咨询与建议

限定检索结果

文献类型

  • 232 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 148 篇 工学
    • 142 篇 计算机科学与技术...
    • 125 篇 软件工程
    • 29 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 16 篇 生物工程
    • 15 篇 电气工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 生物医学工程(可授...
    • 14 篇 机械工程
    • 12 篇 光学工程
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 6 篇 仪器科学与技术
    • 6 篇 安全科学与工程
    • 5 篇 材料科学与工程(可...
  • 66 篇 理学
    • 34 篇 数学
    • 19 篇 生物学
    • 15 篇 物理学
    • 11 篇 系统科学
    • 10 篇 统计学(可授理学、...
    • 5 篇 化学
  • 29 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 16 篇 工商管理
    • 7 篇 图书情报与档案管...
  • 12 篇 医学
    • 12 篇 临床医学
    • 11 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 11 篇 法学
    • 6 篇 法学
    • 6 篇 社会学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 5 篇 农学
  • 1 篇 教育学

主题

  • 26 篇 software
  • 25 篇 machine learning
  • 23 篇 accuracy
  • 21 篇 machine learning...
  • 15 篇 adversarial mach...
  • 13 篇 software algorit...
  • 12 篇 support vector m...
  • 11 篇 deep learning
  • 11 篇 predictive model...
  • 10 篇 security
  • 9 篇 medical services
  • 9 篇 real-time system...
  • 9 篇 training
  • 8 篇 internet of thin...
  • 7 篇 computational mo...
  • 7 篇 performance eval...
  • 7 篇 convolutional ne...
  • 6 篇 scalability
  • 6 篇 vectors
  • 6 篇 feature extracti...

机构

  • 8 篇 chitkara univers...
  • 4 篇 department of ma...
  • 2 篇 ideabytes softwa...
  • 2 篇 department of el...
  • 2 篇 software college...
  • 2 篇 department of co...
  • 2 篇 school of softwa...
  • 2 篇 east west univer...
  • 2 篇 software institu...
  • 2 篇 arka jain univer...
  • 2 篇 hubei engineerin...
  • 2 篇 guangdong univer...
  • 2 篇 artificial intel...
  • 2 篇 westcliff univer...
  • 2 篇 brac university ...
  • 2 篇 qingdao universi...
  • 2 篇 china institute ...
  • 2 篇 hainan province ...
  • 2 篇 dongguan key lab...
  • 2 篇 hyderabad

作者

  • 2 篇 r. subash
  • 2 篇 du shipei
  • 2 篇 agrawalla bikash
  • 2 篇 sun yu
  • 2 篇 yang lei
  • 2 篇 rahman shafiur
  • 2 篇 rizdania
  • 2 篇 sivasankar c.
  • 2 篇 arslan hilal
  • 2 篇 gupta sandeep
  • 2 篇 sultana shayma
  • 1 篇 sahil subbaiah m...
  • 1 篇 zhu siyu
  • 1 篇 jabbar qasim abd...
  • 1 篇 sree vivek s.
  • 1 篇 chellatamilan t.
  • 1 篇 mishra gaurav ve...
  • 1 篇 bhoomika p.
  • 1 篇 rajiv gandhi k
  • 1 篇 seal ayan

语言

  • 168 篇 英文
  • 64 篇 其他
  • 3 篇 中文
检索条件"任意字段=2nd International Conference on Software Engineering and Machine Learning, CONF-SEML 2024"
232 条 记 录,以下是31-40 订阅
排序:
Empowering Precision machine: Deep learning Technique for Lung Cancer Diagnosis  2
Empowering Precision Machine: Deep Learning Technique for Lu...
收藏 引用
2nd international conference on Computing and Data Analytics, ICCDA 2024
作者: Jamil, Danish Shah, Syed Mehr Ali Khan, Muhammad Numan Ali Aljarwani, Fatma Mahfoodh Mohammed University of Santiago de Compostela Spain Sir Syed University of Engineering & Technology Department of Software Engineering India College of Computing & Information Sciences University of Technology and Applied Sciences Musandam Oman
This research paper delves into the realm of lung cancer diagnosis, a critical area in modern healthcare owing to its substantial global impact. Leveraging cutting-edge technology and machine learning methodologies, s... 详细信息
来源: 评论
UUT: Unveiling Unknown Threats with machine learning for Exploit Detection  2
UUT: Unveiling Unknown Threats with Machine Learning for Exp...
收藏 引用
2nd international conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Khan, Aadil Sharma, Ishu Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
In cybersecurity, attack detection indicates finding and countering efforts to take advantage of weak spots in computer systems using cutting edge technologies like AI and machine learning. Exploits are software or pr... 详细信息
来源: 评论
Enhancing Transparency in DDoS Detection on SDN Using Explainable ML Models  2
Enhancing Transparency in DDoS Detection on SDN Using Explai...
收藏 引用
2nd international conference on Information and Communication Technology, ICICT 2024
作者: Raihan, Md. Zobair Islam, Md. Saiful Institute of Information and Communication Technology Bangladesh University of Engineering and Technology Dhaka Bangladesh
software-Defined Networking (SDN) is a networking approach that allows network administrators to define and manage network behavior through software rather than relying on physical hardware configurations. SDN can be ... 详细信息
来源: 评论
Analysis of Code Smells Using machine learning Algorithms  1
收藏 引用
2nd international conference on Modern Research in Aerospace engineering, MRAE 2023
作者: Jain, Varun Singh, Rohinish Rai, Nishant Gupta, Aakanshi Amity School of Engineering and Technology Amity University Uttar Pradesh Noida India
A code smell is a sign or indication that is introduced in the source code of a software program during the design or implementation phases, which may lead to more significant problems during software maintenance. The... 详细信息
来源: 评论
COLLEGEBOT: Virtual Assistant System for Enquiry Using Natural Language Processing  2
COLLEGEBOT: Virtual Assistant System for Enquiry Using Natur...
收藏 引用
2nd international conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Selvi, A. Mounika, V. Rubika, V. Uvadharanee, B. M.Kumarasamy College of Engineering Thalavapalayam Department of Computer Science and Engineering Tamilnadu Karur639113 India
The Artificial Intelligence (AI) and Natural Language Processing (NLP) software or application helps to interact with people in a human-like fashion by delivering information, answering questions, completing tasks, an... 详细信息
来源: 评论
Personal Exercise Trainer Using Computer Vision  2
Personal Exercise Trainer Using Computer Vision
收藏 引用
2nd international conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Hari Ram, S. Ashok, A. Ramalingam, A. Dheenadhayalan, S. National Engineering College Dept. of Computer Science and Engineering Tamil Nadu Kovilpatti India
The Personal Trainer online application tracks users progress and offers realtime feedback to encourage users in their daily workout routines. To identify and analyze human body movements, the program uses the mediapi... 详细信息
来源: 评论
Ethical Considerations of Bias and Fairness in AI Models  2
Ethical Considerations of Bias and Fairness in AI Models
收藏 引用
2nd international conference on Disruptive Technologies, ICDT 2024
作者: Verma, Sarvachan Paliwal, Neha Yadav, Kanchan Vashist, P.C. Ajay Kumar Garg Engineering College Department of Information Technology UP Ghaziabad India UP Ghaziabad India Gla University Department of Mechanical Engineering UP Mathura India Gl Bajaj Institute of Technology and Management Department of Information Technology Up Greater Noida India
The ethical implications of artificial intelligence (AI) are becoming increasingly important. AI systems have the potential to incite bias against certain races and genders, either through programming choices or throu... 详细信息
来源: 评论
ML-Orchestrated Malware Detection Framework for Windows APIs in Critical Infrastructure Systems  2
ML-Orchestrated Malware Detection Framework for Windows APIs...
收藏 引用
2nd international conference on Computer, Communication and Control, IC4 2024
作者: Vaghasiya, Shayalkumar Gupta, Rajesh Mohapatra, Santoshinee Tanwar, Sudeep Garg, Deepak Institute of Technology Nirma University Department of Computer Science and Engineering Gujarat 382481 India Sr University School of Computer Science and Ai Telangana Warangal India
The security of critical infrastructure systems is crucial as they provide basic amenities and services necessary for functioning of a community, also they represent important part of country's economy. An attack ... 详细信息
来源: 评论
A Service-Oriented Digital Twin Framework for Dynamic and Robust Distributed Systems  2
A Service-Oriented Digital Twin Framework for Dynamic and Ro...
收藏 引用
2nd IEEE international conference on software Services engineering (SSE)
作者: Gu, Rong Seceleanu, Tiberiu Xiong, Ning Naeem, Muhammad Malardalen Univ Vasteras Sweden
Digital Twins (DTs) are virtual representations of physical products in many dimensions, such as geometry and behaviour. As a backbone of Industry 4.0, DTs help interpret and even predict the behaviour of physical pro... 详细信息
来源: 评论
Morphed Picture Recognition using machine learning Algorithms  2
Morphed Picture Recognition using Machine Learning Algorithm...
收藏 引用
2nd IEEE international conference on Advances in Information Technology, ICAIT 2024
作者: Kadiri, Padmaja Anusha, Palagati Prabhu, Madhav Asuncion, Rolito Pavan, Voonna Sainath Suman, Jami Venkata Department of AIML Mohan Babu University Erstwhile Sree Vidyanikethan Engineering College Andhra Pradesh Tirupati India Guru Nanak Institute of Technology Telangana Hyderabad India Faculty Computing and Electronic Engineering Middle East College Muscat Oman Department of CSE Gayatri Vidya Parishad College of Engineering Andhra Pradesh Visakhapatnam India Department of ECE GMR Institute of Technology Andhra Pradesh Rajam India
With the development of image alteration tools in the digital age, image authenticity has become a major topic. It is becoming more and more difficult to discern between photos that have been altered and those that ha... 详细信息
来源: 评论