咨询与建议

限定检索结果

文献类型

  • 2,237 篇 会议
  • 13 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 2,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,607 篇 工学
    • 1,383 篇 计算机科学与技术...
    • 967 篇 软件工程
    • 322 篇 控制科学与工程
    • 242 篇 信息与通信工程
    • 219 篇 电气工程
    • 176 篇 生物工程
    • 128 篇 生物医学工程(可授...
    • 91 篇 机械工程
    • 76 篇 交通运输工程
    • 58 篇 光学工程
    • 50 篇 电子科学与技术(可...
    • 43 篇 化学工程与技术
    • 42 篇 安全科学与工程
    • 35 篇 仪器科学与技术
    • 32 篇 土木工程
  • 465 篇 理学
    • 237 篇 数学
    • 182 篇 生物学
    • 101 篇 统计学(可授理学、...
    • 80 篇 物理学
    • 47 篇 系统科学
    • 40 篇 化学
  • 434 篇 管理学
    • 287 篇 管理科学与工程(可...
    • 162 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 170 篇 医学
    • 163 篇 临床医学
    • 82 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 35 篇 公共卫生与预防医...
  • 76 篇 教育学
    • 74 篇 教育学
  • 49 篇 法学
    • 44 篇 社会学
  • 30 篇 经济学
  • 18 篇 农学
  • 2 篇 军事学

主题

  • 172 篇 machine learning
  • 160 篇 deep learning
  • 135 篇 training
  • 100 篇 data models
  • 78 篇 feature extracti...
  • 76 篇 accuracy
  • 70 篇 data mining
  • 67 篇 neural networks
  • 66 篇 predictive model...
  • 61 篇 reinforcement le...
  • 57 篇 computational mo...
  • 52 篇 support vector m...
  • 46 篇 real-time system...
  • 42 篇 machine learning...
  • 39 篇 training data
  • 39 篇 artificial intel...
  • 36 篇 visualization
  • 35 篇 learning systems
  • 35 篇 adaptation model...
  • 31 篇 big data

机构

  • 18 篇 kazan natl res t...
  • 12 篇 king mongkuts un...
  • 10 篇 institute of inf...
  • 9 篇 school of cyber ...
  • 7 篇 chitkara univers...
  • 7 篇 college of compu...
  • 6 篇 king mongkuts un...
  • 6 篇 department of co...
  • 6 篇 the key laborato...
  • 5 篇 chinese acad sci...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 peng cheng lab
  • 4 篇 univ chinese aca...
  • 4 篇 department of ci...
  • 4 篇 school of electr...
  • 4 篇 department of el...
  • 4 篇 school of inform...
  • 4 篇 univ chinese aca...
  • 4 篇 school of comput...

作者

  • 7 篇 yang qiang
  • 7 篇 piriyasurawong p...
  • 6 篇 ouya samuel
  • 6 篇 akatimagool soms...
  • 5 篇 mendy gervais
  • 5 篇 cortez paulo
  • 5 篇 kraysman natalia...
  • 4 篇 peng shaoliang
  • 4 篇 liu sheng
  • 4 篇 you linlin
  • 4 篇 li han
  • 4 篇 barabanova svetl...
  • 4 篇 wang wei
  • 4 篇 huang kaiqi
  • 4 篇 lei baiying
  • 4 篇 wang jinyan
  • 4 篇 khatsrinova olga...
  • 4 篇 shen dinggang
  • 4 篇 li wei
  • 4 篇 li qianmu

语言

  • 2,158 篇 英文
  • 91 篇 其他
  • 27 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=22nd International Conference on Intelligent Data Engineering and Automated Learning"
2255 条 记 录,以下是1491-1500 订阅
排序:
A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks
A Spatial-Temporal Features Based Fingerprinting Method for ...
收藏 引用
IEEE international conference on High Performance Computing and Communications (HPCC)
作者: Zhongfeng Jin Nan Li Chao Liu Meimei Li Shaohua An Weiqing Huang School of Cyber Security No.19 yuquan road shijingshan district University of Chinese Academy of Sciences Beijing China Chinese Academy of Sciences E-park No.80 xingshikou road haidian district Institute of Information Engineering Beijing China
As the most widely used solution for intelligent manufacturing, the Distributed Numerical Control (DNC) system faces with various novel attack opportunities caused by increasing connection to industrial ethernet and e... 详细信息
来源: 评论
Employing machine learning techniques on sentiment analysis of google play store bangla reviews  22
Employing machine learning techniques on sentiment analysis ...
收藏 引用
22nd international conference on Computer and Information Technology, ICCIT 2019
作者: Jawad Soumik, Md Muhtasim Salvi Md Farhavi, Syed Eva, Farzana Sinha, Tonmoy Alam, Mohammad Shafiul Ahsanullah University of Science and Technology Dept. of Computer Science and Engineering Dhaka Bangladesh Ahsanullah University of Science and Technology Dept. Computer Science and Engineering Dhaka Bangladesh
This article offers an in-depth insight on a number of existing methodologies to perform sentiment analysis using text classification on Bangla dataset. Although the rapidly developing machine learning algorithms are ... 详细信息
来源: 评论
MTLH: Video QoE Monitoring for Encrypted Traffic via Multi-Task learning with Hierarchy
MTLH: Video QoE Monitoring for Encrypted Traffic via Multi-T...
收藏 引用
IEEE international conference on High Performance Computing and Communications (HPCC)
作者: Lei Xu Gang Xiong Gaopeng Gou Jie Chen Tianyu Cui Tianyi Shan Chinese Academy of Sciences Institute of Information Engineering Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China University of California San Diego
With the continuous growth of video traffic on the whole Internet, it is of vital importance for content providers to provide high-quality service. Monitoring the QoE (Quality of Experience) of video can help them to ... 详细信息
来源: 评论
Context-Aware learning for Anomaly Detection with Imbalanced Log data
Context-Aware Learning for Anomaly Detection with Imbalanced...
收藏 引用
IEEE international conference on High Performance Computing and Communications (HPCC)
作者: Peijie Sun E Yuepeng Tong Li Yulei Wu Jingguo Ge Junling You Bingzhen Wu Chinese Academy of Sciences Institute of Information Engineering Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China College of Engineering Mathematics and Physical Sciences University of Exeter Exeter UK
Logs are used to record runtime states and significant events for a software system. They are widely used for anomaly detection. Logs produced by most of the real-world systems show clear characteristics of imbalanced... 详细信息
来源: 评论
Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients
Privacy-Preservation in Distributed Deep Neural Networks via...
收藏 引用
IEEE international conference on High Performance Computing and Communications (HPCC)
作者: Antwi-Boasiako Emmanuel Shijie Zhou Yongjian Liao Qihe Liu School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
In this paper, privacy preservation in Distributed Deep Neural Networks (DDNN) is re-visited. We focus on the use of Homomorphic Encryption (HE) in the DDNN. Although HE provides some level of effective way to bring p... 详细信息
来源: 评论
Emotional Health: A data driven approach to understand our emotions and improve our health  22
Emotional Health: A data driven approach to understand our e...
收藏 引用
22nd IEEE international conference on Computational Science and engineering (IEEE CSE) / 17th IEEE international conference on Embedded and Ubiquitous Computing (IEEE EUC)
作者: Vuppalapati, Chandrasekar Kedari, Sharat Ilapakurti, Anitha Kedari, Santosh Shankar, Jaya Hanumayamma Innovat & Technol Inc 628 Crescent Terrace Fremont CA 94536 USA Hanumayamma Innovat & Technol Inc Hig 2Block 2Flat 7 Hyderabad 500044 TN India
Human emotions play an important role in everyone's daily life. People who have good emotional health pose to have good health. However, many things that happen in our life can disrupt our emotional health. These ... 详细信息
来源: 评论
Usage identification of anomaly detection in an industrial context  22
Usage identification of anomaly detection in an industrial c...
收藏 引用
22nd international conference on engineering Design, ICED 2019
作者: Zoghlami, Firas Kurrek, Philip Jocas, Mark Masala, Giovanni Salehi, Vahid University of Applied Sciences Munich Germany University of Plymouth United Kingdom
The use of flexible and autonomous robotics systems is the solution for the automation task of the production and intra-logistics environments. This dynamic context requires the robot to be aware of its surroundings t... 详细信息
来源: 评论
data-driven Fault Diagnosis of Induction Motors Using a Stacked Autoencoder Network  22
Data-driven Fault Diagnosis of Induction Motors Using a Stac...
收藏 引用
22nd international conference on Electrical Machines and Systems, ICEMS 2019
作者: Skylvik, Audun Johannessen Robbersmyr, Kjell G. Khang, Huynh Van University of Agder Department of Engineering Sciences Grimstad4879 Norway
Current signatures from an induction motor are normally used to detect anomalies in the condition of the motor based on signal processing techniques. However, false alarms might occur if using signal processing analys... 详细信息
来源: 评论
learning Believable Player Movement Patterns from Human data in a Soccer Game
Learning Believable Player Movement Patterns from Human Data...
收藏 引用
international conference on Advanced Communication Technology (ICACT)
作者: Victor Khaustov Maxim Mozgovoy Active Knowledge Engineering Lab University of Aizu Aizuwakamatsu Japan
Player movement patterns are one of the behavioral traits immediately visible to an observer. Thus, a soccer AI system striving for believable (human-like) behavior must ensure the believability of player movements. W... 详细信息
来源: 评论
22nd international conference on Business Information Systems, BIS 2019
22nd International Conference on Business Information System...
收藏 引用
22nd international conference on Business Information Systems, BIS 2019
The proceedings contain 67 papers. The special focus in this conference is on Business Information Systems. The topics include: Potential Benefits of New Online Marketing Approaches;using Blockchain Technology for Cro...
来源: 评论