咨询与建议

限定检索结果

文献类型

  • 22,626 篇 会议
  • 3,225 篇 期刊文献
  • 19 篇 学位论文
  • 7 册 图书

馆藏范围

  • 25,876 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,151 篇 工学
    • 3,093 篇 计算机科学与技术...
    • 2,542 篇 电气工程
    • 1,383 篇 信息与通信工程
    • 686 篇 控制科学与工程
    • 593 篇 软件工程
    • 285 篇 仪器科学与技术
    • 218 篇 环境科学与工程(可...
    • 189 篇 机械工程
    • 183 篇 生物医学工程(可授...
    • 163 篇 交通运输工程
    • 149 篇 测绘科学与技术
    • 130 篇 生物工程
    • 122 篇 石油与天然气工程
    • 121 篇 电子科学与技术(可...
    • 117 篇 材料科学与工程(可...
    • 111 篇 网络空间安全
    • 98 篇 土木工程
    • 92 篇 动力工程及工程热...
    • 66 篇 水利工程
  • 943 篇 理学
    • 289 篇 生物学
    • 188 篇 物理学
    • 155 篇 化学
    • 139 篇 地球物理学
    • 132 篇 数学
    • 84 篇 系统科学
  • 612 篇 管理学
    • 525 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
  • 437 篇 医学
    • 284 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 227 篇 农学
    • 148 篇 作物学
  • 53 篇 经济学
  • 52 篇 法学
  • 49 篇 文学
  • 47 篇 教育学
  • 17 篇 艺术学
  • 3 篇 军事学
  • 2 篇 哲学

主题

  • 25,877 篇 machine learning...
  • 8,356 篇 machine learning
  • 4,256 篇 support vector m...
  • 4,174 篇 accuracy
  • 4,172 篇 prediction algor...
  • 3,590 篇 predictive model...
  • 3,467 篇 training
  • 3,208 篇 classification a...
  • 3,170 篇 feature extracti...
  • 1,941 篇 data models
  • 1,801 篇 computational mo...
  • 1,776 篇 deep learning
  • 1,658 篇 random forests
  • 1,466 篇 neural networks
  • 1,387 篇 clustering algor...
  • 1,384 篇 real-time system...
  • 1,274 篇 data mining
  • 1,133 篇 optimization
  • 998 篇 decision trees
  • 975 篇 measurement

机构

  • 120 篇 chitkara univers...
  • 39 篇 lovely professio...
  • 36 篇 chitkara centre ...
  • 30 篇 computer science...
  • 30 篇 centre of resear...
  • 28 篇 department of co...
  • 26 篇 school of comput...
  • 21 篇 univ chinese aca...
  • 21 篇 computer science...
  • 21 篇 school of comput...
  • 20 篇 computer science...
  • 18 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 department of co...
  • 16 篇 brac university ...
  • 16 篇 khulna universit...
  • 15 篇 symbiosis instit...
  • 15 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 computer science...

作者

  • 25 篇 ashwini kodipall...
  • 24 篇 mahendra kumar g...
  • 15 篇 rakesh kumar
  • 13 篇 wei liu
  • 13 篇 atul kumar
  • 12 篇 qiangfu zhao
  • 12 篇 amit kumar
  • 12 篇 surendran r
  • 12 篇 satvik vats
  • 11 篇 jun zhang
  • 11 篇 li li
  • 11 篇 liu yang
  • 11 篇 wei li
  • 10 篇 sudeep tanwar
  • 10 篇 himanshu sharma
  • 10 篇 amiya ranjan pan...
  • 9 篇 lei wang
  • 9 篇 tohari ahmad
  • 9 篇 shanmugasundaram...
  • 9 篇 rishabh sharma

语言

  • 25,672 篇 英文
  • 147 篇 其他
  • 33 篇 中文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 德文
检索条件"主题词=Machine Learning Algorithms"
25877 条 记 录,以下是661-670 订阅
排序:
A Comparative Analysis and Evaluation of machine learning algorithms for Malware Detection
A Comparative Analysis and Evaluation of Machine Learning Al...
收藏 引用
International Conference on Adaptive Science & Technology (ICAST)
作者: Beverlyn Ewuradwoa Amanfu Govindha Ramaiah Yeluripati Computer Science and Informations Systems Department Ashesi University Berekuso Ghana
The increasing complexity of malware has become a threat to the security of individuals, businesses, and institutions that operate in cyberspace. New malware variants are regularly being created with obfuscation techn... 详细信息
来源: 评论
Assessing machine learning algorithms for Real-Time Fake Currency Detection
Assessing Machine Learning Algorithms for Real-Time Fake Cur...
收藏 引用
Sustainable Communication Networks and Application (ICSCNA), International Conference on
作者: Ajanthaa Lakkshmanan Revanth Sai Grandhi V. Girish Department of Computing Technologies School of Computing SRM Institute of Science and Technology Chennai India
Counterfeiting poses a significant threat as the circulation of fake currency diminishes the value of genuine notes, thereby disrupting the country's economic stability. Addressing this issue is critical before th... 详细信息
来源: 评论
Performance Evaluation of machine learning algorithms on the Intrusion Detection System of Military Defence Operations
Performance Evaluation of Machine Learning Algorithms on the...
收藏 引用
Advances in Data Engineering and Intelligent Computing Systems (ADICS), International Conference on
作者: Raja Nandini M Nachiyappan. S Anusha K Asha Jerlin M Vellore Institute of Technology Chennai India
Intrusion detection system is used against harmful attacks also attacker's tools and strategies are always evolving. But implementing an authorized IDS system is equally a significant job. Several experiments were... 详细信息
来源: 评论
IoT-Based Livestock Monitoring and Management System Using machine learning algorithms
IoT-Based Livestock Monitoring and Management System Using M...
收藏 引用
Science, Technology, Engineering and Management (ICSTEM), International Conference on
作者: Nagendar Yamsani K. Muthukumaran B Santhosh Kumar Asha V Navdeep Singh JoshuvaArockia Dhanraj School of Computer Science and Artificial Intelligence SR UNIVERSITY Warangal Department of Biomedical Engineering DSCET-Anna University Chennai Institute of Aeronautical Engineering Hyderabad Department of Computer Applications New Horizon College of Engineering Bangalore Lovely Professional University Phagwara Department of Computer Science and Engineering (AI&ML) School of Engineering Dayananda Sagar University Bengaluru Karnataka India
This article provides a description of an Internet of Things (IoT) system that employs machine learning algorithms to provide real-time and precise insights into the health and behaviour of animals. A network of Inter... 详细信息
来源: 评论
Development of machine learning algorithms for fault detection in power systems - a review
Development of machine learning algorithms for fault detecti...
收藏 引用
Science, Engineering and Business for Sustainable Development Goals (SEB-SDG), International Conference on
作者: Olayanju Olamide. Samson Saheed Lekan Gbadamosi Moses Oluwafemi Onibonoje Evans. E. Ojo Department of Electrical Electronic and Computer Engineering Afe Babalola University Ado-Ekiti Nigeria Department of Electrical and Electronic Engineering Bowen University Iwo Osun State Nigeria Dept. of Electrical Power Engineering Durban University of Technology Durban South Africa
Detecting and locating faults within electrical grids presents substantial challenges in power systems engineering, leading to energy loss, reduced revenue, and equipment damage. This paper provides a comprehensive re... 详细信息
来源: 评论
Social Media Text Sentiment Classification Based on Bag-of-Words Models with Multiple machine learning algorithms
Social Media Text Sentiment Classification Based on Bag-of-W...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Siyuan Lee National University of Defense Technology Changsha Hunan China
In this paper, we use bag-of-words model combined with various machine learning algorithms to classify the sentiment of social media texts. Firstly, the data is classified into three categories of positive, neutral an... 详细信息
来源: 评论
Pothole Sensing and Analysis with Doppler Audio Signal Spectrum Employing machine learning algorithms
Pothole Sensing and Analysis with Doppler Audio Signal Spect...
收藏 引用
IEEE Symposium on Wireless Technology and Applications (ISWTA)
作者: Suraya Zainuddin Muhammad Aiman Dani Ismail Haslinah Mohd Nasir Nur Emileen Abd Rashid Khairul Khaizi Mohd Shariff Izwan Zainal Abidin Fakulti Teknologi dan Kejuruteraan Elektronik dan Komputer University Teknikal Malaysia Melaka Melaka Malaysia Microwave Research Institute Universiti Teknologi MARA Selangor Malaysia Terradrone Technology Malaysia Sdn Bhd Kuala Lumpur Malaysia
Potholes are imperfections, whether minor divots or massive craters, on the surface of roads, streets, or pavements caused by depressions or holes that are dangerous for cars and pedestrians. Several approaches have b... 详细信息
来源: 评论
Evaluating Sparkle and Beyond the Four Cs: Unveiling a New Frontier in Diamond Valuation with Advanced machine learning algorithms
Evaluating Sparkle and Beyond the Four Cs: Unveiling a New F...
收藏 引用
Artificial Intelligence and Emerging Technology (Global AI Summit), International Conference on
作者: Md Shaik Amzad Basha K Pushpalatha Shruti Jose M Martha Sucharitha GITAM School of Business Gandhi Institute of Technology & Management (Deemed to be University) Bengaluru India Master of Business Administration Mallareddy Engineering College (Autonomous) Telangana India Department of Professional Studies Christ (Deemed to be University) Bengaluru India
The gemological and high-end retail sectors evaluate diamonds using the “Four Cs”: carat weight, color, clarity, and cut. This study evaluates machine learning diamond valuation accuracy using these parameters. Mach... 详细信息
来源: 评论
Enhanced Sensor Fault Detection in Aquatic Monitoring using Deep learning and machine learning algorithms
Enhanced Sensor Fault Detection in Aquatic Monitoring using ...
收藏 引用
International Conference on Parallel Distributed and Grid Computing (PDGC)
作者: Kuna Venkateswararao Gali Pavan Ratnam Nayudu Jonnalagadda Balaji J. N. V. R. Swarup Kumar Irugu John Peter Noble K. E. Naresh Kumar Dept. of CSE GST GITAM Deemed to be University Visakhapatnam India
This paper deals with the problem of probable sensor failure detection using different machine learning and Deep learning algorithms like VAE, AE, CNN, LSTM, OneClass-SVM, and Isolation Forest in Internet of Things ap... 详细信息
来源: 评论
Spam SMS Classifier Using machine learning algorithms
Spam SMS Classifier Using Machine Learning Algorithms
收藏 引用
Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA), International Conference on
作者: Bhagyashri Mankar Mohini Wanjari Diksha Gabhane Department of Information Technology Yeshwantrao Chavan College of Engineering (YCCE) Nagpur India Department of Artificial Intelligence and Machine Learning J.D. College of Engineering Nagpur India
Spam via short messaging service (SMS) is becoming more prevalent as spammers use it as a means of reaching their targets. While spam SMS messages can be annoying, they can also be dangerous since they might attempt t... 详细信息
来源: 评论