咨询与建议

限定检索结果

文献类型

  • 62 篇 期刊文献
  • 39 篇 会议
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 89 篇 工学
    • 50 篇 计算机科学与技术...
    • 34 篇 电气工程
    • 18 篇 控制科学与工程
    • 13 篇 信息与通信工程
    • 11 篇 软件工程
    • 9 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 石油与天然气工程
    • 3 篇 环境科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 土木工程
    • 2 篇 测绘科学与技术
    • 2 篇 网络空间安全
  • 17 篇 理学
    • 5 篇 数学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
  • 13 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 教育学
    • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 农学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 103 篇 boosting algorit...
  • 15 篇 machine learning
  • 7 篇 ensemble learnin...
  • 5 篇 adaboost
  • 5 篇 classification
  • 4 篇 face detection
  • 3 篇 intrusion detect...
  • 3 篇 support vector r...
  • 3 篇 fault diagnosis
  • 3 篇 random forest
  • 3 篇 support vector m...
  • 3 篇 svm
  • 3 篇 anomaly detectio...
  • 3 篇 generalization e...
  • 3 篇 intrusion detect...
  • 3 篇 churn prediction
  • 3 篇 compressed domai...
  • 3 篇 learning (artifi...
  • 3 篇 accuracy
  • 3 篇 weak classifier

机构

  • 2 篇 cv raman global ...
  • 2 篇 wuhan univ sci &...
  • 2 篇 persistent syst ...
  • 1 篇 s china normal u...
  • 1 篇 city univ hong k...
  • 1 篇 thomas jefferson...
  • 1 篇 gerdau ouro bran...
  • 1 篇 co. ltd jinhua
  • 1 篇 northwestern uni...
  • 1 篇 china univ geosc...
  • 1 篇 vignan inst tech...
  • 1 篇 institut teknolo...
  • 1 篇 university of ca...
  • 1 篇 lanzhou vocation...
  • 1 篇 systems engineer...
  • 1 篇 univ naples fede...
  • 1 篇 eastern inst tec...
  • 1 篇 cent s univ info...
  • 1 篇 master of inform...
  • 1 篇 beihang univ sch...

作者

  • 2 篇 zhang xiaolong
  • 2 篇 priyadarshini ro...
  • 2 篇 thakor devendra
  • 2 篇 kharwar ankit
  • 1 篇 sarigiannidis g.
  • 1 篇 jiji c. victor
  • 1 篇 zhao rc
  • 1 篇 jafari arezou
  • 1 篇 roy diptendu sin...
  • 1 篇 ben letaifa asma
  • 1 篇 nishat mirza mun...
  • 1 篇 liska gilberto r...
  • 1 篇 zhang chunyang
  • 1 篇 chatzisavvas k. ...
  • 1 篇 sieg miriam
  • 1 篇 fujii hiromitsu
  • 1 篇 raisa fatima fai...
  • 1 篇 zhang yancong
  • 1 篇 yu chongchong
  • 1 篇 li yonggang

语言

  • 99 篇 英文
  • 2 篇 其他
  • 2 篇 中文
检索条件"主题词=Boosting algorithm"
103 条 记 录,以下是71-80 订阅
排序:
Off-line signature verification incorporating the prior model
Off-line signature verification incorporating the prior mode...
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Wan, L Lin, ZC Zhao, RC Northwestern Polytech Univ Dept Comp Sci & Engn Xian 710072 Shaanxi Peoples R China
The existing signature verification systems usually train classifiers for a new user by both his/her genuine and forgery signatures. Obviously, the requirement of forgery signatures is impractical. This paper presents... 详细信息
来源: 评论
AN EFFECTIVE AND EFFICIENT HEART DISEASE PREDICTION MODEL USING DISTRIBUTED HIGH PERFORMANCE LIGHT GBM  5
AN EFFECTIVE AND EFFICIENT HEART DISEASE PREDICTION MODEL US...
收藏 引用
5th International Conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC)
作者: Chowdary, B., V Kedarnath, Jaina Vyshnavi, Rachamalla Lavakush, Valluri Shasihdhar, Chavula Vignan Inst Technol & Sci Dept CSE Hyderabad Telangana India
The healthcare industries acquire massive portions of facts which encompass some hidden information;it virtually is useful for making powerful options. For giving appropriate results as nicely as making dependable opt... 详细信息
来源: 评论
Lecture video indexing using boosted margin maximizing neural networks  16
Lecture video indexing using boosted margin maximizing neura...
收藏 引用
16th IEEE International Conference on Machine Learning and Applications (ICMLA)
作者: Ma, Di Zhang, Xi Ouyang, Xu Agam, Gady IIT Dept Comp Sci Chicago IL 60616 USA
This paper presents a novel approach for lecture video indexing using a boosted deep convolutional neural network system. The indexing is performed by matching high quality slide images, for which text is either known... 详细信息
来源: 评论
An Enhanced Model for Effective Recognition and Segmentation of SLG in Dynamic Video Sequence Using Boosted Learning algorithm
An Enhanced Model for Effective Recognition and Segmentation...
收藏 引用
IEEE 11th International Conference on Networking, Sensing and Control (ICNSC)
作者: Elakkiya, R. Selvamani, K. Kanimozhi, S. Anna Univ Madras 600025 Tamil Nadu India
This paper proposes a new approach to solve the problem of real-time vision-based hand gesture recognition with the combination of hand posture and hand gesture analyses. The main objective of this is to divide the re... 详细信息
来源: 评论
Effective Intrusion Detection System Using Semi-Supervised Learning
Effective Intrusion Detection System Using Semi-Supervised L...
收藏 引用
International Conference on Data Mining and Intelligent Computing (ICDMIC)
作者: Wagh, Sharmila Kishor Kolhe, Satish R. MES Coll Engn Dept Comp Engn Pune Maharashtra India North Maharashtra Univ Sch Comp Sci Jalgaon India
Network security is a very important aspect of internet enabled systems in the present world scenario. As the internet keeps developing the number of security attacks as well as their severity has shown a significant ... 详细信息
来源: 评论
Predictive Analysis & Brief Study of Early-Stage Diabetes Using Multiple Classifier Models  12
Predictive Analysis & Brief Study of Early-Stage Diabetes Us...
收藏 引用
IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)
作者: Tahsin, Mohammad Sadman Jobayer, Md Antor, Md Borhan Uddin Islam, Maidul Raisa, Fatima Fairuz Shaikat, Md Al Hasan BRAC Univ Dept Comp Sci & Engn Dhaka Bangladesh BRAC Univ Dept Elect & Elect Engn Dhaka Bangladesh
Diabetes Mellitus is one of the world's leading causes of mortality, with a worldwide death toll estimated to be in the millions. It is determined by the concentration of a sugar molecule in the blood, which is pr... 详细信息
来源: 评论
A new model based on global hybridization of machine learning techniques for "customer chum prediction"  3
A new model based on global hybridization of machine learnin...
收藏 引用
3rd International Conference on Intelligent Computing in Data Sciences (ICDS)
作者: Khamlichi, Fahd Idrissi Zaim, Doha Khalifa, Khalid Devoteam Levallois Perret France
We present a new model based on a global hybridization of the most popular machine learning methods applied to the challenging problem of customer churning prediction in the telecommunications industry. In the first p... 详细信息
来源: 评论
An Adaptive Ensemble Model for Brain-Computer Interfaces
An Adaptive Ensemble Model for Brain-Computer Interfaces
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ)
作者: Hayashi, Isao Tsuruse, Shinji Kansai Univ Dept Informat Takatsuki Osaka 5691095 Japan Panason Syst Solut Japan Co Ltd Tokyo 1040061 Japan
Brain-computer interface (BCI) have recently entered the research limelight. In many such systems, external computers and machines are controlled by brain activity signals measured using near-infrared spectroscopy (NI... 详细信息
来源: 评论
Profiling Phishing Emails Based on Hyperlink Information
Profiling Phishing Emails Based on Hyperlink Information
收藏 引用
International Conference on Advances in Social Network Analysis and Mining (ASONAM)
作者: Yearwood, John Mammadov, Musa Banerjee, Arunava Univ Ballarat Grad Sch ITMS Ballarat Vic 3353 Australia
In this paper, a novel method for profiling phishing activity from an analysis of phishing emails is proposed. Profiling is useful in determining the activity of an individual or a particular group of phishers. Work i... 详细信息
来源: 评论
Comparison of supervised machine learning techniques for customer churn prediction based on analysis of customer behavior
收藏 引用
Journal of Systems and Information Technology 2017年 第1-2期19卷 65-93页
作者: Khodabandehlou, Samira Zivari Rahman, Mahmoud Master of Information Technology Engineering Tehran Iran Allameh Tabataba’i University Tehran Iran
Purpose: This paper aims to provide a predictive framework of customer churn through six stages for accurate prediction and preventing customer churn in the field of business. Design/methodology/approach: The six stag... 详细信息
来源: 评论