咨询与建议

限定检索结果

文献类型

  • 1,327 篇 会议
  • 11 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 915 篇 工学
    • 757 篇 计算机科学与技术...
    • 498 篇 软件工程
    • 303 篇 信息与通信工程
    • 204 篇 电气工程
    • 175 篇 生物工程
    • 127 篇 生物医学工程(可授...
    • 107 篇 光学工程
    • 90 篇 控制科学与工程
    • 80 篇 电子科学与技术(可...
    • 58 篇 仪器科学与技术
    • 48 篇 机械工程
    • 35 篇 化学工程与技术
    • 28 篇 安全科学与工程
    • 26 篇 交通运输工程
  • 425 篇 理学
    • 189 篇 生物学
    • 187 篇 数学
    • 151 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 40 篇 化学
  • 169 篇 管理学
    • 106 篇 图书情报与档案管...
    • 72 篇 管理科学与工程(可...
    • 40 篇 工商管理
  • 146 篇 医学
    • 130 篇 临床医学
    • 88 篇 基础医学(可授医学...
    • 65 篇 药学(可授医学、理...
    • 24 篇 公共卫生与预防医...
  • 28 篇 教育学
    • 28 篇 教育学
  • 27 篇 法学
    • 21 篇 社会学
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 5 篇 军事学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 210 篇 machine learning
  • 134 篇 deep learning
  • 78 篇 signal processin...
  • 71 篇 accuracy
  • 70 篇 feature extracti...
  • 68 篇 signal processin...
  • 61 篇 support vector m...
  • 56 篇 machine learning...
  • 45 篇 predictive model...
  • 33 篇 neural networks
  • 32 篇 convolutional ne...
  • 31 篇 random forests
  • 29 篇 computational mo...
  • 29 篇 training
  • 26 篇 natural language...
  • 25 篇 prediction algor...
  • 21 篇 technological in...
  • 20 篇 real-time system...
  • 19 篇 adversarial mach...
  • 18 篇 image processing

机构

  • 16 篇 chitkara centre ...
  • 14 篇 centre of resear...
  • 12 篇 shenyang ligong ...
  • 6 篇 chitkara univers...
  • 6 篇 ai & ds vishwaka...
  • 6 篇 school of inform...
  • 5 篇 department of me...
  • 5 篇 khulna universit...
  • 5 篇 department of co...
  • 4 篇 delhi technologi...
  • 4 篇 heilongjiang uni...
  • 4 篇 department of s&...
  • 4 篇 beijing univ pos...
  • 4 篇 it vishwakarma i...
  • 4 篇 chitkara univers...
  • 4 篇 sri lanka instit...
  • 4 篇 advanced telecom...
  • 4 篇 shenyang ligong ...
  • 4 篇 graduate school ...
  • 3 篇 karunya institut...

作者

  • 6 篇 mehta shiva
  • 5 篇 rasmita panigrah...
  • 4 篇 neelamadhab padh...
  • 4 篇 wang xin
  • 3 篇 m. vigenesh
  • 3 篇 baydeti nagaraju
  • 3 篇 sinambela marzuk...
  • 3 篇 santosh kumar sh...
  • 3 篇 ganapati panda
  • 3 篇 debendra muduli
  • 3 篇 abujar sheikh
  • 3 篇 a. sivanantham
  • 3 篇 li yajie
  • 3 篇 li aihua
  • 3 篇 zhou feng
  • 3 篇 islam md. sanzid...
  • 2 篇 aira kharvel par...
  • 2 篇 nokshangthemba
  • 2 篇 maheswara rao v ...
  • 2 篇 lee tzong-ru

语言

  • 1,187 篇 英文
  • 151 篇 其他
  • 11 篇 中文
检索条件"任意字段=Proceedings of the 2019 2nd International Conference on Signal Processing and Machine Learning"
1347 条 记 录,以下是541-550 订阅
排序:
HYBRID MODEL FOR NETWORK ANOMALY DETECTION WITH GRADIENT BOOSTING DECISION TREES And TABTRANSFORMER
HYBRID MODEL FOR NETWORK ANOMALY DETECTION WITH GRADIENT BOO...
收藏 引用
IEEE international conference on Acoustics, Speech and signal processing (ICASSP)
作者: Xu, Xinyue Zheng, Xiaolu Australian Natl Univ Canberra ACT Australia Beihang Univ Beijing Peoples R China
Last decades have witnessed the monumental growth of Internet applications, and the network security fields have attracted increasing interests as it has become a necessity due to proliferation of information technolo... 详细信息
来源: 评论
A Web Based Four-Tier Architecture using Reduced Feature Based Neural Network Approach for Prediction of Student Performance  2
A Web Based Four-Tier Architecture using Reduced Feature Bas...
收藏 引用
2nd international conference on Robotics, Electrical and signal processing Techniques, ICREST 2021
作者: Hossen, Anwar Alamgir, Rakib Bin Alam, Arman Ul Siddika, Fatema Hossain, Shah Fahad Arman, Md. Shohel Daffodil International University Dept. of Software Engineering Dhaka Bangladesh Jagannath University Dept. of Computer Science and Engineering Dhaka Bangladesh
Enhancing student's performance is a significant part of developing quality education in any educational institute. It is very difficult to get promising student performance without student categorization accordin... 详细信息
来源: 评论
Cyber Attack Detection Model (CADM) Based on machine learning Approach  2
Cyber Attack Detection Model (CADM) Based on Machine Learnin...
收藏 引用
2nd international conference on Robotics, Electrical and signal processing Techniques, ICREST 2021
作者: Hossain, Fahima Akter, Marzana Uddin, Mohammed Nasir Jagannath University Department of Computer Science and Engineering Dhaka1100 Bangladesh
A reliable Cyber Attack Detection Model (CADM) is a system that works as safeguard for the users of modern technological devices and assistant for the operators of networks. The research paper aims to develop a CADM f... 详细信息
来源: 评论
A Study on Banana Leaf Disease Detection Based on Grabcut Algorithm Using Multispectral Camera
A Study on Banana Leaf Disease Detection Based on Grabcut Al...
收藏 引用
international conference on signal processing, Communication, Power and Embedded System (SCOPES)
作者: N. Jeebaratnam Chinmayee Dora Dhawaleswar Rao CH Electronics and Communication Engineering Centurion University of Technology and Management Paralakhemundi India Computer Science Engineering Centurion University of Technology and Management Paralakhemundi India
The majority of people in India rely on farming as their primary source of income. Farmers encounter a variety of difficulties as a result of climate change. Decrease in yield is due to diseases on the plant. The quic... 详细信息
来源: 评论
COVID-19 Detection from Chest X-ray Images Using 2D-LWP-EWT and SVM
COVID-19 Detection from Chest X-ray Images Using 2D-LWP-EWT ...
收藏 引用
Innovations in High Speed Communication and signal processing (IHCSP), international conference on
作者: Ranveer Pratap Lal Bhupendra Singh Kirar Dheeraj Kumar Agrawal Vivek Patel Mamta Patankar Raghvendra Singh Thakur Advanced Micro Devices (AMD) USA ECE Department Indian Institute of Information Technology Bhopal India ECE Department Maulana Azad National Institute of Technology Bhopal India Department of CSE IES Institute of Technology and Management Bhopal India
The global surge of COVID-19, an unprecedented viral outbreak originating in China in 2019, method, real-time reverse transcriptase-polymerase chain reaction (RT-PCR), though widely used, is critiqued for its lower se... 详细信息
来源: 评论
Detecting Malicious Insiders In Social Networks And Mitigating Cyber Threats With Advanced Security Approaches
Detecting Malicious Insiders In Social Networks And Mitigati...
收藏 引用
Innovations in High Speed Communication and signal processing (IHCSP), international conference on
作者: V. Mahalakshmi Avni Garg Rekha M M Mandar Diwakar M. Vigenesh Raman Verma Department of EEE Prince Shri Venkateshwara Padmavathy Engineering College Chennai Chitkara Centre for Research and Development Chitkara University Himachal Pradesh India School of Sciences Chemistry and Biochemistry JAIN (Deemed to be University) Bangalore Karnataka India AI & Ds Vishwakarma Institute of Technology Pune India Department of Computer Science Engineering Karpagam Academy of Higher Education Coimbatore Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India
When a fraudster uses a false identity to appear as a reliable source in an OSN, this kind of assault is known as an insider attack. The identification of users' actions inside the network is now a popular use of ... 详细信息
来源: 评论
The Influence and Reconstruction of international MOOCS on Chinese College English Curriculum  2
The Influence and Reconstruction of International MOOCS on C...
收藏 引用
2nd international conference on Computers, Information processing and Advanced Education, CIPAE 2021
作者: Kang, Weijie Heilongjiang University of Technology Heilongjiang Jixi China
This paper firstly introduces MOOCS (Massive Open Online Courses) and its main characteristics, then it analyzes the challenges of MOOCS to college English Curriculum in China. This paper discusses the reconstruction ... 详细信息
来源: 评论
Application of learning Behavior Analysis Algorithm Based on Data Mining in the Cultivation of international Talents  2
Application of Learning Behavior Analysis Algorithm Based on...
收藏 引用
2nd international conference on Computers, Information processing and Advanced Education, CIPAE 2021
作者: Wu, Zhong Zhou, Chuan Physical Education School Wuhan Business University Wuhan China Institute of Machanical Engineering Wuhan Institute of Shipbuilding Technology Wuhan China
In recent years, data mining, as a wide range of applications, has emerged and been widely used in various fields. At present, the role of data mining in the field of learning is on the rise. The main problem of analy... 详细信息
来源: 评论
COVID-19 Detection using Transfer learning with Convolutional Neural Network  2
COVID-19 Detection using Transfer Learning with Convolutiona...
收藏 引用
2nd international conference on Robotics, Electrical and signal processing Techniques, ICREST 2021
作者: Dutta, Pramit Roy, Tanny Anjum, Nafisa Chittagong University of Engineering and Technology Department of Electronics and Telecommunication Engineering Chittagong Bangladesh
The Novel Coronavirus disease 2019 (COVID-19) is a fatal infectious disease, first recognized in December 2019 in Wuhan, Hubei, China, and has gone on an epidemic situation. Under these circumstances, it became more i... 详细信息
来源: 评论
Training Optimization for a Hardware-Aware Approach to Deep learning  2nd
Training Optimization for a Hardware-Aware Approach to De...
收藏 引用
2nd international conference on Data Science, machine learning and Applications, ICDSMLA 2020
作者: Asok, Anjana Birla Institute of Technology and Science Pilani Rajasthan333031 India
Deep Convolutional Neural Networks (DCNNs) have been proven to be effective for various problems involving image, video and signal processing and classification. The size and complexity of the network are major concer... 详细信息
来源: 评论