咨询与建议

限定检索结果

文献类型

  • 20,103 篇 会议
  • 103 篇 期刊文献
  • 50 册 图书

馆藏范围

  • 20,256 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,207 篇 工学
    • 11,478 篇 计算机科学与技术...
    • 8,852 篇 软件工程
    • 3,234 篇 信息与通信工程
    • 2,496 篇 生物工程
    • 2,263 篇 控制科学与工程
    • 1,800 篇 电气工程
    • 1,487 篇 生物医学工程(可授...
    • 1,046 篇 机械工程
    • 1,028 篇 光学工程
    • 1,026 篇 电子科学与技术(可...
    • 797 篇 安全科学与工程
    • 777 篇 动力工程及工程热...
    • 761 篇 交通运输工程
    • 682 篇 仪器科学与技术
    • 660 篇 化学工程与技术
    • 483 篇 材料科学与工程(可...
  • 6,783 篇 理学
    • 3,489 篇 数学
    • 2,659 篇 生物学
    • 1,498 篇 统计学(可授理学、...
    • 1,365 篇 物理学
    • 844 篇 系统科学
    • 738 篇 化学
  • 4,237 篇 管理学
    • 2,539 篇 管理科学与工程(可...
    • 2,023 篇 图书情报与档案管...
    • 1,280 篇 工商管理
  • 1,434 篇 医学
    • 1,287 篇 临床医学
    • 1,240 篇 基础医学(可授医学...
    • 764 篇 药学(可授医学、理...
    • 631 篇 公共卫生与预防医...
  • 693 篇 教育学
    • 667 篇 教育学
  • 560 篇 法学
  • 487 篇 农学
  • 450 篇 经济学
  • 43 篇 军事学
  • 27 篇 文学
  • 8 篇 艺术学
  • 1 篇 哲学

主题

  • 1,325 篇 deep learning
  • 1,124 篇 machine learning
  • 832 篇 accuracy
  • 557 篇 data mining
  • 541 篇 support vector m...
  • 526 篇 feature extracti...
  • 431 篇 training
  • 411 篇 data models
  • 406 篇 convolutional ne...
  • 398 篇 predictive model...
  • 379 篇 internet of thin...
  • 362 篇 real-time system...
  • 328 篇 computational mo...
  • 324 篇 neural networks
  • 314 篇 big data
  • 233 篇 reinforcement le...
  • 200 篇 forecasting
  • 180 篇 object detection
  • 175 篇 machine learning...
  • 170 篇 artificial intel...

机构

  • 227 篇 chitkara univers...
  • 64 篇 centre of interd...
  • 54 篇 maharishi school...
  • 43 篇 maharishi school...
  • 34 篇 college of techn...
  • 31 篇 pune
  • 28 篇 school of comput...
  • 28 篇 chitkara univers...
  • 28 篇 the islamic univ...
  • 28 篇 school of comput...
  • 26 篇 karnataka bangal...
  • 24 篇 computer science...
  • 24 篇 computer science...
  • 24 篇 uttaranchal inst...
  • 23 篇 department of ar...
  • 22 篇 graphic era deem...
  • 22 篇 school of inform...
  • 22 篇 department of in...
  • 22 篇 national univers...
  • 20 篇 department of co...

作者

  • 23 篇 kukreja vinay
  • 22 篇 gill kanwarparta...
  • 21 篇 wang lei
  • 20 篇 shiva mehta
  • 19 篇 liu yang
  • 18 篇 wang jing
  • 16 篇 singh jagendra
  • 15 篇 zhang tao
  • 15 篇 malik bader alaz...
  • 15 篇 joshi kapil
  • 14 篇 yang yang
  • 13 篇 zhang lei
  • 13 篇 li yang
  • 12 篇 meena belwal
  • 12 篇 novais paulo
  • 12 篇 li li
  • 12 篇 zhang bo
  • 11 篇 babu tina
  • 11 篇 liu xin
  • 11 篇 rupesh gupta

语言

  • 15,418 篇 英文
  • 4,818 篇 其他
  • 126 篇 中文
  • 3 篇 土耳其文
  • 2 篇 西班牙文
  • 1 篇 俄文
检索条件"任意字段=3rd International Conference on Intelligent Data Engineering and Automated Learning"
20256 条 记 录,以下是4501-4510 订阅
排序:
Detection of Breast Cancer from Histopathological Images using Image Processing and Deep-learning  3
Detection of Breast Cancer from Histopathological Images usi...
收藏 引用
3rd international conference on intelligent Computing, Instrumentation and Control Technologies, ICICICT 2022
作者: Thomas, Anusha Maria Adithya, G. Arunselvan, A.S. Karthik, R. Vellore Institute of Technology Electronics and Computer Engineering Chennai India Vellore Institute of Technology Centre for Cyber Physical Systems School of Electronics Engineering Chennai India
Breast cancer is the most commonly occurring cancer in women. Cancer patients frequently develop metastasis, which is responsible for more than 90% of their deaths. The mortality rate will be significantly reduced if ... 详细信息
来源: 评论
Platform of the Web vulnerability detection Based on Natural Language Processing  3
Platform of the Web vulnerability detection Based on Natural...
收藏 引用
3rd international conference on Computer Vision, Image and Deep learning and international conference on Computer engineering and Applications, CVIDL and ICCEA 2022
作者: Ge, Xin Yue, Min-Nan University of Shanghai for Science and Technology Information Office Shanghai China University of Shanghai for Science and Technology School of Energy and Power Engineering Shanghai China
Rule-based Web vulnerability detection is the most common method, usually based on the analysis of the website code and the feedback on detection of the target. In the process, large amount of contaminated data and ne... 详细信息
来源: 评论
Optimized Virtual Machine Scheduling for Green Cloud Computing Using MLP-LSTM with Sheep Flock Optimization  3
Optimized Virtual Machine Scheduling for Green Cloud Computi...
收藏 引用
3rd international conference on Communication, Control, and intelligent Systems, CCIS 2024
作者: D'Souza, Mithun Sreenivasa, B.L. Nagalavi, Deepa Ahmad Khan, Shamim Sathyanarayana, S. Dhaaraani, R. St. Joseph's University Department of Computer Science Bangalore India School of It Mangalore India Glocal University Glocal School of Science & Technology U.P India Nie First Grade College Department of Computer Science Mysore India K. Ramakrishnan College of Engineering Department of Ai & Ds Tamil Nadu Trichy India
With the growing demand for cloud computing services, it is important to efficiently manage resources using proper strategies in order to save energy consumption while retaining high-level performance. The innovative ... 详细信息
来源: 评论
Research on Privacy Protection based on Network traffic data  3
Research on Privacy Protection based on Network traffic data
收藏 引用
3rd international conference on Digital Signal and Computer Communications, DSCC 2023
作者: Liu, Zhiyu Li, Qing Gong, Yue Li, Qiuxiang The First Research Institute of the Ministry of Public Security of P.R.C Beijing China Beijing Municipal Public Security Bureau Beijing China
This paper discusses the research of privacy protection based on network traffic data. Firstly, the concept and collection method of network traffic data are introduced, and the method of collecting network traffic da... 详细信息
来源: 评论
Cyber Security Fraud Detection Using Machine learning Approach  3
Cyber Security Fraud Detection Using Machine Learning Approa...
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2023
作者: Raman, Ramakrishnan Tiwari, Mohit Buddhi, Dharam Trivedi, Snehal Bothe, Shivaji Ponnusamy, R. Symbiosis Institute of Business Management Maharashtra Pune India Bharati Vidyapeeth's College of Engineering Department of Computer Science and Engineering Paschim Vihar Delhi India Uttaranchal University Uttaranchal Institute of Technology India Parul University Department of Mech India Department of IT & Business Analytics India Chennai Institute of Technology Department of Computer Science & Engineering India
It is notoriously harder to identify fraudsters for its fluid nature in terms of recognizable trends. Latest technological breakthroughs were used by scammers. Individuals overcome the protection, incurring millions o... 详细信息
来源: 评论
The Development of Advanced Deep learning-Based EoR Signal Separation Techniques  3rd
The Development of Advanced Deep Learning-Based EoR Signal S...
收藏 引用
3rd international conference on Computer Vision, High Performance Computing, Smart Devices, and Networks, CHSN 2022
作者: Pradeep, S. Prasad, C.V.P.R. Ruchitha, Ch Maisammaguda Telangana Hyderabad India Maisammaguda Telangana Hyderabad India
The weak EoR signal is submerged in the strong foreground radiation interference. The classic the foreground removal methods assume that the foreground spectrum is smooth, but the complex instrumental effect will affe... 详细信息
来源: 评论
Research on Abnormal Network Traffic Detection Method based on Machine learning  3
Research on Abnormal Network Traffic Detection Method based ...
收藏 引用
3rd international conference on Machine learning and Computer Application, ICMLCA 2022
作者: Tan, Xiaobo Jia, Yumei College of Information Science and Engineering Ligong University Liaoning Shenyang China Department of Computer Science and Technology Shenyang Ligong University Liaoning Shenyang China
Aiming at the problem of high false detection rate and low detection rate of abnormal network traffic detection methods due to uneven data distribution of current network traffic datasets, a network abnormal traffic d... 详细信息
来源: 评论
Deep learning and Machine learning Algorithms Methods in Cyber Security  3rd
Deep Learning and Machine Learning Algorithms Methods in Cyb...
收藏 引用
3rd international conference on Smart Computing and Cyber Security—Strategic Foresight, Security Challenges and Innovation, SMARTCYBER 2023
作者: Al-Absi, Mohammed Abdulhakim R’Bigui, Hind Al-Absi, Ahmed A. Department of Computer Engineering Dongseo University 47 Jurye-ro Sasang-gu Busan47011 Korea Republic of Digital Enterprise Department Nsoft CO. LTD No. 407 14 Tekeunosaneop-go 55beon gil Nam-gu Ulsan44776 Korea Republic of Department of Smart Computing Kyungdong University 46 4-gil Bongpo Gangwon-do Goseong-gun24764 Korea Republic of
This study investigates the use of Machine learning (ML) and Deep learning (DL) algorithms in cyber security. By leveraging ML and DL technologies, organizations can enhance their ability to detect and prevent cyber t... 详细信息
来源: 评论
A model parameter update strategy for enhanced asynchronous federated learning algorithm  3
A model parameter update strategy for enhanced asynchronous ...
收藏 引用
3rd IEEE international conference on Computer Systems, ICCS 2023
作者: Sun, Yu Gao, Xin Shen, Ying Xie, Jianfei Yang, Jiandong Si, Nong Beijing University of Technology Faculty of Information Technology Beijing China North China Institute of Science & Technology Department of Internet of Things Engineering Hebei China Capinfo Technology Development Co. Ltd. Beijing China
Federated learning addresses the 'data islands' issue resulting from privacy concerns, enabling multiple users to train a model collaboratively without sharing their private datasets. However, in the model tra... 详细信息
来源: 评论
A method of generating abstract ink paintings based on machine learning  3
A method of generating abstract ink paintings based on machi...
收藏 引用
3rd international conference on Computer Vision and data Mining, ICCVDM 2022
作者: Huang, Yike Sichuan University Chuanda Road Shuangliu County Chengdu610207 China
The advancement of computer technology in the area of image generation opens up opportunities for the creation of art. However, owing to the complexity of artistic expression and the difficulty of data collection, gen... 详细信息
来源: 评论