咨询与建议

限定检索结果

文献类型

  • 1,890 篇 会议
  • 6 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 1,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,395 篇 工学
    • 1,275 篇 计算机科学与技术...
    • 1,022 篇 软件工程
    • 318 篇 生物工程
    • 311 篇 信息与通信工程
    • 190 篇 生物医学工程(可授...
    • 162 篇 控制科学与工程
    • 124 篇 电气工程
    • 120 篇 光学工程
    • 83 篇 机械工程
    • 74 篇 化学工程与技术
    • 65 篇 安全科学与工程
    • 63 篇 网络空间安全
    • 54 篇 电子科学与技术(可...
    • 48 篇 仪器科学与技术
  • 760 篇 理学
    • 399 篇 数学
    • 327 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 152 篇 物理学
    • 134 篇 系统科学
    • 83 篇 化学
  • 449 篇 管理学
    • 253 篇 管理科学与工程(可...
    • 232 篇 图书情报与档案管...
    • 131 篇 工商管理
  • 175 篇 医学
    • 166 篇 临床医学
    • 159 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
    • 63 篇 公共卫生与预防医...
  • 82 篇 教育学
    • 82 篇 教育学
  • 77 篇 法学
    • 69 篇 社会学
  • 52 篇 农学
    • 51 篇 作物学
  • 46 篇 经济学
  • 4 篇 军事学

主题

  • 326 篇 machine learning
  • 135 篇 deep learning
  • 79 篇 support vector m...
  • 66 篇 machine learning...
  • 55 篇 forecasting
  • 46 篇 feature extracti...
  • 37 篇 decision trees
  • 36 篇 accuracy
  • 35 篇 computational mo...
  • 34 篇 computer vision
  • 31 篇 predictive model...
  • 30 篇 training
  • 29 篇 convolutional ne...
  • 28 篇 data mining
  • 28 篇 students
  • 26 篇 neural networks
  • 22 篇 object detection
  • 22 篇 artificial intel...
  • 21 篇 sentiment analys...
  • 20 篇 internet of thin...

机构

  • 12 篇 chitkara univers...
  • 7 篇 shenyang ligong ...
  • 6 篇 uttaranchal inst...
  • 5 篇 department of co...
  • 5 篇 maharishi school...
  • 5 篇 alibaba cloud bi...
  • 4 篇 school of comput...
  • 4 篇 college of compu...
  • 4 篇 key laboratory o...
  • 4 篇 lovely professio...
  • 4 篇 jilin agricultur...
  • 4 篇 uttaranchal univ...
  • 4 篇 key laboratory o...
  • 4 篇 department of co...
  • 4 篇 master of comput...
  • 4 篇 school of inform...
  • 3 篇 school of comput...
  • 3 篇 vivekananda glob...
  • 3 篇 department of el...
  • 3 篇 college of compu...

作者

  • 4 篇 liu gang
  • 4 篇 kumar rakesh
  • 4 篇 waseemullah
  • 4 篇 liu peng
  • 3 篇 zhang tao
  • 3 篇 kumar ajay
  • 3 篇 rakesh kumar
  • 3 篇 babu tina
  • 3 篇 siddhant
  • 3 篇 sharma arun
  • 3 篇 faisal rehman
  • 3 篇 wang xiaofei
  • 3 篇 sharif hanan
  • 3 篇 gupta rajeev kum...
  • 3 篇 singh sunil kuma...
  • 3 篇 rehman faisal
  • 3 篇 tina babu
  • 3 篇 yang wei
  • 3 篇 sharma avinash
  • 3 篇 prajwal

语言

  • 1,779 篇 英文
  • 116 篇 其他
  • 18 篇 中文
检索条件"任意字段=3rd International Conference on Machine Learning and Computer Application, ICMLCA 2022"
1897 条 记 录,以下是571-580 订阅
排序:
A Synoptic Survey on Personality Prediction System using MBTI  3
A Synoptic Survey on Personality Prediction System using MBT...
收藏 引用
3rd international conference on Electronics and Sustainable Communication Systems, ICESC 2022
作者: Justindhas, Y. Mohanraj, Sabari Mutheeswari Shivani, R. Easwari Engineering College Department of Computer Science and Engineering Chennai India
This survey paper presents a Personality Prediction System based on Meyer-Briggs-Type-Indicator (MBTI) that computes and identifies the personality traits of an individual using a qualified machine learning technique.... 详细信息
来源: 评论
Semantic Analysis and machine learning Techniques for Enhancing Content-Based Image Retrieval  3rd
Semantic Analysis and Machine Learning Techniques for Enhanc...
收藏 引用
3rd international conference on Mechanical and Energy Technologies, ICMET 2023
作者: Sunil, G. Manochandar, S. Atheeq Sultan Ghori, Md. Kumar, K. Suresh Kumar, Binod Dhanke, Jyoti School of Computer Science and Artificial Intelligence SR University Telangana Warangal India Department of Master of Business Administration CARE College of Engineering Tamil Nadu #27 Dindugal Main Road Tamil Nadu Thayanur620 009 India Department of Computer Science and Engineering Telangana University Nizamabad Telangana State Nizamabad India MBA Department Panimalar Engineering College Varadarajapuram Poonamallee Chennai India JSPM Rajarshi Shahu College of Engineering Maharashtra Pune India Savitribai Phule Pune University Maharashtra Pune India
Multimedia data has grown in volume and complication due to the explosion of computing innovations and the introduction of the Internet. The client can submit a request to the content-based image retrieval (CBIR) stru... 详细信息
来源: 评论
DDoS Attack Detection Using machine learning  3rd
DDoS Attack Detection Using Machine Learning
收藏 引用
3rd international conference on Information Technology, InCITe 2023
作者: Swati, Jadhav Nitin, Pise Singh, Shruti Sinha, Akash Sirvi, Vishal Srivastava, Shreyansh Computer Engineering and Technology MIT World Peace University Pune India Department of Computer Engineering Vishwakarma Institute of Technology Pune India
Distributed denial of service attack, sometimes termed as the ddos attack, is now the most dangerous cyber threat. This is primarily accomplished through network traffic bombardment, in which attackers attempt to gene... 详细信息
来源: 评论
Utilizing machine learning to Develop an Improved Real-Time Data Analysis System  3
Utilizing Machine Learning to Develop an Improved Real-Time ...
收藏 引用
3rd international conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Khandari, Harsimrat Sahoo, Girija Shankar Raja Praveen, K.N. Shree, Ritu Umamaheswari, B. Yashwant, V. Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Computer Science and Engineering Karnataka Bangalore India Vivekananda Global University Department of Computer Science & Application Jaipur India Prince Shri Venkateshwara Padmavathy Engineering College Department of Computer Science and Engineering Chennai India Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India
With the constantly growing volume of facts being produced, conventional data evaluation structures are regularly insufficient in terms of presenting an correct overview of the most modern-day data. The utilization of... 详细信息
来源: 评论
Design and application of English Assisted learning System Based on Mobile learning Platform  3
Design and Application of English Assisted Learning System B...
收藏 引用
3rd international conference on machine learning and Big Data Analytics for IoT Security and Privacy, SPIoT2023
作者: Huang, Xiaojing Public Course Department Hainan Vocational University of Science and Technology Haikou571126 China
For the purpose of developing a new kind of auxiliary learning method or tool, the author puts forward a kind of personalized mobile EFL learning system based on Android and vocabulary learning. The system consists of... 详细信息
来源: 评论
application of Deep learning in Monitoring and Warning of Network Public Opinion in Universities  3
Application of Deep Learning in Monitoring and Warning of Ne...
收藏 引用
3rd international conference on computer Science and Management Technology, ICCSMT 2022
作者: Li, Menggang Wuhan University of Science and Technology Hubei Province Wuhan China
This paper uses the deep learning technology of convolutional neural network (CNN) and Word2vec to improve the accuracy of network public opinion monitoring in universities. This paper uses crawler technology to obtai... 详细信息
来源: 评论
machine learning Approach Based Phishing Email Text Analysis (ML-PE-TA)  3
Machine Learning Approach Based Phishing Email Text Analysis...
收藏 引用
3rd international conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2022
作者: Ahammad, Shaik Mulinti Mustaq Raviteja, Tangudu Koushik, Jami Dinesh, Pamidi Venkata Ashok, Asha Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
Phishing based incidents are the procedure of posting illegal or dishonest communications that seems to be originated from a trustworthy sending node. It is commonly reflected in the case of email transmission. The ai... 详细信息
来源: 评论
Design and Implementation of Virtual Character based on Facial Motion Capture  3
Design and Implementation of Virtual Character based on Faci...
收藏 引用
2022 3rd international conference on computer Information and Big Data applications, CIBDA 2022
作者: Qi, Jiangyuan Wang, Shanshan School of Art and Design Changjiang Polytechnic China School of Computer Technology and Software Engineering Wuhan Polytechnic China
The metaverse is one of the hottest concepts right now. With the development of computer technology, digital virtual human gradually developed from concept to practical application. At present, virtual characters have... 详细信息
来源: 评论
Multifold Secured Bank application Authentication Service Using Random Visual Cryptography and Multimodal Steganography with Blockchain Technology  1
收藏 引用
3rd international conference on Recent Trends in machine learning, IoT, Smart Cities and applications, ICMISC 2022
作者: Jahnavi, S. Nandini, C. Computer Science and Engineering Department Dayananda Sagar Academy of Technology and Management Visvesvaraya Technological University Karnataka Bangalore560082 India
DATA protection is becoming increasingly critical as the demand for online services grows, which biometrics authentication can help with. To communicate biometric data authenticating services over the Internet in a se... 详细信息
来源: 评论
machine learning Models based Mental Health Detection  3
Machine Learning Models based Mental Health Detection
收藏 引用
3rd international conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2022
作者: Karunakaran, Manivannan Balusamy, Jeevanantham Selvaraj, Krishnakumar Psna College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu India Jainee College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu India Theni Kammavar Sangam College of Technology Department of Electronics and Communication Engineering Tamil Nadu India
This century will be the fastest ever, putting a heavy burden on future generations, especially students. Future generations will face enormous stress, competition, social issues, and constant pressure. Their lives wi... 详细信息
来源: 评论