咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 2 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 365 篇 工学
    • 337 篇 计算机科学与技术...
    • 265 篇 软件工程
    • 94 篇 生物工程
    • 64 篇 信息与通信工程
    • 64 篇 生物医学工程(可授...
    • 24 篇 电气工程
    • 15 篇 控制科学与工程
    • 14 篇 光学工程
    • 14 篇 化学工程与技术
    • 10 篇 机械工程
    • 10 篇 动力工程及工程热...
    • 10 篇 土木工程
    • 10 篇 农业工程
  • 197 篇 理学
    • 99 篇 生物学
    • 96 篇 数学
    • 43 篇 统计学(可授理学、...
    • 37 篇 系统科学
    • 33 篇 物理学
    • 11 篇 化学
  • 84 篇 管理学
    • 50 篇 图书情报与档案管...
    • 37 篇 管理科学与工程(可...
    • 32 篇 工商管理
  • 51 篇 医学
    • 51 篇 基础医学(可授医学...
    • 51 篇 临床医学
    • 44 篇 药学(可授医学、理...
    • 12 篇 公共卫生与预防医...
  • 26 篇 法学
    • 22 篇 社会学
  • 15 篇 农学
    • 15 篇 作物学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 10 篇 教育学
    • 10 篇 教育学
  • 1 篇 军事学

主题

  • 157 篇 machine learning
  • 63 篇 machine learning...
  • 59 篇 deep learning
  • 36 篇 support vector m...
  • 30 篇 computational mo...
  • 25 篇 predictive model...
  • 22 篇 prediction algor...
  • 19 篇 informatics
  • 17 篇 feature extracti...
  • 17 篇 training
  • 15 篇 decision trees
  • 14 篇 forecasting
  • 13 篇 internet of thin...
  • 13 篇 cloud computing
  • 13 篇 supervised learn...
  • 12 篇 intrusion detect...
  • 11 篇 medical services
  • 11 篇 heart
  • 11 篇 artificial intel...
  • 11 篇 technological in...

机构

  • 25 篇 department of co...
  • 21 篇 uttaranchal inst...
  • 18 篇 graphic era deem...
  • 9 篇 uttaranchal inst...
  • 7 篇 department of cs...
  • 7 篇 department of co...
  • 6 篇 chitkara univers...
  • 6 篇 symbiosis instit...
  • 5 篇 amity university...
  • 5 篇 amity university...
  • 5 篇 uttaranchal univ...
  • 4 篇 maharashtra pune
  • 4 篇 department of cs...
  • 4 篇 department of co...
  • 4 篇 vishwakarma univ...
  • 4 篇 department of bi...
  • 4 篇 faculty of engin...
  • 4 篇 biomedical syste...
  • 4 篇 department of el...
  • 4 篇 engineering and ...

作者

  • 9 篇 anita gehlot
  • 7 篇 rajesh singh
  • 7 篇 singh rajesh
  • 7 篇 durgaprasad gang...
  • 7 篇 gehlot anita
  • 5 篇 sandeep kumar
  • 5 篇 joel alanya-belt...
  • 5 篇 alanya-beltran j...
  • 5 篇 ramakrishnan ram...
  • 5 篇 bhasker pant
  • 4 篇 pundir sumit
  • 4 篇 wan azani mustaf...
  • 4 篇 hiam alquran
  • 4 篇 vikas tripathi
  • 4 篇 ahmed alkhayyat
  • 4 篇 arora bhavna
  • 4 篇 raman ramakrishn...
  • 4 篇 devesh pratap si...
  • 4 篇 kumar sandeep
  • 4 篇 gangodkar durgap...

语言

  • 590 篇 英文
  • 5 篇 其他
检索条件"任意字段=5th Asia Conference on Machine Learning and Computing, ACMLC 2022"
595 条 记 录,以下是151-160 订阅
排序:
Advanced Mechanisms of Perception in the Digital Hide and Seek Game Based on Deep learning  5
Advanced Mechanisms of Perception in the Digital Hide and Se...
收藏 引用
5th IEEE International conference on Smart Systems and Technologies, SST 2022
作者: Livada, Časlav Hodak, David Department of Software Engineering Faculty of Electrical Engineering Computing and Information Osijek Croatia Faculty of Electrical Engineering Computing and Information Osijek Croatia
the goal of this paper is to demonstrate the power of machine learning and deep learning combined with powerful tools used in creating virtual simulations. this is made possible by the Unity Game Engine, a software us... 详细信息
来源: 评论
An efficient multi-functional deep learning model for effective medical image classification using skin lesion database  5
An efficient multi-functional deep learning model for effect...
收藏 引用
IEEE 5th International conference on Multimedia Information Processing and Retrieval (MIPR)
作者: Nampalle, Kishore Babu Raman, Balasubramanian Indian Inst Technol Roorkee Comp Sci & Engn Dept Machine Intelligence Lab Roorkee Uttar Pradesh India
the automatic process of classifying a medical image plays a vital role in Computer-Aided Diagnosis (CADx). Due to the advent of Convolutional Neural Networks (CNNs) and wide usage, there has been a substantial improv... 详细信息
来源: 评论
Graph Neural Network-based Android Malware Classification with Jumping Knowledge  5
Graph Neural Network-based Android Malware Classification wi...
收藏 引用
5th IEEE conference on Dependable and Secure computing (IEEE DSC)
作者: Lo, Wai Weng Layeghy, Siamak Sarhan, Mohanad Gallagher, Marcus Portmann, Marius Univ Queensland Sch Informat Technol & Elect Engn Brisbane Qld Australia
this paper presents a new Android malware detection method based on Graph Neural Networks (GNNs) with Jumping-Knowledge (JK). Android function call graphs (FCGs) consist of a set of program functions and their interpr... 详细信息
来源: 评论
Hyperdimensional Consumer Pattern Analysis with Quantum Neural Architectures using Non-Hermitian Operators  5
Hyperdimensional Consumer Pattern Analysis with Quantum Neur...
收藏 引用
5th International conference on Information Management and machine Intelligence, ICIMMI 2023
作者: Goyal, Shivam Singh, Sunil K. Kumar, Sudhakar Sarin, Saket Gupta, Brij B. Arya, Varsha Chui, Kwok Tai Chandigarh College of Engineering and Technology Chandigarh Chandigarh India Asia University Taichung Taiwan Hong Kong Metropolitan University Hong Kong Hong Kong
In an era inundated with high-dimensional consumer data, the need for advanced hyper-dimensional pattern analysis poses a significant computational challenge. this research pioneers the use of quantum computing to rev... 详细信息
来源: 评论
Detection of Adaptive Network Intrusion Employing Enhanced machine learning Systems  5
Detection of Adaptive Network Intrusion Employing Enhanced M...
收藏 引用
5th International conference on Contemporary computing and Informatics, IC3I 2022
作者: Nirmala, B. Vijaya Mahadev Ravi Kiran, K. Gehlot, Anita Bhojne, Shilpa Sachin Bordoloi, Dibyhash PSNA College of Engineering and Technology Information Technology Tamilnadu Dindigul India Chandigarh University Department of AIT-CSE Punjab Mohali India UCEK Computer Science and Engineering JNTUK Kakinada India Uttaranchal Institute of Technology Uttaranchal University Uttarakhand Dehradun India Sandip University Department of Computer Sciences and Engineering Maharashtra Nashik India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India
In a variety of situations, the use of network intrusion detection systems (NIDS) is essential for preventing computer network disturbances. Characterizing network traffic is troublesome, by and by, because of the int... 详细信息
来源: 评论
MMArt-ACM 2022: 5th JointWorkshop on Multimedia Artworks Analysis and Attractiveness computing in Multimedia  22
MMArt-ACM 2022: 5th JointWorkshop on Multimedia Artworks Ana...
收藏 引用
ACM International conference on Multimedia Retrieval (ICMR)
作者: Nitta, Naoko Hu, Anita Tobitani, Kensuke Mokogawa Womens Univ Nishinomiya Hyogo Japan Natl Tsing Hua Univ Hsinchu Taiwan Univ Nagasaki Nagasaki Japan
In addition to classical art types like paintings and sculptures, new types of artworks emerge following the advancement of deep learning, social platforms, media capturing devices, and media processing tools. Large v... 详细信息
来源: 评论
An Experimental Investigation on the Emotion Recognition Using Power Spectrum Density and machine learning Algorithms in EEG Signals  5th
An Experimental Investigation on the Emotion Recognition Usi...
收藏 引用
5th EAI International conference on Big Data Innovation for Sustainable Cognitive computing, BDCC 2022
作者: Babu, Nirmal Varghese Kanaga, E. Grace Mary Department of Computer Science and Engineering Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India
Emotion recognition is a technique for identifying and classifying human emotions by combining biosensing, face recognition, speech and voice recognition, machine learning, and pattern recognition. the electroencephal... 详细信息
来源: 评论
Efficient Implementation to Reduce the Data Size in Big Data Using Classification Algorithm of machine learning  5th
Efficient Implementation to Reduce the Data Size in Big Data...
收藏 引用
5th EAI International conference on Big Data Innovation for Sustainable Cognitive computing, BDCC 2022
作者: RajKumar, V. Priyadharshini, G. Krishnasamy College of Engineering and Technology Cuddalore India
Big data play an enormous role in the real-world industry, such as financial, banking, government sector, and healthcare, to store the enormous amount of data stored and processed. Here, big data analytics processing ... 详细信息
来源: 评论
Survival Prediction of a Patient afterward a Heart Attack by machine learning  5
Survival Prediction of a Patient afterward a Heart Attack by...
收藏 引用
5th International conference on Contemporary computing and Informatics, IC3I 2022
作者: Giri, Biswajit Agarwal, Suman Kumari Kumari, Nandani Majumder, Rana Gupta, Sumita Mitra, Anirban Meghnad Saha Institute of Technology Kolkata India Sister Nivedita University Kolkata India ASET Amity University Noida India
Heart attack is a major threat to human life. It occurs in one or more coronary arteries refilled by the oxygen-rich blood, which also supplies into the heart muscle, suddenly becomes blocked, and unfortunately, a few... 详细信息
来源: 评论
Detecting Distributed Denial of Service Attacks in Internet of things Networks Using machine learning in Fog computing  5
Detecting Distributed Denial of Service Attacks in Internet ...
收藏 引用
5th International conference on Engineering Technology and its Applications, IICETA 2022
作者: Hassan, Karrar Falih Manaa, Mehdi Ebady University of Babylon College of Information Technology Babylon Iraq
the number of Internet of things (IoT) devices and the data produced by these devices have increased dramatically in recent years. IoT networks have benefited from the arrival of 5G, which aims to link more devices qu... 详细信息
来源: 评论