咨询与建议

限定检索结果

文献类型

  • 13,153 篇 会议
  • 188 册 图书
  • 160 篇 期刊文献

馆藏范围

  • 13,500 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 9,042 篇 工学
    • 7,532 篇 计算机科学与技术...
    • 4,276 篇 软件工程
    • 1,627 篇 信息与通信工程
    • 1,525 篇 电气工程
    • 1,246 篇 控制科学与工程
    • 962 篇 生物工程
    • 528 篇 机械工程
    • 498 篇 生物医学工程(可授...
    • 477 篇 动力工程及工程热...
    • 470 篇 电子科学与技术(可...
    • 323 篇 光学工程
    • 310 篇 交通运输工程
    • 296 篇 安全科学与工程
    • 264 篇 材料科学与工程(可...
    • 263 篇 化学工程与技术
  • 3,509 篇 理学
    • 2,195 篇 数学
    • 1,058 篇 生物学
    • 602 篇 物理学
    • 582 篇 统计学(可授理学、...
    • 473 篇 系统科学
    • 244 篇 化学
  • 1,864 篇 管理学
    • 1,294 篇 管理科学与工程(可...
    • 682 篇 图书情报与档案管...
    • 541 篇 工商管理
  • 594 篇 医学
    • 496 篇 临床医学
    • 405 篇 基础医学(可授医学...
    • 223 篇 药学(可授医学、理...
  • 303 篇 教育学
    • 293 篇 教育学
  • 251 篇 法学
    • 228 篇 社会学
  • 221 篇 经济学
    • 219 篇 应用经济学
  • 136 篇 农学
  • 37 篇 军事学
  • 21 篇 文学
  • 6 篇 艺术学

主题

  • 1,272 篇 optimization
  • 1,083 篇 machine learning
  • 1,021 篇 deep learning
  • 463 篇 accuracy
  • 454 篇 reinforcement le...
  • 312 篇 computational mo...
  • 303 篇 machine learning...
  • 288 篇 training
  • 273 篇 support vector m...
  • 264 篇 feature extracti...
  • 259 篇 predictive model...
  • 244 篇 neural networks
  • 223 篇 real-time system...
  • 216 篇 genetic algorith...
  • 207 篇 adversarial mach...
  • 161 篇 particle swarm o...
  • 155 篇 learning algorit...
  • 151 篇 convolutional ne...
  • 138 篇 internet of thin...
  • 130 篇 data mining

机构

  • 46 篇 chitkara centre ...
  • 36 篇 chitkara univers...
  • 30 篇 chitkara univers...
  • 29 篇 the islamic univ...
  • 18 篇 centre of resear...
  • 18 篇 al-farahidi univ...
  • 17 篇 lloyd institute ...
  • 17 篇 department of co...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 gla university d...
  • 14 篇 department of co...
  • 13 篇 vishwakarma inst...
  • 12 篇 college of manag...
  • 11 篇 chitkara univers...
  • 11 篇 school of comput...
  • 10 篇 columbia univers...
  • 10 篇 univ chinese aca...
  • 10 篇 lovely professio...
  • 10 篇 university of ch...

作者

  • 13 篇 lima jose
  • 13 篇 pereira ana i.
  • 11 篇 wang wei
  • 9 篇 rakesh kumar
  • 9 篇 wang hui
  • 9 篇 de-shuang huang
  • 9 篇 ye jieping
  • 8 篇 yang tianbao
  • 8 篇 neeraj varshney
  • 8 篇 r. santhana kris...
  • 7 篇 zhang tao
  • 7 篇 zhang lei
  • 7 篇 li li
  • 7 篇 buzdalov maxim
  • 7 篇 wang jian
  • 7 篇 huang heng
  • 7 篇 hu rong
  • 7 篇 yang yang
  • 7 篇 todorov venelin
  • 7 篇 zivkovic miodrag

语言

  • 12,576 篇 英文
  • 896 篇 其他
  • 73 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"任意字段=4th International Conference on Optimization Learning Algorithms and Applications"
13501 条 记 录,以下是301-310 订阅
排序:
Optimizing search advertising strategies: integrating reinforcement learning with generalized second-price auctions for enhanced ad ranking and bidding  4
Optimizing search advertising strategies: integrating reinfo...
收藏 引用
4th international conference on Advanced algorithms and Signal Image Processing, AASIP 2024
作者: Zhou, Chang Zhao, Yang Cao, Jin Shen, Yi Cui, Xiaoling Cheng, Chiyu Columbia University New York United States Dallas United States University of Michigan Ann Arbor United States San Jose United States University of California Irvine United States
this paper explores the integration of strategic optimization methods in the context of search advertising, focusing on ad ranking and bidding mechanisms within e-commerce platforms. Employing a combination of reinfor... 详细信息
来源: 评论
Container Acceleration Method Based on Image Block Granularity optimization  4
Container Acceleration Method Based on Image Block Granulari...
收藏 引用
4th IEEE international conference on Power, Electronics and Computer applications, ICPECA 2024
作者: Deng, Guanghong Hu, Huiyang Wuhan Digital Engineering Institute System Platform Department Wuhan China
In the DevOps development mode, a significant amount of redundant data often accumulates in the image file layer. the repeated loading of this redundant data consumes valuable storage and network resources in the clus... 详细信息
来源: 评论
Critical Disaster Prediction using Machine learning algorithms  4
Critical Disaster Prediction using Machine Learning Algorith...
收藏 引用
4th international conference on Soft Computing for Security applications, ICSCSA 2024
作者: Nirmala, E. Suresh, M. Maragatharajan, M. Dadlani, Riya VIT Bhopal University School of Computing Science and Engineering Madhya Pradesh Kothrikalan India VIT Bhopal University School of Computing Sciences and Artificial Intelligence Madhya Pradesh Kothrikalan India
Prediction of earthquake is a challenging factor in the early warning system. there are a number of geographical locations that cause earthquake very often due to climatic changes. Earthquake is one among the natural ... 详细信息
来源: 评论
A technique utilizing Machine learning and Convolutional Neural Networks (CNN) for the identification of SQL Injection Attacks  4
A technique utilizing Machine Learning and Convolutional Neu...
收藏 引用
4th international conference of Science and Information Technology in Smart Administration, ICSINTESA 2024
作者: Setiyaji, Andri Ramli, Kalamullah Hidayatulloh, Zulkifli Yasin Budhi Dharmawan, G.S. Universitas Indonesia Faculty of Engineering Department of Electrical Engineering Depok Indonesia Center of Network Communications Meteorological Climatological and Geophysical Agency Jakarta Indonesia
Analyzing logs can aid in debugging or optimizing system performance. A comprehension of system efficacy is frequently linked to an awareness of the manner in which the system's resources are utilized. SQL injecti... 详细信息
来源: 评论
Time Series Forecasting Based on Combinatorial Models and optimization  7
Time Series Forecasting Based on Combinatorial Models and Op...
收藏 引用
7th international conference on Advanced algorithms and Control Engineering, ICAACE 2024
作者: Sun, Zichang Shandong University Weihai China
As a key tool for understanding data changes over time, time series analysis plays a key role in a variety of disciplines and applications, and its in-depth study is of great significance. In this paper, singular spec... 详细信息
来源: 评论
Ransomware Classification: A Comparative Analysis of ML algorithms  4
Ransomware Classification: A Comparative Analysis of ML Algo...
收藏 引用
4th IEEE international conference on ICT in Business Industry and Government, ICTBIG 2024
作者: Waghmare, Shweta Bajeja, Sunil Marwadi University Gujrat Rajkot India Marwadi University Faculty of Computer Application Gujrat Rajkot India
the increasing prevalence of ransomware, malware, and malicious cyberattacks poses a significant threat to computer networks, data centers, websites, mobile applications, and industrial environments across various bus... 详细信息
来源: 评论
A Deep learning-based Study of Terrain Classification and Distance optimization for Transmission Lines  4
A Deep Learning-based Study of Terrain Classification and Di...
收藏 引用
4th international conference on Smart Grid and Energy Internet, SGEI 2024
作者: Wan, Xin He, Rui Yan, Tianyou Xu, Binbin Chen, Lixia Guangzhou Power Supply Bureau of Guangdong Power Grid Co. Ltd. Guangdong Guangzhou510630 China
the current terrain classification of transmission lines is generally target classification or fixed-point classification, which lacks comparability and leads to the reduction of the optimization frequency of a single... 详细信息
来源: 评论
A PSO-Assisted Reinforcement learning Algorithm for Job Shop Scheduling  6
A PSO-Assisted Reinforcement Learning Algorithm for Job Shop...
收藏 引用
6th international conference on Data-Driven optimization of Complex Systems (DOCS)
作者: Yue, Peng Jin, Yaochu Shi, Qi Dai, Xuewu Cui, Dongliang Northeastern Univ State Key Lab Synthet Automat Proc Ind Shenyang 110819 Peoples R China Westlake Univ Sch Engn Hangzhou 310030 Peoples R China Northumbria Univ Newcastle Upon Tyne NE1 8ST Tyne & Wear England
the Job Shop Scheduling Problem (JSSP) is a critical and complex optimization challenge in manufacturing. Recently, Reinforcement learning (RL)-based methods have garnered significant attention due to their promising ... 详细信息
来源: 评论
A Phishing URL Detection Model based on Horse Herd optimization and Random Forest algorithms  4
A Phishing URL Detection Model based on Horse Herd Optimizat...
收藏 引用
4th international conference on Pervasive Computing and Social Networking (ICPCSN)
作者: Hemannth, P. Chinta, Mukesh Satya, S. Sarat Devasena, P. Sri Aneelaja Velagapudi Ramakrishna Siddhartha Engn Coll Comp Sci & Engn Dept Vijayawada Andhra Pradesh India
Phishing attacks continue to be a notable threat to network and information security. they plan to expose user information and privacy, such as login credentials, passwords, credit card numbers, and other details, by ... 详细信息
来源: 评论
Research on key algorithm optimization strategy of oscillographic blood pressure measurement  4
Research on key algorithm optimization strategy of oscillogr...
收藏 引用
2024 4th international conference on Artificial Intelligence and Industrial Technology applications, AIITA 2024
作者: Wang, Long Luo, Yiqun Tang, Zhenghua School of Physics and Electronic and Electrical Engineering Xiangnan University Chenzhou423000 China
In this paper, adaptive filtering and wavelet de-baseline drift algorithms are proposed for the signal preprocessing of the oscillographic blood pressure measurement algorithm. On feature extraction, fuzzy logic class... 详细信息
来源: 评论