咨询与建议

限定检索结果

文献类型

  • 3,204 篇 会议
  • 19 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 3,233 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,933 篇 工学
    • 1,731 篇 计算机科学与技术...
    • 1,587 篇 软件工程
    • 421 篇 信息与通信工程
    • 321 篇 控制科学与工程
    • 318 篇 生物工程
    • 185 篇 生物医学工程(可授...
    • 172 篇 电气工程
    • 144 篇 机械工程
    • 115 篇 电子科学与技术(可...
    • 101 篇 光学工程
    • 94 篇 安全科学与工程
    • 92 篇 化学工程与技术
    • 91 篇 动力工程及工程热...
    • 79 篇 网络空间安全
  • 891 篇 理学
    • 497 篇 数学
    • 336 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 158 篇 物理学
    • 154 篇 系统科学
    • 84 篇 化学
  • 500 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 185 篇 医学
    • 158 篇 临床医学
    • 156 篇 基础医学(可授医学...
    • 110 篇 药学(可授医学、理...
    • 83 篇 公共卫生与预防医...
  • 133 篇 法学
    • 90 篇 社会学
  • 82 篇 经济学
    • 82 篇 应用经济学
  • 78 篇 农学
    • 75 篇 作物学
  • 66 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学

主题

  • 493 篇 machine learning
  • 103 篇 deep learning
  • 86 篇 software
  • 62 篇 machine learning...
  • 59 篇 support vector m...
  • 52 篇 internet of thin...
  • 49 篇 decision trees
  • 48 篇 artificial intel...
  • 47 篇 forecasting
  • 44 篇 software enginee...
  • 40 篇 training
  • 39 篇 predictive model...
  • 36 篇 feature extracti...
  • 35 篇 neural networks
  • 33 篇 software testing
  • 31 篇 software algorit...
  • 26 篇 reinforcement le...
  • 26 篇 adversarial mach...
  • 25 篇 covid-19
  • 25 篇 object detection

机构

  • 31 篇 college of compu...
  • 31 篇 chitkara univers...
  • 12 篇 karnataka bangal...
  • 12 篇 school of inform...
  • 11 篇 software enginee...
  • 11 篇 department of so...
  • 10 篇 department of so...
  • 10 篇 school of comput...
  • 9 篇 maharishi school...
  • 8 篇 maharishi school...
  • 7 篇 maharishi school...
  • 7 篇 school of comput...
  • 7 篇 daffodil interna...
  • 7 篇 department of co...
  • 7 篇 school of inform...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 software enginee...
  • 6 篇 department of co...
  • 6 篇 department of so...

作者

  • 8 篇 patidar sanjay
  • 7 篇 liu han
  • 7 篇 han liu
  • 6 篇 alfurhood badria...
  • 6 篇 ishu sharma
  • 6 篇 sharma ishu
  • 6 篇 badria sulaiman ...
  • 5 篇 bitto abu kowshi...
  • 5 篇 dharshana kasthu...
  • 5 篇 ali raja hashim
  • 5 篇 yibeltal assefa
  • 5 篇 assefa yibeltal
  • 5 篇 ajmeera kiran
  • 5 篇 raja hashim ali
  • 5 篇 sethia divyashik...
  • 4 篇 heyn hans-martin
  • 4 篇 krishna aneesh
  • 4 篇 william p.
  • 4 篇 iqbal muhammad w...
  • 4 篇 zain ul abideen

语言

  • 1,910 篇 英文
  • 1,322 篇 其他
  • 53 篇 中文
  • 1 篇 德文
检索条件"任意字段=2023 International Conference on Software Engineering and Machine Learning, CONF-SEML 2023"
3233 条 记 录,以下是521-530 订阅
排序:
TRACKING AND VISUALIZATION OF BENCHTOP ASSEMBLY COMPONENTS USING A RGBD CAMERA  18
TRACKING AND VISUALIZATION OF BENCHTOP ASSEMBLY COMPONENTS U...
收藏 引用
ASME 18th Int Mfg Sci and Engn conf held jointly with the 51st N Amer Res conf / Japan-Soc-of-Mech-Engineers Int conf on Leading Edge Mfg/Mat and Proc
作者: Maddipatla, Yashwanth Li, Jiaqiong Zheng, Yi Li, Beiwen Iowa State Univ Dept Mech Engn Ames IA 50011 USA
The workforce training for part assembly processes usually depends on paper-based instructions, which may not be intuitive and could take a long time for a worker to be fully proficient. This paper aims to improve the... 详细信息
来源: 评论
Artificial Intelligence for securing SDIoT: Challenges and countermeasures  20
Artificial Intelligence for securing SDIoT: Challenges and c...
收藏 引用
20th international Multi-conference on Systems, Signals and Devices, SSD 2023
作者: Zaidoun, Ameur Salem Baccouch, Hajer Guermazi, Abderrahmen Lachiri, Zied National Engineering School of Tunis Signal Images and Information Technologies Lab Tunisia Higher Institute of Technological Studies of Siliana Tunisia National Engineering School of Sfax Computer and Embedded Systems Lab Tunisia Higher Institute of Technological Studies of Sfax Tunisia
SDIoT (software Defined IoT) is an emerging IoT technology, deployed using SDN architecture;nevertheless, it presents several weaknesses, which can be raised in different layers. To mitigate SDIoT intrusions and attac... 详细信息
来源: 评论
Exploring Hyperparameter Usage and Tuning in machine learning Research  2
Exploring Hyperparameter Usage and Tuning in Machine Learnin...
收藏 引用
IEEE/ACM 2nd international conference on AI engineering - software engineering for AI (CAIN)
作者: Simon, Sebastian Kolyada, Nikolay Akiki, Christopher Potthast, Martin Stein, Benno Siegmund, Norbert Univ Leipzig Leipzig Germany Bauhaus Univ Weimar Weimar Germany Univ Leipzig ScaDS AI Dresden Leipzig Germany
The success of machine learning (ML) models depends on careful experimentation and optimization of their hyperparameters. Tuning can affect the reliability and accuracy of a trained model and is the subject of ongoing... 详细信息
来源: 评论
XMODOS: An Explainable Model for Denial of Service Attack Detection
XMODOS: An Explainable Model for Denial of Service Attack De...
收藏 引用
2023 IEEE international conference on Systems, Man, and Cybernetics, SMC 2023
作者: Molokwu, Reginald C. Molokwu, Bonaventure C. Molokwu, Victor C. Canadian Institute for Cybersecurity University of New Brunswick Canada Software Engineering Department of Computer Science Concordia University Canada School of Energy Geoscience Infrastructure and Society Hariot-Watt University Edinburgh United Kingdom
This paper proposes a machine learning-based approach for detecting Denial-of-Service (DoS) attacks using different datasets for training and testing. The study evaluates the performance of the proposed approach on a ...
来源: 评论
Predicting software Errors Using Neural Networks  12
Predicting Software Errors Using Neural Networks
收藏 引用
12th international conference on System Modeling and Advancement in Research Trends, SMART 2023
作者: Pandey, Ratnesh Kumar Chand, Jay Srivastava, Ashish Kumar Singh, Narendra Pal Gautam, Rakesh Kumar Invertis University Department of Computer Science & Engineering UP Bareilly India Kamla Nehru Institute of Physical and Social Sciences Department of Computer Science & Engineering UP Sultanpur India Madyanchal Professional University Department of Computer Science & Engineering MP Bhopal India Iimt College of Engineering Department of Computer Science & Engineering UP Greater Noida India Iet Department of Computer Science & Engineering Department of Information Technology UP Lucknow India
The growing call for online technology software has additionally elevated the call for great and occasional-cost merchandise. Predicting software vulnerabilities is one of the most essential obligations of a very good... 详细信息
来源: 评论
VDDA: An Effective software Vulnerability Detection Model Based on Deep learning and Attention Mechanism  26
VDDA: An Effective Software Vulnerability Detection Model Ba...
收藏 引用
26th international conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chang, Jiaqi Ma, Zhujuan Cao, Binghao Zhu, Erzhou Anhui University School of Computer Science and Technology Hefei China Anhui Xinhua University School of Big Data and Artificial Intelligence Hefei China
Many of software vulnerability detection methods suffer from problems of dependent on expert experience, rough detection granularity, and incomplete syntax and semantics information on source codes. This paper propose... 详细信息
来源: 评论
An Exploratory Analysis of Effect of Adversarial machine learning Attack on IoT-enabled Industrial Control Systems
An Exploratory Analysis of Effect of Adversarial Machine Lea...
收藏 引用
2023 international conference on Smart Computing and Application, ICSCA 2023
作者: Trivedi, Sandeep Anh Tran, Tien Faruqui, Nuruzzaman Hassan, Md. Maruf Deloitte Consulting Llp Houston United States Seoul National University Department of Naval Architecture and Ocean Engineering Seoul City Korea Republic of Daffodil International University Daffodil Smart City Department of Software Engineering Dhaka Bangladesh
machine learning (ML)-based Intrusion Detection Systems (IDS) is an effective technology to automatically detect cyber attacks in the Internet of Things (IoT) dependent Industrial Control Systems (ICS). It is faster, ... 详细信息
来源: 评论
Generative Pre-Trained Transformer (GPT) Models for Irony Detection and Classification  4
Generative Pre-Trained Transformer (GPT) Models for Irony De...
收藏 引用
4th international Informatics and software engineering conference, IISEC 2023
作者: Aytekin, Mustafa Ulvi Ayhan Erdem, O. Gazi University Graduate School of Natural and Applied Sciences Department of Computer Engineering Ankara Turkey Gazi University Faculty of Technology Department of Computer Engineering Ankara Turkey
The tasks of identifying and classifying ironic texts remain an ongoing challenge, necessitating continued exploration for enhanced solutions in NLP. This study delves into assessing the effectiveness of Generative Pr... 详细信息
来源: 评论
international conference on Advances and Applications of Artificial Intelligence and machine learning, ICAAAIML 2023
International Conference on Advances and Applications of Art...
收藏 引用
international conference on Advances and Applications of Artificial Intelligence and machine learning, ICAAAIML 2023
The proceedings contain 35 papers. The special focus in this conference is on Advances and Applications of Artificial Intelligence and machine learning. The topics include: Leveraging Differently Layered Convolutional...
来源: 评论
*** - engineering and Assurance of a Driverless Regional Train  2
*** - Engineering and Assurance of a Driverless Regional Tra...
收藏 引用
IEEE/ACM 2nd international conference on AI engineering - software engineering for AI (CAIN)
作者: Zeller, Marc Rothfelder, Martin Klein, Cornel Siemens AG Munich Germany
Traditional automation technologies alone are not sufficient to enable the fully automated operation of trains. However, Artificial Intelligence (AI) and machine learning (ML) offers great potential to realize the man... 详细信息
来源: 评论