咨询与建议

限定检索结果

文献类型

  • 4,153 篇 会议
  • 38 册 图书
  • 7 篇 期刊文献

馆藏范围

  • 4,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,774 篇 工学
    • 2,496 篇 计算机科学与技术...
    • 2,042 篇 软件工程
    • 615 篇 生物工程
    • 614 篇 信息与通信工程
    • 364 篇 生物医学工程(可授...
    • 295 篇 控制科学与工程
    • 223 篇 电气工程
    • 211 篇 光学工程
    • 161 篇 安全科学与工程
    • 142 篇 机械工程
    • 129 篇 电子科学与技术(可...
    • 120 篇 交通运输工程
    • 119 篇 化学工程与技术
    • 97 篇 动力工程及工程热...
  • 1,369 篇 理学
    • 674 篇 数学
    • 645 篇 生物学
    • 331 篇 统计学(可授理学、...
    • 308 篇 物理学
    • 197 篇 系统科学
    • 128 篇 化学
  • 748 篇 管理学
    • 421 篇 管理科学与工程(可...
    • 414 篇 图书情报与档案管...
    • 250 篇 工商管理
  • 343 篇 医学
    • 315 篇 临床医学
    • 308 篇 基础医学(可授医学...
    • 221 篇 药学(可授医学、理...
    • 126 篇 公共卫生与预防医...
  • 160 篇 法学
    • 139 篇 社会学
  • 157 篇 教育学
    • 155 篇 教育学
  • 141 篇 农学
    • 140 篇 作物学
  • 89 篇 经济学
  • 9 篇 军事学
  • 6 篇 文学

主题

  • 532 篇 machine learning
  • 248 篇 deep learning
  • 117 篇 support vector m...
  • 99 篇 adversarial mach...
  • 93 篇 accuracy
  • 93 篇 machine learning...
  • 83 篇 forecasting
  • 76 篇 convolutional ne...
  • 70 篇 predictive model...
  • 70 篇 feature extracti...
  • 59 篇 artificial intel...
  • 53 篇 students
  • 51 篇 learning systems
  • 48 篇 decision trees
  • 48 篇 training
  • 47 篇 reinforcement le...
  • 47 篇 computational mo...
  • 47 篇 computer vision
  • 46 篇 internet of thin...
  • 41 篇 neural networks

机构

  • 46 篇 chitkara univers...
  • 15 篇 graphic era hill...
  • 10 篇 college of manag...
  • 9 篇 graphic era deem...
  • 8 篇 computer science...
  • 8 篇 beijing universi...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 department of in...
  • 6 篇 università di ca...
  • 6 篇 infn sezione di ...
  • 6 篇 north-west unive...
  • 6 篇 computer science...
  • 6 篇 lovely professio...
  • 6 篇 in2p3 lpc campus...
  • 6 篇 kkr and ksr inst...
  • 6 篇 institut univers...
  • 6 篇 national centre ...
  • 6 篇 greater bay area...

作者

  • 18 篇 kukreja vinay
  • 15 篇 mehta shiva
  • 10 篇 william p.
  • 8 篇 sharma vikrant
  • 7 篇 mahamudul hasan
  • 7 篇 shiva mehta
  • 6 篇 chen a.
  • 6 篇 benoit d.m.
  • 6 篇 ferrara g.
  • 6 篇 ardid m.
  • 6 篇 calvo d.
  • 6 篇 gagliardini s.
  • 6 篇 eddymaoui a.
  • 6 篇 kulikovskiy v.
  • 6 篇 labalme m.
  • 6 篇 gal t.
  • 6 篇 bozza c.
  • 6 篇 khatun a.
  • 6 篇 kalekin o.
  • 6 篇 huang f.

语言

  • 2,394 篇 英文
  • 1,803 篇 其他
  • 126 篇 中文
检索条件"任意字段=Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application"
4198 条 记 录,以下是3281-3290 订阅
排序:
Deep learning application of Automated Facemask Classification and Physical-Distancing Detection  4
Deep Learning Application of Automated Facemask Classificati...
收藏 引用
4th international conference on Vocational Education and Electrical Engineering, ICVEE 2021
作者: Militante, Sammy V. Marin, Edward Louie M. Canja, Genesis V. Paglingayen, Gerard James B. Saballa-Marin, Mary Jezza M. College of Engineering and Architecture University of Antique SibalomAntique Philippines College of Computer Studies University of Antique SibalomAntique Philippines
COVID-19 adversity has stopped the global economy and most of the countries in the entire world are still in locked down even though there is now a vaccine available to fight the COVID-19 diseases. Many nations includ... 详细信息
来源: 评论
WannaLaugh: A Configurable Ransomware Emulator - learning to Mimic Malicious Storage Traces  24
WannaLaugh: A Configurable Ransomware Emulator - Learning to...
收藏 引用
proceedings of the 17th ACM international Systems and Storage conference
作者: Dionysios Diamantopoulos Roman Pletka Slavisa Sarafijanovic A.L. Narasimha Reddy Haris Pozidis IBM Research Europe - Zürich Lab Säumerstrasse 4 Rüschlikon Switzerland Department of Electrical and Computer Engineering Texas A&M University College Station Texas USA
Ransomware, a fearsome and an evolving cybersecurity threat, continues to inflict severe consequences on individuals and organizations worldwide. Traditional detection methods, reliant on static signatures and applica... 详细信息
来源: 评论
Human Pose Estimation using Deep learning Techniques  22
Human Pose Estimation using Deep Learning Techniques
收藏 引用
proceedings of the 4th international conference on Information Management & machine Intelligence
作者: Anant Grover Deepak Arora Anuj Grover Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Uttar Pradesh Lucknow Campus. India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Uttar Pradesh Lucknow Campus India
Human Pose Estimation is a method of detecting and classifying all the key human body joints. A 2D Human Pose Estimation method predicts the two-dimensional coordinates from an input image. Classical methods used defo... 详细信息
来源: 评论
A Safe Architecture of 5G Network Intelligence Based on Federated learning and NWDAF  22
A Safe Architecture of 5G Network Intelligence Based on Fede...
收藏 引用
proceedings of the 4th international conference on Advanced Information Science and System
作者: Lu Yu Lun Xin Manxue Guo China Mobile Research Institute China
Abstract: Intelligent communication network is the technical development trend of 5G and post-5G era. Big data analysis is the foundation of intelligent network while data isolation and privacy protection in network d...
来源: 评论
AI-Driven Alert Systems for an Intuitive Animal Monitoring System
AI-Driven Alert Systems for an Intuitive Animal Monitoring S...
收藏 引用
Advancement in Electronics & Communication Engineering (AECE), international conference on
作者: P. Latha Diana Inba Malar Y Hemavarthini C S Manjuparkavi V Sneha S Department of Computer Science and Engineering V.S.B. Engineering College Karur India
All animals that can sight, including humans, do so in a way that appears instinctive and natural. Creatures use their vision system early in life often even from birth to traverse their surroundings, recognize and co... 详细信息
来源: 评论
An application of XGBoost algorithm for online transaction fraud detection based on improved sailfish optimizer
An application of XGBoost algorithm for online transaction f...
收藏 引用
international conference on machine learning, Big Data and Business Intelligence (MLBDBI)
作者: Hongwei Chen Lun Chen School of Computer Science Hubei University of Technology Wuhan China
Fraud detection is relevant in this context because of the large scale of online transactions, which conceal a small number of fraudulent *** learning (ML) fraud detection models have numerous hyperparameters of the e... 详细信息
来源: 评论
CNN-based Deep learning Approach for MRI-based Brain Tumor Detection
CNN-based Deep Learning Approach for MRI-based Brain Tumor D...
收藏 引用
Smart Electronics and Communication (ICOSEC), international conference on
作者: Kanagaraj Narayanasamy Elangovan Sathish Kumar L M Maragatharajan D. Deepa Department of Computer Science Karpagam Academy of Higher Education Coimbatore TamilNadu India Department of DSBS SRM Institute of Science and Technology Kattankulathur TamilNadu India School of Computing Science and Engineering VIT Bhopal University Kotrikalan MP India Department of CSE Kongu Engineering College Perundurai Tamil Nadu India
Conventional brain tumor prediction method is a time-consuming and inaccurate process that involves manually evaluating a large number of MRI (magnetic resonance imaging) scan pictures in search of signs of brain canc...
来源: 评论
Mental Health Analysis using Deep learning of Social Media Data gathered using Chrome Extension
Mental Health Analysis using Deep Learning of Social Media D...
收藏 引用
Emerging Technology (INCET), international conference for
作者: Manvita Joshi Chetashri Mahajan Traividya Korgaonkar Nataasha Raul Meghana Naik Computer Engineering Department Sardar Patel Institute of Technology Mumbai India Applied Sciences Mathematics and Humanities Department Sardar Patel Institute of Technology Mumbai India
Recently the topic of ’mental health’ has gained high awareness, especially among younger generations. the age group that mostly gets affected by mental disorders is between 15-49 years of age. Research conducted on...
来源: 评论
Exploring the application of computer Intelligence Algorithms in Logistics and Supply Chain Management  22
Exploring the Application of Computer Intelligence Algorithm...
收藏 引用
proceedings of the 7th international conference on Intelligent Information Processing
作者: Mei-E Xie Lichen Qiao Wuhan Business University China Northeastern University China
Digital transformation and innovation are the current trend of the times, and computer intelligence algorithms will be an important supporting technology for a new generation of logistics industry. With the continuous... 详细信息
来源: 评论
Research and Design of Active Operation application Platform for Power Supply Stations  23
Research and Design of Active Operation Application Platform...
收藏 引用
proceedings of the 2023 4th international conference on Big Data Economy and Information Management
作者: Yifan Hu Zhihao Shen Xiaojun Shen Jinxia Jiang Jiawen Zhan Information and Communication Branch State Grid Zhejiang Electric Power Co. Ltd. China
In order to implement the company's strategic deployment, continuously improve the service capacity of the power supply station, implement the national rural revitalization strategy, and solve the problem of incom...
来源: 评论