咨询与建议

限定检索结果

文献类型

  • 3,214 篇 会议
  • 19 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 3,243 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,942 篇 工学
    • 1,740 篇 计算机科学与技术...
    • 1,594 篇 软件工程
    • 423 篇 信息与通信工程
    • 329 篇 控制科学与工程
    • 318 篇 生物工程
    • 185 篇 生物医学工程(可授...
    • 176 篇 电气工程
    • 145 篇 机械工程
    • 116 篇 电子科学与技术(可...
    • 101 篇 光学工程
    • 99 篇 安全科学与工程
    • 93 篇 化学工程与技术
    • 92 篇 动力工程及工程热...
    • 79 篇 网络空间安全
  • 893 篇 理学
    • 499 篇 数学
    • 336 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 158 篇 物理学
    • 154 篇 系统科学
    • 84 篇 化学
  • 505 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 185 篇 医学
    • 158 篇 临床医学
    • 156 篇 基础医学(可授医学...
    • 110 篇 药学(可授医学、理...
    • 83 篇 公共卫生与预防医...
  • 134 篇 法学
    • 91 篇 社会学
  • 82 篇 经济学
    • 82 篇 应用经济学
  • 78 篇 农学
    • 75 篇 作物学
  • 66 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学

主题

  • 499 篇 machine learning
  • 104 篇 deep learning
  • 86 篇 software
  • 62 篇 machine learning...
  • 59 篇 support vector m...
  • 52 篇 internet of thin...
  • 52 篇 artificial intel...
  • 49 篇 decision trees
  • 47 篇 forecasting
  • 44 篇 software enginee...
  • 40 篇 training
  • 39 篇 predictive model...
  • 36 篇 feature extracti...
  • 35 篇 neural networks
  • 33 篇 software testing
  • 31 篇 software algorit...
  • 26 篇 reinforcement le...
  • 26 篇 adversarial mach...
  • 25 篇 covid-19
  • 25 篇 object detection

机构

  • 31 篇 college of compu...
  • 31 篇 chitkara univers...
  • 12 篇 karnataka bangal...
  • 12 篇 school of inform...
  • 11 篇 software enginee...
  • 11 篇 department of so...
  • 10 篇 department of so...
  • 10 篇 school of comput...
  • 9 篇 maharishi school...
  • 8 篇 maharishi school...
  • 7 篇 maharishi school...
  • 7 篇 school of comput...
  • 7 篇 daffodil interna...
  • 7 篇 department of co...
  • 7 篇 school of inform...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 software enginee...
  • 6 篇 department of co...
  • 6 篇 department of so...

作者

  • 8 篇 patidar sanjay
  • 7 篇 liu han
  • 7 篇 han liu
  • 6 篇 alfurhood badria...
  • 6 篇 ishu sharma
  • 6 篇 sharma ishu
  • 6 篇 badria sulaiman ...
  • 5 篇 bitto abu kowshi...
  • 5 篇 dharshana kasthu...
  • 5 篇 ali raja hashim
  • 5 篇 yibeltal assefa
  • 5 篇 assefa yibeltal
  • 5 篇 ajmeera kiran
  • 5 篇 raja hashim ali
  • 5 篇 sethia divyashik...
  • 4 篇 heyn hans-martin
  • 4 篇 krishna aneesh
  • 4 篇 william p.
  • 4 篇 iqbal muhammad w...
  • 4 篇 liu xin

语言

  • 1,802 篇 英文
  • 1,440 篇 其他
  • 69 篇 中文
  • 1 篇 德文
检索条件"任意字段=2023 International Conference on Software Engineering and Machine Learning, CONF-SEML 2023"
3243 条 记 录,以下是721-730 订阅
排序:
Enhancing Data engineering and Accelerating learning through Intelligent Automation  2
Enhancing Data Engineering and Accelerating Learning through...
收藏 引用
2nd international conference on Trends in Electrical, Electronics and Computer engineering, TEECCON 2023
作者: Pradeep, Aneesh Rustamov, Azamat Shokirov, Xudoyshukur Ibragimovna, Guli Tirova Farkhadovna, Sabirova Umida Medetovna, Akhmedova Feruza New Uzbekistan University Software Engineering Tashkent Uzbekistan New Uzbekistan University Mechanical Engineering Tashkent Uzbekistan Bukhara State University Uzbek Linguistics and Journlism Uzbekistan University Named after Mirzo Ulugbek Department of Sociology Tashkent Uzbekistan Uzbekistan Named after Mirzo Ulugbek Department of Sociology Tashkent Uzbekistan
The rapid growth of data and the increasing complexity of analytical tasks have necessitated the development of efficient data engineering processes and accelerated learning techniques. Intelligent data engineering an... 详细信息
来源: 评论
Democratizing Quality-Based machine learning Development through Extended Feature Models  1
收藏 引用
26th international conference on Fundamental Approaches to software engineering (FASE) Held as Part of the European Joint conferences on Theory and Practice of software (ETAPS)
作者: dAloisio, Giordano Di Marco, Antinisca Stilo, Giovanni Univ Aquila Laquila Italy
ML systems have become an essential tool for experts of many domains, data scientists and researchers, allowing them to find answers to many complex business questions starting from raw datasets. Nevertheless, the dev... 详细信息
来源: 评论
An Ensemble machine learning-Based Approach for Detecting Malicious Websites Using URL Features  3rd
An Ensemble Machine Learning-Based Approach for Detecting Ma...
收藏 引用
3rd international conference on Trends in Electronics and Health Informatics, TEHI 2023
作者: Uddin, Khandaker Mohammad Mohi Islam, Md. Ashraful Hasan, Md. Nahid Ahmad, Kawsar Haque, Mir Aminul Department of Computer Science andEngineering Southeast University Dhaka1208 Bangladesh Department of Computer Science and Engineering Dhaka International University Dhaka1205 Bangladesh Department of Computer Science and Engineering Jahangirnagar Univerisity Dhaka Bangladesh Department of Computer Science and Engineering Daffodil International University Dhaka1216 Bangladesh
The Internet has transformed into a hub for a wide array of illegal activities, ranging from annoying spam ads to financial scams, all thanks to advancements in modern technology. With the constant enhancements in net... 详细信息
来源: 评论
Patch Antenna Design Using machine learning: ANN and SVR  7
Patch Antenna Design Using Machine Learning: ANN and SVR
收藏 引用
7th IEEE international conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2023
作者: Patil, Aditi R Raju, Chinmay M Harish, Shreya Shanthi, P. Rv College of Engineering® Department of Ete Bangalore India
Every advancement in technology aims to address challenges within a specific field. One such recognized issue pertains to the laborious process of antenna design utilizing CAD tools. The proposed solution offers an ef... 详细信息
来源: 评论
Detecting Distributed DoS Attacks on SDN using machine learning (ML) Methods
Detecting Distributed DoS Attacks on SDN using Machine Learn...
收藏 引用
2023 IEEE international conference on Innovative Data Communication Technologies and Application, ICIDCA 2023
作者: Kurakula, Arun Kumar Akhila, K. Bhavya, Mummalla Sai, Meesala Venkata Cse Tirupati India Department of Computer Science and Engineering Tirupati India
The DDoS attack is a well-known malicious attack that aims to interrupt traffic of the server. A DDoS attack involves the coordination of multiple systems to target a specific host simultaneously. SDN is a software De... 详细信息
来源: 评论
WhatsApp Chatbot for Real-Time Stock Updates and Analytics  14
WhatsApp Chatbot for Real-Time Stock Updates and Analytics
收藏 引用
14th international conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Rao, Tanmay Vairagade, Rupali Muppidwar, Shantanu Sherki, Shreyash Barokar, Jagdish G. H. Raisoni College of Engineering Department of Information Technology Nagpur India
This research project focuses on the development of a WhatsApp bot for stock updates using Flask, Python, and Alpha Vantage API. The aim of the project is to provide a platform for users to easily access and receive u... 详细信息
来源: 评论
Application of Internet of Things and Cognitive Design Protocol for Clothing Pattern Design
Application of Internet of Things and Cognitive Design Proto...
收藏 引用
2023 Annual international conference on Emerging Research Areas: international conference on Intelligent Systems, AICERA/ICIS 2023
作者: Zearah, Sajad Ali Abdul Kadeem, Sahar R. Taha, Ahmed Mahdi Hussin, Marwa Saad Majeed, Maryam Ghassan Al-Tameemi, Ahmed Raed Scientific Research Center Al-ayen University Thi-Qar Iraq National University of Science and Technology Department of Medical Devices Engineering Technologies Nasiriyah Dhi Qar Iraq Medical Instruments Engineering Techniques Al-farahidi University Baghdad Iraq Computer Technologies Engineering Al-Turath University College Baghdad Iraq Al-Kunooze University College Technical Computer Engineering Department Basrah Iraq Computer Engineering Techniques Al-Nisour University College Baghdad Iraq
Designing software is used regularly in most fabric firms to create prototypes of new garments. The study suggests a deep-learning-based IoT-based computational modeling protocol for fashion pattern creation. For this... 详细信息
来源: 评论
Design of a hybrid model of finite element method and machine learning to predict mode I-II crack expansions  3
Design of a hybrid model of finite element method and machin...
收藏 引用
3rd international conference on Artificial Intelligence, Automation, and High-Performance Computing, AIAHPC 2023
作者: Yao, Jianchun Li, Xiaoqi Xiang, Jiawei College of Mechanical and Electrical Engineering Wenzhou University Wenzhou325035 China
Compound mode I-II crack expansion is a common fracture source for the failures of mechanical components in real-world running structures. Therefore, prediction of crack extensions of mode I-II loading is a long-term ... 详细信息
来源: 评论
Intelligent Advertising System Incorporating User Feedback: Design and Implementation using OpenCV and Python  3
Intelligent Advertising System Incorporating User Feedback: ...
收藏 引用
3rd IEEE international conference on Intelligent Technologies, CONIT 2023
作者: Pradeep, Aneesh New Uzbekistan University Software Engineering Tashkent Uzbekistan
Conventional advertisement displays have always been a one-way communication channel, as they do not provide an avenue for users to give feedback. This is a primary barrier since firms must tailor their advertising st... 详细信息
来源: 评论
Effective Feature Extraction Framework to Improve Network Intrusion Detection System  9
Effective Feature Extraction Framework to Improve Network In...
收藏 引用
9th IEEE international Women in engineering (WIE) conference on Electrical and Computer engineering, WIECON-ECE 2023
作者: Mv, Hari Vinayak Jarin, T. Raja, Kiruba Thangam Jyothi Engineering College APJ Abdul Kalam Technological University Department of ECE Thrissur India Jyothi Engineering College APJ Abdul Kalam Technological University Department of EEE Thrissur India School of CSE and Information Systems Vellore Institute of Technology Dept. of Software and Systems Engineering Vellore India
A network intrusion detection system (NIDS) is a crucial component of a robust cybersecurity strategy. Its primary purpose is to continuously monitor network traffic and detect suspicious or malicious activity that co... 详细信息
来源: 评论