咨询与建议

限定检索结果

文献类型

  • 1,129 篇 会议
  • 11 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,147 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 748 篇 工学
    • 708 篇 计算机科学与技术...
    • 441 篇 软件工程
    • 136 篇 信息与通信工程
    • 108 篇 电气工程
    • 72 篇 生物医学工程(可授...
    • 67 篇 生物工程
    • 65 篇 控制科学与工程
    • 32 篇 安全科学与工程
    • 29 篇 化学工程与技术
    • 21 篇 网络空间安全
    • 20 篇 动力工程及工程热...
    • 19 篇 机械工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
  • 252 篇 理学
    • 185 篇 数学
    • 78 篇 系统科学
    • 77 篇 生物学
    • 64 篇 统计学(可授理学、...
    • 24 篇 化学
    • 15 篇 物理学
  • 215 篇 管理学
    • 121 篇 图书情报与档案管...
    • 104 篇 管理科学与工程(可...
    • 52 篇 工商管理
  • 77 篇 医学
    • 68 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 47 篇 药学(可授医学、理...
    • 27 篇 公共卫生与预防医...
  • 33 篇 法学
    • 32 篇 社会学
  • 31 篇 教育学
    • 27 篇 教育学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 15 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 374 篇 data mining
  • 237 篇 machine learning
  • 56 篇 support vector m...
  • 56 篇 machine learning...
  • 48 篇 feature extracti...
  • 45 篇 data models
  • 44 篇 accuracy
  • 42 篇 sentiment analys...
  • 40 篇 big data
  • 39 篇 classification a...
  • 35 篇 predictive model...
  • 34 篇 classification
  • 31 篇 deep learning
  • 30 篇 training
  • 29 篇 prediction algor...
  • 26 篇 forecasting
  • 23 篇 neural networks
  • 23 篇 decision trees
  • 20 篇 artificial intel...
  • 19 篇 learning systems

机构

  • 4 篇 college of techn...
  • 3 篇 department of sc...
  • 3 篇 galgotias univer...
  • 3 篇 shanghai univers...
  • 3 篇 uttaranchal univ...
  • 3 篇 uttaranchal inst...
  • 2 篇 new prince shri ...
  • 2 篇 china transport ...
  • 2 篇 miet haldwani
  • 2 篇 school of it viv...
  • 2 篇 state grid custo...
  • 2 篇 world college of...
  • 2 篇 school of econom...
  • 2 篇 china electric p...
  • 2 篇 college of compu...
  • 2 篇 shandong institu...
  • 2 篇 chitkara univers...
  • 2 篇 school of comput...
  • 2 篇 college of infor...
  • 2 篇 state key labora...

作者

  • 3 篇 guidotti riccard...
  • 3 篇 raman ramakrishn...
  • 3 篇 vysotska victori...
  • 3 篇 chen feng
  • 2 篇 chen haifeng
  • 2 篇 yakovyna vitaliy
  • 2 篇 kulvinder singh
  • 2 篇 monreale anna
  • 2 篇 buddhima attanay...
  • 2 篇 jacob shomona gr...
  • 2 篇 madhurya j a
  • 2 篇 wang hui
  • 2 篇 gama j
  • 2 篇 kalinina irina
  • 2 篇 suwimon kooptiwo...
  • 2 篇 nitin n. sakhare
  • 2 篇 gozhyj aleksandr
  • 2 篇 das rama krushna
  • 2 篇 xu weiqiang
  • 2 篇 k.k. senthilkuma...

语言

  • 1,081 篇 英文
  • 64 篇 其他
  • 17 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Machine Learning and Data Mining, MLDM 2003"
1147 条 记 录,以下是221-230 订阅
排序:
Developing a Computational Tool for Lung Cancer Prediction with data mining Techniques  3
Developing a Computational Tool for Lung Cancer Prediction w...
收藏 引用
3rd IEEE international conference on Distributed Computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Chohan, Jasgurpreet Singh Madan, Heena Kumar, Himanshu Kapoor, Monit Singh, Devendra Almusawi, Muntather School Of Mechanical Engineering Rayat Bahra University Mohali India Chandigarh Engineering College Chandigarh Group Of Colleges Department Of Computer Science Engineering Mohali Punjab Jhanjeri India Chitkara Centre For Research And Development Chitkara University Himachal Pradesh India Centre Of Research Impact And Outreach Chitkara University Punjab Rajpura India Uttaranchal Institute Of Technology Uttaranchal University Department Of Computer Science & Engineering Dehradun India The Islamic University Najaf Iraq
machine learning is commonly used to automate disease classification by extracting features from segmented objects, but automated segmentation can be difficult. Model proposed uses average values to compute features b... 详细信息
来源: 评论
data mining for Fraud Detection in Telecommunications: Detecting Anomalous Behaviors in Real-Time  3
Data Mining for Fraud Detection in Telecommunications: Detec...
收藏 引用
3rd IEEE international conference on Automation and Computation, AUTOCOM 2025
作者: Mishra, Nidhi Shivaji, Ghorpade Bipin Kalinga University Department of Cs & It Raipur India
In the recent past, telecom experts have been confronted with so many problems emanating from fraudulent deeds that apart from causing loss of money discredits organizations. To mitigate these problems, real-time frau... 详细信息
来源: 评论
An Analysis of data mining Techniques in Software Engineering database Design  3
An Analysis of Data Mining Techniques in Software Engineerin...
收藏 引用
3rd international conference on machine learning and Big data Analytics for IoT Security and Privacy, SPIoT2023
作者: Lu, Fengwei Jin, Zhongwei Zhang, Xiaolin School of Information Engineering Heilongjiang Polytechnic Heilongjiang Harbin China
With the advent of Internet information technology, data mining technology has been applied in various fields of China's social and industrial development, and has promoted the quality development of the industry ... 详细信息
来源: 评论
Construction of Fusion Visualization Platform for Meteorological Station and Monitoring Application Scenarios  3rd
Construction of Fusion Visualization Platform for Meteorolog...
收藏 引用
3rd international conference on machine learning, Cloud Computing and Intelligent mining, MLCCIM 2024
作者: He, Tingting Jiang, Yuantong Hao, Panlin Zheng, Faling He, Yuanrong School of Cultural Industries and Tourism Xiamen University of Technology Xiamen China College of Computer and Information Engineering Xiamen University of Technology Xiamen China Technology Co. Ltd. Xiamen China
With the continuous development of real-world 3D, the visualization of multi-source real 3D data fusion is significant for digital twins. Based on SketchUp, this study aims to utilize advanced laser point cloud scanni... 详细信息
来源: 评论
Intrusion Detection in Computer Networks using Optimized machine learning Algorithms  3
Intrusion Detection in Computer Networks using Optimized Mac...
收藏 引用
3rd international Informatics and Software Engineering conference, IISEC 2022
作者: Yilmaz, Abdullah Asim Republic of Türkiye Ministry of Agriculture and Forestry Department of Strategy Development Ankara Turkey
Intrusion detection systems (IDSs) are employed to maintain computer networks from cyber attacks. Here, the aim is to detect intrusions once the data is transmitted across the internet. Intrusion detection methods (ID... 详细信息
来源: 评论
Research on meteorological risk prediction method based on machine learning algorithm  3
Research on meteorological risk prediction method based on m...
收藏 引用
3rd international conference on Computer Vision and data mining, ICCVDM 2022
作者: Li, Ping Chen, Yu Liu, Shuo Tian, Li Lu, Jinglong Liaoning Provincial Meteorological Observatory Shenyang Liaoning110016 China Liaoning Meteorological Disaster Monitoring and Early Warning Centre Shenyang Liaoning110016 China Institute of Atmospheric Environment China Meteorological Administration Shenyang Liaoning110016 China
Among all kinds of natural disasters, meteorological disasters cause the greatest economic losses. Meteorological disasters have multiple causes. The characteristics of systematization, social amplification, unpredict... 详细信息
来源: 评论
Application of machine learning Algorithm: Forecasting Heart disease
Application of Machine Learning Algorithm: Forecasting Heart...
收藏 引用
Innovation in Technology (INOCON), IEEE international conference for
作者: Apurva Lohia Arti Pawar ICAS Manipal Academy of Higher Education Manipal India
The healthcare industry produces a huge amount of complex data about patient records. This data can be processed and mined to uncover hidden patterns, which will provide professionals in the healthcare field with addi...
来源: 评论
Construction of Business English Needs Analysis Model Based on Computer Corpus  3rd
Construction of Business English Needs Analysis Model Based ...
收藏 引用
3rd EAI international conference on Application of Big data, Blockchain, and Internet of Things for Education Informatization, BigIoT-EDU 2023
作者: Lu, Yao Zhang, Li Ma, Lingya Shandong Management University Shandong Jinan250357 China Hubei Three Gorges Polytechnic Hubei Yichang443000 China
In order to meet the needs of business English, this article constructs a computer corpus based business English requirement analysis model. By collecting and organizing relevant corpus in the field of business Englis... 详细信息
来源: 评论
3rdWorkshop on Patent Text mining and Semantic Technologies (PatentSemTech2022)  22
3rdWorkshop on Patent Text Mining and Semantic Technologies ...
收藏 引用
45th international ACM SIGIR conference on Research and Development in Information Retrieval (SIGIR)
作者: Krestel, Ralf Aras, Hidir Andersson, Linda Piroi, Florina Hanbury, Allan Alderucci, Dean ZBW Leibniz Informat Ctr Econ Kiel Germany Univ Kiel Kiel Germany FIZ Karlsruhe Karlsruhe Germany Artificial Researcher IT GmbH Vienna Austria TU Wien Vienna Austria Res Studios Austria Vienna Austria Carnegie Mellon Univ Ctr AI & Patent Anal Pittsburgh PA 15213 USA
Steadily increasing numbers of patent applications per year and large amounts of available patent data necessitate highly efficient and interactive next-generation information retrieval systems in the patent domain. A... 详细信息
来源: 评论
Cyber Security Fraud Detection Using machine learning Approach  3
Cyber Security Fraud Detection Using Machine Learning Approa...
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Raman, Ramakrishnan Tiwari, Mohit Buddhi, Dharam Trivedi, Snehal Bothe, Shivaji Ponnusamy, R. Symbiosis Institute of Business Management Maharashtra Pune India Bharati Vidyapeeth's College of Engineering Department of Computer Science and Engineering Paschim Vihar Delhi India Uttaranchal University Uttaranchal Institute of Technology India Parul University Department of Mech India Department of IT & Business Analytics India Chennai Institute of Technology Department of Computer Science & Engineering India
It is notoriously harder to identify fraudsters for its fluid nature in terms of recognizable trends. Latest technological breakthroughs were used by scammers. Individuals overcome the protection, incurring millions o... 详细信息
来源: 评论