咨询与建议

限定检索结果

文献类型

  • 5,626 篇 会议
  • 90 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 5,726 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,768 篇 工学
    • 2,326 篇 计算机科学与技术...
    • 1,325 篇 软件工程
    • 565 篇 信息与通信工程
    • 466 篇 电气工程
    • 200 篇 生物工程
    • 175 篇 控制科学与工程
    • 174 篇 生物医学工程(可授...
    • 108 篇 机械工程
    • 84 篇 交通运输工程
    • 83 篇 化学工程与技术
    • 81 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 70 篇 仪器科学与技术
    • 65 篇 动力工程及工程热...
    • 55 篇 土木工程
    • 55 篇 安全科学与工程
    • 52 篇 环境科学与工程(可...
  • 898 篇 理学
    • 477 篇 数学
    • 235 篇 生物学
    • 232 篇 物理学
    • 191 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 67 篇 化学
  • 588 篇 管理学
    • 325 篇 图书情报与档案管...
    • 306 篇 管理科学与工程(可...
    • 163 篇 工商管理
  • 290 篇 医学
    • 244 篇 临床医学
    • 144 篇 基础医学(可授医学...
    • 80 篇 药学(可授医学、理...
  • 76 篇 法学
    • 71 篇 社会学
  • 54 篇 经济学
  • 45 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 2 篇 军事学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 1,599 篇 data models
  • 534 篇 predictive model...
  • 529 篇 training
  • 498 篇 machine learning
  • 461 篇 data mining
  • 416 篇 big data
  • 404 篇 computational mo...
  • 343 篇 feature extracti...
  • 333 篇 task analysis
  • 326 篇 prediction algor...
  • 267 篇 deep learning
  • 255 篇 machine learning...
  • 245 篇 classification a...
  • 238 篇 analytical model...
  • 191 篇 clustering algor...
  • 190 篇 support vector m...
  • 182 篇 neural networks
  • 158 篇 natural language...
  • 142 篇 training data
  • 141 篇 mathematical mod...

机构

  • 19 篇 sun yat sen univ...
  • 19 篇 daffodil interna...
  • 12 篇 univ chinese aca...
  • 11 篇 tsinghua univers...
  • 11 篇 university of ch...
  • 11 篇 school of data a...
  • 10 篇 carnegie mellon ...
  • 9 篇 renmin univ chin...
  • 9 篇 lviv polytechnic...
  • 8 篇 shenzhen researc...
  • 7 篇 shanghai jiao to...
  • 7 篇 college of compu...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 7 篇 national univers...
  • 7 篇 harbin institute...
  • 7 篇 beijing key lab ...
  • 7 篇 natl univ def te...
  • 7 篇 renmin univ chin...
  • 6 篇 university of sc...

作者

  • 7 篇 li li
  • 7 篇 wang wei
  • 7 篇 xiao yanghua
  • 6 篇 wen ji-rong
  • 6 篇 cui bin
  • 6 篇 zhao wayne xin
  • 6 篇 ying liu
  • 6 篇 syed akhter hoss...
  • 5 篇 yang tong
  • 5 篇 liu yang
  • 5 篇 li zhang
  • 5 篇 jia weijia
  • 5 篇 chen liu
  • 5 篇 yang yang
  • 5 篇 xiao hongbo
  • 5 篇 nguyen trong-the
  • 5 篇 yu jie
  • 5 篇 albert bifet
  • 5 篇 wang bin
  • 5 篇 carlos ordonez

语言

  • 5,682 篇 英文
  • 36 篇 其他
  • 9 篇 中文
  • 2 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=2020 International Conference on Data Processing Algorithms and Models, ICDPAM 2020"
5726 条 记 录,以下是531-540 订阅
排序:
data Selective NLMS Outperforms LSTM and Futures for Regional Soybean Prices Forecasting
Data Selective NLMS Outperforms LSTM and Futures for Regiona...
收藏 引用
European Signal processing conference (EUSIPCO)
作者: Hamed Yazdanpanah Ana Clara Teixeira Vaishali Marar Aline Pezente Mohammad M. Ghassemi Traive Inc. Brookline MA USA
Reliable forecasting of regional commodity prices is crucial for agribusiness risk management. Our paper introduces data-Selective Normalized Least-Mean-Square (DS-NLMS), a new adaptive learning algorithm applied to 9... 详细信息
来源: 评论
RTAD-TP: Real-Time Anomaly Detection Algorithm for Univariate Time Series data Based on Two-Parameter Estimation  1
收藏 引用
16th international conference on Knowledge Science, Engineering and Management (KSEM)
作者: Fan, Qiyun Tang, Yan Ding, Xiaoming Huangfu, Qianglong Ding, Peihao Southwest Univ Sch Comp & Informat Sci Chongqing Peoples R China
The anomaly detection of univariate time series data is becoming increasingly important, as early detection of anomalies is valuable in practical applications. However, due to the continuous influx of data streams and... 详细信息
来源: 评论
Multi-domain Recommendation with Embedding Disentangling and Domain Alignment  23
Multi-domain Recommendation with Embedding Disentangling and...
收藏 引用
32nd ACM international conference on Information and Knowledge Management (CIKM)
作者: Ning, Wentao Yan, Xiao Liu, Weiwen Cheng, Reynold Zhang, Rui Tang, Bo Univ Hong Kong Hong Kong Peoples R China Southern Univ Sci & Technol Hong Kong Peoples R China Huawei Noahs Ark Lab Montreal PQ Canada Univ Hong Kong Dept Comp Sci Hong Kong Peoples R China Univ Hong Kong Musketeers Fdn Inst Data Sci Hong Kong Peoples R China Guangdong Hong Kong Macau Joint Lab Hong Kong Peoples R China Southern Univ Sci & Technol Res Inst Trustworthy Autonomous Syst Shenzhen Peoples R China Southern Univ Sci & Technol Dept Comp Sci & Engn Shenzhen Peoples R China
Multi-domain recommendation (MDR) aims to provide recommendations for different domains (e.g., types of products) with overlapping users/items and is common for platforms such as Amazon, Facebook, and LinkedIn that ho... 详细信息
来源: 评论
data ANALYTICS IN FARMING: RICE PRICE PREDICTION IN ANDHRA PRADESH  5
DATA ANALYTICS IN FARMING: RICE PRICE PREDICTION IN ANDHRA P...
收藏 引用
5th international conference on Multimedia, Signal processing and Communication Technologies (IMPACT)
作者: Reddy, Pundru Chandra Shaker Suryanarayana, G. Prakash, L. N. C. K. Yadala, Sucharitha REVA Univ Sch Comp & Informat Technol Bengalure India Vardhaman Coll Engn Dept Comp Sci & Engn Hyderabad India CVR Coll Engn Dept Comp Sci & Engn Hyderabad India CMR Inst Technol Dept Comp Sci & Engn Hyderabad India
The variances regarding prices of horticultural commodities adversely affect the nations GDP. The ranchers are genuinely and monetarily influenced as their long stretches of difficult work go to no end. Forecast of th... 详细信息
来源: 评论
Medical data Clustering Based on Multi-objective Clustering Algorithm  4th
Medical Data Clustering Based on Multi-objective Clustering ...
收藏 引用
4th international conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Chen, Shilian Tan, Yingsi Guo, Junkai He, Yuqin Geng, Shuang College of Management Shenzhen University Shenzhen518060 China
With the development of massive medical data, clustering algorithm becomes an effective way for medical data processing and data mining. On the one hand, it helps medical learners find effective information patterns f... 详细信息
来源: 评论
Quantum Fuzzy Least Squares Algorithm for Uncertain Environment  8th
Quantum Fuzzy Least Squares Algorithm for Uncertain Environm...
收藏 引用
8th international conference on Artificial Intelligence and Security , ICAIS 2022
作者: Yu, Shipeng Chang, Yan Zhang, Shibin Wang, Qirun School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610255 China School of Engineering and Technology University of Hertfordshire Hertford United Kingdom
With the development of information technology, modern society has entered the era of big data. Big data means a huge amount of data, as well as the complexity and uncertainty of data. In order to find valuable data e... 详细信息
来源: 评论
Show Me the Whole World: Towards Entire Item Space Exploration for Interactive Personalized Recommendations  22
Show Me the Whole World: Towards Entire Item Space Explorati...
收藏 引用
15th ACM international conference on Web Search and data Mining (WSDM)
作者: Song, Yu Sun, Shuai Lian, Jianxun Huang, Hong Li, Yu Jin, Hai Xie, Xing Natl Engn Res Ctr Big Data Technol & Syst Wuhan Peoples R China Serv Comp Technol & Syst Lab Wuhan Peoples R China Luazhong Univ Sci & Technol Wuhan Peoples R China Microsoft Res Asia Beijing Peoples R China Meituan Grp Beijing Peoples R China
User interest exploration is an important and challenging topic in recommender systems, which alleviates the closed-loop effects between recommendation models and user-item interactions. Contextual bandit (CB) algorit... 详细信息
来源: 评论
The Role of User Behavior Patterns in Enhancing Fraud Detection in Online Banking: A Bibliometric Analysis
The Role of User Behavior Patterns in Enhancing Fraud Detect...
收藏 引用
Technology Innovation and Its Applications (ICTIIA), international conference on
作者: Pita Silvia Qurotul Aini Efa Ayu Nabila Henderi Hardjanto Nusantoro Department of Informatic Engineering University of Raharja Tangerang Indonesia Department of Digital Business University of Raharja Tangerang Indonesia Department of Retail Management University of Raharja Tangerang Indonesia
The complexity of fraud in online banking has outpaced traditional rule-based detection systems. This paper examines how user behavior patterns enhance fraud detection by integrating behavioral analytics with machine ... 详细信息
来源: 评论
A Statistical-Based Approach to Load Model Parameter Identification
收藏 引用
IEEE ACCESS 2021年 9卷 66915-66928页
作者: Gulakhmadov, Aminjon Tavlintsev, Alexander Pankratov, Aleksey Suvorov, Anton Kovaleva, Anastasia Lipnitskiy, Ilya Safaraliev, Murodbek Semenenko, Sergey Gubin, Pavel Dmitriev, Stepan Rasulzoda, Khusrav Chinese Acad Sci Xinjiang Inst Ecol & Geog Res Ctr Ecol & Environm Cent Asia Urumqi 830011 Peoples R China Chinese Acad Sci Xinjiang Inst Ecol & Geog State Key Lab Desert & Oasis Ecol Urumqi 830011 Peoples R China Minist Energy & Water Resources Tajikistan Dushanbe 734064 Tajikistan Ural Fed Univ Dept Automated Elect Syst Ekaterinburg 620002 Russia United Power Syst Tomsk 634041 Russia HP Inc Portland OR 97211 USA Andritz Hydro GmbH D-88212 Ravensburg Germany
In the last few years, a great number of methods for identifying the load model parameters have been proposed. This article discusses the use of statistical approach to estimate the substation equivalent load model pa... 详细信息
来源: 评论
Software Module Clustering Using the Hierarchical Clustering Combination Method  7
Software Module Clustering Using the Hierarchical Clustering...
收藏 引用
7th international conference on Cloud Computing and Big data Analytics, ICCCBDA 2022
作者: Xia, Hong Zhang, Yongkang Chen, Yanping Zhang, Hengshan Wang, Zhongmin Wang, Fengwei School of Computer Science and Technology Xi'An Univ. of P. and Telecom. Shaanxi Key Lab. of Network Data Analysis and Intelligent Processing Xi'an China Xi'An University of Posts and Telecommunications School of Computer Science and Technology Xi'an China ZTECorporation Shenzhen China
The scale of software applications has increased dramatically. Hierarchical clustering is a good method for modular recovery of software architecture. Because the different evaluation criteria of software types and cl... 详细信息
来源: 评论