咨询与建议

限定检索结果

文献类型

  • 13,377 篇 会议
  • 17 篇 期刊文献

馆藏范围

  • 13,394 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,105 篇 工学
    • 6,398 篇 计算机科学与技术...
    • 5,095 篇 软件工程
    • 1,730 篇 信息与通信工程
    • 1,008 篇 控制科学与工程
    • 735 篇 生物工程
    • 721 篇 电气工程
    • 667 篇 生物医学工程(可授...
    • 582 篇 网络空间安全
    • 511 篇 光学工程
    • 451 篇 安全科学与工程
    • 398 篇 电子科学与技术(可...
    • 344 篇 交通运输工程
    • 328 篇 动力工程及工程热...
    • 288 篇 机械工程
    • 267 篇 仪器科学与技术
  • 2,667 篇 理学
    • 1,298 篇 数学
    • 879 篇 生物学
    • 637 篇 统计学(可授理学、...
    • 535 篇 物理学
    • 328 篇 系统科学
    • 242 篇 化学
  • 1,877 篇 管理学
    • 1,300 篇 管理科学与工程(可...
    • 789 篇 图书情报与档案管...
    • 573 篇 工商管理
  • 947 篇 医学
    • 687 篇 临床医学
    • 681 篇 基础医学(可授医学...
    • 659 篇 公共卫生与预防医...
    • 264 篇 药学(可授医学、理...
  • 508 篇 法学
    • 471 篇 社会学
  • 262 篇 经济学
    • 262 篇 应用经济学
  • 223 篇 农学
  • 210 篇 教育学
  • 198 篇 文学
  • 9 篇 军事学
  • 1 篇 艺术学

主题

  • 2,085 篇 accuracy
  • 1,690 篇 deep learning
  • 1,198 篇 machine learning
  • 1,188 篇 computational mo...
  • 1,044 篇 training
  • 1,026 篇 data models
  • 968 篇 predictive model...
  • 724 篇 real-time system...
  • 687 篇 convolutional ne...
  • 685 篇 feature extracti...
  • 676 篇 machine learning...
  • 585 篇 support vector m...
  • 532 篇 federated learni...
  • 485 篇 adversarial mach...
  • 330 篇 contrastive lear...
  • 311 篇 medical services
  • 295 篇 random forests
  • 289 篇 analytical model...
  • 278 篇 prediction algor...
  • 271 篇 neural networks

机构

  • 105 篇 lovely professio...
  • 101 篇 chitkara univers...
  • 57 篇 department of co...
  • 47 篇 school of comput...
  • 45 篇 school of comput...
  • 45 篇 department of co...
  • 44 篇 department of co...
  • 42 篇 the islamic univ...
  • 40 篇 shandong provinc...
  • 36 篇 college of compu...
  • 32 篇 university of ch...
  • 28 篇 department of co...
  • 27 篇 department of co...
  • 26 篇 computer science...
  • 26 篇 graphic era deem...
  • 25 篇 department of co...
  • 25 篇 amrita vishwa vi...
  • 25 篇 the islamic univ...
  • 23 篇 department of co...
  • 23 篇 college of intel...

作者

  • 23 篇 satvik vats
  • 18 篇 shiva mehta
  • 18 篇 kukreja vinay
  • 18 篇 vats satvik
  • 17 篇 anjali t.
  • 17 篇 rishabh sharma
  • 17 篇 deepak upadhyay
  • 16 篇 senthil kumar th...
  • 15 篇 singh jagendra
  • 15 篇 venugopalan manj...
  • 13 篇 manjunatha
  • 13 篇 rakesh kumar
  • 12 篇 ramya maranan
  • 11 篇 selvanayaki kola...
  • 11 篇 s. kaliappan
  • 10 篇 andersson karl
  • 10 篇 muthukumaravel a...
  • 10 篇 yang yang
  • 10 篇 ayodeji olalekan...
  • 10 篇 surendran r.

语言

  • 12,124 篇 英文
  • 1,269 篇 其他
  • 306 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=2024 International Conference on Computing, Machine Learning and Data Science, CMLDS 2024"
13394 条 记 录,以下是4851-4860 订阅
排序:
ANOMALY-AWARE SEMANTIC SELF-ALIGNMENT FRAMEWORK FOR VIDEO-BASED PERSON RE-IDENTIFICATION  49
ANOMALY-AWARE SEMANTIC SELF-ALIGNMENT FRAMEWORK FOR VIDEO-BA...
收藏 引用
49th IEEE international conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Ran, Zhidan Lu, Xiaobo Liu, Wei Southeast Univ Sch Automat Nanjing 210096 Peoples R China Minist Educ Key Lab Measurement & Control Complex Syst Engn Nanjing 210096 Peoples R China
Video-based person re-identification (Re-ID) aims at matching the video snippets of the same person across multiple cameras. The ubiquitous appearance misalignment is a critical challenge in video person re-identifica... 详细信息
来源: 评论
Cyber Chronicles: Tracking Behavior Patterns for Detecting Threats in Large Networks  3
Cyber Chronicles: Tracking Behavior Patterns for Detecting T...
收藏 引用
3rd international conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Ramasubbu, Senthilnathan Thangavel, Senthil Kumar Jeyakumar, G. Amrita School of Computing Department of Computer Science and Engineering Coimbatore India
One of the primary challenges in cybersecurity is that even one un-detected, appropriately unanalyzed malicious security event can hide the attack vectors of a potential hacker. It is essential to detect the data brea... 详细信息
来源: 评论
Towards a New Hybrid Synthetic Minority Oversampling Technique for Imbalanced Problem in Software Defect Prediction  5
Towards a New Hybrid Synthetic Minority Oversampling Techniq...
收藏 引用
5th international conference on data Analytics for Business and Industry, ICDABI 2024
作者: Saheed, Yakub Kayode Abdulsalam, Sulaiman Olaniyi Ibrahim, Mohammed Babatunde Baba, Usman Ahmad American University of Nigeria School of ITand Computing Adamawa State Nigeria Kwara State University Dept. of Computer Science Malete Nigeria Nigerian Extractive Industries Transparency Initiative ICT Unit Abuja Nigeria North-Eastern University Dept. of Computer Science Gombe Nigeria
The software industry strives to improve software quality through continuous bug prediction, bug elimination, and module fault prediction. This issue has piqued researchers' interest because of its significant rel... 详细信息
来源: 评论
Towards a Model: Exploring Fatigue Factors in ZOOM Online Classes  12
Towards a Model: Exploring Fatigue Factors in ZOOM Online Cl...
收藏 引用
12th international conference on Current Trends in Advanced computing, ICCTAC 2024
作者: Thomas, Lijo P Menon, Vishnu Achutha Thomas, Juby Ashique Ali, K.A. Soman, K.K. Sateesh Kumar, T.K. Department of Computer Science Bengaluru India Central University of Tamil Nadu Department of Media and Communication Bengaluru India Department of Media Studies Thiruvarur India Central University of Tamil Nadu Deprtment of Commerce Thiruvarur India Central University of Tamil Nadu Department of Education Bengaluru India Departemnt of Commerce Bengaluru India
The ascent of Zoom as the predominant platform for facilitating online classes signifies a notable paradigm shift in the domain of remote education. Its rapid adoption can be attributed to several factors, such as its... 详细信息
来源: 评论
Application of Self-supervised learning in Tunnel Lining Detection  8th
Application of Self-supervised Learning in Tunnel Lining Det...
收藏 引用
8th international conference on computing, Control and Industrial Engineering, CCIE 2024
作者: Jiang, Zhijie Hu, Nan Song, Heng Duan, Lanxi Cheng, Weiguo Cao, Ping State Key Laboratory of Particle Detection and Electronics University of Science and Technology of China Hefei230026 China Management and Technology Institute China Railway No.4 Engineering Group Co. Ltd. Anhui Hefei230000 China
Ground penetrating radar (GPR) is an important nondestructive technique in bridge and tunnel defect detection, and its signal intelligent analysis is a research hotspot. The radar data interpretation method using neur... 详细信息
来源: 评论
Detection of Criminal Activities/Criminal Through CCTV by Live Footage Analysis
Detection of Criminal Activities/Criminal Through CCTV by Li...
收藏 引用
2024 OPJU international Technology conference on Smart computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Kumar, Rahul Rajpurohit, Divyajeet Singh Hanief, Mushraf Sharma, Shilpi Choudhury, Tanupriya Sar, Ayan Amity School of Engineering and Technology Department of Computer Science and Engineering Uttar Pradesh Noida India Graphic Era Deemed to Be University Cse Dept Uttarakhand Dehradun248002 India University of Petroleum and Energy Studies School of Computer Science Uttarakhand Dehradun248007 India
The integration of deep learning techniques, particularly the You Only Look Once (YOLO) object detection model, with Closed-Circuit Television (CCTV) systems has significantly transformed the landscape of crime detect... 详细信息
来源: 评论
Revolutionizing Brain Tumor Analysis: Unleashing the Potential of Residual UNet for Enhanced Segmentation Accuracy  4
Revolutionizing Brain Tumor Analysis: Unleashing the Potenti...
收藏 引用
4th IEEE international conference on Advance computing and Innovative Technologies in Engineering, ICACITE 2024
作者: Tiwari, Pradeep Kumar Johri, Prashant Galgotias University School of Computing Science and Engineering Greater Noida India
Advances in diagnosis have been made, leading to significant changes in the approach to mental health diagnosis. This update delivers the powerful segmentation algorithms needed to provide accurate diagnosis and treat... 详细信息
来源: 评论
GLAM-SERP: Building a Graph learning-Assisted Model for Soft Error Resilience Prediction in GPGPUs  23rd
GLAM-SERP: Building a Graph Learning-Assisted Model for Soft...
收藏 引用
23rd international conference on Algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Wei, Xiaohui Zhao, Jianpeng Jiang, Nan Yue, Hengshan Jilin Univ Coll Comp Sci & Technol Changchun Peoples R China
Due to their efficient data-parallel computing capabilities, General-Purpose Graphics Processing Units (GPGPUs) have become increasingly prevalent in deep learning and scientific computing domains. Because of the grow... 详细信息
来源: 评论
HybridFL: Hybrid Approach Toward Privacy-Preserving Federated learning  6th
HybridFL: Hybrid Approach Toward Privacy-Preserving Federate...
收藏 引用
6th international conference on Security and Privacy in New computing Environments, SPNCE 2023
作者: Ali, Sheraz Mamoon, Saqib Usman, Areeba Abidin, Zain ul Zhao, Chuan School of Information Science and Engineering University of Jinan Jinan250022 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China University of Sargodha Sargodha Pakistan Shandong Provincial Key Laboratory of Network-Based Intelligent Computing University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Software Engineering University of Jinan Jinan250022 China
In this study, we introduce a novel Hybrid Federated learning (HybridFL) approach aimed at enhancing privacy and accuracy in collaborative machine learning scenarios. Our methodology integrates Differential Privacy (D... 详细信息
来源: 评论
A Federated learning Anomaly Detection Approach for IoT Environments  2nd
A Federated Learning Anomaly Detection Approach for IoT Env...
收藏 引用
2nd international conference on Advances in computing Research, ACR 2024
作者: Suleiman, Basem Anaissi, Ali Yan, Wenbo Bello, Abubakar Zou, Sophie Tong, Ling Nga Meric School of Computer Science The University of Sydney Camperdown Australia School of Social Sciences Western Sydney University Penrith Australia
The fast-growing development of smart home environments and the popularity of IoT devices have increasingly raised security concerns about anomalous behaviour and events. Traditional methods employ machine learning (M... 详细信息
来源: 评论