咨询与建议

限定检索结果

文献类型

  • 2,119 篇 会议
  • 48 篇 期刊文献
  • 28 册 图书

馆藏范围

  • 2,195 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,500 篇 工学
    • 1,133 篇 计算机科学与技术...
    • 655 篇 软件工程
    • 274 篇 电气工程
    • 252 篇 信息与通信工程
    • 141 篇 生物医学工程(可授...
    • 135 篇 控制科学与工程
    • 133 篇 光学工程
    • 104 篇 生物工程
    • 93 篇 机械工程
    • 66 篇 仪器科学与技术
    • 61 篇 电子科学与技术(可...
    • 59 篇 材料科学与工程(可...
    • 55 篇 化学工程与技术
    • 33 篇 建筑学
    • 33 篇 土木工程
    • 24 篇 力学(可授工学、理...
    • 20 篇 安全科学与工程
  • 664 篇 理学
    • 348 篇 数学
    • 207 篇 物理学
    • 177 篇 生物学
    • 95 篇 统计学(可授理学、...
    • 59 篇 化学
    • 33 篇 系统科学
  • 206 篇 管理学
    • 137 篇 图书情报与档案管...
    • 79 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 140 篇 医学
    • 132 篇 临床医学
    • 49 篇 基础医学(可授医学...
    • 31 篇 药学(可授医学、理...
  • 21 篇 法学
    • 21 篇 社会学
  • 20 篇 艺术学
  • 11 篇 教育学
  • 9 篇 经济学
  • 9 篇 农学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 635 篇 pattern recognit...
  • 92 篇 feature extracti...
  • 60 篇 pattern matching
  • 59 篇 local binary pat...
  • 59 篇 neural networks
  • 59 篇 face recognition
  • 54 篇 data mining
  • 41 篇 image segmentati...
  • 40 篇 pattern recognit...
  • 40 篇 machine learning
  • 40 篇 character recogn...
  • 37 篇 shape
  • 36 篇 pattern analysis
  • 35 篇 image processing
  • 34 篇 support vector m...
  • 34 篇 image recognitio...
  • 33 篇 bioinformatics
  • 33 篇 computer vision
  • 32 篇 image analysis
  • 31 篇 artificial intel...

机构

  • 13 篇 national laborat...
  • 6 篇 chinese acad sci...
  • 5 篇 pattern recognit...
  • 5 篇 chinese acad sci...
  • 5 篇 univ windsor sch...
  • 5 篇 university of to...
  • 5 篇 chinese academy ...
  • 4 篇 university colle...
  • 4 篇 pattern recognit...
  • 4 篇 institute of ima...
  • 4 篇 the hebrew unive...
  • 4 篇 the university o...
  • 4 篇 sorbonne univers...
  • 4 篇 eurecom biot
  • 4 篇 national lab of ...
  • 4 篇 key laboratory o...
  • 4 篇 école centrale d...
  • 4 篇 national institu...
  • 4 篇 computer vision ...
  • 3 篇 institute of ima...

作者

  • 11 篇 ngom alioune
  • 9 篇 ma songde
  • 8 篇 li stan z.
  • 8 篇 suen ching y.
  • 6 篇 c.y. suen
  • 6 篇 lei zhen
  • 6 篇 suen c.y.
  • 5 篇 lu hanqing
  • 5 篇 wang wei
  • 5 篇 duin robert p. w...
  • 5 篇 anon
  • 5 篇 liao shengcai
  • 5 篇 kropatsch walter...
  • 4 篇 leo joskowicz
  • 4 篇 li yifeng
  • 4 篇 liu cheng-lin
  • 4 篇 hagras hani
  • 4 篇 diana mateus
  • 4 篇 song de ma
  • 4 篇 maria a. zuluaga

语言

  • 2,122 篇 英文
  • 65 篇 其他
  • 12 篇 中文
检索条件"任意字段=3rd IAPR International Conference on Pattern Recognition in Bioinformatics"
2195 条 记 录,以下是741-750 订阅
排序:
3rd international conference on Theory and Practice of Natural Computing, TPNC 2014
3rd International Conference on Theory and Practice of Natur...
收藏 引用
3rd international conference on the Theory and Practice of Natural Computing, TPNC 2014
The proceedings contain 22 papers. The special focus in this conference is on Theory and Practice of Natural Computing. The topics include: Multi-noisy-objective optimization based on prediction of worst-case performa...
来源: 评论
The damage detection of pressure pipe based on the statistical pattern recognition theory
The damage detection of pressure pipe based on the statistic...
收藏 引用
3rd international conference on Energy and Environmental Protection, ICEEP 2014
作者: Zhao, Su Min He, Wen She Chang, Shuang Mei Cheng, Yu Qiang Lanzhou Jiao Tong University Lanzhou 730070 China
Based on the statistical pattern recognition theory, the AMRA timing analysis methods are used in the article, through the combination of long autoregressive model residuals method and the least squares method the mod... 详细信息
来源: 评论
Application of fuzzy pattern recognition model on the regional water resources carrying capacity evaluation  3
Application of fuzzy pattern recognition model on the region...
收藏 引用
3rd international conference on Civil, Architectural and Hydraulic Engineering, ICCAHE 2014
作者: Wei, Yuan Dong Yu, Xue Feng Li, Ming School of Hydraulic and Electric Engineering Heilongjiang University Harbin China
This article analyses the connotations of water resources carrying capacity and its evaluation method, Selecting 9 main factors as the evaluation indexes, combined with fuzzy pattern recognition model and apply this m... 详细信息
来源: 评论
Integrating evolutionary robotics with 3D printing for rapid fabrication and deployment of a physically-simulated autonomous six articulated-wheeled robot
Integrating evolutionary robotics with 3D printing for rapid...
收藏 引用
international conference on Artificial Intelligence and pattern recognition, AIPR 2014
作者: Lim, S.H. Teo, J. Evolutionary Computing Laboratory Faculty of Computing and Informatics Universiti Malaysia Sabah Kota Kinabalu88450 Malaysia
This paper presented the fabrication of a six articulated-wheeled robot (SAWR) with 3D printing technology. The SAWR is obtained from a evolution process where the morphology of the SAWR is optimized. A single objecti... 详细信息
来源: 评论
3rd international conference on Man-Machine Interactions, ICMMI 2013
3rd International Conference on Man-Machine Interactions, IC...
收藏 引用
3rd international conference on Man-Machine Interactions, ICMMI 2013
The proceedings contain 88 papers. Invited papers. The special focus in this conference is on Human-computer interactions, Robot control, embedded and navigation systems, Bio-data analysis and mining, Biomedical signa...
来源: 评论
Image Vector Classification Algorithm for Hand-Writing Verification  3
Image Vector Classification Algorithm for Hand-Writing Verif...
收藏 引用
3rd international conference on Advances in Computing, Communications and Informatics (ICACCI)
作者: Singh, Tripty Mishra, Shivendra Amrita Vishwa Vidyapetham Sch Engn Bangalore Karnataka India
In this paper, we propose and implement the data mining techniques for verification of hand-writing recorded in an image. The captured images are considered independent of writing material in this system. This system ... 详细信息
来源: 评论
Instance based schema matching framework utilizing google similarity and regular expression  3
Instance based schema matching framework utilizing google si...
收藏 引用
3rd international conference on Data Management Technologies and Applications, DATA 2014
作者: Mehdi, Osama A. Ibrahim, Hamidah Affendey, Lilly Suriani Faculty of Computer Science and Information Technology Serdang43400 Malaysia
Schema matching is the task of identifying correspondences between schema attributes that exist in different schemas. A variety of approaches have been proposed to achieve the main goal of high-quality match results w... 详细信息
来源: 评论
Proceedings of the 3rd ACM SIGSPATIAL international Workshop on Mobile Geographic Information Systems, MobiGIS 2014 - In Conjunction with the 22nd ACM SIGSPATIAL international conference on Advances in Geographic Information Systems, ACM SIGSPATIAL 2014
Proceedings of the 3rd ACM SIGSPATIAL International Workshop...
收藏 引用
3rd ACM SIGSPATIAL international Workshop on Mobile Geographic Information Systems, MobiGIS 2014, Held in Conjunction with the 22nd ACM SIGSPATIAL international conference on Advances in Geographic Information Systems, ACM SIGSPATIAL 2014
The proceedings contain 10 papers. The topics discussed include: finding high-probability mobile photography routes between origin and destination endpoints;effective evacuation route planning algorithms by updating e...
来源: 评论
Biomechanical study of foot force pattern in Hallux Valgus (HV) patients
收藏 引用
5th international conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management, DHM 2014 - Held as Part of 16th international conference on Human-Computer Interaction, HCI international 2014
作者: Eshraghi, Saba Esat, Ibrahim School of Engineering and Design Brunel University of London United Kingdom
Background: Hallux valgus is the angulation of the big toe of more than 15 degrees. Many people during their lives are challenged with this condition. The occurrence is 3 times more in women to men. However one of the... 详细信息
来源: 评论
The Scheme of 3-Level Authentication Mechanism for Preventing Internal Information Leakage
The Scheme of 3-Level Authentication Mechanism for Preventin...
收藏 引用
4th international conference on Digital Information and Communication Technology and it's Applications (DICTAP)
作者: Cheon, Sang-Pil Kang, Jung-Min Park, Min-Woo Eom, Jung-Ho Daejeon Univ Dept Mil Studies Taejon South Korea Sungkyunkwan Univ Dept Elect & Comp Engn Suwon South Korea
In this paper, we proposed 3-level authentication technique to prevent internal information leakage in network system. When system authenticates users, it requires user's ID&P/W firstly. Then, it requires a se... 详细信息
来源: 评论