咨询与建议

限定检索结果

文献类型

  • 13,156 篇 会议
  • 188 册 图书
  • 160 篇 期刊文献

馆藏范围

  • 13,503 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 9,040 篇 工学
    • 7,542 篇 计算机科学与技术...
    • 4,288 篇 软件工程
    • 1,624 篇 信息与通信工程
    • 1,526 篇 电气工程
    • 1,231 篇 控制科学与工程
    • 962 篇 生物工程
    • 513 篇 机械工程
    • 500 篇 生物医学工程(可授...
    • 472 篇 电子科学与技术(可...
    • 461 篇 动力工程及工程热...
    • 326 篇 光学工程
    • 308 篇 交通运输工程
    • 294 篇 安全科学与工程
    • 267 篇 材料科学与工程(可...
    • 248 篇 化学工程与技术
  • 3,515 篇 理学
    • 2,203 篇 数学
    • 1,058 篇 生物学
    • 605 篇 物理学
    • 583 篇 统计学(可授理学、...
    • 473 篇 系统科学
    • 241 篇 化学
  • 1,863 篇 管理学
    • 1,294 篇 管理科学与工程(可...
    • 681 篇 图书情报与档案管...
    • 543 篇 工商管理
  • 595 篇 医学
    • 497 篇 临床医学
    • 406 篇 基础医学(可授医学...
    • 223 篇 药学(可授医学、理...
  • 306 篇 教育学
    • 296 篇 教育学
  • 251 篇 法学
    • 228 篇 社会学
  • 221 篇 经济学
    • 219 篇 应用经济学
  • 136 篇 农学
  • 37 篇 军事学
  • 21 篇 文学
  • 6 篇 艺术学

主题

  • 1,271 篇 optimization
  • 1,086 篇 machine learning
  • 1,019 篇 deep learning
  • 464 篇 accuracy
  • 457 篇 reinforcement le...
  • 312 篇 computational mo...
  • 303 篇 machine learning...
  • 289 篇 training
  • 273 篇 support vector m...
  • 265 篇 feature extracti...
  • 260 篇 predictive model...
  • 246 篇 neural networks
  • 223 篇 real-time system...
  • 217 篇 genetic algorith...
  • 207 篇 adversarial mach...
  • 161 篇 particle swarm o...
  • 155 篇 learning algorit...
  • 150 篇 convolutional ne...
  • 138 篇 internet of thin...
  • 131 篇 data mining

机构

  • 46 篇 chitkara centre ...
  • 36 篇 chitkara univers...
  • 30 篇 chitkara univers...
  • 29 篇 the islamic univ...
  • 18 篇 centre of resear...
  • 18 篇 al-farahidi univ...
  • 17 篇 lloyd institute ...
  • 17 篇 department of co...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 gla university d...
  • 14 篇 department of co...
  • 13 篇 vishwakarma inst...
  • 12 篇 college of manag...
  • 11 篇 chitkara univers...
  • 11 篇 university of ch...
  • 11 篇 school of comput...
  • 10 篇 columbia univers...
  • 10 篇 univ chinese aca...
  • 10 篇 lovely professio...

作者

  • 13 篇 lima jose
  • 13 篇 pereira ana i.
  • 11 篇 wang wei
  • 9 篇 rakesh kumar
  • 9 篇 wang hui
  • 9 篇 de-shuang huang
  • 9 篇 ye jieping
  • 8 篇 yang tianbao
  • 8 篇 neeraj varshney
  • 8 篇 r. santhana kris...
  • 7 篇 zhang tao
  • 7 篇 zhang lei
  • 7 篇 li li
  • 7 篇 buzdalov maxim
  • 7 篇 wang jian
  • 7 篇 huang heng
  • 7 篇 hu rong
  • 7 篇 yang yang
  • 7 篇 todorov venelin
  • 7 篇 zivkovic miodrag

语言

  • 12,570 篇 英文
  • 905 篇 其他
  • 73 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"任意字段=4th International Conference on Optimization Learning Algorithms and Applications"
13504 条 记 录,以下是581-590 订阅
排序:
Design, and optimization Using Genetic algorithms of a Dual-Band Microstrip Antenna Based on Defective Ground Structure forWireless Power Transmission applications  4th
Design, and Optimization Using Genetic Algorithms of a Dual-...
收藏 引用
4th international conference on Digital Technologies and applications (ICDTA)
作者: En-Naghma, Walid Halaq, Hanan El Ougli, Abdelghani Univ Sidi Mohamed Ben Abdellah Fac Sci Dept Phys Comp Sci Signal Automat & Cognitivism Lab Fes Morocco
this paper investigates an improved microstrip patch antenna array (MPAA) design using the defective ground structure (DGS) technique operating at a dual-band (at 2.45 GHz and 5.8 GHz) in the ISM (Industrial, Scientif... 详细信息
来源: 评论
Research on Intelligent Seedling Environment Monitoring And Early-warning System Based on Machine learning Algorithm  4
Research on Intelligent Seedling Environment Monitoring And ...
收藏 引用
4th IEEE international conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2024
作者: Yu, Caiping Ren, Dongyan Xie, Zongzhi Guangxi Vocational Normal University School of Computer and Information Engineering China
With the rise of intelligent agriculture, the intelligent transformation of agriculture has been realised, bringing new development to agricultural production. However, in traditional agriculture, the regulation of se... 详细信息
来源: 评论
FSENet: Applying Deep learning to Transparent Lens Counting  24
FSENet: Applying Deep Learning to Transparent Lens Counting
收藏 引用
4th international conference on Computer, Internet of things and Control Engineering
作者: Ai, Shiquan Liu, Chun Hubei Univ Technol Sch Comp Sci Wuhan Hubei Peoples R China
the accurate identification and counting of transparent lenses is critical in automated production processes, as it directly impacts overall production efficiency. However, current neural network models exhibit limita... 详细信息
来源: 评论
Comparative Analysis of Encoding Methods in Regression Predicting Models of Bachelor's Final Marks  4th
Comparative Analysis of Encoding Methods in Regression Predi...
收藏 引用
4th international conference on Digital Technologies and applications (ICDTA)
作者: Oqaidi, Khalid Aouhassi, Sarah Mansouri, Khalifa Univ Hassan II Casablanca ENSET Mohammedia Lab M2S2I Casablanca Morocco
this study assesses the impact of One-Hot and Target Encoding techniques on the accuracy of predicting bachelor's degree final marks in economics and management. Employing regression models across six machine lear... 详细信息
来源: 评论
A Method for Anomaly Detection of Encrypted Traffic in Power IoT Base on Security Baseline learning  4
A Method for Anomaly Detection of Encrypted Traffic in Power...
收藏 引用
4th international conference on Digital Data Processing, DDP 2024
作者: Peng, Zhou Qiang, Xu Lizhi, Hu Menglin, Li State Grid Zhejiang Co. Ltd. Information and Communication Branch Hangzhou China China Electric Power Research Institute Information and Communication Branch Beijing China
As numerous power IoT terminals require secure access to the power grid, how to detect the encrypted malicious traffic in power IoT becomes a challenge. Following an in-depth investigation of potential security risks ... 详细信息
来源: 评论
Multi-Behavioral Recommender System Based on Multi-View Contrastive learning  4
Multi-Behavioral Recommender System Based on Multi-View Cont...
收藏 引用
4th international conference on Machine learning and Intelligent Systems Engineering (MLISE)
作者: Zhang, Haiyang Gao, Rong Liu, Donghua Wan, Xiang Hubei Univ Technol Sch Comp Sci Wuhan Peoples R China China Waterborne Transport Res Inst Beijing Peoples R China Wuhan Second Ship Design & Res Inst Wuhan Peoples R China
In modern recommendation systems, diverse user behavior data such as browsing, clicking, and purchasing provide rich information for personalized recommendations. However, effectively integrating and utilizing these v... 详细信息
来源: 评论
Machine learning methods and resources: An overview  4th
Machine learning methods and resources: An overview
收藏 引用
4th international conference on Computational Methods in Science and Technology, ICCMST 2024
作者: Goyal, S. Kaur, A. Batra, N. Haryana Mullana-Ambala India
Machine learning tasks are made simpler by a variety of tools that provide an extensive selection of features and ease of use. One renowned framework that excels at deep learning is TensorFlow, which makes model creat... 详细信息
来源: 评论
Central Limit theorem for Two-Timescale Stochastic Approximation with Markovian Noise: theory and applications  27
Central Limit Theorem for Two-Timescale Stochastic Approxima...
收藏 引用
27th international conference on Artificial Intelligence and Statistics (AISTATS)
作者: Hu, Jie Doshi, Vishwaraj Eun, Do Young North Carolina State Univ Raleigh NC 27695 USA IQVIA Inc Durham NC USA
Two-timescale stochastic approximation (TTSA) is among the most general frameworks for iterative stochastic algorithms. this includes well-known stochastic optimization methods such as SGD variants and those designed ... 详细信息
来源: 评论
Leveraging Machine learning for Signal Processing in Surface Electromyography (sEMG) for Prosthetic Control  4th
Leveraging Machine Learning for Signal Processing in Surface...
收藏 引用
4th international conference on Digital Technologies and applications (ICDTA)
作者: Mhiriz, Zakariae Bourhaleb, Mohammed Rahmoune, Mohammed Mohammed First Univ Natl Sch Appl Sci Res Lab Appl Sci Oujda Morocco
In this study, we delve into enhancing prosthetic limb control through surface electromyography (sEMG) via machine learning techniques, addressing challenges like signal selectivity and noise. With the backdrop of exp... 详细信息
来源: 评论
Agility of in Deep learning algorithms in Developing Conflicting Attacks Protections and to Secure Vulnerabilities  4
Agility of in Deep Learning Algorithms in Developing Conflic...
收藏 引用
4th IEEE international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2024
作者: Asaad, Renas Rajab Abdulrahman, Saman Mohammed Hani, Ahmed Alaa Ahmad, Hawar Bahzad Sallow, Amira Bibo Zeebaree, Subhi R. M. Nawroz University Department of Computer Science Duhok Iraq Nawroz University College of Science Department of Computer Science KRG Duhok Iraq Duhok Polytechnic University Technical College of Engineering Energy Engineering Department Duhok Iraq
Deep learning methods have brought revolution to a variety of applications: from image recognition to natural language processing, and many others. However, their most important vulnerability, when used in adversarial... 详细信息
来源: 评论