咨询与建议

限定检索结果

文献类型

  • 177 篇 会议
  • 4 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 146 篇 工学
    • 121 篇 计算机科学与技术...
    • 59 篇 软件工程
    • 21 篇 控制科学与工程
    • 16 篇 信息与通信工程
    • 12 篇 生物工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 电气工程
    • 5 篇 安全科学与工程
    • 4 篇 仪器科学与技术
    • 4 篇 电子科学与技术(可...
    • 4 篇 交通运输工程
    • 4 篇 农业工程
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
  • 59 篇 理学
    • 40 篇 数学
    • 16 篇 生物学
    • 11 篇 统计学(可授理学、...
    • 7 篇 物理学
    • 4 篇 化学
    • 3 篇 系统科学
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 9 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 6 篇 法学
    • 6 篇 社会学
  • 6 篇 农学
    • 6 篇 作物学
  • 2 篇 教育学
  • 1 篇 经济学

主题

  • 13 篇 deep learning
  • 12 篇 machine learning
  • 10 篇 data mining
  • 7 篇 real-time system...
  • 7 篇 convolutional ne...
  • 6 篇 clustering algor...
  • 5 篇 feature extracti...
  • 5 篇 artificial intel...
  • 5 篇 data models
  • 4 篇 database managem...
  • 4 篇 accuracy
  • 4 篇 forecasting
  • 3 篇 internet of thin...
  • 3 篇 fuzzy sets
  • 3 篇 support vector m...
  • 3 篇 automation
  • 3 篇 manuals
  • 3 篇 visualization
  • 3 篇 decision making
  • 3 篇 classification

机构

  • 3 篇 school of comput...
  • 2 篇 monash universit...
  • 2 篇 chengdu universi...
  • 2 篇 information tech...
  • 2 篇 department of ma...
  • 2 篇 ajou univ div el...
  • 2 篇 dept. of informa...
  • 2 篇 department of da...
  • 2 篇 intelligent comp...
  • 2 篇 telkom universit...
  • 2 篇 univ london roya...
  • 2 篇 department of in...
  • 2 篇 naval research l...
  • 2 篇 department of co...
  • 2 篇 the university o...
  • 2 篇 school of comput...
  • 2 篇 faculty of scien...
  • 2 篇 tsing hua univ s...
  • 2 篇 ajou univ grad s...
  • 2 篇 department of ma...

作者

  • 4 篇 yin hujun
  • 3 篇 lee yuh-jye
  • 3 篇 zhang byoung-tak
  • 3 篇 taniar david
  • 3 篇 huang de-shuang
  • 2 篇 sun jg
  • 2 篇 chan tony f.
  • 2 篇 horváth tomáš
  • 2 篇 pao hsing-kuo
  • 2 篇 liu yang
  • 2 篇 ng michael k.
  • 2 篇 tashu tsegaye mi...
  • 2 篇 ahmad k
  • 2 篇 fakhrurroja hani...
  • 2 篇 p. vishnu kumar
  • 2 篇 bellotti t
  • 2 篇 luo zy
  • 2 篇 hujun yin
  • 2 篇 wu edmond h.
  • 2 篇 colin fyfe

语言

  • 174 篇 英文
  • 5 篇 其他
  • 3 篇 中文
检索条件"任意字段=5th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2004"
182 条 记 录,以下是111-120 订阅
排序:
Cluster-based visualisation of marketing data
收藏 引用
5th international conference on intelligent data engineering and automated learning, ideal 2004
作者: Lisboa, Paulo J.G. Patel, Shail School of Computing and Mathematical Sciences John Moores University LiverpoolL3 3BX United Kingdom Corporate Research Unilever R and D Colworth House Sharnbrook BedfordMK44 1LQ United Kingdom
Marketing data analysis typically aims to gain insights for targeted promotions or, increasingly, to implement collaborative filtering. ideally, data would be visualised directly. there is a scarcity of methods to vis... 详细信息
来源: 评论
Deep learning on Natural Viewing Behaviors to Differentiate Children with Fetal Alcohol Spectrum Disorder
Deep Learning on Natural Viewing Behaviors to Differentiate ...
收藏 引用
14th international conference on intelligent data engineering and automated learning (ideal)
作者: Tseng, Po-He Paolozza, Angelina Munoz, Douglas P. Reynolds, James N. Itti, Laurent Univ So Calif Dept Comp Sci Los Angeles CA 90089 USA Queens Univ Ctr Neurosci Studies Kingston ON K7L 3N6 Canada
Computational models of visual attention have attracted strong interest by accurately predicting how humans deploy attention. However, little research has utilized these models to detect clinical populations whose att... 详细信息
来源: 评论
Exploiting safety constraints in fuzzy self-organising maps for safety critical applications
收藏 引用
5th international conference on intelligent data engineering and automated learning, ideal 2004
作者: Kurd, Zeshan Kelly, Tim P. Austin, Jim High Integrity Systems Engineering Group Department of Computer Science University of York YorkYO10 5DD United Kingdom Advanced Computer Architectures Group Department of Computer Science University of York YorkYO10 5DD United Kingdom
this paper defines a constrained Artificial Neural Network (ANN) that can be employed for highly-dependable roles in safety critical applications. the derived model is based upon the Fuzzy Self-Organising Map (FSOM) a... 详细信息
来源: 评论
Stacking-based ensemble learning on low dimensional features for fake news detection  21
Stacking-based ensemble learning on low dimensional features...
收藏 引用
21st IEEE international conference on High Performance Computing and Communications, 17th IEEE international conference on Smart City and 5th IEEE international conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Li, Songqian Ma, Kun Niu, Xuewei Wang, Yufeng Ji, Ke Yu, Ziqiang Chen, Zhenxiang School of Information Science and Engineering University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China
With the age of incoming of self-media, everyone can be the author of the content in the media age of big data. this has caused a mass of fake news appearing in the network. Authors of these fake news will mislead the... 详细信息
来源: 评论
Mining association rules using relative confidence
收藏 引用
5th international conference on intelligent data engineering and automated learning, ideal 2004
作者: Do, Tien Dung Hui, Siu Cheung Fong, Alvis C.M. School of Computer Engineering Nanyang Technological University Nanyang Avenue Singapore
Mining for association rules is one of the fundamental tasks of data mining. Association rule mining searches for interesting relationships amongst items for a given dataset based mainly on the support and confidence ... 详细信息
来源: 评论
Business Process Redesign of Sales Monitoring Business Process Management to be a Smart Logistic Shipment Company  5
Business Process Redesign of Sales Monitoring Business Proce...
收藏 引用
5th international conference on Advancement in data Science, E-learning and Information Systems, ICADEIS 2023
作者: Firdaus, Taufiq Maulana Fajri, Hanif Fakhrurroja, Hanif Telkom University School of Industrial and System Engineering Bandung Indonesia Telkom University National Research and Innovation Agency School of Industrial Engineering Bandung Indonesia
the sales process in every company is important. therefore, every sales record must be stored in an integrated database so that tracking sales records is easy. However, there are still many sales recording practices t... 详细信息
来源: 评论
intelligent data engineering and automated learningideal 2010  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: Colin Fyfe Peter Tino Darryl Charles Cesar Garcia-Osorio Hujun Yin
the ideal conference has become a unique, established and broad interdisciplinary forum for experts, researchers and practitioners in many fields to interact with each other and with leading academics and industries i... 详细信息
来源: 评论
Detecting credit card fraud by using questionnaire-responded transaction model based on support vector machines
收藏 引用
5th international conference on intelligent data engineering and automated learning, ideal 2004
作者: Chen, Rong-Chang Chiu, Ming-Li Huang, Ya-Li Chen, Lin-Ti Department of Logistics Engineering and Management China Department of Information Management National Taichung Institute of Technology No. 129 Sec. 3 Sanmin Rd Taichung404 Taiwan
this work proposes a new method to solve the credit card fraud problem. Traditionally, systems based on previous transaction data were set up to predict a new transaction. this approach provides a good solution in som... 详细信息
来源: 评论
automated Detection of Encryption Algorithms Using AI Techniques  5
Automated Detection of Encryption Algorithms Using AI Techni...
收藏 引用
5th international conference on IoT Based Control Networks and intelligent Systems, ICICNIS 2024
作者: Chidambaranathan, Senthilnathan Santhanaraj, M. Ajitha, E. Syed Fiaz, A.S. Suchithra, B. Kathirvel, T. Virtusa Corporation NJ United States Kongunadu College of Engineering and Technology Department of IT Tamil Nadu Trichy India St. Joseph's Institute of Technology Computer Science and Engineering India Sona College of Technology Department of Information Technology Salem India Sri Eshwar College of Engineering Department of CSE Coimbatore India
In today's digital era, cryptographic algorithms play a vital role in safeguarding sensitive information, maintaining confidentiality, and defending against cyberattacks. With the growing variety of encryption met... 详细信息
来源: 评论
Evaluation Toolkit For Robustness Testing Of Automatic Essay Scoring Systems  2022
Evaluation Toolkit For Robustness Testing Of Automatic Essay...
收藏 引用
5th ACM India Joint international conference on data Science and Management of data (CoDS-COMAD) / 9th ACM IKDD CODS conference / 26th COMAD conference
作者: Kabra, Anubha Bhatia, Mehar Singla, Yaman Kumar Li, Junyi Jessy Shah, Rajiv Ratn Adobe San Jose CA 95110 USA IIIT Delhi Delhi India SUNY Buffalo Buffalo NY USA Univ Texas Austin Austin TX 78712 USA
Automatic scoring engines have been used for scoring approximately fifteen million test-takers in just the last three years. this number is increasing further due to COVID-19 and the associated automation of education... 详细信息
来源: 评论