咨询与建议

限定检索结果

文献类型

  • 1,327 篇 会议
  • 11 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 915 篇 工学
    • 757 篇 计算机科学与技术...
    • 498 篇 软件工程
    • 303 篇 信息与通信工程
    • 204 篇 电气工程
    • 175 篇 生物工程
    • 127 篇 生物医学工程(可授...
    • 107 篇 光学工程
    • 90 篇 控制科学与工程
    • 80 篇 电子科学与技术(可...
    • 58 篇 仪器科学与技术
    • 48 篇 机械工程
    • 35 篇 化学工程与技术
    • 28 篇 安全科学与工程
    • 26 篇 交通运输工程
  • 425 篇 理学
    • 189 篇 生物学
    • 187 篇 数学
    • 151 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 40 篇 化学
  • 169 篇 管理学
    • 106 篇 图书情报与档案管...
    • 72 篇 管理科学与工程(可...
    • 40 篇 工商管理
  • 146 篇 医学
    • 130 篇 临床医学
    • 88 篇 基础医学(可授医学...
    • 65 篇 药学(可授医学、理...
    • 24 篇 公共卫生与预防医...
  • 28 篇 教育学
    • 28 篇 教育学
  • 27 篇 法学
    • 21 篇 社会学
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 5 篇 军事学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 210 篇 machine learning
  • 134 篇 deep learning
  • 78 篇 signal processin...
  • 71 篇 accuracy
  • 70 篇 feature extracti...
  • 68 篇 signal processin...
  • 61 篇 support vector m...
  • 56 篇 machine learning...
  • 45 篇 predictive model...
  • 33 篇 neural networks
  • 32 篇 convolutional ne...
  • 31 篇 random forests
  • 29 篇 computational mo...
  • 29 篇 training
  • 26 篇 natural language...
  • 25 篇 prediction algor...
  • 21 篇 technological in...
  • 20 篇 real-time system...
  • 19 篇 adversarial mach...
  • 18 篇 image processing

机构

  • 16 篇 chitkara centre ...
  • 14 篇 centre of resear...
  • 12 篇 shenyang ligong ...
  • 6 篇 chitkara univers...
  • 6 篇 ai & ds vishwaka...
  • 6 篇 school of inform...
  • 5 篇 department of me...
  • 5 篇 khulna universit...
  • 5 篇 department of co...
  • 4 篇 delhi technologi...
  • 4 篇 heilongjiang uni...
  • 4 篇 department of s&...
  • 4 篇 beijing univ pos...
  • 4 篇 it vishwakarma i...
  • 4 篇 chitkara univers...
  • 4 篇 sri lanka instit...
  • 4 篇 advanced telecom...
  • 4 篇 shenyang ligong ...
  • 4 篇 graduate school ...
  • 3 篇 karunya institut...

作者

  • 6 篇 mehta shiva
  • 5 篇 rasmita panigrah...
  • 4 篇 neelamadhab padh...
  • 4 篇 wang xin
  • 3 篇 m. vigenesh
  • 3 篇 baydeti nagaraju
  • 3 篇 sinambela marzuk...
  • 3 篇 santosh kumar sh...
  • 3 篇 ganapati panda
  • 3 篇 debendra muduli
  • 3 篇 abujar sheikh
  • 3 篇 a. sivanantham
  • 3 篇 li yajie
  • 3 篇 li aihua
  • 3 篇 zhou feng
  • 3 篇 islam md. sanzid...
  • 2 篇 aira kharvel par...
  • 2 篇 nokshangthemba
  • 2 篇 maheswara rao v ...
  • 2 篇 lee tzong-ru

语言

  • 1,187 篇 英文
  • 151 篇 其他
  • 11 篇 中文
检索条件"任意字段=Proceedings of the 2019 2nd International Conference on Signal Processing and Machine Learning"
1347 条 记 录,以下是571-580 订阅
排序:
Literature Survey-Food Recognition and Calorie Measurement Using Image processing and machine learning Techniques  2nd
Literature Survey-Food Recognition and Calorie Measurement U...
收藏 引用
2nd international conference on Communications and Cyber-Physical Engineering (ICCCE)
作者: Reddy, V. Hemalatha Kumari, Soumya Muralidharan, Vinitha Gigoo, Karan Thakare, Bhushan S. STESs Sinhgad Acad Engn Pune Maharashtra India
Nowadays, with easy access to internet, food is delivered at our doorsteps just on the click of a button due to which people have started to consume higher amount of fast food. This has accelerated the chances of suff... 详细信息
来源: 评论
Knowledge-graph based Proactive Dialogue Generation with Improved Meta-learning  2020
Knowledge-graph based Proactive Dialogue Generation with Imp...
收藏 引用
2nd international conference on Image processing and machine Vision / international conference on Pattern Recognition and machine learning (IPMV)
作者: Xu, Hongcai Bao, Junpeng Wang, Junqing Xi An Jiao Tong Univ Xian 710049 Shaanxi Peoples R China
Knowledge graph-based dialogue systems can narrow down knowledge candidates for generating informative and diverse responses with the use of prior information, e.g., triple attributes or graph paths. However, most cur... 详细信息
来源: 评论
A Forgotten Strategy for Pooled Contextualized Embedding learning  2020
A Forgotten Strategy for Pooled Contextualized Embedding Lea...
收藏 引用
2nd international conference on Image processing and machine Vision / international conference on Pattern Recognition and machine learning (IPMV)
作者: Cai, Dunbo Huang, Zhiguo Qian, Ling Hang, Tao Feng, Qingsong China Mobile Suzhou Software Suzhou Peoples R China
String (word) embeddings are keys to advanced neural natural language understanding (NLU) models. Recently, a new embedding called contextual string embedding (CtxEmb) reached a new state of the art on many NLU tasks.... 详细信息
来源: 评论
Atrial Fibrillation Pattern Recognition using Features of Second Order Dynamic System
Atrial Fibrillation Pattern Recognition using Features of Se...
收藏 引用
Intelligent Cybernetics Technology & Applications (ICICyTA), international conference on
作者: Lee Wei Qi Nurul Ashikin Abdul-Kadir Wei Wei Heng Mohd Afzan Othman Norlaili Mat Safri Abdul-Mutalib Embong Universiti Teknologi Malaysia Johor Bahru Malaysia University of Southampton Malaysia Johor Malaysia Universiti Malaysia Terengganu Terengganu Malaysia
According to World Health Organization (WHO), an estimated 17.9 million people died from cardiovascular diseases (CVD) in 2019, representing 32 % of all global deaths. Of these deaths, 85 % were due to heart attack an... 详细信息
来源: 评论
Ac operation hardware learning neural circuit using v-f converter system  2nd
Ac operation hardware learning neural circuit using v-f conv...
收藏 引用
2nd international conference on Sensor Networks and signal processing, SNSP 2019
作者: Kawaguchi, Masashi Ishii, Naohiro Umeno, Masayoshi National Institute of Technology Suzuka College Shiroko Mie Suzuka510-0294 Japan Aichi Institute of Technology Yachigusa Yagusa-cho Aichi Toyota470-0392 Japan Chubu University 1200 Matsumoto-cho Aichi Kasugai487-8501 Japan
In the artificial intelligence, machine learning and neural network field, many practical use models have been proposed. However, these models are based on a digital Von Neumann model’s computer. There are minority s... 详细信息
来源: 评论
Extreme learning machine Based Defect Detection for Solder Joints
收藏 引用
JOURNAL OF INTERNET TECHNOLOGY 2020年 第5期21卷 1535-1543页
作者: Ma, Liyong Xie, Wei Zhang, Yong Feng, Xijia Harbin Inst Technol Sch Informat Sci & Engn Harbin Heilongjiang Peoples R China Harbin Inst Technol Dept Civil Engn Harbin Heilongjiang Peoples R China
The quality of solder joints is essential for electronic products, and the detection of defects in solder joints is critical to the quality control of electronic products. A vision inspection is developed to detect de... 详细信息
来源: 评论
Research on Fault Detection Method of Catenary Equipment Based on Deep learning  2
Research on Fault Detection Method of Catenary Equipment Bas...
收藏 引用
2nd IEEE international conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2021
作者: Zhang, Fangheng Tao, Kemeng Xie, Xiaoxia Liu, Hang Tian, Lijun Yang, Xixi Wang, Minghan Heyuan Intelligent Technology CO. LTD Jinan China Jinan Union IT Information Technology CO. LTD Jinan China School of Electrical Engineering Shandong University Jinan China
The transportation capacity of electrified railways can be more than double that of ordinary railways, and it has the advantages of low cost, low energy consumption and low environmental pollution. As one of the core ... 详细信息
来源: 评论
Random Forest-Based Enhanced Detection of Lumpy Skin Disease Under Two Data Types
Random Forest-Based Enhanced Detection of Lumpy Skin Disease...
收藏 引用
international conference on signal processing, Communication, Power and Embedded System (SCOPES)
作者: Madhumita Pal Ganapati Panda Rajiv Lochan Bal Dept. of Electrical Engineering Government College of Engineering Keonjhar Odisha India Dept. of Electronics & Telecommunication Engineering C.V.Raman Global University Bhubaneswar India Dept. of Mining Engineering Orissa School of Mining Engg. Keonjhar India
The deadly and extremely contagious Lumpy Skin Lesion Disease (LSLD) frequently affects cattle. Tough raised nodules that form on the cattle's body, high fever, sterility, and a marked reduction in milk output by ... 详细信息
来源: 评论
Detecting domain name system tunneling and exfiltration from domain name system traffic  2nd
Detecting domain name system tunneling and exfiltration from...
收藏 引用
2nd international conference on Sensor Networks and signal processing, SNSP 2019
作者: Tseng, Yi-Chung Sun, Ming-Kung Chen, Wei-An Acer Cyber Security Incorporation Taipei Taiwan
In this study, we present a framework to detect a Domain Name System (DNS) tunnel and DNS exfiltration network traffic by using both unsupervised and supervised learning algorithms. In general, considerable time is re... 详细信息
来源: 评论
Application and optimization of intrusion detection system based on Artificial Intelligence  2
Application and optimization of intrusion detection system b...
收藏 引用
2nd IEEE international conference on Civil Aviation Safety and Information Technology (ICCASIT)
作者: Zhu, Kaidi Wu, Xiangwen Yu, Sun Huo, Da Li, Rui Pei, Xikai Second Res Inst CAAC Chengdu Peoples R China Inner Mongolia Autonomous Reg Civil Airports Grp Hulun Buir Branch Hulunbeir Peoples R China North China Regionnal Air Traff Management Bur CA Beijing Peoples R China China Civilaviat Adm Air Traff Management Bur Beijing Peoples R China
The traditional perimeter intrusion detection system will be faced more challenges in the new era, such as high-accuracy positioning, low energy dependence, high environmental robustness and so on. This paper introduc... 详细信息
来源: 评论