咨询与建议

限定检索结果

文献类型

  • 774 篇 会议
  • 18 册 图书
  • 17 篇 期刊文献

馆藏范围

  • 809 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 274 篇 工学
    • 205 篇 计算机科学与技术...
    • 169 篇 软件工程
    • 62 篇 信息与通信工程
    • 60 篇 电气工程
    • 48 篇 控制科学与工程
    • 20 篇 生物工程
    • 19 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 11 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 安全科学与工程
    • 8 篇 化学工程与技术
    • 7 篇 仪器科学与技术
    • 6 篇 材料科学与工程(可...
  • 126 篇 理学
    • 93 篇 数学
    • 32 篇 统计学(可授理学、...
    • 30 篇 物理学
    • 26 篇 系统科学
    • 23 篇 生物学
    • 8 篇 化学
  • 91 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 18 篇 医学
    • 17 篇 基础医学(可授医学...
    • 17 篇 临床医学
    • 11 篇 药学(可授医学、理...
  • 11 篇 法学
    • 8 篇 社会学
  • 11 篇 教育学
    • 10 篇 教育学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 7 篇 农学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 machine learning...
  • 25 篇 accuracy
  • 22 篇 machine learning
  • 19 篇 prediction algor...
  • 16 篇 genetic algorith...
  • 16 篇 clustering algor...
  • 15 篇 predictive model...
  • 14 篇 classification a...
  • 13 篇 support vector m...
  • 13 篇 feature extracti...
  • 13 篇 heuristic algori...
  • 12 篇 deep learning
  • 11 篇 optimization
  • 11 篇 algorithm design...
  • 11 篇 data models
  • 10 篇 data mining
  • 10 篇 real-time system...
  • 9 篇 internet of thin...
  • 9 篇 neural networks
  • 9 篇 analytical model...

机构

  • 7 篇 daffodil interna...
  • 5 篇 department of so...
  • 3 篇 speech technolog...
  • 3 篇 chitkara univers...
  • 3 篇 speech technolog...
  • 3 篇 university of le...
  • 3 篇 uttaranchal inst...
  • 3 篇 department of el...
  • 3 篇 department of co...
  • 3 篇 malaysia-japan i...
  • 3 篇 department of in...
  • 3 篇 symbiosis instit...
  • 2 篇 department of el...
  • 2 篇 tsinghua univ de...
  • 2 篇 school of inform...
  • 2 篇 international de...
  • 2 篇 cloud computing ...
  • 2 篇 symbiosis instit...
  • 2 篇 aditya engineeri...
  • 2 篇 department of re...

作者

  • 7 篇 li kin fun
  • 4 篇 sankar ananth
  • 4 篇 rahman mostafiju...
  • 4 篇 kdv prasad
  • 3 篇 pillai prashant
  • 3 篇 hu yim fun
  • 3 篇 khatun sabira
  • 3 篇 harshal patil
  • 3 篇 saikat gochhait
  • 3 篇 dankan gowda v
  • 2 篇 yuanfa ji
  • 2 篇 rosli omar
  • 2 篇 janjarassuk udom
  • 2 篇 ahmed marzia
  • 2 篇 sahnius usman
  • 2 篇 islam md. sharif...
  • 2 篇 lili yu
  • 2 篇 ramya maranan
  • 2 篇 xu kai j.
  • 2 篇 jos carlos alves

语言

  • 778 篇 英文
  • 27 篇 其他
  • 8 篇 中文
检索条件"任意字段=5th International Conference on Fun with Algorithms"
809 条 记 录,以下是351-360 订阅
排序:
Research of Pattern Matching Algorithm Based on KMP and BMHS2  5
Research of Pattern Matching Algorithm Based on KMP and BMHS...
收藏 引用
5th IEEE international conference on Computer and Communications, ICCC 2019
作者: Zhou, Yansen Pang, Ruixuan University of International Relations Department of Information Science and Technology Beijing China
the improvement of the time performance of pattern matching algorithm mainly lies in reducing the number of character comparisons and increasing the distance of the matching window moving to the right when mismatch. I... 详细信息
来源: 评论
Research on small target detection algorithm based on improved yolov3
Research on small target detection algorithm based on improv...
收藏 引用
international conference on Mechanical, Control and Computer Engineering (ICMCCE)
作者: Kangquan Ye Zhongbin Fang Xiaojie Huang Xizhe Ma Jing Ji Qiantong Wu Yongjun Xie Rail Transit Research Institute of Jinan University China School of international energy Jinan University China Zhuhai China
As a popular target detection algorithm, yolov3 has high detection speed and detection accuracy. However, compared with other target detection algorithms, yolov3 has poor performance in small target recognition, with ... 详细信息
来源: 评论
EEML 2019 - Proceedings of the 5th Workshop on Experimental Economics and Machine Learning, co-located with the 7th international conference on Applied Research in Economics, iCare7 2019
EEML 2019 - Proceedings of the 5th Workshop on Experimental ...
收藏 引用
5th international Workshop on Experimental Economics and Machine Learning, EEML 2019
the proceedings contain 11 papers. the topic discussed include: recommender systems for online classiï¬52;ed advertisements;field experimentation in marketing research;deep reinforcement learning with Viz...
来源: 评论
Proceedings of MLHPC 2019: 5th Workshop on Machine Learning in HPC Environments - Held in conjunction with SC 2019: the international conference for High Performance Computing, Networking, Storage and Analysis
Proceedings of MLHPC 2019: 5th Workshop on Machine Learning ...
收藏 引用
5th IEEE/ACM Workshop on Machine Learning in HPC Environments, MLHPC 2019
the proceedings contain 8 papers. the topics discussed include: scalable hyperparameter optimization with lazy Gaussian processes;understanding scalability and fine-grain parallelism of synchronous data parallel train...
来源: 评论
Proceedings - 2019 5th international conference on Science and Technology, ICST 2019
Proceedings - 2019 5th International Conference on Science a...
收藏 引用
5th international conference on Science and Technology, ICST 2019
the proceedings contain 122 papers. the topics discussed include: a detection of tissue electroporation with very short high voltage impulse;optimization of PLL loop filter control to reduce time delay using genetic a...
来源: 评论
5th international Symposium on Dependable Software Engineering: theories, Tools, and Applications, SETTA 2019
5th International Symposium on Dependable Software Engineeri...
收藏 引用
5th international Symposium on Dependable Software Engineering: theories, Tools, and Applications, SETTA 2019
the proceedings contain 8 papers. the special focus in this conference is on Dependable Software Engineering. the topics include: Simplifying the analysis of software design variants with a colorful alloy;Response tim...
来源: 评论
Automated Prediction of Phishing Websites Using Deep Convolutional Neural Network  5
Automated Prediction of Phishing Websites Using Deep Convolu...
收藏 引用
5th international conference on Computer, Communication, Chemical, Materials and Electronic Engineering, IC4ME2 2019
作者: Zubair Hasan, K.M. Hasan, Md Zahid Zahan, Nusrat Daffodil International University Department of Computer Science Engineering Dhaka Bangladesh
Phishing is one of the ruinous issues encountered by the World Wide Web (WWW) and steers to the financial catastrophes for individuals and businesses. It has been perpetually a perplexing issue to identify phishing at... 详细信息
来源: 评论
Minimised Jaya Algorithm-based Structure optimisation for Heterogeneous Wireless Sensor Networks
Minimised Jaya Algorithm-based Structure optimisation for He...
收藏 引用
IEEE international conference on Computing, Communication and Security (ICCCS)
作者: Piyush Mishra Debasish Sahoo Hemant Khandelwal Nishith Amman Srichandan Sobhanayak International Institute of Information Technology Bhubaneswar
Extensive research has been carried out in regard to homogenous Wireless Sensor Networks, subject to various constraints such as the available energy resources for sensor nodes. However, research for optimum cluster h... 详细信息
来源: 评论
Machine learning and datamining methods for hybrid IoT intrusion detection
Machine learning and datamining methods for hybrid IoT intru...
收藏 引用
international conference on Cloud Technologies and Applications (CloudTech)
作者: Abdellatif El Ghazi Ait Moulay Rachid TIC Lab Information and Communication Technology Laboratory International University in Rabat Rabat Morocco Algebra and Functional Analysis Group Mohamed V University in Rabat Rabat Morocco
By 2025 Internet of things will reach over 75 billion devices which would exceed number of humans about 8.1 billion. these devices need to be secured from many threats by implementing secure and interoperable solution... 详细信息
来源: 评论
An Overview of Bag of Words;Importance, Implementation, Applications, and Challenges  5
An Overview of Bag of Words;Importance, Implementation, Appl...
收藏 引用
5th international Engineering conference on Developments in Civil and Computer Engineering Applications, IEC 2019
作者: Qader, Wisam A. Ameen, Musa M. Ahmed, Bilal I. Tishk International University Computer Engineering Dep. Erbil Iraq Tishk International University Information Technology Dep. Erbil Iraq
In the past fifteen years, the grow of using Bag of Words (BoW) method in the field of computer vision is visibly observed. In addition,-for the text classification and texture recognition, it can also be used in clas... 详细信息
来源: 评论