咨询与建议

限定检索结果

文献类型

  • 1,327 篇 会议
  • 11 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 915 篇 工学
    • 757 篇 计算机科学与技术...
    • 498 篇 软件工程
    • 303 篇 信息与通信工程
    • 204 篇 电气工程
    • 175 篇 生物工程
    • 127 篇 生物医学工程(可授...
    • 107 篇 光学工程
    • 90 篇 控制科学与工程
    • 80 篇 电子科学与技术(可...
    • 58 篇 仪器科学与技术
    • 48 篇 机械工程
    • 35 篇 化学工程与技术
    • 28 篇 安全科学与工程
    • 26 篇 交通运输工程
  • 425 篇 理学
    • 189 篇 生物学
    • 187 篇 数学
    • 151 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 40 篇 化学
  • 169 篇 管理学
    • 106 篇 图书情报与档案管...
    • 72 篇 管理科学与工程(可...
    • 40 篇 工商管理
  • 146 篇 医学
    • 130 篇 临床医学
    • 88 篇 基础医学(可授医学...
    • 65 篇 药学(可授医学、理...
    • 24 篇 公共卫生与预防医...
  • 28 篇 教育学
    • 28 篇 教育学
  • 27 篇 法学
    • 21 篇 社会学
  • 18 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 5 篇 军事学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 210 篇 machine learning
  • 134 篇 deep learning
  • 78 篇 signal processin...
  • 71 篇 accuracy
  • 70 篇 feature extracti...
  • 68 篇 signal processin...
  • 61 篇 support vector m...
  • 56 篇 machine learning...
  • 45 篇 predictive model...
  • 33 篇 neural networks
  • 32 篇 convolutional ne...
  • 31 篇 random forests
  • 29 篇 computational mo...
  • 29 篇 training
  • 26 篇 natural language...
  • 25 篇 prediction algor...
  • 21 篇 technological in...
  • 20 篇 real-time system...
  • 19 篇 adversarial mach...
  • 18 篇 image processing

机构

  • 16 篇 chitkara centre ...
  • 14 篇 centre of resear...
  • 12 篇 shenyang ligong ...
  • 6 篇 chitkara univers...
  • 6 篇 ai & ds vishwaka...
  • 6 篇 school of inform...
  • 5 篇 department of me...
  • 5 篇 khulna universit...
  • 5 篇 department of co...
  • 4 篇 delhi technologi...
  • 4 篇 heilongjiang uni...
  • 4 篇 department of s&...
  • 4 篇 beijing univ pos...
  • 4 篇 it vishwakarma i...
  • 4 篇 chitkara univers...
  • 4 篇 sri lanka instit...
  • 4 篇 advanced telecom...
  • 4 篇 shenyang ligong ...
  • 4 篇 graduate school ...
  • 3 篇 karunya institut...

作者

  • 6 篇 mehta shiva
  • 5 篇 rasmita panigrah...
  • 4 篇 neelamadhab padh...
  • 4 篇 wang xin
  • 3 篇 m. vigenesh
  • 3 篇 baydeti nagaraju
  • 3 篇 sinambela marzuk...
  • 3 篇 santosh kumar sh...
  • 3 篇 ganapati panda
  • 3 篇 debendra muduli
  • 3 篇 abujar sheikh
  • 3 篇 a. sivanantham
  • 3 篇 li yajie
  • 3 篇 li aihua
  • 3 篇 zhou feng
  • 3 篇 islam md. sanzid...
  • 2 篇 aira kharvel par...
  • 2 篇 nokshangthemba
  • 2 篇 maheswara rao v ...
  • 2 篇 lee tzong-ru

语言

  • 1,271 篇 英文
  • 67 篇 其他
  • 11 篇 中文
检索条件"任意字段=Proceedings of the 2019 2nd International Conference on Signal Processing and Machine Learning"
1347 条 记 录,以下是651-660 订阅
排序:
Detection of Compatibility, Proximity and Expectancy of Bengali Sentences using Long Short Term Memory
Detection of Compatibility, Proximity and Expectancy of Beng...
收藏 引用
international conference on Robotics,Electrical and signal processing Techniques (ICREST)
作者: Md. Ashraful Haider Chowdhury Nasirul Mumenin Muhammad Taus Mohammad Abu Yousuf Bangladesh University of Professionals Dhaka Bangladesh Institute of Information Technology Jahangirnagar University Dhaka Bangladesh
Text classification is known to be a supervised machine learning technique used in one or more predefined categories to classify sentences or text archives. To be a perfect phrase to convey one's feelings or to be... 详细信息
来源: 评论
A machine learning Approach to Identify the Students at the Risk of Dropping Out of Secondary Education in India  2nd
A Machine Learning Approach to Identify the Students at the ...
收藏 引用
2nd international conference on Soft Computing and signal processing, ICSCSP 2019
作者: Nangia, Sagarika Anurag, Jhilmil Gambhir, Ishani Oracle India Pvt. Ltd. Bengaluru India TATA Motors Pune India TATA Motors Lucknow India
Having a significant number of students dropping studies at higher education limits their possibilities of having better employment opportunities. According to a UNESCO report, India is fifty years behind in achieving... 详细信息
来源: 评论
Component Recognition Method Based on Deep learning and machine Vision  19
Component Recognition Method Based on Deep Learning and Mach...
收藏 引用
2nd international conference on Image and Graphics processing (ICIGP) / 5th international conference on Virtual Reality
作者: Tang, Hao Chen, Jie Zhen, Xuesong Chongqing CEPREI Ind Technol Res Inst Chongqing Peoples R China
Traditional component coding recognition adopts manual recognition or primitive machine vision technology in the electronic component testing and screening industry, which has the issues of low testing efficiency and ... 详细信息
来源: 评论
Human facial expression recognition using deep learning technique  2
Human facial expression recognition using deep learning tech...
收藏 引用
2nd international conference on signal processing and Communication, ICSPC 2019
作者: Harshitha, S. Sangeetha, N. Shirly, Asenath P. Abraham, Chandy D. Karunya Institute of Technology and Sciences Department of Electronics and Communication Engineering Coimbatore India
The emotion is recognized from facial expression by using static images. It is one of the categories in signal processing which is applied in various fields, similarly for human and computer interaction. Some sources ... 详细信息
来源: 评论
Distributed Denial of Service Attacks Detection System by machine learning Based on Dimensionality Reduction  2
Distributed Denial of Service Attacks Detection System by Ma...
收藏 引用
2nd international conference of Modern Applications on Information and Communication Technology, ICMAICT 2020
作者: Abbas, Sara Abdalelah Almhanna, Mahdi S. College of Information Technology University of Babylon Babil Iraq
Data mining algorithms have essential methods and rules that can contribute in detecting and preventing various types of network attacks. These methods are utilized with the intrusion detection systems that can be des... 详细信息
来源: 评论
Comparative analysis of various machine learning Techniques for Intrusion Detection System  2
Comparative analysis of various Machine Learning Techniques ...
收藏 引用
2nd international conference on signal processing and Communication, ICSPC 2019
作者: Ajitha, Deborah D. Basil, Xavier S. David, Shibin Kathrine, JaspherWillsie Karunya Institute of Technology and Sciences Department of CSE Coimbatore India
Surfing internet becomes common now-a-days that gave a chance for intruders to steal information. Therefore security is very important to detect any unwanted activities by using intrusion detection system. Intrusion d... 详细信息
来源: 评论
Sentence Sentiment Classification Using Convolutional Neural Network in Myanmar Texts  20
Sentence Sentiment Classification Using Convolutional Neural...
收藏 引用
2nd international conference on Image, Video and signal processing, IVSP 2020
作者: Oo, Saung Hnin Pwint Theeramunkong, Thanaruk Hung, Nguyen Duy Sirindhorn International Institute of Technology Thammasat University Thailand
There are still few works on application of deep learning for Myanmar language. This paper presents an approach to use a convolutional neural network (CNN) model to classify sentence sentiment in Myanmar texts. A CNN ... 详细信息
来源: 评论
Cyber Attack Detection Model (CADM) Based on machine learning Approach
Cyber Attack Detection Model (CADM) Based on Machine Learnin...
收藏 引用
international conference on Robotics,Electrical and signal processing Techniques (ICREST)
作者: Fahima Hossain Marzana Akter Mohammed Nasir Uddin Jagannath University Dhaka Bangladesh
A reliable Cyber Attack Detection Model (CADM) is a system that works as safeguard for the users of modern technological devices and assistant for the operators of networks. The research paper aims to develop a CADM f... 详细信息
来源: 评论
Bacterial foraging optimization in non-identical parallel batch processing machines  1
收藏 引用
2nd international conference on machine Intelligence and signal processing, MISP 2019
作者: Majumder, Arindam Laha, Dipak Mechanical Engineering Department National Institute of Technology Agartala799046 India Mechanical Engineering Department Jadavpur University Kolkata700032 India
The paper presents a modified bacterial foraging optimization (BFO) algorithm to solve non-identical parallel batch processing machine scheduling problems with the objective of minimizing total weighted tardiness. The... 详细信息
来源: 评论
An Overview of learning Algorithms and Inference Techniques on Restricted Boltzmann machines (RBMs)  2019
An Overview of Learning Algorithms and Inference Techniques ...
收藏 引用
2nd international conference on Software Engineering and Information Management (ICSIM) / 2nd international conference on Big Data and Smart Computing (ICBDSC)
作者: Merindasari, Esti Widyanto, M. Rahmat Basaruddin, T. Univ Indonesia Fac Comp Sci Depok Indonesia
Restricted Boltzmann machines (RBMs) is one of machine learning's methods which within past decades, the development of RBMs has quite increase. Researches of RBMs focused on theories and applications of RBMs. The... 详细信息
来源: 评论