咨询与建议

限定检索结果

文献类型

  • 799 篇 会议
  • 10 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 811 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 539 篇 工学
    • 513 篇 计算机科学与技术...
    • 338 篇 软件工程
    • 155 篇 信息与通信工程
    • 117 篇 控制科学与工程
    • 93 篇 生物工程
    • 92 篇 网络空间安全
    • 85 篇 石油与天然气工程
    • 54 篇 生物医学工程(可授...
    • 41 篇 电气工程
    • 27 篇 光学工程
    • 23 篇 农业工程
    • 19 篇 机械工程
    • 18 篇 化学工程与技术
    • 17 篇 安全科学与工程
  • 298 篇 理学
    • 207 篇 数学
    • 102 篇 生物学
    • 65 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 39 篇 物理学
    • 17 篇 化学
  • 185 篇 管理学
    • 136 篇 管理科学与工程(可...
    • 57 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 58 篇 医学
    • 58 篇 基础医学(可授医学...
    • 58 篇 临床医学
    • 39 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 27 篇 法学
    • 21 篇 社会学
  • 26 篇 农学
    • 26 篇 作物学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 教育学

主题

  • 146 篇 machine learning
  • 72 篇 deep learning
  • 38 篇 machine learning...
  • 36 篇 support vector m...
  • 30 篇 adversarial mach...
  • 23 篇 computational mo...
  • 20 篇 training
  • 19 篇 forecasting
  • 16 篇 predictive model...
  • 16 篇 prediction algor...
  • 13 篇 internet of thin...
  • 13 篇 sentiment analys...
  • 13 篇 artificial intel...
  • 13 篇 convolutional ne...
  • 12 篇 object detection
  • 11 篇 neural networks
  • 11 篇 feature extracti...
  • 10 篇 face recognition
  • 10 篇 decision trees
  • 9 篇 random forest

机构

  • 17 篇 chitkara univers...
  • 6 篇 pimpri chinchwad...
  • 6 篇 univ johannesbur...
  • 5 篇 pimpri chinchwad...
  • 5 篇 faculty of infor...
  • 5 篇 key lab complex ...
  • 5 篇 baoji univ arts ...
  • 4 篇 dept. of compute...
  • 4 篇 department of co...
  • 4 篇 qiannan normal u...
  • 4 篇 department of co...
  • 4 篇 univ witwatersra...
  • 4 篇 department of co...
  • 4 篇 karpagam academy...
  • 4 篇 computer science...
  • 3 篇 university of sa...
  • 3 篇 amrita school of...
  • 3 篇 department of cs...
  • 3 篇 department of el...
  • 3 篇 easwari engineer...

作者

  • 7 篇 reza ahmed wasif
  • 5 篇 s abhishek
  • 5 篇 goyal s.b.
  • 5 篇 jennifer sanjeda...
  • 4 篇 anjali t.
  • 4 篇 abhishek s.
  • 4 篇 van zyl terence ...
  • 3 篇 andersson karl
  • 3 篇 chohan jasgurpre...
  • 3 篇 swain debabrata
  • 3 篇 singh balbir
  • 3 篇 sha akhbar
  • 3 篇 pawar rajendra
  • 3 篇 shamim mahbub ha...
  • 3 篇 shanmugasundar g...
  • 3 篇 kukreja vinay
  • 3 篇 tawfik hissam
  • 3 篇 akhbar sha
  • 3 篇 zhou jincheng
  • 3 篇 kalita kanak

语言

  • 739 篇 英文
  • 72 篇 其他
检索条件"任意字段=7th International Conference on Machine Learning and Soft Computing, ICMLSC 2023"
811 条 记 录,以下是431-440 订阅
排序:
Detection of Tumor-Infiltrating Lymphocytes in the Images of Immunohistochemistry using Deep learning Techniques  7
Detection of Tumor-Infiltrating Lymphocytes in the Images of...
收藏 引用
7th international conference on Image Information Processing, ICIIP 2023
作者: Priya, S.Baghavathi Karuparthi, Manojna Madeswaran, TamilSelvi Computer Science And Engineering Amrita Vishwa Vidyapeetham School of Computing Chennai India University of Technology And Applied Sciences Information Technology Nizwa Oman
Deep learning is playing a pivotal role in revolutionizing the field of medicine, particularly in its ability to enhance the interpretation of histopathological images and unravel the intricate relationship between th... 详细信息
来源: 评论
A Detailed Analysis on Spam Emails and Detection Using machine learning Algorithms  1
收藏 引用
7th international conference on Inventive Systems and Control, ICISC 2023
作者: Sulthana, Razia Verma, Avani Jaithunbi, A.K. Department of Computing and Mathematical Sciences University of Greenwich Old Royal Naval College LondonSE10 9LS United Kingdom Department of Computer Science Birla Institute of Technology & Science Pilani Dubai Campus Dubai345055 United Arab Emirates Department of Computer Science RMD Engineering College TamilNadu Kavaraipettai601206 India
Spam email is the unwanted junk and solicited email sent in bulk to the receivers, using botnets, spambots, or a network of infected computers. these spam emails can be phishing emails that trick users to get their se... 详细信息
来源: 评论
Federated learning for Wearable Sensor-Based Human Activity Recognition  7th
Federated Learning for Wearable Sensor-Based Human Activity...
收藏 引用
7th international conference on Intelligent Technologies, ICIT 2022
作者: Sachin, D.N. Annappa, B. Ambesenge, Sateesh Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal India
computing devices that can identify various human behaviors or motions may be used to aid individuals in multiple contexts, including sports, healthcare, and interactions between humans and robots. Data readily access... 详细信息
来源: 评论
machine learning Approach in Melanoma Cancer Stage Detection
Machine Learning Approach in Melanoma Cancer Stage Detection
收藏 引用
international conference on computing Communication Control and Automation (ICCUBEA)
作者: Aniruddha Chitte Aniket Pawar Mukund Nale Department Of Electronics and Telecommunication JSPM's RSCOE Pune India
Finding the stage of melanoma cancer is important for cancer research. Because of the lack of awareness of the signs, the number of mortalities has dramatically increased, making early detection of skin cancer essenti...
来源: 评论
A Scientific Study for Breast Cancer Detection Using Various machine learning Algorithms  7th
A Scientific Study for Breast Cancer Detection Using Various...
收藏 引用
Proceedings of the 7th international conference on Advances in computing and Data Sciences, ICACDS 2023
作者: Soni, Prashant Kumar, Sanjeev Kumar, Dilip Department of Computer Science Engineering United University U.P Prayagraj211012 India Department of Computer Science and Engineering United College of Enginnering and Research U.P Prayagraj211001 India
A noncommunicable chronic illness, cancer impacts people of all ages, races, nationalities, and socioeconomic statuses indistinctly. Having this diagnosis confirmed illness is usually concerning for the patient. Becau... 详细信息
来源: 评论
USE-Based Deep learning Approach to Detect Spammers on Twitter  7th
USE-Based Deep Learning Approach to Detect Spammers on Twitt...
收藏 引用
7th international conference on Smart Trends in computing and Communications, SmartCom 2023
作者: Dhaka, Deepali Saleem, Saima Mehrotra, Monica Department of Computer Science Jamia Millia Islamia New Delhi110025 India
Spammers disseminating obscene content on Twitter have been studied and detected using various hybrid features and machine learning approaches in past. To have greater insight into data prevailing in form of text on p... 详细信息
来源: 评论
Smart-Contract Vulnerability Detection Method Based on Deep learning  7th
Smart-Contract Vulnerability Detection Method Based on Deep ...
收藏 引用
7th international conference on Smart computing and Communication, SmartCom 2022
作者: Hu, Zimu Tsai, Wei-Tek Zhang, Li Digital Society and Blockchain Laboratory Beihang University Beijing China Beijing Tiande Technologies Beijing China
With the rapid development of blockchain technology, smart contracts (SCs) applied in digital currency transactions have been widely used. However, SCs often have vulnerability in their code that allow criminals to ex... 详细信息
来源: 评论
Identification of Cracks in High-Rise Buildings Using Drones and Deep learning  1
收藏 引用
7th international conference on Smart Trends in computing and Communications, SmartCom 2023
作者: Tyagi, Ria Mehta, Vishad Sankaranarayanan, Suresh Department of Networking and Communications SRM Institute of Science and Technology Kattankulathur Campus Chennai India Department of Computer Science College of Computer Science and Information Technology King Faisal University Al Hofuf Saudi Arabia
the conventional way of identifying structural defects and cracks in high-rise buildings is very labor-intensive, time-consuming, and requires a lot of equipment too. there has been work done in the past where machine... 详细信息
来源: 评论
machine learning-Based Social Distance Detection: An Approach Using OpenCV and YOLO Framework  7th
Machine Learning-Based Social Distance Detection: An Approac...
收藏 引用
7th international conference on Emerging Research in computing, Information, Communication and Applications, ERCICA 2022
作者: Shetty, Deepthi Sarojadevi, H. Kakamari, Onkar Bharatesh Shetty, Savitha Shetty, Saritha Shenoy, Radhika V. Rashmi, B.N. Sneha Dechamma, M.S. Tanmaya, G. Department of CS and E NMIT Bengaluru India Department of CSE NMAM Institute of Technology Karkala India Department of MCA NMAM Institute of Technology Karkala India
In the fight against coronavirus, social distance has proven to be a very effective tool. To minimize the risk of the virus spreading through physical contact or proximity, the public is being advised to limit their c... 详细信息
来源: 评论
Carbon-Energy Composite Flow for Transferred Multi-searcher Q-learning Algorithm with Reactive Power Optimization  7th
Carbon-Energy Composite Flow for Transferred Multi-searcher ...
收藏 引用
7th international conference on soft computing in Data Science (SCDS)
作者: Zhou, Jincheng Xue, Hongyu Qiannan Normal Univ Nationalities Sch Comp & Informat Duyun 558000 Guizhou Peoples R China Baoji Univ Arts & Sci Sch Comp Sci Baoji 721007 Peoples R China Key Lab Complex Syst & Intelligent Optimizat Guiz Duyun 558000 Guizhou Peoples R China
In the conventional carbon emission computation paradigm, the primary obligation falls on the electricity-generating side. However, according to the theory of carbon emission flow, the grid side and the user side are ... 详细信息
来源: 评论