咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 21 篇 会议

馆藏范围

  • 51 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 27 篇 计算机科学与技术...
    • 19 篇 电气工程
    • 12 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 4 篇 软件工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 测绘科学与技术
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
  • 17 篇 理学
    • 5 篇 生物学
    • 4 篇 物理学
    • 2 篇 数学
    • 2 篇 化学
    • 2 篇 地球物理学
    • 1 篇 地理学
    • 1 篇 大气科学
    • 1 篇 海洋科学
    • 1 篇 系统科学
  • 4 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 2 篇 农学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 51 篇 unsupervised alg...
  • 7 篇 supervised algor...
  • 5 篇 anomaly detectio...
  • 3 篇 clustering
  • 3 篇 machine learning
  • 2 篇 meeting segmenta...
  • 2 篇 yolov4
  • 2 篇 acoustic feature...
  • 2 篇 transfer learnin...
  • 2 篇 mooc
  • 2 篇 performance metr...
  • 2 篇 cross domain det...
  • 2 篇 summary keyword ...
  • 2 篇 learners
  • 2 篇 classification
  • 2 篇 k-means
  • 2 篇 funtion segmenta...
  • 2 篇 ile
  • 2 篇 cyclegan
  • 2 篇 unsupervised lea...

机构

  • 2 篇 hunan elect powe...
  • 2 篇 cent south univ ...
  • 2 篇 ibn tofail univ ...
  • 2 篇 sharif univ tech...
  • 2 篇 department of co...
  • 2 篇 hunan key lab in...
  • 1 篇 city univ hong k...
  • 1 篇 tata consultancy...
  • 1 篇 nanyang technol ...
  • 1 篇 univ bristol sch...
  • 1 篇 chinese acad sci...
  • 1 篇 widyatma univ ba...
  • 1 篇 inst natl sci ap...
  • 1 篇 xinjiang med uni...
  • 1 篇 sidi mohamed ben...
  • 1 篇 shanghai jiao to...
  • 1 篇 univ beira inter...
  • 1 篇 univ chinese aca...
  • 1 篇 inserm f-69008 l...
  • 1 篇 peking univ hosp...

作者

  • 2 篇 liu yang
  • 2 篇 zhang shigeng
  • 2 篇 bokaei mohammad ...
  • 2 篇 xie yiman
  • 2 篇 yiu siu ming
  • 2 篇 yu long
  • 2 篇 wang weiping
  • 2 篇 tan xiao
  • 2 篇 rochdi youssef
  • 2 篇 ouali yassine
  • 2 篇 sameti hossein
  • 2 篇 sun yizhen
  • 1 篇 cooper ashley
  • 1 篇 li xinyue
  • 1 篇 kostov yordan
  • 1 篇 gu dongbing
  • 1 篇 corneyllie alexa...
  • 1 篇 tian shengwei
  • 1 篇 li xin
  • 1 篇 libourel paul-an...

语言

  • 48 篇 英文
  • 3 篇 其他
检索条件"主题词=Unsupervised algorithm"
51 条 记 录,以下是21-30 订阅
排序:
Post Mergers and Acquisitions Integration Solution using Machine Learning  19
Post Mergers and Acquisitions Integration Solution using Mac...
收藏 引用
19th IEEE-India-Council International Conference (INDICON)
作者: Maan, Jitendra Nagwekar, Riddhi Jayraj Tata Consultancy Serv EGG S&S Serv Gurgaon India Tata Consultancy Serv EGG S&S Serv Pune Maharashtra India
With the rapidly transforming digital world, various smart platforms/Post M&A Integration solutions are being utilized to accelerate the transition process of M&A activities. But the procedures include conside... 详细信息
来源: 评论
Attack Detection in Smart Home IoT Networks using CluStream and Page-Hinkley Test
Attack Detection in Smart Home IoT Networks using CluStream ...
收藏 引用
IEEE Latin-American Conference on Communications (LATINCOM)
作者: Nakagawa, Fernando H. Y. Barbon Junior, Sylvio Zarpelao, Bruno Bogaz Univ Estadual Londrina Dept Comp Sci Londrina Parana Brazil
The expansion of IoT device networks increases the demand for security systems that detect attacks against these new targets. These devices have simple hardware, limited memory and processing power, and often are requ... 详细信息
来源: 评论
Dynamic real-time abnormal energy consumption detection and energy efficiency optimization analysis considering uncertainty
收藏 引用
APPLIED ENERGY 2022年 307卷 118314-118314页
作者: Yin, Sihua Yang, Haidong Xu, Kangkang Zhu, Chengjiu Zhang, Shaqing Liu, Guosheng Guangdong Univ Technol Guangdong Engn Res Ctr Green Mfg & Energy Efficie Guangzhou 510006 Guangdong Peoples R China Guangdong Univ Technol Sch Management Guangzhou 510006 Guangdong Peoples R China
Uncertain working conditions will lead to abnormal energy consumption and energy loss of high energy consumption machines. Therefore, it is necessary to detect abnormal energy consumption data, which is designed to op... 详细信息
来源: 评论
Cross Different Time Periods Detection algorithm based on YOLOv4  40
Cross Different Time Periods Detection Algorithm based on YO...
收藏 引用
40th Chinese Control Conference (CCC)
作者: Fan, Jiaqi Huo, Tianjiao Wei, Zhenqi Wang, Jiachen Li, Xin Gao, Bingzhao Jilin Univ State Key Lab Automot Simulat & Control Changchun 130025 Peoples R China Jilin Univ Coll Comp Sci & Technol Changchun 130012 Peoples R China Tongji Univ Clean Energy Automot Engn Ctr Shanghai 201804 Peoples R China
With the development of autonomous driving vehicle target detection technology, multi-target detection in complex environment has gradually become the focus of attention. In this paper, based on the YOLOv4 algorithm, ... 详细信息
来源: 评论
YAKE! Keyword extraction from single documents using multiple local features
收藏 引用
INFORMATION SCIENCES 2020年 509卷 257-289页
作者: Campos, Ricardo Mangaravite, Vitor Pasquali, Arian Jorge, Alipio Nunes, Celia Jatowt, Adam Polytech Inst Tomar Ci2 Smart Cities Res Ctr Tomar Portugal Univ Porto FCUP Porto Portugal Univ Beira Interior Dept Math Covilha Portugal Kyoto Univ Grad Sch Informat Kyoto Japan INESC TEC INESC Technol & Sci LIAAD Porto Portugal Univ Beira Interior Ctr Math & Applicat Covilha Portugal Univ Fed Minas Gerais Belo Horizonte MG Brazil
As the amount of generated information grows, reading and summarizing texts of large collections turns into a challenging task. Many documents do not come with descriptive terms, thus requiring humans to generate keyw... 详细信息
来源: 评论
Toward a hybrid machine learning approach for extracting and clustering learners' behaviours in adaptive educational system
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTING SCIENCE AND MATHEMATICS 2020年 第2期12卷 117-131页
作者: El Aissaoui, Ouafae El Madani, Yasser El Alami Oughdir, Lahcen Dakkak, Ahmed El Allioui, Youssouf Sidi Mohamed Ben Abdellah Univ FPT LSI Fes Morocco Mohammed V Univ ENSIAS Rabat Morocco Hassan First Univ FPK LS3M Khouribga Morocco
The learning style is a vital learner's characteristic that must be considered while recommending learning materials. In this paper we have proposed an approach to identify learning styles automatically. The first... 详细信息
来源: 评论
Habituation as a neural algorithm for online odor discrimination
收藏 引用
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA 2020年 第22期117卷 12402-12410页
作者: Shen, Yang Dasgupta, Sanjoy Navlakha, Saket Cold Spring Harbor Lab Simons Ctr Quantitat Biol POB 100 Cold Spring Harbor NY 11724 USA Univ Calif San Diego Comp Sci & Engn Dept La Jolla CA 92093 USA
Habituation is a form of simple memory that suppresses neural activity in response to repeated, neutral stimuli. This process is critical in helping organisms guide attention toward the most salient and novel features... 详细信息
来源: 评论
WSAD: An unsupervised Web Session Anomaly Detection Method  16
WSAD: An Unsupervised Web Session Anomaly Detection Method
收藏 引用
16th IEEE International Conference on Mobility, Sensing and Networking (MSN)
作者: Sun, Yizhen Xie, Yiman Wang, Weiping Zhang, Shigeng Gao, Jun Chen, Yating Hunan Elect Power Corp State Grid Informat & Commun Co Changsha Peoples R China Cent South Univ Sch Comp Sci & Engn Changsha Peoples R China Hunan Key Lab Internet Things Elect Changsha Peoples R China
Web servers in the Internet are vulnerable to Web attacks, to detect Web attacks, a commonly used method is to detect anomalies in the request parameters by making regular-expression-based matching rules for the param... 详细信息
来源: 评论
RPAD: An unsupervised HTTP Request Parameter Anomaly Detection Method  19
RPAD: An Unsupervised HTTP Request Parameter Anomaly Detecti...
收藏 引用
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Sun, Yizhen Xie, Yiman Wang, Weiping Zhang, Shigeng Wu, Yuxi Feng, Jingchuan Hunan Elect Power Corp State Grid Informat & Commun Co Changsha Hunan Peoples R China Cent South Univ Sch Comp Sci & Engn Changsha Hunan Peoples R China Hunan Key Lab Internet Things Elect Changsha Hunan Peoples R China
Web servers in the Internet are vulnerable to Web attacks. A general way to launch Web attacks is to carry attack payloads in HTTP request parameters, e.g. SQL Injection and XSS attacks. To detect Web attacks, a commo... 详细信息
来源: 评论
Cross Different Time Periods Detection algorithm based on YOLOv4
Cross Different Time Periods Detection Algorithm based on YO...
收藏 引用
第40届中国控制会议
作者: Jiaqi Fan Tianjiao Huo Zhenqi Wei Jiachen Wang Xin Li Bingzhao Gao State Key Laboratory of Automotive Simulation and Control Jilin University College of Computer Science and Technology Jilin University Clean Energy Automotive Engineering Center Tongji University
With the development of autonomous driving vehicle target detection technology, multi-target detection in complex environment has gradually become the focus of attention. In this paper, based on the YOLOv4 algorithm, ... 详细信息
来源: 评论