咨询与建议

限定检索结果

文献类型

  • 4,129 篇 会议
  • 38 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 4,173 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,733 篇 工学
    • 2,463 篇 计算机科学与技术...
    • 2,042 篇 软件工程
    • 616 篇 生物工程
    • 586 篇 信息与通信工程
    • 362 篇 生物医学工程(可授...
    • 266 篇 控制科学与工程
    • 214 篇 电气工程
    • 211 篇 光学工程
    • 147 篇 安全科学与工程
    • 136 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 118 篇 化学工程与技术
    • 105 篇 交通运输工程
    • 91 篇 动力工程及工程热...
  • 1,368 篇 理学
    • 674 篇 数学
    • 646 篇 生物学
    • 332 篇 统计学(可授理学、...
    • 306 篇 物理学
    • 197 篇 系统科学
    • 127 篇 化学
  • 720 篇 管理学
    • 393 篇 管理科学与工程(可...
    • 388 篇 图书情报与档案管...
    • 237 篇 工商管理
  • 340 篇 医学
    • 315 篇 临床医学
    • 308 篇 基础医学(可授医学...
    • 221 篇 药学(可授医学、理...
    • 125 篇 公共卫生与预防医...
  • 159 篇 法学
    • 138 篇 社会学
  • 156 篇 教育学
    • 154 篇 教育学
  • 141 篇 农学
    • 140 篇 作物学
  • 89 篇 经济学
  • 9 篇 军事学
  • 5 篇 文学

主题

  • 522 篇 machine learning
  • 240 篇 deep learning
  • 117 篇 support vector m...
  • 99 篇 adversarial mach...
  • 92 篇 accuracy
  • 92 篇 machine learning...
  • 83 篇 forecasting
  • 74 篇 convolutional ne...
  • 70 篇 predictive model...
  • 69 篇 feature extracti...
  • 57 篇 artificial intel...
  • 53 篇 students
  • 51 篇 learning systems
  • 48 篇 decision trees
  • 48 篇 training
  • 47 篇 reinforcement le...
  • 47 篇 computational mo...
  • 47 篇 computer vision
  • 46 篇 internet of thin...
  • 41 篇 sentiment analys...

机构

  • 46 篇 chitkara univers...
  • 15 篇 graphic era hill...
  • 10 篇 college of manag...
  • 9 篇 graphic era deem...
  • 8 篇 computer science...
  • 8 篇 beijing universi...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 department of in...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 computer science...
  • 6 篇 lovely professio...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 kkr and ksr inst...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 greater bay area...

作者

  • 18 篇 kukreja vinay
  • 15 篇 mehta shiva
  • 10 篇 william p.
  • 8 篇 sharma vikrant
  • 7 篇 mahamudul hasan
  • 7 篇 shiva mehta
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.
  • 6 篇 huang f.

语言

  • 4,030 篇 英文
  • 142 篇 其他
  • 30 篇 中文
检索条件"任意字段=Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application"
4173 条 记 录,以下是201-210 订阅
排序:
Big Data Analysis Of Female Dysmenorrhea Based On Multiple machine learning Methods  4
Big Data Analysis Of Female Dysmenorrhea Based On Multiple M...
收藏 引用
4th international conference on computer, Big Data and Artificial Intelligence, ICCBD+AI 2023
作者: Zhang, Xu Deng, Lifeng Song, Wenxiao Xiao, Yahui Shandong University of Science and Technology College of Mathematics and Systems Science Qingdao China China United Network Communications Co. Ltd Qingdao Branch Qingdao China
Dysmenorrhea is one of the most common gynecological disorders, and when it is severe, it may have many adverse effects on the patient's life and work. In order to assist the treatment of dysmenorrhea and reduce t... 详细信息
来源: 评论
machine learning Based Prediction of Malicious Intrusions in IoT Empowered Cybersecurity application  4
Machine Learning Based Prediction of Malicious Intrusions in...
收藏 引用
4th international conference on Technological Advancements in Computational Sciences, ICTACS 2024
作者: Upadhyay, Yatharth Tiwari, Damodar Gupta, Shital Sharma, Twinlkle Bansal Institute of Science and Technology Cse Department Bhopal India
Since the introduction of the Internet of things, the security of the IoT environment has become the most critical concern. Vulnerabilities related to malicious intrusions are major impacts to the IoT systems, impacti... 详细信息
来源: 评论
Adaptive Approximation Strategy to Reduce Approximation Error in Reinforcement learning  4
Adaptive Approximation Strategy to Reduce Approximation Erro...
收藏 引用
4th international conference on computer Engineering and application, ICCEA 2023
作者: Li, Min Zhu, William Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu China
Approximation error exists in the reinforcement learning method which is based on the action-value. In this paper, we propose an adaptive approximation strategy to reduce this error. the motivation is that the approxi... 详细信息
来源: 评论
2024 4th international conference on Consumer Electronics and computer Engineering, ICCECE 2024
2024 4th International Conference on Consumer Electronics an...
收藏 引用
4th international conference on Consumer Electronics and computer Engineering, ICCECE 2024
the proceedings contain 102 papers. the topics discussed include: identification of schizophrenia and depression based on deep learning and EEG;content-based galaxy image retrieval using convolutional neural networks;...
来源: 评论
Academic Performance Analysis of the Students with Feature Retraction Using machine learning Algorithms  4
Academic Performance Analysis of the Students with Feature R...
收藏 引用
4th international conference on Sustainable Expert Systems, ICSES 2024
作者: Chowdhury, Suman Das, Dilip Kumar International University of Business Agriculture and Technology Department of Electrical and Electronic Engineering Dhaka1230 Bangladesh International University of Business Agriculture and Technology Department of Mathematics Dhaka1230 Bangladesh
this research investigates the application of machine learning algorithms to predict student academic performance based on historical data and current factors. Five machine learning algorithms were employed to analyze... 详细信息
来源: 评论
YOLO-based obstacle detection under few-shot learning  4
YOLO-based obstacle detection under few-shot learning
收藏 引用
4th IEEE international conference on Data Science and computer application, ICDSCA 2024
作者: Liu, Chengyu Yang, Yuan School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
the obstacle detection industry has been developing rapidly in recent years. Obstacle detection technology has grown by leaps and bounds. Few-shot obstacle detection has a profound significance, which can help us to s... 详细信息
来源: 评论
Recommendation system for anime using machine learning algorithms  4th
Recommendation system for anime using machine learning algor...
收藏 引用
4th Annual international conference on Data Science, machine learning and Blockchain Technology, AICDMB 2023
作者: Choudhary, Harsh Raghavendra, S. Ramyashree Department of Information and Communication Technology Manipal Institute of Technology Manipal Academy of Higher Education Manipal India
these days, many people watch anime, especially the younger generations. With so many different sorts of programming available, this specialist area of the entertainment industry is drawing an increasing number of peo... 详细信息
来源: 评论
machine learning and Deep learning Analysis of PCG Data  4
Machine Learning and Deep Learning Analysis of PCG Data
收藏 引用
4th international conference on Artificial Intelligence and Signal Processing
作者: Kotipalli, Khyathi Devi Gayam, Vyshnavi Chandu, Hema Poojitha Abburi, Radha Samanta, Sibendu SRM Univ Dept CSE Amaravati Andhra Pradesh India SRM Univ Dept ECE Amaravati Andhra Pradesh India SRM Univ Dept ECE & CSE Amaravati Andhra Pradesh India
Cardiovascular diseases are some of the most common diseases today. A new estimate from the World Heart Federation (WHF) states that the number of deaths from cardiovascular diseases (CVD) increased from 12.1 million ... 详细信息
来源: 评论
An Optimal Real-Time Routing and Clustering Protocol for UAV Networks Based on Security  4
An Optimal Real-Time Routing and Clustering Protocol for UAV...
收藏 引用
4th international conference on Sentiment Analysis and Deep learning, ICSADL 2025
作者: Sophia, S. Leelipushpam Paulraj, Getzi Jeba Yuvarajan, D. Karunya Institute of Technology and Sciences Division of Artificial Intelligence and Machine Learning Coimbatore India Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India
Unmanned Aerial Vehicle (UAV) networks play an important role in different application areas such as military surveillance, emergency services, and infrastructure. However, these networks face significant challenges s... 详细信息
来源: 评论
Review of machine learning Models in Cyberbullying Detection Problem  4
Review of Machine Learning Models in Cyberbullying Detection...
收藏 引用
4th IEEE international conference on Smart Information Systems and Technologies, SIST 2024
作者: Toktarova, Aigerim Sultan, Daniyar Azhibekova, Zhanar Department of Information Systems International Kazakh-Turkish University Turkistan Kazakhstan Department of Information Systems Al-Farabi Kazakh National University Almaty Kazakhstan Department of Information Communication technologies Kazakh National Medical University Named After S.D.Asfendiyarov Almaty Kazakhstan
this research paper delves into the intricate domain of cyberbullying detection on social media, addressing the pressing issue of online harassment and its implications. the study encompasses a comprehensive explorati... 详细信息
来源: 评论