawalpindi Pakistan
In network security, Intrusion Detection Systems (IDS) is increasingly important due to rise in cyber-attacks. To ensure accurate detection and prevention, IDS leverages machine learning (ML) and Deep learning (DL) al... 详细信息
来源: 评论
Toward Unpaired Multi-modal Medical Image Segmentation via learning Structured Semantic Consistency  6
Toward Unpaired Multi-modal Medical Image Segmentation via L...
收藏 引用
6th international conference on Medical Imaging with Deep learning (MIDL)
作者: Yang, Jie Zhu, Ye Wang, Chaoqun Li, Zhen Zhang, Ruimao Chinese Univ Hong Kong Shenzhen Res Inst Big Data Shenzhen Peoples R China
Integrating multi-modal data to promote medical image analysis has recently gained great attention. This paper presents a novel scheme to learn the mutual benefits of different modalities to achieve better segmentatio... 详细信息
来源: 评论
A Sublinear-Regret Reinforcement learning Algorithm on Constrained Markov Decision Processes with reset action  2020
A Sublinear-Regret Reinforcement Learning Algorithm on Const...
收藏 引用
4th international conference on machine learning and soft computing (icmlsc)
作者: Watanabe, Takashi Sakuragawa, Takashi Kyoto Univ Grad Sch Human & Environm Studies Kyoto Japan
In this paper, we study model-based reinforcement learning in an unknown constrained Markov Decision Processes (CMDPs) with reset action. We propose an algorithm, Constrained-UCRL, which uses confidence interval like ... 详细信息
来源: 评论