咨询与建议

限定检索结果

文献类型

  • 2,644 篇 会议
  • 61 篇 期刊文献
  • 38 册 图书
  • 3 篇 学位论文

馆藏范围

  • 2,746 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 488 篇 电气工程
    • 437 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 167 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 56 篇 仪器科学与技术
    • 55 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 光学工程
    • 26 篇 动力工程及工程热...
  • 537 篇 理学
    • 279 篇 数学
    • 187 篇 生物学
    • 114 篇 物理学
    • 108 篇 系统科学
    • 108 篇 统计学(可授理学、...
    • 54 篇 化学
  • 266 篇 管理学
    • 141 篇 图书情报与档案管...
    • 136 篇 管理科学与工程(可...
    • 64 篇 工商管理
  • 146 篇 医学
    • 122 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 36 篇 药学(可授医学、理...
    • 27 篇 特种医学
    • 25 篇 医学技术(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 35 篇 教育学
    • 28 篇 教育学
  • 22 篇 经济学
  • 22 篇 农学
  • 8 篇 文学
  • 5 篇 艺术学
  • 1 篇 军事学

主题

  • 897 篇 machine learning
  • 218 篇 deep learning
  • 123 篇 feature extracti...
  • 106 篇 training
  • 103 篇 machine learning...
  • 85 篇 classification
  • 72 篇 cloud computing
  • 70 篇 support vector m...
  • 70 篇 neural networks
  • 62 篇 big data
  • 60 篇 data mining
  • 60 篇 computational mo...
  • 53 篇 artificial intel...
  • 49 篇 sentiment analys...
  • 45 篇 predictive model...
  • 43 篇 intrusion detect...
  • 40 篇 reinforcement le...
  • 38 篇 data models
  • 35 篇 neural network
  • 34 篇 internet of thin...

机构

  • 12 篇 univ chinese aca...
  • 11 篇 institute of mac...
  • 7 篇 school of comput...
  • 7 篇 fudan university
  • 7 篇 school of electr...
  • 7 篇 guangxi academy ...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 tno technical sc...
  • 6 篇 université de st...
  • 6 篇 nikhef national ...
  • 6 篇 university würzb...
  • 6 篇 université de ha...
  • 6 篇 university of jo...
  • 6 篇 university moham...
  • 6 篇 astrocent nicola...

作者

  • 14 篇 qin xiao
  • 8 篇 yuan chang-an
  • 8 篇 huang de-shuang
  • 7 篇 chen hao
  • 7 篇 yuan changan
  • 7 篇 wu hongjie
  • 7 篇 zhao xingming
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.

语言

  • 2,639 篇 英文
  • 69 篇 中文
  • 39 篇 其他
检索条件"任意字段=2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017"
2746 条 记 录,以下是61-70 订阅
排序:
A New Computational Approach to the Levenberg-Marquardt learning Algorithm  21st
A New Computational Approach to the Levenberg-Marquardt Lear...
收藏 引用
21st international conference on Artificial Intelligence and soft computing (ICAISC)
作者: Bilski, Jaroslaw Kowalczyk, Barosz Smolag, Jacek Czestochowa Tech Univ Inst Computat Intelligence Czestochowa Poland
A new parallel computational approach to the Levenberg-Marquardt learning algorithm is presented. The proposed solution is based on the AVX instructions to effectively reduce the high computational load of this algori... 详细信息
来源: 评论
Network Intrusion Detection Using Weighted Voting Ensemble Deep learning Model  11
Network Intrusion Detection Using Weighted Voting Ensemble D...
收藏 引用
11th international conference on Electrical, Electronic and computing Engineering, IcETRAN 2024
作者: Milosevic, Marija Ciric, Vladimir Milentijevic, Ivan University of Nis Faculty of Electronic Engineering Nis Serbia
System and network security have become one of the main considerations for the system or network design, implementation and maintenance. The increased volume of traffic and the ever-changing form of internet communica... 详细信息
来源: 评论
DDoS Attack Detection on Cloud computing Services using Algorithms of machine learning: Survey  7
DDoS Attack Detection on Cloud Computing Services using Algo...
收藏 引用
7th international conference on computing Methodologies and Communication, ICCMC 2023
作者: Sathvika, Chilla Satwika, Vuyyuru Sruthi, Yarrapothu Geethika, Maddali Bulla, Suneetha Swathi, K. Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram India
Nowadays cloud computing services have become the most popular internet-based computing and many organizations use their services. Due to this, many cyberattacks are happening in the cloud. One of those attacks is the... 详细信息
来源: 评论
A machine-learning Approach to Classify Depressive Posts from Reddit Social Media
A Machine-Learning Approach to Classify Depressive Posts fro...
收藏 引用
2023 international conference on Next-Generation computing, IoT and machine learning, NCIM 2023
作者: Quader, Adib Wahid Jamil, Md Shafayet Uddin, Mohammad Irfan Patwary, Muhammed J. A. International Islamic University Department of Computer Science & Engineering Chittagong Bangladesh
Depression leading to suicide has become a major concern in our society. It's high time to investigate the reason behind it. As numerous people are expressing their concerns regarding depression on Reddit, such po... 详细信息
来源: 评论
Sparse-learning-based High-order Dynamic Functional Connectivity Networks for Brain Disease Classification  23
Sparse-learning-based High-order Dynamic Functional Connecti...
收藏 引用
7th international conference on machine learning and soft computing, icmlsc 2023
作者: Wang, Jianhui Jie, Biao Zhang, Xingyu Li, Wen Wu, Zhaoxiang Yang, Yang School of Computer and Information Anhui Normal University Anhui Wuhu China
Dynamic functional connectivity network (DFCN) derived from resting-state functional magnetic resonance imaging (rs-fMRI), which characterizes the dynamic interaction between brain regions, has been applied to classif... 详细信息
来源: 评论
Detection of Abductors Using machine learning Algorithms  1
收藏 引用
6th international conference on soft computing and Signal Processing, ICSCSP 2023
作者: Baba, Mohammad Asif Varun, Thupakula Sai Shalivahana, Madasu Shaik, Subhani Iyengar, N. Ch. Sriman Narayana Telangana Hyderabad India
The objective of this project is to help the police personnel and higher authorities to track down missing people quickly. The usual process to track down a missing person is using different types of investigation met... 详细信息
来源: 评论
A Long-Short Term Memory Model-based approach for smart intrusion detection systems  15
A Long-Short Term Memory Model-based approach for smart intr...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Reddy, Dasari Deepthi Himabindu, G. School of Technology Dept. of Cse Telangana Hyderabad India
Academics interested in developing intrusion detection systems (IDS) gathered the CSE-CIC IDS datasets in 2017 and 2018. A recent study utilizing these datasets revealed the need to address their unbalanced distributi... 详细信息
来源: 评论
Deep learning-Enabled Prediction of Daily Solar Irradiance from Simulated Climate Data  23
Deep Learning-Enabled Prediction of Daily Solar Irradiance f...
收藏 引用
7th international conference on machine learning and soft computing, icmlsc 2023
作者: Gerges, Firas Boufadel, Michel C. Bou-Zeid, Elie Nassif, Hani Wang, Jason T. L. New Jersey Institute of Technology United States Princeton University United States Rutgers University - New Brunswick United States
Solar Irradiance depicts the light energy produced by the Sun that hits the Earth. This energy is important for renewable energy generation and is intrinsically fluctuating. Forecasting solar irradiance is crucial for... 详细信息
来源: 评论
Optimizing Crime Prevention Strategies Using machine learning Models  1
Optimizing Crime Prevention Strategies Using Machine Learnin...
收藏 引用
1st international conference for Women in computing, InCoWoCo 2024
作者: Ajitha, V. Sherly, S. Irin Venitha, E. Senthilkumar, M. Vishalakshi, N. Bhavyadevi Prathipa, R. Nalla Malla Reddy Engineering College Department of CSE Hyderabad India Department of CSE Chennai India Rajalakshmi Institute of Technology Department of CSE Chennai India Kongunadu College of Engineering and Technology Department of AI & DS Thottiyam Trichy India SOET CMR University Department of CSE Bengaluru India Panimalar Engineering College Department of ECE Chennai India
Crime rates are on the rise, necessitating effective strategies for prevention. machine learning has emerged as a promising tool for forecasting crime incidents due to its ability to learn from data autonomously. The ... 详细信息
来源: 评论
ESC: Exploration with soft Commonsense Constraints for Zero-shot Object Navigation  40
ESC: Exploration with Soft Commonsense Constraints for Zero-...
收藏 引用
40th international conference on machine learning
作者: Zhou, Kaiwen Zheng, Kaizhi Pryor, Connor Shen, Yilin Jin, Hongxia Getoor, Lise Wang, Xin Eric Univ Calif Santa Cruz Santa Cruz CA 95064 USA Samsung Res Amer Mountain View CA USA
The ability to accurately locate and navigate to a specific object is a crucial capability for embodied agents that operate in the real world and interact with objects to complete tasks. Such object navigation tasks u... 详细信息
来源: 评论