咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 488 篇 电气工程
    • 437 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 537 篇 理学
    • 279 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 108 篇 系统科学
    • 108 篇 统计学(可授理学、...
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是231-240 订阅
排序:
YOLOv3 with Asymmetric Intersection over Union Based Loss Function for Human Detection  21
YOLOv3 with Asymmetric Intersection over Union Based Loss Fu...
收藏 引用
5th international conference on machine learning and soft computing, icmlsc 2021
作者: Zhu, Heng Yang, Dongchao Huang, Geng Wu, Qingyuan Li, Teng Tao, Bo State Key Laboratory of Tribology Tsinghua University Beijing China
In order to improve the performance of the target detection model based on convolutional neural network, and make the bounding box representing the object location contain as complete original target information as po... 详细信息
来源: 评论
Augmented Analytics an Innovative Paradigm  13th
Augmented Analytics an Innovative Paradigm
收藏 引用
13th international conference on Innovations in Bio-Inspired computing and Applications, IBICA 2022, and 12th World Congress on Information and Communication Technologies, WICT 2022
作者: Guarda, Teresa Lopes, Isabel Universidad Estatal Península de Santa Elena La Libertad Ecuador CIST – Centro de Investigación en Sistemas y Telecomunicaciones Universidad Estatal Península de Santa Elena La Libertad Ecuador Algoritmi Centre Minho University Guimarães Portugal Instituto Politécnico de Bragança Bragança Portugal UNIAG Instituto Politécnico de Bragança Bragança Portugal
Business intelligence (BI) and analytics are a set of techniques, methodologies, and tools used in the analysis of business data, which allow users (decision makers) to have a clearer view of the market, leveraging th... 详细信息
来源: 评论
machine learning-Based Optimization of Network Security Protocols for Enhanced Threat Detection
Machine Learning-Based Optimization of Network Security Prot...
收藏 引用
Device Intelligence, computing and Communication Technologies, (DICCT), international conference on
作者: S. Palani A. Muthukumaravel Department of Computer Science Bharath Institute of Higher Education and Research Chennai Tamilnadu India Faculty of Arts and Science Bharath Institute of Higher Education and Research Chennai Tamilnadu India
Current cyber threats are relatively sophisticated, and this has put pressure on traditional network security protocols. It proposes an extended machine learning methodology using a supervised Random Forest algorithm ... 详细信息
来源: 评论
Customizable DDoS Attack Data Generation in SDN Environments for Enhanced machine learning Detection Models  5
Customizable DDoS Attack Data Generation in SDN Environments...
收藏 引用
5th international conference on Advanced Research in computing, ICARC 2025
作者: Gayantha, Nadeera Rajapakse, Chathura Senanayake, Janaka University of Kelaniya Dept. of Industrial Management Sri Lanka Robert Gordon University School of Computing Engineering and Technology Aberdeen United Kingdom
Distributed Denial of Service (DDoS) attacks are a critical threat to the security and reliability of software-Defined Networking (SDN) environments. Existing datasets for training machine learning (ML) models, such a... 详细信息
来源: 评论
A Peer learning Method for Building Robust Text Classification Models
A Peer Learning Method for Building Robust Text Classificati...
收藏 引用
IEEE international conference on Big Data and Smart computing (BigComp)
作者: Jeon, Hyun-Kyu Cheong, Yun-Gyung Sungkyunkwan Univ Dept AI Suwon South Korea Sungkyunkwan Univ Dept AI Convergence Program Social Innovat Suwon South Korea
Classilication is an essential task in many practical problems. A machine learning based classification model is built to minimize the error between actual labels and predicted labels generated by the model. When the ... 详细信息
来源: 评论
Identification of Risk Factors for Mortality after Myocardial Infarction Using machine learning Methods  24
Identification of Risk Factors for Mortality after Myocardia...
收藏 引用
24th international conference on soft computing and Measurements, SCM 2021
作者: Kashirina, Irina L. Firyulina, Maria A. Bondarenko, Yulia V. Desyatirikova, Elena N. Efimova, Olga E. Chernenkaya, Liudmila V. Voronezh State University Voronezh Russia Voronezh State Technical University Voronezh Russia Peter the Great St. Petersburg Polytechnic University Saint Petersburg Russia
The article presents the results of a study on predicting the risk of mortality after myocardial infarction based on depersonalized data, including a description of 11457 cases of heart attacks in the Voronezh region ... 详细信息
来源: 评论
Fracture Modeling Method of Asmari Formation Carbonate Reservoir in G Oilfield, Middle East  13th
Fracture Modeling Method of Asmari Formation Carbonate Reser...
收藏 引用
13th international Field Exploration and Development conference, IFEDC 2023
作者: Sun, Fu-Ting Hui, Chen Tong, Yi Da, Li-Na CNOOC International Limited Beijing China
Fractures are developed in the carbonate reservoir of Asmari Formation in G oilfield in the Middle East, which aggravates the heterogeneity of the reservoir and is an important factor affecting the productivity of pro... 详细信息
来源: 评论
Deep Feature learning Network for Vehicle Retrieval  21
Deep Feature Learning Network for Vehicle Retrieval
收藏 引用
5th international conference on machine learning and soft computing, icmlsc 2021
作者: Phung, Trang T.T. Ly, Ngoc Q. Vo, Trung T. Ho, Minh T.N. VNUHCM-University of Science Ho Chi Minh City Viet Nam Vietnam and Saigon University Ho Chi Minh City Viet Nam SaiGon University Viet Nam
Vehicle Retrieval plays a very important role for traffic surveillance system which has been being developed in recent decades with innovative methods from traditional approach to deep learning approach. However, ther... 详细信息
来源: 评论
Research and application of data-driven carbon emission analysis and prediction  2
Research and application of data-driven carbon emission anal...
收藏 引用
2nd international conference on Cloud computing, Big Data Application and software Engineering, CBASE 2023
作者: Wei, Dongmei Meng, Dan Southwest University of Finance and Economics School of Management Science and Engineering Chengdu611130 China Xihua University School of Computer and Software Engineering Chengdu610039 China
The issue of carbon emissions has become an important policy direction for countries around the world to promote healthy socio-economic development and address climate change issues. This article conducts feature extr... 详细信息
来源: 评论
machine learning Approach for Mitigating Security Threats in IoT Environment  5
Machine Learning Approach for Mitigating Security Threats in...
收藏 引用
5th international conference on Inventive Research in computing Applications, ICIRCA 2023
作者: Saini, Harnit Bala, Saroj Ida, S.Jhansi Kumar, K. Suresh Swetha, Shankerpally Divyabarathi, P. Ajay Kumar Garg Engineering College Department of Cse Ghaziabad India Ajay Kumar Garg Engineering College Department of Mca Ghaziabad India R.M.K Engineering College Department of Computer Science and Business Systems Kavaraipettai India Kongu Engineering College Department of Cse Erode India Cvr College of Engineering Department of Information Technology Telangana India Bannari Amman Institute of Technology Department of Artificial Intelligence and Data Science Erode India
In today's world, a huge amount of data and information is transferred through wireless networks. The Internet of Things (IoT) is a complex network that consists of diverse sensors, devices, and things, which ofte... 详细信息
来源: 评论