咨询与建议

限定检索结果

文献类型

  • 755 篇 会议
  • 8 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 470 篇 工学
    • 386 篇 计算机科学与技术...
    • 289 篇 软件工程
    • 172 篇 信息与通信工程
    • 93 篇 电气工程
    • 84 篇 生物工程
    • 75 篇 控制科学与工程
    • 71 篇 生物医学工程(可授...
    • 46 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
    • 36 篇 电子科学与技术(可...
    • 29 篇 仪器科学与技术
    • 26 篇 机械工程
    • 25 篇 光学工程
    • 21 篇 化学工程与技术
  • 206 篇 理学
    • 100 篇 数学
    • 91 篇 生物学
    • 47 篇 统计学(可授理学、...
    • 43 篇 物理学
    • 39 篇 系统科学
    • 29 篇 化学
  • 133 篇 管理学
    • 82 篇 图书情报与档案管...
    • 75 篇 管理科学与工程(可...
    • 27 篇 工商管理
  • 67 篇 医学
    • 57 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 39 篇 药学(可授医学、理...
  • 22 篇 法学
    • 21 篇 社会学
  • 16 篇 农学
    • 16 篇 作物学
  • 15 篇 教育学
    • 14 篇 教育学
  • 9 篇 经济学
  • 5 篇 军事学
  • 1 篇 文学

主题

  • 205 篇 machine learning
  • 60 篇 signal processin...
  • 47 篇 feature extracti...
  • 45 篇 deep learning
  • 45 篇 signal processin...
  • 39 篇 support vector m...
  • 36 篇 machine learning...
  • 31 篇 training
  • 27 篇 accuracy
  • 22 篇 computational mo...
  • 18 篇 neural networks
  • 16 篇 data models
  • 15 篇 predictive model...
  • 15 篇 image processing
  • 14 篇 natural language...
  • 14 篇 forecasting
  • 13 篇 electroencephalo...
  • 13 篇 real-time system...
  • 13 篇 classification
  • 13 篇 artificial intel...

机构

  • 7 篇 chitkara univers...
  • 4 篇 school of comput...
  • 4 篇 lloyd law colleg...
  • 3 篇 telangana hydera...
  • 3 篇 school of comput...
  • 3 篇 institute of aer...
  • 3 篇 lloyd institute ...
  • 3 篇 school of electr...
  • 3 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 department of el...
  • 3 篇 department of me...
  • 3 篇 central universi...
  • 3 篇 lloyd law colleg...
  • 3 篇 lloyd institute ...
  • 3 篇 college of compu...
  • 3 篇 school of electr...
  • 3 篇 co. ltd.
  • 2 篇 school of presch...
  • 2 篇 beijing institut...

作者

  • 4 篇 shaik subhani
  • 4 篇 wathiq mansoor
  • 4 篇 mansoor wathiq
  • 3 篇 anand r.
  • 3 篇 subba rao s.p.v.
  • 3 篇 gabbouj moncef
  • 3 篇 yazici ibrahim
  • 3 篇 i̇brahim yazici
  • 3 篇 k mayuri
  • 2 篇 rui wang
  • 2 篇 anas abou el kal...
  • 2 篇 guo jianxin
  • 2 篇 mehdi salkhordeh...
  • 2 篇 a l n rao
  • 2 篇 shuja mirza
  • 2 篇 yatika gori
  • 2 篇 ahmed qtaishat
  • 2 篇 cao jiuwen
  • 2 篇 mirza shuja
  • 2 篇 liu yang

语言

  • 741 篇 英文
  • 24 篇 其他
  • 12 篇 中文
检索条件"任意字段=6th International Conference on Signal Processing and Machine Learning, SPML 2023"
769 条 记 录,以下是161-170 订阅
排序:
6th international conference on Security and Privacy in New Computing Environments, SPNCE 2023
6th International Conference on Security and Privacy in New ...
收藏 引用
6th international conference on Security and Privacy in New Computing Environments, SPNCE 2023
the proceedings contain 23 papers. the special focus in this conference is on Security and Privacy in New Computing Environments. the topics include: Consortium Blockchain Storage Optimization Based on60;Fountain C...
来源: 评论
Data, Information, Knowledge, Wisdom Pyramid Concept Revisited in the Context of Deep learning  15th
Data, Information, Knowledge, Wisdom Pyramid Concept Revisit...
收藏 引用
15th international KES conference on Intelligent Decision Technologies, KESIDT 2023
作者: Kostek, Bożena ETI Faculty Audio Acoustics Laboratory Gdańsk University of Technology Narutowicza 11/12 Gdańsk80-232 Poland
In this paper, the data, information, knowledge, and wisdom (DIKW) pyramid is revisited in the context of deep learning applied to machine learning-based audio signal processing. A discussion on the DIKW schema is car... 详细信息
来源: 评论
machine learning-Based Prediction of Cardiovascular Diseases Using Flask  6th
Machine Learning-Based Prediction of Cardiovascular Diseases...
收藏 引用
6th international conference on Soft Computing and signal processing, ICSCSP 2023
作者: Sagar Reddy, V. Supraja, Boddula Vamshi Kumar, M. Krishna Chaitanya, Ch. Department of Electronics and Communication Engineering VNR VJIET Telangana Hyderabad India
Health care is an inescapable task in a human’s life. Cardiovascular diseases, also known as CVDs, are amongst the most prevalent causes of death globally, costing the lives of around 17.9 million people each year. C... 详细信息
来源: 评论
machine learning-Aided Piece-Wise Modeling Technique of Power Amplifier for Digital Predistortion  48
Machine Learning-Aided Piece-Wise Modeling Technique of Powe...
收藏 引用
48th IEEE international conference on Acoustics, Speech and signal processing, ICASSP 2023
作者: Krishna Chaitanya Bulusu, S.S. Tervo, Nuutti Susarla, Praneeth Sillanpaa, Mikko J. Silven, Olli Juntti, Markku Parssinen, Aarno OuluFI-90014 Finland OuluFI-90014 Finland OuluFI-90014 Finland
We propose a new power amplifier (PA) behavioral modeling approach, to characterize and compensate for the signal quality degrading effects induced by a PA with a machine learning (ML) aided piece-wise (PW) modeling a... 详细信息
来源: 评论
Prediction of Air Pollutant Concentrations in Airport Areas using machine learning Architecture  12
Prediction of Air Pollutant Concentrations in Airport Areas ...
收藏 引用
12th international conference on Image processing theory, Tools and Applications, IPTA 2023
作者: Wang, Huaijin Djemal, Khalifa Feiz, Amir Ali Chaudhuri, Sheli Sinha Paris Saclay University Univ. Evry Ibisc Evry France Paris Saclay University Univ. Evry Lmee Evry France Jadavpur University Electronics and Telecommunication Engineering Department Kolkata India
the importance of analyzing and predicting the levels of atmospheric pollutants is emphasized in environmental risk studies. Existing prediction models based on machine learning have been proposed for this purpose. In... 详细信息
来源: 评论
A Human-machine Collaborative Video Summarization Framework Using Pupillary Response signals  6
A Human-Machine Collaborative Video Summarization Framework ...
收藏 引用
6th international conference on Information Communication and signal processing, ICICSP 2023
作者: Ma, Haigang Yu, Wenyuan Wang, Yaoyao Zhou, Minwei Ding, Nai Zheng, Jing Zhejiang University Hangzhou China Zhejiang Lab Hangzhou China Zhejiang University Zhejiang Lab Hangzhou China
this paper proposes a novel, human-machine collaborative, pupillary response-based video summarization framework. Considering that humans are the end-users and evaluators of video content, it is natural to establish t... 详细信息
来源: 评论
A Comparative Study of machine learning and Deep learning Algorithm for Handwritten Digit Recognition  6
A Comparative Study of Machine Learning and Deep Learning Al...
收藏 引用
6th international conference on Contemporary Computing and Informatics, IC3I 2023
作者: Sohail, Mohammed Lal Saini, Madan Singh, Vedant Pratap Dhir, Sarthak Patel, Vishal Apex Institute of Technology Department of CSE Chandigarh University Punjab India
Handwritten digit recognition is a complex task in various real-world applications such as bank check processing, postal automation recognition etc. In recent time, different kind of learning algorithms are used to an... 详细信息
来源: 评论
Enhancing Brain Tumour Aid Diagnosis with Augmented Reality rendering-based 6 DoF Object Pose Estimation  6
Enhancing Brain Tumour Aid Diagnosis with Augmented Reality ...
收藏 引用
6th international conference on signal processing and Information Security, ICSPIS 2023
作者: Amara, Kahina Kerdjidj, Oussama Atalla, Shadi Guerroudji, Mohamed Amine Mansoor, Wathiq Zenati, Nadia Centre for Development of Advanced Technologies Algiers Algeria University of Dubai College of Engineering and It Dubai United Arab Emirates
Accurately estimating the position and orientation of objects in augmented reality (AR) is a crucial task known as 6 Degrees of Freedom (6 DoF) object pose estimation. this capability enables machines to understand th... 详细信息
来源: 评论
Exploiting machine learning Technique for Attack Detection in Intrusion Detection System (IDS) Based on Protocol  6th
Exploiting Machine Learning Technique for Attack Detection i...
收藏 引用
6th international conference on Information and Knowledge Systems (ICIKS)
作者: Aladesote, Olomi Isaiah Fakoya, Johnson Tunde Agbelusi, Olutola Fed Polytech Dept Comp Sci Ile Oluji Ondo Nigeria Fed Univ Technol Akure Dept Software Engn Akure Ondo Nigeria
An intrusion detection system (IDS) can be either software or hardware that computerizes the process of keeping track of and evaluating network or computer system activity for indications of security issues. IDS is a ... 详细信息
来源: 评论
Network Information Security Risk Assessment Method Based on machine learning Algorithm  6th
Network Information Security Risk Assessment Method Based on...
收藏 引用
6th European-Alliance-for-Innovation (EAI) international conference on Advanced Hybrid Information processing (ADHIP)
作者: Jiang, Ruirong Wan, Liyong Jiangxi Univ Software Profess Technol Nanchang 330041 Jiangxi Peoples R China
the current computer network information security risk assessment methods have the problems of low assessment accuracy, which seriously restricts the assessment effect. In order to solve this problem and improve the e... 详细信息
来源: 评论