咨询与建议

限定检索结果

文献类型

  • 5,626 篇 会议
  • 90 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 5,726 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,768 篇 工学
    • 2,326 篇 计算机科学与技术...
    • 1,324 篇 软件工程
    • 566 篇 信息与通信工程
    • 466 篇 电气工程
    • 200 篇 生物工程
    • 176 篇 控制科学与工程
    • 174 篇 生物医学工程(可授...
    • 109 篇 机械工程
    • 84 篇 交通运输工程
    • 83 篇 化学工程与技术
    • 81 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 70 篇 仪器科学与技术
    • 65 篇 动力工程及工程热...
    • 55 篇 安全科学与工程
    • 54 篇 土木工程
    • 52 篇 环境科学与工程(可...
  • 899 篇 理学
    • 478 篇 数学
    • 235 篇 生物学
    • 232 篇 物理学
    • 191 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 67 篇 化学
  • 589 篇 管理学
    • 326 篇 图书情报与档案管...
    • 307 篇 管理科学与工程(可...
    • 164 篇 工商管理
  • 290 篇 医学
    • 244 篇 临床医学
    • 144 篇 基础医学(可授医学...
    • 80 篇 药学(可授医学、理...
  • 76 篇 法学
    • 71 篇 社会学
  • 55 篇 经济学
  • 45 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 2 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 1,599 篇 data models
  • 534 篇 predictive model...
  • 529 篇 training
  • 498 篇 machine learning
  • 461 篇 data mining
  • 416 篇 big data
  • 404 篇 computational mo...
  • 343 篇 feature extracti...
  • 333 篇 task analysis
  • 326 篇 prediction algor...
  • 267 篇 deep learning
  • 255 篇 machine learning...
  • 245 篇 classification a...
  • 238 篇 analytical model...
  • 191 篇 clustering algor...
  • 190 篇 support vector m...
  • 182 篇 neural networks
  • 158 篇 natural language...
  • 142 篇 training data
  • 141 篇 mathematical mod...

机构

  • 19 篇 sun yat sen univ...
  • 19 篇 daffodil interna...
  • 12 篇 univ chinese aca...
  • 11 篇 tsinghua univers...
  • 11 篇 university of ch...
  • 11 篇 school of data a...
  • 10 篇 carnegie mellon ...
  • 9 篇 renmin univ chin...
  • 9 篇 lviv polytechnic...
  • 8 篇 shenzhen researc...
  • 7 篇 shanghai jiao to...
  • 7 篇 college of compu...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 7 篇 national univers...
  • 7 篇 harbin institute...
  • 7 篇 beijing key lab ...
  • 7 篇 natl univ def te...
  • 7 篇 renmin univ chin...
  • 6 篇 university of sc...

作者

  • 7 篇 li li
  • 7 篇 wang wei
  • 7 篇 xiao yanghua
  • 6 篇 wen ji-rong
  • 6 篇 cui bin
  • 6 篇 zhao wayne xin
  • 6 篇 ying liu
  • 6 篇 syed akhter hoss...
  • 5 篇 yang tong
  • 5 篇 liu yang
  • 5 篇 li zhang
  • 5 篇 jia weijia
  • 5 篇 chen liu
  • 5 篇 yang yang
  • 5 篇 xiao hongbo
  • 5 篇 nguyen trong-the
  • 5 篇 yu jie
  • 5 篇 albert bifet
  • 5 篇 wang bin
  • 5 篇 carlos ordonez

语言

  • 5,682 篇 英文
  • 36 篇 其他
  • 9 篇 中文
  • 2 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=2020 International Conference on Data Processing Algorithms and Models, ICDPAM 2020"
5726 条 记 录,以下是381-390 订阅
排序:
Wind Vector Inversion of ADS-B data Based on Improved PSO-PF Algorithm
Wind Vector Inversion of ADS-B Data Based on Improved PSO-PF...
收藏 引用
international conference on Guidance, Navigation and Control, ICGNC 2022
作者: Chen, Wantong Wu, Duo Ren, Shiyu Diao, Tianru Tianjin Key Laboratory of Intelligent Signal and Image Processing Civil Aviation University of China Tianjin300300 China School of Electronic Information and Automation Civil Aviation University of China Tianjin300300 China
At present, inversing wind vector from aircraft trajectory captured by automatic dependent surveillance-broadcast (ADS-B) is one of the main solutions to obtain wind field in aviation meteorology. However, some algori... 详细信息
来源: 评论
Confidential Inference in Decision Trees: FPGA Design and Implementation  30
Confidential Inference in Decision Trees: FPGA Design and Im...
收藏 引用
30th IFIP/IEEE international conference on Very Large Scale Integration (VLSI-SoC)
作者: Karn, Rupesh Raj Elfadel, Ibrahim M. Khalifa Univ Ctr Cyber Phys Syst C2PS Abu Dhabi U Arab Emirates
In confidential computing, algorithms operate on encrypted inputs to produce encrypted outputs. Specifically, in confidential inference, Alice has the parameters of the machine-learning model but does not want to reve... 详细信息
来源: 评论
WordStylist: Styled Verbatim Handwritten Text Generation with Latent Diffusion models  17th
WordStylist: Styled Verbatim Handwritten Text Generation wit...
收藏 引用
17th international conference on Document Analysis and Recognition (ICDAR)
作者: Nikolaidou, Konstantina Retsinas, George Christlein, Vincent Seuret, Mathias Sfikas, Giorgos Smith, Elisa Barney Mokayed, Hamam Liwicki, Marcus Lulea Univ Technol Lulea Sweden Natl Tech Univ Athens Athens Greece Friedrich Alexander Univ Erlangen Germany Univ West Attica Egaleo Greece Univ Ioannina Ioannina Greece
Text-to-Image synthesis is the task of generating an image according to a specific text description. Generative Adversarial Networks have been considered the standard method for image synthesis virtually since their i... 详细信息
来源: 评论
Sentiment Classification Based on RoBERTa and data Augmentation  9
Sentiment Classification Based on RoBERTa and Data Augmentat...
收藏 引用
9th IEEE international conference on Cloud Computing and Intelligence Systems, CCIS 2023
作者: Wang, Xiaoyi Xue, Siyuan Liu, Jie Zhang, Jing Wang, Jincheng Zhou, Jianshe Capital Normal University School of Literature Beijing100048 China China Language Intelligence Research Center Beijing100048 China North China University of Technology School of Information Science Beijing100144 China Beijing Institute of Control and Electronics Technology Beijing100038 China
Sentiment analysis is one of the hot research topics in natural language processing, aiming to analyze the subjective sentiment expressed in text through inductive reasoning. Common deep learning-based sentiment class... 详细信息
来源: 评论
A Novel Framework for data Trading Markets based on Blockchain-enabled Federated Learning  25
A Novel Framework for Data Trading Markets based on Blockcha...
收藏 引用
IEEE 25th international conference on Intelligent Transportation Systems (ITSC)
作者: Li, Cheng Yuan, Yong Wang, Fei-Yue Renmin Univ China Coll Math Beijing Peoples R China Chinese Acad Sci Inst Automat Beijing Peoples R China Macau Univ Sci & Technol Inst Syst Engn Taipa Macao Peoples R China
In recent years, with the continued technical advances and increasing prosperity of digital economy ecosystems, the value of data has been widely recognized, leading to a huge potential demand of establishing data mar... 详细信息
来源: 评论
Detection of Distributed Denial of Service Attacks in the Cloud Using Machine Learning Method
Detection of Distributed Denial of Service Attacks in the Cl...
收藏 引用
international conference on Web Research (ICWR)
作者: Ghazaleh Farjood Ehsan Akhtarkavan Shiva Kamkar Department of Computer Engineering Khatam University Tehran Iran
Cyber-attack classification using deep learning and machine learning models is very suitable for classifying digital threats based on their characteristics and behaviors because these models examine system logs, netwo... 详细信息
来源: 评论
Review on Technological Advancement and Textual data Management algorithms in NLP and CBIR Systems  3rd
Review on Technological Advancement and Textual Data Managem...
收藏 引用
3rd international conference on Recent Trends in Advanced Computing - Artificial Intelligence and Technologies, ICRTAC-AIT 2020
作者: Diviya, M. Karmel, A. SCOPE VIT Chennai Campus Tamilnadu Chennai India
Natural language processing (NLP) and content-based image retrieval (CBIR) systems functioned efficiently with textual input. This offers a broader framework for on-going work such as text processing applications that... 详细信息
来源: 评论
Anomaly Detection of Industrial data Based on Multivariate Multi Scale Analysis  1
收藏 引用
18th international conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Lu, Dan Li, Siao Zhao, Yingnan Han, Qilong College of Computer Science and Technology Harbin Engineering University Harbin150009 China
Anomaly detection stands as a crucial facet within the domain of data quality assurance. Notably, significant strides have been made within the realm of existing anomaly detection algorithms, encompassing notable tech... 详细信息
来源: 评论
Machine Learning Model for Predicting Non-Performing Agricultural Loans in an Imbalanced Lending Environment
Machine Learning Model for Predicting Non-Performing Agricul...
收藏 引用
Computing and Information Technology (ICCIT-1441), 2020 international conference on
作者: Mohamed Ahmed Elnaggar Mostafa Abd El Azeem Fahima A. Maghraby Computer Science Dept. College of Computing & Information Technology Arab Academy for Science Technology and Maritime Transport (AASTMT) Cairo Egypt
Granting a variety of agricultural loans to clients is necessary to support both markets and the agricultural sector. There are many types of risks that affect the banking sector. The most common and important one is ... 详细信息
来源: 评论
One-Shot Object Detection in Heterogeneous Artwork datasets  11
One-Shot Object Detection in Heterogeneous Artwork Datasets
收藏 引用
11th international conference on Image processing Theory, Tools and Applications (IPTA)
作者: Madhu, Prathmesh Meyer, Anna Zinnen, Mathias Muhrenberg, Lara Suckow, Dirk Bendschus, Torsten Reinhardt, Corinna Bell, Peter Verstegen, Ute Kosti, Ronak Maier, Andreas Christlein, Vincent Friedrich Alexander Univ Erlangen Nurnberg Pattern Recognit Lab Erlangen Germany Friedrich Alexander Univ Erlangen Nurnberg Chair Christian Archaeol Erlangen Germany Friedrich Alexander Univ Erlangen Nurnberg Chair Class Archaeol Erlangen Germany Friedrich Alexander Univ Erlangen Nurnberg Inst Art Hist Erlangen Germany Philipps Univ Marburg German & Art Studies Marburg Germany
Christian archeologists face many challenges in understanding visual narration through artwork images. This understanding is essential to access underlying semantic information. Therefore, narrative elements (objects)... 详细信息
来源: 评论