咨询与建议

限定检索结果

文献类型

  • 22,562 篇 会议
  • 3,220 篇 期刊文献
  • 19 篇 学位论文
  • 7 册 图书

馆藏范围

  • 25,807 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,149 篇 工学
    • 3,093 篇 计算机科学与技术...
    • 2,542 篇 电气工程
    • 1,383 篇 信息与通信工程
    • 686 篇 控制科学与工程
    • 593 篇 软件工程
    • 285 篇 仪器科学与技术
    • 217 篇 环境科学与工程(可...
    • 189 篇 机械工程
    • 183 篇 生物医学工程(可授...
    • 163 篇 交通运输工程
    • 149 篇 测绘科学与技术
    • 130 篇 生物工程
    • 122 篇 石油与天然气工程
    • 121 篇 电子科学与技术(可...
    • 117 篇 材料科学与工程(可...
    • 111 篇 网络空间安全
    • 98 篇 土木工程
    • 92 篇 动力工程及工程热...
    • 66 篇 水利工程
  • 943 篇 理学
    • 289 篇 生物学
    • 188 篇 物理学
    • 155 篇 化学
    • 139 篇 地球物理学
    • 132 篇 数学
    • 84 篇 系统科学
  • 611 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
  • 437 篇 医学
    • 284 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 227 篇 农学
    • 148 篇 作物学
  • 53 篇 经济学
  • 52 篇 法学
  • 49 篇 文学
  • 47 篇 教育学
  • 17 篇 艺术学
  • 3 篇 军事学
  • 2 篇 哲学

主题

  • 25,808 篇 machine learning...
  • 8,337 篇 machine learning
  • 4,247 篇 support vector m...
  • 4,161 篇 prediction algor...
  • 4,141 篇 accuracy
  • 3,577 篇 predictive model...
  • 3,462 篇 training
  • 3,199 篇 classification a...
  • 3,156 篇 feature extracti...
  • 1,930 篇 data models
  • 1,793 篇 computational mo...
  • 1,774 篇 deep learning
  • 1,639 篇 random forests
  • 1,463 篇 neural networks
  • 1,386 篇 clustering algor...
  • 1,368 篇 real-time system...
  • 1,271 篇 data mining
  • 1,121 篇 optimization
  • 995 篇 decision trees
  • 971 篇 measurement

机构

  • 120 篇 chitkara univers...
  • 37 篇 lovely professio...
  • 36 篇 chitkara centre ...
  • 30 篇 computer science...
  • 30 篇 centre of resear...
  • 28 篇 department of co...
  • 26 篇 school of comput...
  • 21 篇 univ chinese aca...
  • 21 篇 computer science...
  • 21 篇 school of comput...
  • 20 篇 computer science...
  • 18 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 department of co...
  • 16 篇 brac university ...
  • 16 篇 khulna universit...
  • 15 篇 symbiosis instit...
  • 15 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 computer science...

作者

  • 25 篇 ashwini kodipall...
  • 24 篇 mahendra kumar g...
  • 15 篇 rakesh kumar
  • 13 篇 wei liu
  • 13 篇 atul kumar
  • 12 篇 qiangfu zhao
  • 12 篇 amit kumar
  • 12 篇 surendran r
  • 12 篇 satvik vats
  • 11 篇 jun zhang
  • 11 篇 li li
  • 11 篇 liu yang
  • 11 篇 wei li
  • 10 篇 sudeep tanwar
  • 10 篇 himanshu sharma
  • 10 篇 amiya ranjan pan...
  • 9 篇 lei wang
  • 9 篇 tohari ahmad
  • 9 篇 shanmugasundaram...
  • 9 篇 rishabh sharma

语言

  • 25,604 篇 英文
  • 147 篇 其他
  • 32 篇 中文
  • 5 篇 法文
  • 4 篇 土耳其文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 德文
检索条件"主题词=Machine Learning Algorithms"
25808 条 记 录,以下是4861-4870 订阅
Edge Intelligence Based Identification and Classification of Encrypted Traffic of Internet of Things
收藏 引用
IEEE ACCESS 2021年 9卷 21895-21903页
作者: Zhao, Yue Yang, Yarang Tian, Bo Yang, Jin Zhang, Tianyi Hu, Ning Sci & Technol Commun Secur Lab Chengdu 610041 Peoples R China Kashi Univ Coll Phys & Elect Engn Kashi 844006 Peoples R China Sichuan Univ Coll Cyber Secur Chengdu 610065 Peoples R China Chiba Univ Grad Sch Adv Integrat Sci Chiba 2638522 Japan Cyberspace Secur Res Ctr Peng Cheng Lab Shenzhen 518000 Peoples R China Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou 510006 Peoples R China
A detection model of Internet of Things encrypted traffic based on edge intelligence is proposed in the paper, which can reduce the communication times of distributed Internet of Things gateways in the process of edge... 详细信息
来源: 评论
StreamDFP: A General Stream Mining Framework for Adaptive Disk Failure Prediction
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2023年 第2期72卷 520-534页
作者: Han, Shujie Lee, Patrick P. C. Shen, Zhirong He, Cheng Liu, Yi Huang, Tao Peking Univ Beijing 100871 Peoples R China Chinese Univ Hong Kong Shatin Hong Kong Peoples R China Xiamen Univ Xiamen 361005 Peoples R China Alibaba Grp Hangzhou 310052 Peoples R China
We explore machine learning for accurately predicting imminent disk failures and hence providing proactive fault tolerance for modern large-scale storage systems. Current disk failure prediction approaches are mostly ... 详细信息
来源: 评论
Application of Text Rank Algorithm Fused With LDA in Information Extraction Model
收藏 引用
IEEE ACCESS 2023年 11卷 84301-84312页
作者: Wei, Yunbo Ding, Yongsheng Qiqihar Univ Sch Sci Qiqihar 161006 Peoples R China
With the rapid development of network technology, a large amount of information fills the network world, and the performance of the current information extraction model to extract keyword information from a large numb... 详细信息
来源: 评论
A Novel Constructive Unceasement Conditional Random Field and Dynamic Bayesian Network Model for Attack Prediction on Internet of Vehicle
收藏 引用
IEEE ACCESS 2024年 12卷 24644-24658页
作者: Mahendran, Rakesh Kumar Rajendran, Santhosh Pandian, Prakash Rathore, Rajkumar Singh Benedetto, Francesco Jhaveri, Rutvij H. Rajalakshmi Engn Coll Dept Comp Sci & Engn Chennai 602105 India Karpagam Acad Higher Educ Dept Comp Sci & Engn Coimbatore 641021 India Madha Engn Coll Dept Elect & Commun Engn Chennai 600069 India Cardiff Metropolitan Univ Cardiff Sch Technol Dept Comp Sci Llandaff Campus Cardiff CF5 2YB Wales Univ Roma TRE Signal Proc Telecommun & Econ SP4TE I-00145 Rome Italy Pandit Deendayal Energy Univ Dept Comp Sci & Engn Gandhinagar 382007 India
Today's Internet of Vehicles (IoV) has soared by leveraging data gathered from transportation systems, yet it grapples with security concerns stemming from network vulnerabilities, exposing it to cyber threats. Th... 详细信息
来源: 评论
Analysis of Dimensionality Reduction Techniques on Big Data
收藏 引用
IEEE ACCESS 2020年 8卷 54776-54788页
作者: Reddy, G. Thippa Reddy, M. Praveen Kumar Lakshmanna, Kuruva Kaluri, Rajesh Rajput, Dharmendra Singh Srivastava, Gautam Baker, Thar VIT Sch Infromat Technol & Engn Vellore 632014 Tamil Nadu India Brandon Univ Dept Math & Comp Sci Brandon MB R7A 6A9 Canada China Med Univ Res Ctr Interneural Comp Shenyang 10122 Peoples R China Liverpool John Moores Univ Dept Comp Sci Liverpool L3 3AF Merseyside England
Due to digitization, a huge volume of data is being generated across several sectors such as healthcare, production, sales, IoT devices, Web, organizations. machine learning algorithms are used to uncover patterns amo... 详细信息
来源: 评论
TTSR: Tensor-Train Subspace Representation Method for Visual Domain Adaptation
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2024年 第11期36卷 7229-7241页
作者: Li, Guorui Xu, Pengfei Peng, Sancheng Wang, Cong Cai, Yi Yu, Shui Northeastern Univ Sch Comp Sci & Engn Shenyang 110819 Peoples R China Guangdong Univ Foreign Studies Ctr Linguist & Appl Linguist Guangzhou 510006 Peoples R China Guangdong Univ Foreign Studies Lab Language Engn & Comp Guangzhou 510006 Peoples R China South China Univ Technol Sch Software Engn Guangzhou 510006 Peoples R China Univ Technol Sydney Sch Comp Sci Sydney NSW 2007 Australia
Most existing methods for visual domain adaptation need to convert high-order tensors into one-order high-dimensional vectors through naive vectorization operations. However, they not only destroy the internal spatial... 详细信息
来源: 评论
Analysis of Swarm Intelligence Based ANN algorithms for Attacking PUFs
收藏 引用
IEEE ACCESS 2021年 9卷 121743-121758页
作者: Oun, Ahmed Hazari, Noor Ahmad Niamat, Mohammed Y. Univ Toledo Dept Elect Engn & Comp Sci Toledo OH 43606 USA
Physical Unclonable Functions (PUFs) are used for authentication and generation of secure cryptographic keys. However, recent research work has shown that PUFs, in general, are vulnerable to machine learning modeling ... 详细信息
来源: 评论
Stream water quality prediction using boosted regression tree and random forest models
收藏 引用
STOCHASTIC ENVIRONMENTAL RESEARCH AND RISK ASSESSMENT 2022年 第9期36卷 2661-2680页
作者: Alnahit, Ali O. Mishra, Ashok K. Khan, Abdul A. Clemson Univ Glenn Dept Civil Engn Clemson SC 29634 USA King Saud Univ Dept Civil Engn Riyadh Saudi Arabia
Reliable water quality prediction can improve environmental flow monitoring and the sustainability of the stream ecosystem. In this study, we compared two machine learning methods to predict water quality parameters, ... 详细信息
来源: 评论
Federated Cooperation and Augmentation for Power Allocation in Decentralized Wireless Networks
收藏 引用
IEEE ACCESS 2020年 8卷 48088-48100页
作者: Yan, Mu Chen, Bolun Feng, Gang Qin, Shuang Univ Elect Sci & Technol China Natl Key Lab Sci & Technol Commun Chengdu 611731 Peoples R China
Emerging mobile edge techniques and applications such as Augmented Reality (AR)/Virtual Reality (VR), Internet of Things (IoT), and vehicle networking, result in an explosive growth of power and computing resource con... 详细信息
来源: 评论
Scalable malware classification with multifaceted content features and threat intelligence
收藏 引用
IBM JOURNAL OF RESEARCH AND DEVELOPMENT 2016年 第4期60卷 6:1-6:11页
作者: Hu, X. Jang, J. Wang, T. Ashraf, Z. Stoecklin, M. Ph. Kirat, D. IBM Corp Div Res Thomas J Watson Res Ctr Yorktown Hts NY 10598 USA Lehigh Univ Bethlehem PA 18015 USA IBM X Force Adv Secur Team Markham ON L6G 1C7 Canada
Recent years have witnessed the very rapid increase in both the volume and sophistication of malware programs. Malware authors invest heavily in technologies and capabilities to streamline the process of building and ... 详细信息
来源: 评论