咨询与建议

限定检索结果

文献类型

  • 2,237 篇 会议
  • 13 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 2,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,607 篇 工学
    • 1,383 篇 计算机科学与技术...
    • 967 篇 软件工程
    • 322 篇 控制科学与工程
    • 242 篇 信息与通信工程
    • 219 篇 电气工程
    • 176 篇 生物工程
    • 128 篇 生物医学工程(可授...
    • 91 篇 机械工程
    • 76 篇 交通运输工程
    • 58 篇 光学工程
    • 50 篇 电子科学与技术(可...
    • 43 篇 化学工程与技术
    • 42 篇 安全科学与工程
    • 35 篇 仪器科学与技术
    • 32 篇 土木工程
  • 465 篇 理学
    • 237 篇 数学
    • 182 篇 生物学
    • 101 篇 统计学(可授理学、...
    • 80 篇 物理学
    • 47 篇 系统科学
    • 40 篇 化学
  • 434 篇 管理学
    • 287 篇 管理科学与工程(可...
    • 162 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 170 篇 医学
    • 163 篇 临床医学
    • 82 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 35 篇 公共卫生与预防医...
  • 76 篇 教育学
    • 74 篇 教育学
  • 49 篇 法学
    • 44 篇 社会学
  • 30 篇 经济学
  • 18 篇 农学
  • 2 篇 军事学

主题

  • 172 篇 machine learning
  • 160 篇 deep learning
  • 136 篇 training
  • 100 篇 data models
  • 78 篇 feature extracti...
  • 76 篇 accuracy
  • 70 篇 data mining
  • 67 篇 neural networks
  • 66 篇 predictive model...
  • 61 篇 reinforcement le...
  • 57 篇 computational mo...
  • 52 篇 support vector m...
  • 46 篇 real-time system...
  • 42 篇 machine learning...
  • 39 篇 training data
  • 38 篇 artificial intel...
  • 36 篇 visualization
  • 35 篇 learning systems
  • 35 篇 adaptation model...
  • 31 篇 big data

机构

  • 18 篇 kazan natl res t...
  • 12 篇 king mongkuts un...
  • 10 篇 institute of inf...
  • 9 篇 school of cyber ...
  • 7 篇 chitkara univers...
  • 7 篇 college of compu...
  • 6 篇 king mongkuts un...
  • 6 篇 department of co...
  • 6 篇 the key laborato...
  • 5 篇 chinese acad sci...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 peng cheng lab
  • 4 篇 univ chinese aca...
  • 4 篇 department of ci...
  • 4 篇 school of electr...
  • 4 篇 department of el...
  • 4 篇 school of inform...
  • 4 篇 univ chinese aca...
  • 4 篇 school of comput...

作者

  • 7 篇 yang qiang
  • 7 篇 piriyasurawong p...
  • 6 篇 ouya samuel
  • 6 篇 akatimagool soms...
  • 5 篇 mendy gervais
  • 5 篇 cortez paulo
  • 5 篇 kraysman natalia...
  • 4 篇 peng shaoliang
  • 4 篇 liu sheng
  • 4 篇 you linlin
  • 4 篇 li han
  • 4 篇 barabanova svetl...
  • 4 篇 wang wei
  • 4 篇 huang kaiqi
  • 4 篇 lei baiying
  • 4 篇 wang jinyan
  • 4 篇 khatsrinova olga...
  • 4 篇 shen dinggang
  • 4 篇 li wei
  • 4 篇 li qianmu

语言

  • 1,983 篇 英文
  • 267 篇 其他
  • 28 篇 中文
检索条件"任意字段=22nd International Conference on Intelligent Data Engineering and Automated Learning"
2255 条 记 录,以下是1011-1020 订阅
排序:
AWNet: Negative Obstacle Semantic Segmentation Network Based on Adaptive Weight Loss
AWNet: Negative Obstacle Semantic Segmentation Network Based...
收藏 引用
IEEE international conference on Industrial Informatics (IndIN)
作者: Jiarui Zhao Guizhen Yu Jie Wang Zhangyu Wang Junjie Zhang Yunsong Feng State Key Lab of Intelligent Transportation System School of Transportation Science and Engineering The Key Laboratory of Autonomous Transportation Technology for Special Vehicles Ministry of Industry and Information Technology Beihang University Beijing China State Key Lab of Intelligent Transportation System Research Institute for Frontier Science Hefei innovation research institute of Beihang university Beihang University Hefei China State Key Laboratory of Pulsed Power Laser Technology National University of Defense Technology Heufei China
On roads, both vehicles and pedestrians will leave traces after passing by. Slight traces will not cause any trouble to the passing vehicles and pedestrians subsequently. However, there are certain potholes in the roa... 详细信息
来源: 评论
EdgeMLBalancer: A Self-Adaptive Approach for Dynamic Model Switching on Resource-Constrained Edge Devices
EdgeMLBalancer: A Self-Adaptive Approach for Dynamic Model S...
收藏 引用
IEEE international conference on Software Architecture Workshops (ICSAW)
作者: Akhila Matathammal Kriti Gupta Larissa Lavanya Ananya Vishal Halgatti Priyanshi Gupta Karthik Vaidhyanathan Software Engineering Research Center IIIT Hyderabad India IIIT Hyderabad India
The widespread adoption of machine learning (ML) on edge devices, such as mobile phones, laptops, IoT devices, etc. has enabled real-time AI applications in resource-constrained environments. Existing solutions for ma... 详细信息
来源: 评论
Information Geometry of the Locally Most Powerful Test
Information Geometry of the Locally Most Powerful Test
收藏 引用
international conference on Communication Technology (ICCT)
作者: Yongqiang Cheng Xiaoqiang Hua Hao Wu Hongqiang Wang College of Electronic Science and Engineering National University of Defense Technology Changsha China
The locally most powerful (LMP) test for weak signal detection is studied from a information-geometric perspective. In such a framework, the LMP test is identified as the norm of natural whitened gradient on the stati... 详细信息
来源: 评论
Safety or Not? A Comparative Study for Deep learning Apps on Smartphones
Safety or Not? A Comparative Study for Deep Learning Apps on...
收藏 引用
IEEE international conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Jin Au-Yeung Shanshan Wang Yuchen Liu Zhenxiang Chen Information Science and Engineering University of Jinan Jinan China
Recent years have witnessed an astonishing explosion in the evolution of mobile applications powered by deep learning (DL) technologies. Considering that inference of DL models in the cloud requires transferring user ... 详细信息
来源: 评论
Generating High-Resolution Fire Images with Controllable Attributes via Generative Adversarial Networks
Generating High-Resolution Fire Images with Controllable Att...
收藏 引用
international conference on Control, Automation and Systems ( ICCAS)
作者: Nguyen Quoc Dung Hakil Kim Electrical and Computer Engineering Inha University Korea
Obtaining realistic fire images using deep learning models and recent versions of Generative adversarial networks (GAN) has been proven to be a difficult task due to the unnatural appearance of the generated results. ... 详细信息
来源: 评论
Explainable Pre-Trained Models for Skin Cancer Classification
Explainable Pre-Trained Models for Skin Cancer Classificatio...
收藏 引用
IEEE SSD international Multi-conference on Systems, Signals and Devices
作者: Abdelkader Alrabai Amira Echtioui Fathi Kallel Advanced Technologies for Medicine and Signals Laboratory ‘ATMS’ National Engineering School of Sfax (ENIS) Sfax University Sfax Tunisia
Skin cancers represent a significant health issue, posing considerable challenges in early detection and accurate classification. This study investigated the effectiveness of Deep learning (DL) models for skin cancers... 详细信息
来源: 评论
Threat Detection Using MLP for IoT Network  25th
Threat Detection Using MLP for IoT Network
收藏 引用
25th international conference on Internet Computing and IoT, ICOMP 2024, and 22nd international conference on Embedded Systems, Cyber-physical Systems, and Applications, ESCS 2024, held as part of the World Congress in Computer Science, Computer engineering and Applied Computing, CSCE 2024
作者: Taylor, Genea Johnson, David Roy, Kaushik Department of Computer Science North Carolina Agricultural and Technical State University GreensboroNC27411 United States
While the popularity of IoT networks has grown significantly, they remain highly vulnerable to various cyber-attacks. These attacks can disrupt services, compromise sensitive data, and damage the integrity of IoT ecos... 详细信息
来源: 评论
A Comprehensive Machine learning Methodology for Embedded Systems PHM
A Comprehensive Machine Learning Methodology for Embedded Sy...
收藏 引用
IEEE international conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Juliano Pimentel Alistair A. McEwan Hong Qing Yu School of Computing and Engineering University of Derby Derby UK
Techniques of Machine learning (ML) have recently been widely used in several applications, but not much for embedded systems, particularly those of safety-critical functionality, and are expected to help solve comple... 详细信息
来源: 评论
An Empirical Study on Software Requirements Classification Method based on Mobile App User Comments
An Empirical Study on Software Requirements Classification M...
收藏 引用
IEEE international conference on Software Quality, Reliability and Security Companion (QRS-C)
作者: Huan Jin Hongyan Wan Ziruo Li Wenxuan Wang School of Computer Science and Artificial Intelligence Wuhan Textile University Wuhan China School of Information Engineering Wuhan University of Technology Wuhan China
User comments are one of the main ways for IT companies to obtain software evolution requirements. There are two major methods used to classify the software requirements: the traditional user requirements mining metho... 详细信息
来源: 评论
An Energy-Constrained Optimization-Based Structured Pruning Method for Deep Neural Network Compression
An Energy-Constrained Optimization-Based Structured Pruning ...
收藏 引用
international conference on Communication Technology (ICCT)
作者: Siping Liu Qiang Li Bo Peng Yanping Qiao Maosong Lin Qiang Zeng School of Information Engineering Southwest University of Science and Technology Mianyang China Science and Technology on Altitude Simulation Laboratory Mianyang China School of Computer Science and Technology Southwest University of Science and Technology Mianyang China
Deep neural networks are widely used in modern intelligent applications due to their superior ability to express reality, and these intelligent applications run on highly energy-constrained edge devices. Neural networ... 详细信息
来源: 评论