咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 488 篇 电气工程
    • 437 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 537 篇 理学
    • 279 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 108 篇 系统科学
    • 108 篇 统计学(可授理学、...
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是391-400 订阅
排序:
Target Recognition and Grab Location Based on machine Vision and Deep learning  10th
Target Recognition and Grab Location Based on Machine Vision...
收藏 引用
10th international conference on Frontier computing, FC 2020
作者: Yao, Jin Feng, Jing Liu, Yuzhou Chen, Licheng You, Rentang Sun, Jiaxing Zhang, Xiaofei Xiang, Yongzhi Chen, Xiaoyun Li, Hui School of Mechanical and Material Engineering Wuzhou University Guangxi Wuzhou543000 China
The application of target recognition and sorting has greatly improved the level of industrial automation, liberated human hands, and effectively saved resources and improved efficiency. The purpose of this paper is t... 详细信息
来源: 评论
Intrusion Detection System Using soft computing Techniques: A Review  1
收藏 引用
1st international conference on Data Science, machine learning and Applications, 2019
作者: Agarwal, Pooja Dr. Shakuntala Misra National Rehabilitation University LucknowUttar Pradesh India
In the proposed study, the past research work has been reviewed which was based on soft computing techniques for IDS and played a better role to detect the intrusion in computer networks. This study reviewed various r... 详细信息
来源: 评论
A PHP and JSP Web Shell Detection System With Text Processing Based On machine learning  19
A PHP and JSP Web Shell Detection System With Text Processin...
收藏 引用
19th IEEE international conference on Trust, Security and Privacy in computing and Communications (IEEE TrustCom)
作者: Zhang, Han Liu, Ming Yue, Zihan Xue, Zhi Shi, Yong He, Xiangjian Shanghai Jiao Tong Univ Shanghai Peoples R China Univ Technol Sydney Sydney NSW Australia
Web shell is one of the most common network attack methods, and traditional detection methods may not detect complex and flexible variants of web shell attacks. In this paper, we present a comprehensive detection syst... 详细信息
来源: 评论
HOPFIELD NETWORKS IS ALL YOU NEED  9
HOPFIELD NETWORKS IS ALL YOU NEED
收藏 引用
9th international conference on learning Representations, ICLR 2021
作者: Ramsauer, Hubert Schäfl, Bernhard Lehner, Johannes Seidl, Philipp Widrich, Michael Adler, Thomas Gruber, Lukas Holzleitner, Markus Kreil, David Kopp, Michael Klambauer, Günter Brandstetter, Johannes Hochreiter, Sepp ELLIS Unit Linz LIT AI Lab Institute for Machine Learning Johannes Kepler University Linz Austria Austria
We introduce a modern Hopfield network with continuous states and a corresponding update rule. The new Hopfield network can store exponentially (with the dimension of the associative space) many patterns, retrieves th... 详细信息
来源: 评论
Face Reconstruction with Generative Adversarial Network  2019
Face Reconstruction with Generative Adversarial Network
收藏 引用
3rd international conference on machine learning and soft computing (icmlsc)
作者: Putra, Dino Hariatma Basaruddin, T. Univ Indonesia Fac Comp Sci Depok Indonesia
Generative Adversarial Network (GAN) is a framework of deep learning in generative models. The generative model aims to synthesize a new data so that it has a distribution of distribution according to the original dat... 详细信息
来源: 评论
Unsupervised Description of 3D Shapes by Superquadrics Using Deep learning  1
收藏 引用
international conference on Computer Vision and machine Intelligence, CVMI 2022
作者: Eltaher, Mahmoud Breuß, Michael Brandenburg University of Technology Cottbus Germany Al-Azhar University Cairo Egypt
The decomposition of 3D shapes into simple yet representative components is a very intriguing topic in computer vision as it is very useful for many possible applications. Superquadrics may be used with benefit to obt... 详细信息
来源: 评论
Time Series Data Augmentation and Dropout Roles in Deep learning Applied to Fall Detection  15th
Time Series Data Augmentation and Dropout Roles in Deep Lear...
收藏 引用
15th international conference on soft computing Models in Industrial and Environmental Applications, SOCO 2020
作者: González, Enol García Villar, José Ramón de la Cal, Enrique Computer Science Department University of Oviedo Oviedo Spain
Fall Detection is one of the most interesting and challenging research topics in the world today because of its implications in society and also because the complexity of processing Time Series (TS). Plenty of researc... 详细信息
来源: 评论
Enhancing Explainability of machine learning-based Intrusion Detection Systems
Enhancing Explainability of Machine Learning-based Intrusion...
收藏 引用
IEEE international conference on Research, Innovation and Vision for the Future
作者: Thi-Ngoc-Phuc Ho Thuy-Linh Nguyen Xuan-Ha Nguyen Kim-Hung Le University of Information Technology Ho Chi Minh City Vietnam Vietnam National University Ho Chi Minh City Vietnam
Over the past decade, the anomaly-based Intrusion Detection System (IDS) has established itself with many studies proving its effectiveness, especially with deep learning models. However, these models have become more... 详细信息
来源: 评论
Optimizing Digital Coupon Assignment Using Constrained Reinforcement learning  2019
Optimizing Digital Coupon Assignment Using Constrained Reinf...
收藏 引用
3rd international conference on machine learning and soft computing (icmlsc)
作者: Yao, Xinlin Lu, Xianghua Nanjing Univ Sci & Technol Nanjing Jiangsu Peoples R China Fudan Univ Sch Management Shanghai Peoples R China
Coupon marketing is a traditional but effective way to retain customers and stimulate new purchases. Recently, digital coupons have been widely used in e-commerce and distributed to almost everyone. However, the decis... 详细信息
来源: 评论
Utilizing Spatio-temporal Satellite Images and machine learning to Examine the Impacts of Changing Land Use and Land Cover on Sohar City
Utilizing Spatio-temporal Satellite Images and Machine Learn...
收藏 引用
Information Technology (ACIT)
作者: Muhammad Shafi Faculty of Computing and Information Technology Sohar University Sohar Oman
The growing urbanization of cities and towns in the Gulf Cooperation Council (GCC) states as a result of socioeconomic change has primarily resulted in a great deal of strain on the few natural resources and the loss ...
来源: 评论