咨询与建议

限定检索结果

文献类型

  • 40,510 篇 会议
  • 107 篇 期刊文献
  • 97 册 图书

馆藏范围

  • 40,714 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23,085 篇 工学
    • 19,883 篇 计算机科学与技术...
    • 17,994 篇 软件工程
    • 7,869 篇 信息与通信工程
    • 7,818 篇 生物工程
    • 4,852 篇 控制科学与工程
    • 3,903 篇 生物医学工程(可授...
    • 2,982 篇 电气工程
    • 2,742 篇 光学工程
    • 1,929 篇 网络空间安全
    • 1,860 篇 电子科学与技术(可...
    • 1,634 篇 安全科学与工程
    • 1,451 篇 机械工程
    • 1,427 篇 交通运输工程
    • 1,359 篇 动力工程及工程热...
    • 1,266 篇 化学工程与技术
  • 14,261 篇 理学
    • 8,024 篇 生物学
    • 6,082 篇 数学
    • 3,070 篇 物理学
    • 2,810 篇 统计学(可授理学、...
    • 1,467 篇 系统科学
    • 1,463 篇 化学
  • 7,498 篇 管理学
    • 4,229 篇 图书情报与档案管...
    • 3,686 篇 管理科学与工程(可...
    • 2,017 篇 工商管理
  • 3,605 篇 医学
    • 3,123 篇 临床医学
    • 3,077 篇 基础医学(可授医学...
    • 2,390 篇 药学(可授医学、理...
    • 1,391 篇 公共卫生与预防医...
  • 1,563 篇 法学
    • 1,390 篇 社会学
  • 1,287 篇 教育学
    • 1,283 篇 教育学
  • 1,126 篇 农学
  • 806 篇 经济学
  • 283 篇 文学
  • 53 篇 军事学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 2,380 篇 deep learning
  • 1,940 篇 machine learning
  • 823 篇 support vector m...
  • 640 篇 convolutional ne...
  • 566 篇 training
  • 546 篇 feature extracti...
  • 536 篇 forecasting
  • 478 篇 computational mo...
  • 467 篇 reinforcement le...
  • 460 篇 machine learning...
  • 456 篇 object detection
  • 421 篇 computer vision
  • 413 篇 neural networks
  • 409 篇 internet of thin...
  • 394 篇 predictive model...
  • 355 篇 covid-19
  • 332 篇 long short-term ...
  • 309 篇 transfer learnin...
  • 258 篇 convolution
  • 256 篇 image segmentati...

机构

  • 471 篇 chitkara univers...
  • 135 篇 computer science...
  • 126 篇 school of comput...
  • 88 篇 karnataka bangal...
  • 85 篇 college of compu...
  • 83 篇 centre of interd...
  • 67 篇 school of comput...
  • 61 篇 school of comput...
  • 58 篇 school of comput...
  • 58 篇 graphic era deem...
  • 53 篇 department of co...
  • 50 篇 medical technica...
  • 49 篇 computer science...
  • 48 篇 school of comput...
  • 47 篇 maharishi school...
  • 46 篇 department of co...
  • 43 篇 computer science...
  • 43 篇 the islamic univ...
  • 42 篇 department of co...
  • 41 篇 school of comput...

作者

  • 61 篇 shiva mehta
  • 49 篇 sharma vikrant
  • 40 篇 anjali t.
  • 37 篇 vinay kukreja
  • 34 篇 rakesh kumar
  • 30 篇 deepak gerard
  • 29 篇 sharma neha
  • 27 篇 gill kanwarparta...
  • 25 篇 vishal jain
  • 25 篇 sheshang degadwa...
  • 25 篇 li li
  • 25 篇 nagaraj p.
  • 24 篇 rishabh sharma
  • 24 篇 kukreja vinay
  • 22 篇 pareek piyush ku...
  • 22 篇 shanmugasundaram...
  • 21 篇 yu wang
  • 21 篇 dhairya vyas
  • 20 篇 kumar manish
  • 20 篇 p nagaraj

语言

  • 39,100 篇 英文
  • 1,600 篇 其他
  • 377 篇 中文
  • 4 篇 葡萄牙文
  • 3 篇 西班牙文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"任意字段=2023 International Conference on Computer Engineering and Distance Learning, CEDL 2023"
40714 条 记 录,以下是4801-4810 订阅
排序:
Deep learning-based Hybrid Technique for Forecasting Web Traffic  5
Deep Learning-based Hybrid Technique for Forecasting Web Tra...
收藏 引用
5th IEEE international conference on Electrical, computer and Communication Technologies, ICECCT 2023
作者: Mahanand, Akash Prakash, Prathibha Devaraj, Anjuna Amrita Vishwa Vidyapeetham Department of Mathematics Amritapuri India Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India Sheffield Hallam University Department of Computing United Kingdom
Web traffic is a kind of time-series motion, having its highs and lows. The analysis of predicting web traffic has a greater significance for website owners, to make reliable decisions for website users. But the major... 详细信息
来源: 评论
Should AI Technologies Replace the Human Jobs?  2
Should AI Technologies Replace the Human Jobs?
收藏 引用
2nd international conference for Innovation in Technology, INOCON 2023
作者: Trivedi, Abhinav Kaur, Er. Kanwaldeep Choudhary, Chahil Kunal Barnwal, Priyashi Chandigarh University Computer Science Engineering Mohali India
AI (Artificial Intelligence) technologies are a broad category of computer science techniques that enable machines to perform tasks that would normally require human intelligence, such as understanding natural languag... 详细信息
来源: 评论
Cyber Attack Detection in IoT using Deep learning Techniques  6
Cyber Attack Detection in IoT using Deep Learning Techniques
收藏 引用
6th international conference on Information Systems and computer Networks, ISCON 2023
作者: Tomar, Kartik Bisht, Krishi Joshi, Kshitiz Katarya, Rahul Delhi Technological University Department of Computer Science and Engineering Delhi India
The Internet of things (IoT) consists of millions of digital devices which interact with each other through minimum user interaction. IoT is one of the most rapidly expanding computing sectors;however, it is vulnerabl... 详细信息
来源: 评论
Cross-Site Request Forgery as an Example of Machine learning for Web Vulnerability Detection  3
Cross-Site Request Forgery as an Example of Machine Learning...
收藏 引用
3rd international conference on Smart Data Intelligence, ICSMDI 2023
作者: Rao, Mekala Srinivasa Kalyani, Birudugadda Vathsalya, Baswani Dhanunjay, Karri Narayana, Alasandalapalli Lakshmi Department of Computer Science and Engineering Mylavaram India
This paper presents a strategy for discovering flaws in web applications through Machine learning (ML). Web-based applications are especially troublesome to examine attributed to their variety and extensive usage of c... 详细信息
来源: 评论
Predicting Sentiment on IMDB using ML and DL Techniques
Predicting Sentiment on IMDB using ML and DL Techniques
收藏 引用
2023 international conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2023
作者: Tomar, Ashwin Kaler, Harjot Singh Kumar, Anubhav Chandigarh University Apex Institue of Technology Department of Computer Science and Engineering Punjab Gharuan140413 India
Sentiment classification holds significant importance in the field of nlp as it focuses on determining the sentiment polarity of text, namely positive, negative, or neutral. The widespread usage of IMDB as a platform ... 详细信息
来源: 评论
Employing AI-Driven Drones and Advanced Cyber Penetration Tools for Breakthrough Criminal Network Surveillance  9
Employing AI-Driven Drones and Advanced Cyber Penetration To...
收藏 引用
9th IEEE international Women in engineering (WIE) conference on Electrical and computer engineering, WIECON-ECE 2023
作者: Mohamed, Nachaat Ahmed, Abdussalam Ali Alsharif, Abdulgader Elkhozondar, Hala J. Rabdan Academy Homeland Security Department Abu Dhabi United Arab Emirates Bani Waleed University Mechanical Engineering Department Bani Walid Libya Faculty of Technical Sciences Sebha Sebha Libya Islamic University of Gaza Faculty of Engineering Palestine
In this paper, we introduce a groundbreaking approach to criminal network surveillance, utilizing AI-powered drones equipped with advanced cyber penetration tools. Our methodology entails the deployment of drones to i... 详细信息
来源: 评论
Coded Matrix Computations for D2D-Enabled Linearized Federated learning  48
Coded Matrix Computations for D2D-Enabled Linearized Federat...
收藏 引用
48th IEEE international conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Das, Anindya Bijoy Ramamoorthy, Aditya Love, David J. Brinton, Christopher G. Purdue University School of Electrical and Computer Engineering West LafayetteIN47907 United States Iowa State University Department of Electrical and Computer Engineering AmesIA50010 United States
Federated learning (FL) is a popular technique for training a global model on data distributed across client devices. Like other distributed training techniques, FL is susceptible to straggler (slower or failed) clien... 详细信息
来源: 评论
Machine learning Based Improved Phishing Detection using Adversarial Auto Encoder
Machine Learning Based Improved Phishing Detection using Adv...
收藏 引用
2023 international conference on System, Computation, Automation and Networking, ICSCAN 2023
作者: Balaji, S. Sathishkumar, R. Sharmila, G. Arikaran, N. Nivas, K. Dhamotharan, S. Manakula Vinayagar Institute of Technology Department of Computer Science and Engineering Puducherry India
Phishing scams are frequently used by malicious actors to get login credentials from unsuspecting users. One method for detecting phishing is machine learning. Despite the fact that the accuracy of machine learning al... 详细信息
来源: 评论
On Bidding Decision in Short-Term Electricity Markets: A Reinforcement learning Approach  15
On Bidding Decision in Short-Term Electricity Markets: A Rei...
收藏 引用
15th IEEE international conference on Industry Applications, INDUSCON 2023
作者: Theodoro, Edson A.R. Lopes, Yuri K. Dept. of Electrical Engineering DAELE Federal University of Technology - Parana PR Cornelio Procopio Brazil Dept. of Computer Science CCT Santa Catarina State University SC Joinville Brazil
Modern restructured power systems are identified by the establishment of competitive markets. After the 90s, many countries have been adopted offer-based short-term (day-ahead and intraday) markets to enforce competit... 详细信息
来源: 评论
AI-Navigated Fog Computing based Portable Ambient Particulate Matter Sensor Calibration
AI-Navigated Fog Computing based Portable Ambient Particulat...
收藏 引用
2023 international conference on Sustainable Communication Networks and Application, ICSCNA 2023
作者: Sahaya Sakila, V. Manohar, S. College of Engineering and Technology Srm Institute of Science and Technology Department of Computer Science and Engineering Vadapalani Campus No. 1 Jawaharlal Nehru Road TamilNadu Vadapalani India
Bull Trench Kilns, shortly referred as BTK are one of the major sources of emitting Particulate Matter (PM) pollutants in air, which is harmful to the environment, and it has the capability to remain suspended in the ... 详细信息
来源: 评论