咨询与建议

限定检索结果

文献类型

  • 6,860 篇 会议
  • 72 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 6,977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,967 篇 工学
    • 3,667 篇 计算机科学与技术...
    • 2,767 篇 软件工程
    • 1,207 篇 信息与通信工程
    • 718 篇 控制科学与工程
    • 518 篇 电气工程
    • 475 篇 生物工程
    • 338 篇 网络空间安全
    • 314 篇 生物医学工程(可授...
    • 274 篇 电子科学与技术(可...
    • 262 篇 动力工程及工程热...
    • 221 篇 交通运输工程
    • 221 篇 安全科学与工程
    • 216 篇 机械工程
    • 211 篇 仪器科学与技术
    • 179 篇 光学工程
    • 170 篇 石油与天然气工程
    • 167 篇 化学工程与技术
  • 1,728 篇 理学
    • 1,027 篇 数学
    • 494 篇 生物学
    • 372 篇 统计学(可授理学、...
    • 309 篇 物理学
    • 257 篇 化学
    • 195 篇 系统科学
  • 1,374 篇 管理学
    • 782 篇 图书情报与档案管...
    • 755 篇 管理科学与工程(可...
    • 352 篇 工商管理
  • 342 篇 医学
    • 272 篇 临床医学
    • 260 篇 基础医学(可授医学...
    • 170 篇 公共卫生与预防医...
  • 196 篇 法学
    • 164 篇 社会学
  • 130 篇 经济学
  • 87 篇 农学
  • 72 篇 教育学
  • 19 篇 文学
  • 8 篇 军事学
  • 2 篇 艺术学

主题

  • 311 篇 big data
  • 297 篇 machine learning
  • 213 篇 deep learning
  • 211 篇 data mining
  • 203 篇 data models
  • 158 篇 cloud computing
  • 139 篇 machine learning...
  • 124 篇 training
  • 120 篇 computational mo...
  • 116 篇 feature extracti...
  • 108 篇 signal processin...
  • 103 篇 predictive model...
  • 97 篇 internet of thin...
  • 96 篇 signal processin...
  • 94 篇 prediction algor...
  • 89 篇 support vector m...
  • 83 篇 data privacy
  • 81 篇 artificial intel...
  • 75 篇 sentiment analys...
  • 72 篇 edge computing

机构

  • 88 篇 maharishi school...
  • 67 篇 centre of interd...
  • 31 篇 department of ar...
  • 28 篇 tianjin universi...
  • 28 篇 college of compu...
  • 27 篇 vishwakarma inst...
  • 26 篇 department of co...
  • 26 篇 department of el...
  • 25 篇 chitkara univers...
  • 25 篇 department of co...
  • 22 篇 department of in...
  • 20 篇 vivekananda glob...
  • 19 篇 university of ch...
  • 18 篇 vishwakarma inst...
  • 17 篇 chitkara univers...
  • 17 篇 lovely professio...
  • 17 篇 department of sc...
  • 16 篇 department of el...
  • 15 篇 vishwakarma inst...
  • 14 篇 key laboratory o...

作者

  • 13 篇 ramakrishnan ram...
  • 11 篇 dipannita mondal
  • 10 篇 wang jing
  • 10 篇 nitin n. sakhare
  • 10 篇 mondal dipannita
  • 10 篇 rajeswari d.
  • 8 篇 kumar ritesh
  • 8 篇 akhilendra prata...
  • 8 篇 xu xiaolong
  • 8 篇 li zuoyong
  • 8 篇 jambi ratna raja...
  • 7 篇 chen chen
  • 7 篇 liu ying
  • 7 篇 wang tao
  • 7 篇 vaishali singh
  • 7 篇 kodipalli ashwin...
  • 7 篇 zhang jing
  • 6 篇 zheng-guang wu
  • 6 篇 bin wang
  • 6 篇 ye jun

语言

  • 3,941 篇 英文
  • 3,029 篇 其他
  • 156 篇 中文
检索条件"任意字段=2023 International Conference on Algorithms, Computing and Data Processing, ACDP 2023"
6977 条 记 录,以下是4331-4340 订阅
排序:
The prediction of Digital Political Commercial Evaluation Using Improved Linear Regression
The prediction of Digital Political Commercial Evaluation Us...
收藏 引用
Sustainable computing and data Communication Systems (ICSCDS), international conference on
作者: Naga Vishnu Vardhan Reddy Saravanan M.S Surendran R Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India
Analysis of digital advertisements for politicians with an age factor using linear regression algorithms versus decision trees to determine improved accuracy. The study gathered 116 samples from various internet sourc... 详细信息
来源: 评论
Adaptive Noise Canceller Algorithm with SNR-Based Stepsize and data-Dependent Averaging
Adaptive Noise Canceller Algorithm with SNR-Based Stepsize a...
收藏 引用
international conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Akihiko Sugiyama Yahoo! Japan Research Yahoo Japan Corporation Tokyo Japan Faculty of System Design Tokyo Metropolitan University Hino Japan
This paper proposes an adaptive noise canceller algorithm with an SNR-based stepsize and data-dependent averaging. A first and a second SNR with different time constants for averaging are used one after the other to c... 详细信息
来源: 评论
Malware Detection and Analysis using Machine Learning
Malware Detection and Analysis using Machine Learning
收藏 引用
international conference on computing Methodologies and Communication (ICCMC)
作者: Manoj Sirigiri Divya Sirigiri R. Aishwarya R. Yogitha Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Data Scientist Brillio Technologies Bangalore India
Online privacy for people is getting worse every day. Computer malware is tainting the data records of some well-known companies. Hackers can gain access to a network and change data, once inside. This work discusses ... 详细信息
来源: 评论
data Mining in Healthcare using Machine Learning Techniques
Data Mining in Healthcare using Machine Learning Techniques
收藏 引用
Sustainable computing and Smart Systems (ICSCSS), international conference on
作者: Honey Goel Deepak Kumar Amity Institute of Information Technology AIIT Amity University Noida India
Classification techniques have become increasingly important in healthcare due to the need for accurate and efficient disease diagnosis, treatment planning, and patient care. Supervised learning algorithms, such as de...
来源: 评论
Three-Way Hybrid Sampling Using Granular Balls for Imbalanced Classification
Three-Way Hybrid Sampling Using Granular Balls for Imbalance...
收藏 引用
international Joint conference on Rough Sets (IJCRS)
作者: Xie, Qin Zhang, Qinghua Luo, Nanfang Wang, Guoyin Chongqing Univ Posts & Telecommun Chongqing Key Lab Computat Intelligence Chongqing 400065 Peoples R China Chongqing Univ Posts & Telecommun Key Lab Big Data Intelligent Comp Chongqing 400065 Peoples R China Chongqing Univ Posts & Telecommun Sch Comp Sci & Technol Chongqing 400065 Peoples R China
Imbalanced data is prevalent in various fields, including disease diagnosis. Effective imbalanced learning methods are crucial for improving supervised learning algorithms. Existing preprocessing methods of imbalanced... 详细信息
来源: 评论
Importance of Web Scraping as a data Source for Machine Learning algorithms - Review
Importance of Web Scraping as a Data Source for Machine Lear...
收藏 引用
international conference on Industrial and Information Systems, ICIIS
作者: SCM De S Sirisuriya Department of Computer Science Faculty of Computing General Sir John Kotelawala Defence University Sri Lanka
Machine learning is a branch of artificial intelligence (AI) that trains a machine to think as humans. Machine learning algorithms need large amounts of data for high-value predictions which helps to get better decisi...
来源: 评论
An Automatic Segmentation Fitting Method for Freehand Sketches Based on Greedy Strategy  7th
An Automatic Segmentation Fitting Method for Freehand Sketch...
收藏 引用
7th international conference on computing, Control and Industrial Engineering, CCIE 2023
作者: Zhang, Xiuli Chen, Lei Wan, Zhong College of Information and Intelligence Engineering Zhejiang Wanli University Ningbo China College of Big Data and Software Engineering Zhejiang Wanli University Ningbo China
In this paper, we propose an automatic segmentation and fitting method for hand-drawn sketches based on greedy strategy. This method first resamples and smoothly filter the input sketch stroke sequence, and then autom... 详细信息
来源: 评论
A Controllable Lifestyle Simulator for Use in Deep Reinforcement Learning algorithms
A Controllable Lifestyle Simulator for Use in Deep Reinforce...
收藏 引用
international conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Libio Gonçalves Braz Allmin Susaiyah UPSSITECH - Paul Sabatier University France and Philips Research Netherlands
Deep learning, especially deep reinforcement learning (DRL), has become one of the most useful tools for solving sequential decision-making problems. This is particularly relevant to recommender systems and drug admin... 详细信息
来源: 评论
High-Capacity Reversible data Hiding in Encrypted Images Based on MSB Bit-Plane Serpentine Rearrangement and Compression
High-Capacity Reversible Data Hiding in Encrypted Images Bas...
收藏 引用
Communication, Image and Signal processing (CCISP), international conference on
作者: Tinghua Hu Sheng Qin Kaiyang Wang Guangxi Key Lab of Brain-inspired Computing and Intelligent Chips School of Electronic and Information Engineering Guangxi Normal University Guilin China International Joint Audit Institute Nanjing Audit University Nanjing China
Reversible data hiding techniques in encrypted images (RDH-EI) have been extensively researched to safeguard the privacy of images. To enhance the embedding capability of RDH-EI algorithms and security, this work leve...
来源: 评论
Research on the Methods of data Mining based on the Edge computing for the IoT
Research on the Methods of Data Mining based on the Edge Com...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE international conference on
作者: Yan Huang Weimeng Zhang Xi'an Traffic Engineering Institute Shaanxi China Xian Technician College Shaanxi China
With the advent of the internet of everything, the number of network edge devices has increased rapidly, causing the data generated by such devices to increase rapidly. In order to enable the internet of things to pro... 详细信息
来源: 评论