咨询与建议

限定检索结果

文献类型

  • 553 篇 会议
  • 8 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 563 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 386 篇 工学
    • 370 篇 计算机科学与技术...
    • 246 篇 软件工程
    • 61 篇 信息与通信工程
    • 58 篇 生物工程
    • 43 篇 生物医学工程(可授...
    • 28 篇 电气工程
    • 25 篇 控制科学与工程
    • 18 篇 化学工程与技术
    • 13 篇 机械工程
    • 13 篇 光学工程
    • 13 篇 农业工程
    • 13 篇 安全科学与工程
  • 161 篇 理学
    • 106 篇 数学
    • 61 篇 生物学
    • 57 篇 系统科学
    • 39 篇 统计学(可授理学、...
    • 20 篇 物理学
    • 13 篇 化学
    • 9 篇 大气科学
  • 95 篇 管理学
    • 52 篇 图书情报与档案管...
    • 47 篇 管理科学与工程(可...
    • 24 篇 工商管理
  • 42 篇 医学
    • 42 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
    • 15 篇 公共卫生与预防医...
  • 18 篇 农学
    • 18 篇 作物学
  • 15 篇 法学
    • 11 篇 社会学
  • 10 篇 教育学
    • 10 篇 教育学
  • 9 篇 经济学
    • 9 篇 应用经济学

主题

  • 115 篇 machine learning
  • 50 篇 deep learning
  • 43 篇 machine learning...
  • 37 篇 accuracy
  • 35 篇 support vector m...
  • 21 篇 predictive model...
  • 19 篇 security
  • 18 篇 data models
  • 15 篇 adversarial mach...
  • 15 篇 feature extracti...
  • 15 篇 random forests
  • 15 篇 prediction algor...
  • 15 篇 training
  • 14 篇 decision trees
  • 14 篇 classification a...
  • 14 篇 forecasting
  • 13 篇 computational mo...
  • 12 篇 internet of thin...
  • 11 篇 information tech...
  • 11 篇 real-time system...

机构

  • 3 篇 faculty of compu...
  • 2 篇 faculty of compu...
  • 2 篇 infologia techno...
  • 2 篇 kindi center for...
  • 2 篇 centre of resear...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 greater bay area...
  • 2 篇 vellore institut...
  • 2 篇 department of ar...
  • 2 篇 school of comput...
  • 2 篇 department of ma...
  • 2 篇 chitkara centre ...
  • 2 篇 fraunhofer cente...
  • 2 篇 department of co...
  • 2 篇 sreyas institute...
  • 2 篇 school of comput...
  • 2 篇 ipmi internation...
  • 2 篇 al-farabi kazakh...
  • 2 篇 department of ma...

作者

  • 6 篇 azar ahmad taher
  • 3 篇 bhatnagar roheet
  • 3 篇 foozy cik feresa...
  • 3 篇 ammar hossam has...
  • 2 篇 valeeva elvira
  • 2 篇 khan ayub
  • 2 篇 santos igor
  • 2 篇 varun ojha
  • 2 篇 shreya
  • 2 篇 bringas pablo ga...
  • 2 篇 kurniawan r.
  • 2 篇 maragatharajan m...
  • 2 篇 usha g.
  • 2 篇 singh shikha
  • 2 篇 xiao kai
  • 2 篇 cao peng
  • 2 篇 shyamala devi m.
  • 2 篇 nazri m.z.a.
  • 2 篇 m. maragatharaja...
  • 2 篇 swathi p.

语言

  • 543 篇 英文
  • 18 篇 其他
  • 2 篇 中文
检索条件"任意字段=4th International Conference on Machine Learning and Soft Computing, ICMLSC 2020"
563 条 记 录,以下是131-140 订阅
排序:
PhishingWebsite URL's Detection Using machine learning
PhishingWebsite URL's Detection Using Machine Learning
收藏 引用
computing and Information Technology (ICCIT-1441), 2020 international conference on
作者: Bayan Aljunidi Shahad Albshayer Afnan Almutairi Nawal Alenezi College of Computer Science and Engineering University of Hail. University of Ha'il Ha'il KSA
Phishing attacks pose a significant threat to online security, tricking users into divulging sensitive information by mimicking legitimate websites. this paper addresses the critical problem of detecting phishing URLs... 详细信息
来源: 评论
Early Detection: Deep learning-Driven ECG Image Analysis Forcardiovascular Screening
Early Detection: Deep Learning-Driven ECG Image Analysis For...
收藏 引用
soft computing for Security Applications (ICSCSA), international conference on
作者: J. R. V. Jeny K. Nikhil Goud Divya Sai Leela Amrutha Kishore Azmira Department of Computer Science and Engineering (AI&ML) Vignan Institute of Technology and Science
the heart is a very important organ in the circulatory system. Heart disease is extremely severe and can even lead to death, therefore it is essential to make an accurate and timely diagnosis. However, health data ana... 详细信息
来源: 评论
Real Time Posture Detector using MediaPipe and OpenCV
Real Time Posture Detector using MediaPipe and OpenCV
收藏 引用
soft computing for Security Applications (ICSCSA), international conference on
作者: Sukhdeep Singh Trilok Singh Tarun Singh Diana Nagpal Department of Computer Science and Engineering Guru Nanak Dev Engineering College Ludhiana Department of Computer Science and Engineering Guru Nanak Dev Engineering College Ludhiana India
this work presents the development of a smart gym system utilizing the pre-trained posture estimation model, MediaPipe and torsion angle. While exercising offers numerous health benefits, improper form can pose signif... 详细信息
来源: 评论
Impact of Data Preprocessing on Wind Forecasting Using machine learning Techniques  4
Impact of Data Preprocessing on Wind Forecasting Using Machi...
收藏 引用
4th international conference on Power, Control and computing Technologies, ICPC2T 2025
作者: Gaikwad, Nidhi Haribhau Mitra, Arghya Payal, Jangilwar Das, Soumyabrata Keshri, Ritesh kumar Department of Electrical Engineering VNIT Nagpur India
there is a high demand for renewable energy sources as non renewable energy sources are harmful to the environment due to its effects such as global warming. Among non renewable energy source, the wind energy is unpre... 详细信息
来源: 评论
Sentiment Analysis of Hotel Customers' Feedback in Bangla Using machine learning
Sentiment Analysis of Hotel Customers' Feedback in Bangla Us...
收藏 引用
computing and Information Technology (ICCIT-1441), 2020 international conference on
作者: Jairul Islam Md. Shohidul Islam Husnul Ajra Department of CSE Khulna Khan Bahadur Ahsanullah University Khulna Bangladesh Faculty of Computing Universiti Malaysia Pahang Al-Sultan Abdullah Kuantan Malaysia
In the rapidly expanding internet era, customers or tourists can easily find information about hotels. the growth of the hospitality industry in Bangladesh has led to a rise in the number of online hotel reviews. In t... 详细信息
来源: 评论
A New Database Integrity Protection Approach Against SQL Injection Attacks (SQLIAs)
A New Database Integrity Protection Approach Against SQL Inj...
收藏 引用
computing and Information Technology (ICCIT-1441), 2020 international conference on
作者: Asma Hasan Alhowiti Awad M. Awadelkarim Mohamed Faculty of Computers and Information Technology University of Tabuk Tabuk Saudi Arabia
SQL Injection Attacks (SQLIAs) are among the most significant and serious threats to web applications, empowering assailants to employ countless techniques in order to steal and/or tamper data stored in databases, in ... 详细信息
来源: 评论
Android Malware Detection Using Ensemble learning and Feature Selection with Insights from SHAP Explainable AI
Android Malware Detection Using Ensemble Learning and Featur...
收藏 引用
international conference on soft computing and machine Intelligence (ISCMI)
作者: Rian Adriansyah Parman Sukarno Aulia Arif Wardana School of Computing Telkom University Bandung Indonesia Faculty of ICT Wroław University of Science and Technology Wroław Poland
the increasing proliferation of Android mobile devices, along with a surge in malware targeting these platforms, underscores the need for advanced malware detection methods. this research introduces a robust approach ... 详细信息
来源: 评论
the Effective Detection of Alzheimer in the System via ML Algorithm
The Effective Detection of Alzheimer in the System via ML Al...
收藏 引用
Advance computing and Innovative Technologies in Engineering (ICACITE), international conference on
作者: R. Kishore Kanna Kapil Joshi Gunjan Chhabra Ambali Pacholi X.S. Blessing NimaSajai Flosy R. Menezes Department of Biomedical Engineering Jerusalem College of Engineering (Autonomous) Chennai India Department of CSE Uttaranchal Institute of Technology Uttaranchal University Dehradun India Department of CSE Graphic Era Hill University Adjunct Professor Graphic Era Deemed to be University Dehradun Uttarakhand School of Nursing Science ITM University Gwalior (MP) India College of Nursing Khamis Mushayt King Khalid University Kingdom of Saudi Arabia Institute of Nursing Education Bambolim(Goa) India
Effective therapy for Alzheimer’s disease depends on early diagnosis. Key results from four research that used machine learning to detect Alzheimer’s disease during its initial level. Early research indicates that c... 详细信息
来源: 评论
Beyond Asymptotics: Real-Time Performance of Basic Operations (Preliminary Results)
Beyond Asymptotics: Real-Time Performance of Basic Operation...
收藏 引用
computing and Information Technology (ICCIT-1441), 2020 international conference on
作者: Rania Alhalaseh Information Technology Faculty Mutah University Karak Jordan American University of Madaba (AUM) Jordan
this paper presents preliminary findings on the real-time performance of fundamental mathematical operations, moving beyond traditional asymptotic analysis. While asymptotic analysis offers valuable insights into algo... 详细信息
来源: 评论
An Intelligent Approach for Classification In-Band SQLi Attacks Using machine learning Techniques
An Intelligent Approach for Classification In-Band SQLi Atta...
收藏 引用
computing and Information Technology (ICCIT-1441), 2020 international conference on
作者: Imdad Ali Shah NZ Jhanjhi School of Computing Science Taylor's University Malaysia School of Computer Science SCS Taylor's University Malaysia
In-band SQL injection is the simplest type of SQL injection, and attackers use this type to modify the original query and get direct results from the modified query. Users get information from the database through the... 详细信息
来源: 评论