咨询与建议

限定检索结果

文献类型

  • 13,379 篇 会议
  • 18 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 13,410 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,114 篇 工学
    • 6,410 篇 计算机科学与技术...
    • 5,128 篇 软件工程
    • 1,743 篇 信息与通信工程
    • 1,025 篇 控制科学与工程
    • 736 篇 生物工程
    • 724 篇 电气工程
    • 665 篇 生物医学工程(可授...
    • 597 篇 网络空间安全
    • 512 篇 光学工程
    • 452 篇 安全科学与工程
    • 404 篇 电子科学与技术(可...
    • 347 篇 交通运输工程
    • 329 篇 动力工程及工程热...
    • 304 篇 机械工程
    • 268 篇 仪器科学与技术
  • 2,699 篇 理学
    • 1,326 篇 数学
    • 881 篇 生物学
    • 641 篇 统计学(可授理学、...
    • 540 篇 物理学
    • 331 篇 系统科学
    • 244 篇 化学
  • 1,882 篇 管理学
    • 1,305 篇 管理科学与工程(可...
    • 792 篇 图书情报与档案管...
    • 574 篇 工商管理
  • 946 篇 医学
    • 686 篇 临床医学
    • 679 篇 基础医学(可授医学...
    • 659 篇 公共卫生与预防医...
    • 264 篇 药学(可授医学、理...
  • 509 篇 法学
    • 470 篇 社会学
  • 265 篇 经济学
    • 265 篇 应用经济学
  • 226 篇 农学
  • 207 篇 教育学
  • 198 篇 文学
  • 9 篇 军事学
  • 1 篇 艺术学

主题

  • 2,084 篇 accuracy
  • 1,684 篇 deep learning
  • 1,188 篇 computational mo...
  • 1,185 篇 machine learning
  • 1,044 篇 training
  • 1,026 篇 data models
  • 969 篇 predictive model...
  • 725 篇 real-time system...
  • 691 篇 convolutional ne...
  • 684 篇 feature extracti...
  • 676 篇 machine learning...
  • 584 篇 support vector m...
  • 534 篇 federated learni...
  • 496 篇 adversarial mach...
  • 338 篇 contrastive lear...
  • 311 篇 medical services
  • 295 篇 random forests
  • 286 篇 analytical model...
  • 278 篇 prediction algor...
  • 270 篇 neural networks

机构

  • 105 篇 lovely professio...
  • 101 篇 chitkara univers...
  • 57 篇 department of co...
  • 47 篇 school of comput...
  • 45 篇 school of comput...
  • 45 篇 department of co...
  • 45 篇 department of co...
  • 42 篇 the islamic univ...
  • 40 篇 shandong provinc...
  • 37 篇 college of compu...
  • 32 篇 university of ch...
  • 28 篇 department of co...
  • 27 篇 department of co...
  • 26 篇 computer science...
  • 26 篇 graphic era deem...
  • 25 篇 department of co...
  • 25 篇 amrita vishwa vi...
  • 25 篇 the islamic univ...
  • 23 篇 department of co...
  • 23 篇 college of intel...

作者

  • 23 篇 satvik vats
  • 18 篇 shiva mehta
  • 18 篇 kukreja vinay
  • 18 篇 vats satvik
  • 17 篇 anjali t.
  • 17 篇 rishabh sharma
  • 17 篇 deepak upadhyay
  • 16 篇 senthil kumar th...
  • 15 篇 singh jagendra
  • 15 篇 venugopalan manj...
  • 13 篇 manjunatha
  • 13 篇 rakesh kumar
  • 12 篇 ramya maranan
  • 11 篇 selvanayaki kola...
  • 11 篇 s. kaliappan
  • 10 篇 andersson karl
  • 10 篇 muthukumaravel a...
  • 10 篇 yang yang
  • 10 篇 ayodeji olalekan...
  • 10 篇 surendran r.

语言

  • 12,117 篇 英文
  • 1,292 篇 其他
  • 343 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=2024 International Conference on Computing, Machine Learning and Data Science, CMLDS 2024"
13410 条 记 录,以下是4941-4950 订阅
排序:
Homomorphic Encryption for Privacy Preservation in Occupancy Sensor-Based Smart Lighting  7
Homomorphic Encryption for Privacy Preservation in Occupancy...
收藏 引用
7th international conference on data science and Its Applications, ICoDSA 2024
作者: Putrada, Aji Gautama Abdurohman, Maman Perdana, Doan Nuha, Hilal Hudan School of Computing Telkom University Bandung Indonesia School of Electrical Engineering Telkom University Bandung Indonesia
Occupancy sensor-based smart lighting is very practical because the light status can change automatically according to human activity under the lighting area. However, on the other hand, the user occupancy displayed b... 详细信息
来源: 评论
Enhancing E-learning Materials Recommendations with Contextual Awareness and Collaborative Filtering  6
Enhancing E-Learning Materials Recommendations with Contextu...
收藏 引用
6th international conference on computing and Informatics, ICCI 2024
作者: Anter, Ahmed Moawad, Ibrahim F. Mosaad, Sara M. Faculty of Commerce and Business Administration Helwan University Cairo Egypt Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt Faculty of Computer Science and Engineering New Mansoura University Dakhlia Egypt
The number of learners using online learning materials has significantly increased in recent years. Due to the overload of information, many learners face difficulty finding relevant and useful educational materials t... 详细信息
来源: 评论
TFGAN: Transformer-based Melody Generate GAN  9
TFGAN: Transformer-based Melody Generate GAN
收藏 引用
9th international conference on Image, Vision and computing, ICIVC 2024
作者: Zhang, Liming Shi, Xiuhang Lin, Zicheng Yang, Hao Wang, Songbo Hu, Jianqiao Emerging Risk Research Insitute North China University of Technology Beijing China School of Software Engineering South China University of Technology Guangzhou China
With the development of deep learning technology, using deep learning to automatically compose music for given lyrics has gradually become one of the research hotspots. In the research work on this task, the method of... 详细信息
来源: 评论
Disease Detection And Severity Prediction Of Pomegranate Fruit  15
Disease Detection And Severity Prediction Of Pomegranate Fru...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Paul, Poulin Manishankar, S. Satheesh Kumar, R. Sahrdaya College of Engineering and Technology Dept. of Computer Science and Engineering Kerala Thrissur India Jawaharlal College of Engineering and Technology Dept. of Computer Science and Engineering Kerala Palakkad India
This paper presents an integrated framework for the comprehensive analysis of diseases affecting pomegranate fruit. The suggested system, which makes use of deep learning techniques, includes semantic segmentation for... 详细信息
来源: 评论
Artificial Intelligence Based Sugarcane Leaf Disease Prediction System for Smart Farming  7
Artificial Intelligence Based Sugarcane Leaf Disease Predict...
收藏 引用
7th international conference on Circuit Power and computing Technologies, ICCPCT 2024
作者: Chauhan, Yash Negi, Nitam Sharma, Sachin Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Graphic Era Deemed to Be University Graphic Era Hill University Department of Computer Science and Engineering Dehradun India
In response to the challenges posed by sugarcane diseases, this research introduces a Sugarcane Disease Prediction System, employing deep learning through a Convolutional Neural Network (CNN) using TensorFlow and Kera... 详细信息
来源: 评论
Analysis of Comparison Faster R-CNN Backbone for Oil Palm Tree Counting using Drone Imagery data
Analysis of Comparison Faster R-CNN Backbone for Oil Palm Tr...
收藏 引用
2024 international conference on Information Technology and computing, ICITCOM 2024
作者: Sri Rejeki, Dewi Irwansyah, Edy Golda, Beauty School of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia Representative Indonesia of the International Business Group SuperMap Software Co. Ltd Business Development Beijing China
The palm oil industry is an important subsector in the Indonesian economy. Counting the number of oil palm trees using drone imagery is crucial in developing efficient strategies for managing oil palm plantations. Thi... 详细信息
来源: 评论
Knowledge Graphs Can be Learned with Just Intersection Features  41
Knowledge Graphs Can be Learned with Just Intersection Featu...
收藏 引用
41st international conference on machine learning, ICML 2024
作者: Le, Duy Zhong, Shaochen Liu, Zirui Xu, Shuai Chaudhary, Vipin Zhou, Kaixiong Xu, Zhaozhuo Department of Computer and Data Sciences Case Western Reserve University United States Department of Computer Science Rice University United States Department of Electrical and Computer Engineering North Carolina State University United States Department of Computer Science Stevens Institute of Technology United States
Knowledge Graphs (KGs) are potent frameworks for knowledge representation and reasoning. Nevertheless, KGs are inherently incomplete, leaving numerous uncharted relationships and facts awaiting discovery. Deep learnin... 详细信息
来源: 评论
A Deep learning Approach for Herbal Plant Detection and Recognition  3
A Deep Learning Approach for Herbal Plant Detection and Reco...
收藏 引用
3rd international conference on Applied Artificial Intelligence and computing, ICAAIC 2024
作者: Giridharan, N. Aaffrin Sulthana, R. Mohanraj, R. Sanjay Murugan, M. K.S.Rangasamy College of Technology Department of Artificial Intelligence and Data Science Tamil Nadu India
In this research, TensorFlow, a powerful deep learning toolkit, is utilized in conjunction with the Python programming language to conduct a comprehensive analysis of plant names and specifications. The research invol... 详细信息
来源: 评论
Evaluating data Poisoning Vulnerability in Selective Reincarnation within c-MARL to Salt and Pepper Noise Attack  15
Evaluating Data Poisoning Vulnerability in Selective Reincar...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Putla, Harsha Patibandla, Chanakya Singh, Krishna Pratap Nagabhushan, P. Department of IT IIIT - Allahabad Prayagraj India HOD - Department of IT IIIT - Allahabad Prayagraj India Vignan’s Foundation for Science Technology & Research Guntur India
In the domain of cooperative multi-agent reinforcement learning (c-MARL), the deployment in safety-critical applications necessitates rigorous robustness testing. Despite the advancements in c-MARL algorithms facilita... 详细信息
来源: 评论
AI-Based Methods to Detect and Counter Cyber Threats in Cloud Environments to Strengthen Cloud Security
AI-Based Methods to Detect and Counter Cyber Threats in Clou...
收藏 引用
2024 international conference on Electrical, Electronics and computing Technologies, ICEECT 2024
作者: Chaudhary, Diwakar Verma, S.K. Mohan Shrimal, Vijay Madala, Ravikiran Baliyan, Rashi Sathish, M. Noida International University School of Business Management Greater Noida India Chandigarh University Department of Computer Science Engineering Punjab Mohali India University of Cumberlands Department of Information North Carolina Durham United States Rajalakshmi Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India
Traditional cloud security solutions often employ outdated techniques and find it difficult to stay up to date with the ever-evolving cyber threat scenario. Complex attacks may be made against cloud systems since stat... 详细信息
来源: 评论