咨询与建议

限定检索结果

文献类型

  • 2,237 篇 会议
  • 13 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 2,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,607 篇 工学
    • 1,383 篇 计算机科学与技术...
    • 967 篇 软件工程
    • 322 篇 控制科学与工程
    • 242 篇 信息与通信工程
    • 219 篇 电气工程
    • 176 篇 生物工程
    • 128 篇 生物医学工程(可授...
    • 91 篇 机械工程
    • 76 篇 交通运输工程
    • 58 篇 光学工程
    • 50 篇 电子科学与技术(可...
    • 43 篇 化学工程与技术
    • 42 篇 安全科学与工程
    • 35 篇 仪器科学与技术
    • 32 篇 土木工程
  • 465 篇 理学
    • 237 篇 数学
    • 182 篇 生物学
    • 101 篇 统计学(可授理学、...
    • 80 篇 物理学
    • 47 篇 系统科学
    • 40 篇 化学
  • 434 篇 管理学
    • 287 篇 管理科学与工程(可...
    • 162 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 170 篇 医学
    • 163 篇 临床医学
    • 82 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 35 篇 公共卫生与预防医...
  • 76 篇 教育学
    • 74 篇 教育学
  • 49 篇 法学
    • 44 篇 社会学
  • 30 篇 经济学
  • 18 篇 农学
  • 2 篇 军事学

主题

  • 172 篇 machine learning
  • 160 篇 deep learning
  • 135 篇 training
  • 100 篇 data models
  • 78 篇 feature extracti...
  • 76 篇 accuracy
  • 70 篇 data mining
  • 67 篇 neural networks
  • 66 篇 predictive model...
  • 61 篇 reinforcement le...
  • 57 篇 computational mo...
  • 52 篇 support vector m...
  • 46 篇 real-time system...
  • 42 篇 machine learning...
  • 39 篇 training data
  • 39 篇 artificial intel...
  • 36 篇 visualization
  • 35 篇 learning systems
  • 35 篇 adaptation model...
  • 31 篇 big data

机构

  • 18 篇 kazan natl res t...
  • 12 篇 king mongkuts un...
  • 10 篇 institute of inf...
  • 9 篇 school of cyber ...
  • 7 篇 chitkara univers...
  • 7 篇 college of compu...
  • 6 篇 king mongkuts un...
  • 6 篇 department of co...
  • 6 篇 the key laborato...
  • 5 篇 chinese acad sci...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 peng cheng lab
  • 4 篇 univ chinese aca...
  • 4 篇 department of ci...
  • 4 篇 school of electr...
  • 4 篇 department of el...
  • 4 篇 school of inform...
  • 4 篇 univ chinese aca...
  • 4 篇 school of comput...

作者

  • 7 篇 yang qiang
  • 7 篇 piriyasurawong p...
  • 6 篇 ouya samuel
  • 6 篇 akatimagool soms...
  • 5 篇 mendy gervais
  • 5 篇 cortez paulo
  • 5 篇 kraysman natalia...
  • 4 篇 peng shaoliang
  • 4 篇 liu sheng
  • 4 篇 you linlin
  • 4 篇 li han
  • 4 篇 barabanova svetl...
  • 4 篇 wang wei
  • 4 篇 huang kaiqi
  • 4 篇 lei baiying
  • 4 篇 wang jinyan
  • 4 篇 khatsrinova olga...
  • 4 篇 shen dinggang
  • 4 篇 li wei
  • 4 篇 li qianmu

语言

  • 2,158 篇 英文
  • 91 篇 其他
  • 27 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=22nd International Conference on Intelligent Data Engineering and Automated Learning"
2255 条 记 录,以下是931-940 订阅
排序:
intelligent Assessment Using Variable N-gram Technique  2nd
Intelligent Assessment Using Variable N-gram Technique
收藏 引用
22nd international conference on Interactive Collaborative learning (ICL) / 48th IGIP international conference on engineering Pedagogy - Impact of the 4th Industrial Revolution on engineering Education
作者: Kar, Sadhu Prasad Chatterjee, Rajeev Mandal, Jyotsna Kumar Univ Kalyani Kalyani W Bengal India Natl Inst Tech Teachers Training & Res Block FCSect 3 Kolkata 700106 India
Assessment is the fulcrum of any instructing and learning framework. In e-learning, online evaluation is a significant instrument for assessment of the learner that measures knowledge, skill and attitude. Most of the ... 详细信息
来源: 评论
Effective Malicious URL Detection by Using Generative Adversarial Networks  22nd
Effective Malicious URL Detection by Using Generative Advers...
收藏 引用
22nd international conference on Web engineering (ICWE)
作者: Geng, Jinbu Li, Shuhao Liu, Zhicheng Cheng, Zhenyu Fan, Li Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Natl Comp Network Emergency Response Tech Team Co Beijing Peoples R China
Malicious URL, a.k.a. malicious website, pose a great threat to Web security. In particular, concept drift caused by variants of malicious URL degrades the performance of existing detection methods based on the availa... 详细信息
来源: 评论
Federated learning for Human Activity Recognition on the MHealth dataset  1
收藏 引用
22nd international conference on Artificial Intelligence and Soft Computing, ICAISC 2023
作者: Sanchez, Sergio Machacuay, Javier Quinde, Mario Department of Industrial and Systems Engineering Universidad de Piura Piura Peru Department of Mechanical and Electrical Engineering Universidad de Piura Piura Peru
Human activity recognition (HAR) tasks are essential for developing context-aware features due to their capacity to generate higher-level contexts and personalisable services. The traditional centralised training appr... 详细信息
来源: 评论
Machine learning-Based Remaining Useful Life Predictions and Its Application on Predictive Maintenance
Machine Learning-Based Remaining Useful Life Predictions and...
收藏 引用
international Workshop on Research and Education in Mechatronics (REM)
作者: Ala' Khalifeh Suleman AlMeqdadi Electrical Engineering Department German Jordanian University Amman Jordan Computer Engineering Department German Jordanian University Amman Jordan
Predictive maintenance marks a significant improvement over traditional methods by preventing failures, minimizing downtime, and reducing costs, especially in aviation where it enhances safety. This paper explores the... 详细信息
来源: 评论
Real-Time 3D Object Detection Based on Dynamic Sparse Voxel Transformer in Mining Area
Real-Time 3D Object Detection Based on Dynamic Sparse Voxel ...
收藏 引用
IEEE international conference on Industrial Informatics (IndIN)
作者: Shengdi Sun Zhangyu Wang Runsen Liu Songyue Yang Liyun Wang Wentao Liu State Key Lab of Intelligent Transportation System The Key Laboratory of Autonomous Transportation Technology for Special Vehicles School of Transportation Science and Engineering Ministry of Industry and Information Technology Beihang University Beijing China
To improve the safety and efficiency of mining operation, the development of unmanned transportation technologies for mining trucks is extraordinarily rapid. The application of LiDAR in autonomous mining trucks has al... 详细信息
来源: 评论
ConFunc: Enhanced Binary Function-Level Representation through Contrastive learning
ConFunc: Enhanced Binary Function-Level Representation throu...
收藏 引用
IEEE international conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Longfei Li Xiaokang Yin Xiao Li Xiaoya Zhu Shengli Liu Zhengzhou University Zhengzhou China Information Engineering University Zhengzhou China
Binary code similarity detection (BCSD) has numerous applications, including malware detection, vulnerability search, plagiarism detection, and patch identification. Recent studies have demonstrated that with the rapi... 详细信息
来源: 评论
Pollutant Concentration Prediction Based on the Optimization of Long-Short Distance in Space
Pollutant Concentration Prediction Based on the Optimization...
收藏 引用
IEEE international conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Muyao Peng Kun Wang Yueli Wen School of Communication Engineering Xidian University Xi’an China School of Computer Science and Technology Xidian University Xi’an China
As air pollution continues to pose a growing threat to human health and environmental well-being, accurate forecasting of pollutant concentration has become increasingly important. Existing prediction models can be di... 详细信息
来源: 评论
A Public Benchmark of REST APIs
A Public Benchmark of REST APIs
收藏 引用
international Mining Software Repositories, MSR
作者: Alix Decrop Sara Eraso Xavier Devroey Gilles Perrouin NADI University of Namur Namur Belgium University of Valle Cali Valle del Cauca Colombia
In software engineering, benchmarks are widely used to evaluate and compare the performance, functionality, and reliability of analysis tools. Despite the prevalence of benchmarks in areas such as databases, machine l... 详细信息
来源: 评论
Privacy issues involved in data mining and countermeasures
Privacy issues involved in data mining and countermeasures
收藏 引用
MEMAT 2022;2nd international conference on Mechanical engineering, intelligent Manufacturing and Automation Technology
作者: Jing Liu
data mining can extract valuable information from large amounts of data and has matured in recent years as an important resource for productive life. This technology is a decision support process. It is mainly based o...
来源: 评论
System-Awareness: An Enabling Condition to Design and Deploy Anomaly Detectors
System-Awareness: An Enabling Condition to Design and Deploy...
收藏 引用
IEEE international conference on Software Architecture Workshops (ICSAW)
作者: Muhammad Atif Tommaso Zoppi Andrea Bondavalli Department of Mathematics and Informatics Viale Morgagni 65 University of Florence Florence Italy
Decades of research and practice originated mechanisms that can gather data from any system and process them for identifying deviations from the nominal expected behavior of such system i.e., anomalies. Anomaly detect... 详细信息
来源: 评论