咨询与建议

限定检索结果

文献类型

  • 2,560 篇 会议
  • 38 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 2,608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,815 篇 工学
    • 1,614 篇 计算机科学与技术...
    • 1,200 篇 软件工程
    • 381 篇 信息与通信工程
    • 345 篇 生物工程
    • 255 篇 生物医学工程(可授...
    • 171 篇 控制科学与工程
    • 142 篇 机械工程
    • 133 篇 电气工程
    • 124 篇 光学工程
    • 113 篇 化学工程与技术
    • 88 篇 安全科学与工程
    • 85 篇 动力工程及工程热...
    • 70 篇 电子科学与技术(可...
    • 53 篇 农业工程
  • 792 篇 理学
    • 420 篇 数学
    • 372 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 143 篇 系统科学
    • 132 篇 物理学
    • 77 篇 化学
  • 506 篇 管理学
    • 275 篇 图书情报与档案管...
    • 266 篇 管理科学与工程(可...
    • 153 篇 工商管理
  • 219 篇 医学
    • 214 篇 临床医学
    • 209 篇 基础医学(可授医学...
    • 144 篇 药学(可授医学、理...
    • 82 篇 公共卫生与预防医...
  • 83 篇 法学
    • 71 篇 社会学
  • 64 篇 农学
    • 63 篇 作物学
  • 56 篇 经济学
    • 56 篇 应用经济学
  • 40 篇 教育学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 297 篇 machine learning
  • 152 篇 deep learning
  • 77 篇 support vector m...
  • 76 篇 machine learning...
  • 64 篇 forecasting
  • 54 篇 feature extracti...
  • 51 篇 accuracy
  • 50 篇 artificial intel...
  • 49 篇 adversarial mach...
  • 47 篇 predictive model...
  • 43 篇 decision trees
  • 42 篇 internet of thin...
  • 41 篇 data models
  • 40 篇 convolutional ne...
  • 39 篇 computational mo...
  • 38 篇 training
  • 34 篇 data mining
  • 32 篇 real-time system...
  • 32 篇 sentiment analys...
  • 31 篇 big data

机构

  • 90 篇 karnataka bangal...
  • 72 篇 maharishi school...
  • 71 篇 school of comput...
  • 45 篇 maharishi school...
  • 20 篇 karnataka bengal...
  • 18 篇 department of co...
  • 12 篇 guangdong univer...
  • 11 篇 noida institute ...
  • 11 篇 department of co...
  • 10 篇 chitkara univers...
  • 10 篇 department of co...
  • 9 篇 department of co...
  • 9 篇 department of ci...
  • 8 篇 department of co...
  • 7 篇 department of el...
  • 7 篇 guangdong univer...
  • 7 篇 department of co...
  • 6 篇 chennai
  • 6 篇 department of co...
  • 6 篇 university of el...

作者

  • 22 篇 mishra awakash
  • 22 篇 agarwal trapty
  • 16 篇 alam intekhab
  • 15 篇 savita
  • 7 篇 raghavendra r.
  • 6 篇 krishnaiah pokal...
  • 6 篇 alkhayyat ahmed
  • 6 篇 ahmed alkhayyat
  • 6 篇 annapoorna b.
  • 6 篇 singh vaishali
  • 6 篇 dileep chilukuri
  • 6 篇 kapila dhiraj
  • 6 篇 ravi m.
  • 6 篇 prabhu a.
  • 6 篇 nachappa m.n.
  • 6 篇 satyanarayana b.
  • 6 篇 vinit kumar gunj...
  • 5 篇 ojha ananta
  • 5 篇 wan azani mustaf...
  • 5 篇 hiam alquran

语言

  • 2,383 篇 英文
  • 225 篇 其他
  • 34 篇 中文
检索条件"任意字段=5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023"
2608 条 记 录,以下是91-100 订阅
排序:
PCOS Detection Using CNN and ML Algorithms  5th
PCOS Detection Using CNN and ML Algorithms
收藏 引用
5th international conference on data science, machine learning and applications, icdsmla 2023
作者: Roja, G. Spandana, B. Divya, N. Anusha, R. Pushpa Rani, K. Narayanamma Institute of Technology and Science Telangana Hyderabad India Department of CSE G. Narayanamma Institute of Technology and Science Telangana Hyderabad India Narayanamma Institute of Technology and Science Telangana Hyderabad India Department of CSE MLR Institute of Technology and Science Telangana Hyderabad India
Polycystic Ovarian Syndrome (PCOS) is a complicated menstrual sickness that affects a wide range of women of procreative lifetime. Its miles connected with a combination of signs, including abnormal menstrual cycles, ... 详细信息
来源: 评论
A Novel and Efficient machine learning Technique for Cleaning Q-Messy data  5th
A Novel and Efficient Machine Learning Technique for Cleanin...
收藏 引用
5th international conference on data science, machine learning and applications, icdsmla 2023
作者: Saradhi, K. Davanam, Ganesh Malchi, Sunil Kumar School of Commerce and Management Mohan Babu University Tirupati India Andhra Pradesh Tirupati India
In the era of big data, organizations and researchers face numerous challenges when dealing with large, complex datasets. data cleaning, visualization, and machine learning (ML) models play crucial roles in extracting... 详细信息
来源: 评论
Generative Adversarial Transfer learning for Retinal Image Segmentation  5th
Generative Adversarial Transfer Learning for Retinal Image S...
收藏 引用
5th international conference on data science, machine learning and applications, icdsmla 2023
作者: Yadav, Sanjay Kumar Preethi, D. Acharjya, Kalyan Lora, Chandra Prakash Uttar Pradesh Noida India Department of Computer Science and Information Technology Jain University Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Chemistry Vivekananda Global University Jaipur India
Adversarial switch mastering for surgical device Segmentation in Endoscopic pix is a shape of system learning that uses Generative adversarial Networks (GANs) to apprehend and segment surgical contraptions in endoscop... 详细信息
来源: 评论
Categories of Cyber Crimes, Case Study and Security  5th
Categories of Cyber Crimes, Case Study and Security
收藏 引用
5th international conference on data science, machine learning and applications, icdsmla 2023
作者: Vandana, D. Neeraja, Duddyal Department of IT G. Narayanamma Institute of Technology and Science Telangana Hyderabad India
the widespread adoption of the Internet has revolutionized global communication. However, it has also led to a rise in cybercrime, commonly known as e-crimes, posing significant challenges to modern society. Illegitim... 详细信息
来源: 评论
Detecting Electromagnetic Vulnerabilities in Networking Topologies  5th
Detecting Electromagnetic Vulnerabilities in Networking Topo...
收藏 引用
5th international conference on data science, machine learning and applications, icdsmla 2023
作者: Preethi, D. Verma, Upendra K. Arumugam, Jayachandran Alam, Intekhab Karnataka Bengaluru India Department of Computer Science and Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
this paper describes a technique of detecting electromagnetic vulnerabilities in networking topologies, consisting of Wi-Fi communications. A green approach is offered which entails the mixture of electromagnetic meas... 详细信息
来源: 评论
Estimating Chlorophyll Content of Vegetation in Hyper Spectral Surface Images  5th
Estimating Chlorophyll Content of Vegetation in Hyper Spectr...
收藏 引用
5th international conference on data science, machine learning and applications, icdsmla 2023
作者: Kannagi, A. Adhikari, Manoj S. Manjula, H.M. Agarwal, Trapty Karnataka Bangalore India Department of Computer Science and Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
the Estimating Chlorophyll content material of vegetation in Hyper Spectral floor photos aims to create an automatic approach to accurately degree the concentration of chlorophyll in plant life using hyperspectral flo... 详细信息
来源: 评论
Semantic Enrichment of Textual data through Knowledge Extraction  5th
Semantic Enrichment of Textual Data Through Knowledge Extrac...
收藏 引用
5th international conference on data science, machine learning and applications, icdsmla 2023
作者: Nanda Devi, D.R. Kasu, Harshitha Line, Meghana Roshni, N. Shreya, P. G. Narayanamma Institute of Technology and Science Telangana Hyderabad India
A vast web of information i.e. Knowledge forms the backbone of intelligent systems. Unstructured data poses challenges in terms of information retrieval, scalability and semantic ambiguity. Possible solutions for many... 详细信息
来源: 评论
Applying Reinforcement learning Techniques for Autonomous Spectrum Allocation in 6G Networks  5th
Applying Reinforcement Learning Techniques for Autonomous Sp...
收藏 引用
5th international conference on data science, machine learning and applications, icdsmla 2023
作者: Beemkumar, N. Singh, Akhilendra Pratap Bishnoi, Sunita Kumar, Rajesh Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Chemistry Vivekananda Global University Jaipur India Department of Physics Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India
the use of reinforcement learning for autonomous spectrum allocation in 6G networks is described in this technical abstract. A type of machine learning called reinforcement learning (RL) lets agents learn policies in ... 详细信息
来源: 评论
Analyzing the Efficiency of Key Management Techniques Used in Information Security Models for Networked applications  5th
Analyzing the Efficiency of Key Management Techniques Used i...
收藏 引用
5th international conference on data science, machine learning and applications, icdsmla 2023
作者: Beemkumar, N. Singh, Vaishali Shree, Ritu Batra, Raman Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Mechanical Engineering Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India
this study aims to investigate the performance of numerous key manipulation strategies utilized in modern statistics protection models. Especially, this painting examines the use of public key infrastructures (PKI), s... 详细信息
来源: 评论
ICADEIS 2023 - international conference on Advancement in data science, E-learning and Information Systems: data, Intelligent Systems, and the applications for Human Life, Proceeding
ICADEIS 2023 - International Conference on Advancement in Da...
收藏 引用
5th international conference on Advancement in data science, E-learning and Information Systems, ICADEIS 2023
the proceedings contain 51 papers. the topics discussed include: Alzheimer’s disease detection and classification: an ensemble machine learning paradigm;ontology-based car recommender system using functional requirem...
来源: 评论