咨询与建议

限定检索结果

文献类型

  • 171 篇 会议
  • 3 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 123 篇 计算机科学与技术...
    • 66 篇 软件工程
    • 32 篇 信息与通信工程
    • 26 篇 控制科学与工程
    • 17 篇 电气工程
    • 12 篇 生物工程
    • 10 篇 交通运输工程
    • 7 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 动力工程及工程热...
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 土木工程
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
  • 41 篇 理学
    • 26 篇 数学
    • 12 篇 生物学
    • 9 篇 物理学
    • 9 篇 系统科学
    • 7 篇 统计学(可授理学、...
    • 4 篇 化学
  • 33 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 10 篇 教育学
    • 6 篇 教育学
    • 4 篇 心理学(可授教育学...
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 法学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 13 篇 intelligent syst...
  • 6 篇 internet of thin...
  • 5 篇 informatics
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 4 篇 optimization
  • 4 篇 testing
  • 3 篇 learning systems
  • 3 篇 deep learning
  • 3 篇 advanced driver ...
  • 3 篇 image segmentati...
  • 3 篇 manipulators
  • 3 篇 data mining
  • 3 篇 particle swarm o...
  • 3 篇 semantics
  • 3 篇 information secu...
  • 3 篇 humans
  • 3 篇 artificial intel...
  • 3 篇 cloud computing
  • 3 篇 sensors

机构

  • 4 篇 department of in...
  • 4 篇 department of in...
  • 2 篇 univ politehn bu...
  • 2 篇 beihang univ bei...
  • 2 篇 cairo
  • 2 篇 faculty of compu...
  • 2 篇 department of ad...
  • 2 篇 univ autonoma ba...
  • 2 篇 nanjing univ pos...
  • 2 篇 computer science...
  • 2 篇 6 miklukho-makla...
  • 2 篇 british universi...
  • 2 篇 jiangsu prov col...
  • 2 篇 cairo univ fac c...
  • 2 篇 3-30-1 wajiro-hi...
  • 1 篇 school of biomed...
  • 1 篇 school of automo...
  • 1 篇 university of ou...
  • 1 篇 oxford brookes u...
  • 1 篇 department of co...

作者

  • 4 篇 elhoseny mohamed
  • 4 篇 tohari ahmad
  • 4 篇 hassanien aboul ...
  • 4 篇 m. virvou
  • 4 篇 shaalan khaled
  • 3 篇 muhammad aidiel ...
  • 2 篇 duan xuting
  • 2 篇 laallam fatima z...
  • 2 篇 dzantiev iliya
  • 2 篇 xiong hejin
  • 2 篇 guo peng
  • 2 篇 amer eslam
  • 2 篇 serrano fernando...
  • 2 篇 xhafa fatos
  • 2 篇 sobeslav vladimi...
  • 2 篇 berbaoui brahim
  • 2 篇 lei deming
  • 2 篇 gudkova irina
  • 2 篇 azar ahmad taher
  • 2 篇 soliman taysir h...

语言

  • 175 篇 英文
检索条件"任意字段=3rd International Conference on Advanced Intelligent Systems and Informatics, AISI 2017"
175 条 记 录,以下是1-10 订阅
排序:
3rd international conference on advanced intelligent systems and informatics, aisi 2017
3rd International Conference on Advanced Intelligent Systems...
收藏 引用
3rd international conference on advanced intelligent systems and informatics, aisi 2017
The proceedings contain 85 papers. The special focus in this conference is on advanced intelligent systems and informatics. The topics include: BP-MPSO algorithm for PUMA robot vacumn path planning;modeling and perfor...
来源: 评论
Android Malware Detection Based on CTGAN and LightGBM
Android Malware Detection Based on CTGAN and LightGBM
收藏 引用
international Symposium on advanced Computing and Communication (ISACC)
作者: Zydhan Linnar Putra Tohari Ahmad Muhammad Aidiel Rachman Putra Adifa Widyadhani Chanda D'Layla Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia
Android OS vulnerabilities necessitate improved malware mitigation. Machine learning (ML) offers solutions but struggles with imbalanced datasets, reducing effectiveness in detecting minority classes. Traditional meth... 详细信息
来源: 评论
Generative Adversarial Networks for Synthetic Data Generation in Privacy-Preserving Health informatics
Generative Adversarial Networks for Synthetic Data Generatio...
收藏 引用
international Symposium on advanced Computing and Communication (ISACC)
作者: Vineet Kumar Hassan Safi Ahmed M. Shailaja B Karthikeyan Malik Bader Alazzam R Saravanakumar Symbiosis Centre for Management Studies Pune Symbiosis International (Deemed University) Pune Maharashtra India Department of Biomedical Engineering Al-Farahidi University Baghdad Iraq Department of DataScience MallaReddy University Hyderabad Telangana India Department of CSE KPR Institute of Engineering and Technology Coimbatore India Faculty of Information Technology Jadara University Irbid Jordan Department of ECE Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India
Privacy preserving health informatics deals with the problem of how to obtain informative analysis from the health-related information while ensuring that the privacy of individuals is protected. This paper presents t... 详细信息
来源: 评论
REXIO: Indexing for Low Write Amplification by Reducing Extra I/Os in Key-Value Store Under Mixed Read/Write Workloads  25th
REXIO: Indexing for Low Write Amplification by Reducing Ex...
收藏 引用
25th international conference on Web Information systems Engineering, WISE 2024
作者: Wang, Zizhao Qu, Qiang Han, Nan Deng, Zhelang Ma, Yizhuo Huang, Xiaowen Meng, Jintao Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China University of Chinese Academy of Sciences Beijing China Shenzhen University Shenzhen China Department of Health Technology and Informatics The Hong Kong Polytechnic University Hong Kong Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of China Chengdu China
In mixed read/write (r/w) workloads, Key-Value stores that utilize Log-Structured Merge trees face significant write amplification (WA) due to frequent writing, resulting in extensive data compaction. While current LS... 详细信息
来源: 评论
Frequency Encoding of High Cardinality Categorical Features to Detect SPAM Botnet Activity
Frequency Encoding of High Cardinality Categorical Features ...
收藏 引用
international Symposium on advanced Computing and Communication (ISACC)
作者: Daffa Muhamad Azhar Tohari Ahmad Muhammad Aidiel Rachman Putra Adifa Widyadhani Chanda D’Layla Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia
Network attacks are diverse, with botnets being among the most dangerous. SPAM is a common botnet threat, making botnet detection a critical focus in classifying botnet and non-botnet network traffic. Since most detec... 详细信息
来源: 评论
Lightweight Botnet Detection for IoT: Autoencoder-Based Approach Using Packet Length
Lightweight Botnet Detection for IoT: Autoencoder-Based Appr...
收藏 引用
international Symposium on advanced Computing and Communication (ISACC)
作者: Muhammad Arifuddin Aljufri Tohari Ahmad Muhammad Aidiel Adifa Widyadhani Chanda D'Layla Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia
The growing prevalence of botnet attacks poses a significant threat, particularly as the demand for IoT devices continues to rise. This underscores the need for effective botnet detection techniques tailored for IoT e... 详细信息
来源: 评论
Adaptive Dictionary Optimization for LSTM-Based Detection of Low-Rate FTP Attacks with Noisy Training Sets
Adaptive Dictionary Optimization for LSTM-Based Detection of...
收藏 引用
international Symposium on advanced Computing and Communication (ISACC)
作者: Angela Oryza Prabowo Tohari Ahmad Muhammad Aidiel Rachman Putra Adifa Widyadhani Chanda D’Layla Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia
Network Intrusion Detection systems (NIDS) face challenges from low-rate attacks that evade traditional methods, but deep learning models like Long Short-Term Memory (LSTM) networks offer a solution by analyzing netwo... 详细信息
来源: 评论
U-SwinTrans: Automated Skin Lesion Segmentation Using Swin Transformer
U-SwinTrans: Automated Skin Lesion Segmentation Using Swin T...
收藏 引用
international Symposium on advanced Computing and Communication (ISACC)
作者: Aaditya Lochan Sharma Kalpana Sharma Utkarsh Prakash Srivastava Palash Ghosal Department of Computer Science and Engineering Sikkim Manipal Institute of Technology Sikkim Manipal University Sikkim India Dept of Electrical and Computer Engineering New York University New York USA Department of Information Technology Sikkim Manipal Institute of Technology Sikkim Manipal University Sikkim India
Skin lesions are difficult to segment because of their different shapes, sizes, colors, and textures. While Convolutional Neural Networks (CNNs) have proven effective at medical image segmentation, typical U-shaped ne... 详细信息
来源: 评论
Proceedings of the international conference on advanced intelligent systems and informatics 2017
收藏 引用
2017年
作者: Aboul Ella Hassanien Khaled F. Shaalan Tarek Gaber Mohamed Fahmy Tolba
This book gathers the proceedings of the 3rd international conference on advanced intelligent systems and informatics 2017 (aisi2017), which took place in Cairo, Egypt from September 9 to 11, 2017. This international ...
来源: 评论
Understanding medical text related to breast cancer: A review  3rd
Understanding medical text related to breast cancer: A revie...
收藏 引用
3rd international conference on advanced intelligent systems and informatics, aisi 2017
作者: Ali, Noha Amer, Eslam Zayed, Hala Department of Computer Science Modern Academy Cairo Egypt Department of Computer Science Faculty of Computers and Informatics Benha University Benha Egypt
Breast Cancer is a harmful disease that has caused millions of women deaths. There are a huge number of publications on breast cancer research which offers a good source of information. Identifying breast cancer bioma... 详细信息
来源: 评论