咨询与建议

限定检索结果

文献类型

  • 3,079 篇 会议
  • 24 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 3,120 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,107 篇 工学
    • 1,924 篇 计算机科学与技术...
    • 1,068 篇 软件工程
    • 399 篇 信息与通信工程
    • 285 篇 电气工程
    • 265 篇 生物工程
    • 215 篇 控制科学与工程
    • 170 篇 生物医学工程(可授...
    • 79 篇 化学工程与技术
    • 72 篇 机械工程
    • 69 篇 光学工程
    • 68 篇 仪器科学与技术
    • 63 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 55 篇 动力工程及工程热...
    • 53 篇 网络空间安全
  • 760 篇 理学
    • 424 篇 数学
    • 291 篇 生物学
    • 148 篇 统计学(可授理学、...
    • 140 篇 物理学
    • 127 篇 系统科学
    • 90 篇 化学
  • 499 篇 管理学
    • 301 篇 图书情报与档案管...
    • 229 篇 管理科学与工程(可...
    • 93 篇 工商管理
  • 216 篇 医学
    • 191 篇 临床医学
    • 123 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
    • 53 篇 公共卫生与预防医...
  • 70 篇 法学
    • 68 篇 社会学
  • 51 篇 教育学
    • 46 篇 教育学
  • 35 篇 经济学
  • 30 篇 农学
  • 6 篇 艺术学
  • 4 篇 军事学
  • 1 篇 文学

主题

  • 568 篇 data mining
  • 526 篇 machine learning
  • 185 篇 pattern recognit...
  • 184 篇 deep learning
  • 173 篇 feature extracti...
  • 152 篇 support vector m...
  • 113 篇 accuracy
  • 113 篇 machine learning...
  • 111 篇 training
  • 93 篇 data models
  • 80 篇 neural networks
  • 65 篇 classification
  • 62 篇 sentiment analys...
  • 61 篇 classification a...
  • 59 篇 big data
  • 57 篇 predictive model...
  • 50 篇 face recognition
  • 48 篇 prediction algor...
  • 46 篇 artificial intel...
  • 45 篇 learning systems

机构

  • 7 篇 maharishi school...
  • 5 篇 centre of interd...
  • 5 篇 chitkara univers...
  • 5 篇 uttaranchal univ...
  • 5 篇 uttaranchal inst...
  • 4 篇 chitkara univers...
  • 4 篇 galgotias univer...
  • 4 篇 maharishi school...
  • 4 篇 department of cs...
  • 4 篇 pune
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 university of el...
  • 4 篇 department of sc...
  • 4 篇 school of comput...
  • 4 篇 college of techn...
  • 3 篇 china electric p...
  • 3 篇 centre for patte...
  • 3 篇 karnataka bangal...
  • 3 篇 department of sc...

作者

  • 7 篇 coenen frans
  • 7 篇 venkatesh svetha
  • 6 篇 krasotkina olga
  • 6 篇 mottl vadim
  • 4 篇 waiyamai kitsana
  • 4 篇 sozo inoue
  • 4 篇 phung dinh
  • 4 篇 suen ching y.
  • 4 篇 ceci michelangel...
  • 4 篇 kamel mohamed s.
  • 4 篇 yang jie
  • 3 篇 zhang tao
  • 3 篇 malerba donato
  • 3 篇 guidotti riccard...
  • 3 篇 de lope javier
  • 3 篇 gupta sunil
  • 3 篇 chadha raman
  • 3 篇 sattar abdus
  • 3 篇 kapil joshi
  • 3 篇 ahmed masud

语言

  • 2,982 篇 英文
  • 129 篇 其他
  • 32 篇 中文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Machine Learning and Data Mining in Pattern Recognition"
3121 条 记 录,以下是181-190 订阅
排序:
Implementation of Extreme learning machine and Software as a Service for recognition of Tamil Handwritten words  3
Implementation of Extreme Learning Machine and Software as a...
收藏 引用
3rd international conference on Secure Cyber Computing and Communications, ICSCCC 2023
作者: Naveen, P. Nithyasai, S. Nataraj, B. Sri Eshwar College of Engineering Ece Department Coimbatore India Kathir College of Engineering Ece Department Coimbatore India Sri Ramakrishna College of Engg Ece Department Coimbatore India
The conventional cloud computing paradigm has spurred the development of innovative architectures for next-generation cloud computing. These novel designs can effectively manage vast amounts of data, which was previou... 详细信息
来源: 评论
Identification Method of Dress pattern Drawing based on machine Vision Algorithm  3
Identification Method of Dress Pattern Drawing based on Mach...
收藏 引用
3rd international conference on Computer Vision, Image and Deep learning and international conference on Computer Engineering and Applications, CVIDL and ICCEA 2022
作者: Lyu, Ke Yan, Haizhang Zhejiang Sci-Tech University School of International Education Zhejiang310000 China Xidian University School of Computer Science and Technology Xi'an71000 China
This paper uses the machine vision method to identify the skirt module. We have constructed three kinds of machine recognition models of skirt profile processing, structure analysis of style drawing, and size estimati... 详细信息
来源: 评论
machine learning Strategies in Quantum-Resistant Network Security Protocols  3
Machine Learning Strategies in Quantum-Resistant Network Sec...
收藏 引用
3rd IEEE international conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Dhote, Vijay Sadim, Mohd Tanna, Paresh Tiwari, Annapurna Nand Ies College of Technology Department of Computer Science & Engineering Madhya Pradesh Bhopal462044 India Ies University Department of Computer Science & Engineering Madhya Pradesh Bhopal462044 India Computer Engineering Rk University India Ies College of Technology Department of Electronics & Communication Engineering Madhya Pradesh Bhopal462044 India
The cryptographic techniques that underpin current network security standards run the risk of becoming outdated due to the advancement of quantum computing. Researchers and industry professionals are working to create... 详细信息
来源: 评论
Predicting Course Grades for Students Using machine learning: Determine Early Prediction Time  3rd
Predicting Course Grades for Students Using Machine Learning...
收藏 引用
3rd international conference on Advances in Information and Communication Technology, ICTA 2024
作者: Nguyen, Thi Hong Bui, Quang Vinh Nguyen, Viet Anh Do, Trung Kien Hanoi National University of Education Hanoi Viet Nam VNU University of Engineering and Technology Hanoi Viet Nam
Predicting learning outcomes (LO) is an important problem in educational data mining (EDM). Despite extensive research, there remains a gap in determining the optimal timing for predicting early LO with acceptable acc... 详细信息
来源: 评论
The Design and Implementation of AI Based Smart Notice Board Using Advanced machine learning and Image Processing Techniques  3
The Design and Implementation of AI Based Smart Notice Board...
收藏 引用
3rd international conference on Advancement in Electrical and Electronic Engineering, ICAEEE 2024
作者: Islam, Md. Muhaiminul Hossain, Md. Rakib Akter, Farzana Barman, Bhakti Kusum Malakar, Shuvo Rajshahi University of Engineering & Technology Department of Electronics & Telecommunication Engineering Rajshahi6204 Bangladesh
In contemporary society, conventional notice boards encounter challenges in terms of accessibility and engagement, especially within educational institutions where effective information dissemination is vital. By impl... 详细信息
来源: 评论
Attack Detection System for Cloud-Based Wireless Sensor Networks Using the Proposed Fast Hyper Deep learning Model  3rd
Attack Detection System for Cloud-Based Wireless Sensor Netw...
收藏 引用
3rd international conference on machine learning, Cloud Computing and Intelligent mining, MLCCIM 2024
作者: Saleh, Hadeel M. Marouane, Hend Fakhfakh, Ahmed NTS’COM Laboratory Safax University Sfax Tunisia Continuing Education Center University of Anbar Ramadi Iraq University of Sfax Sfax Tunisia
Cyber security requires detecting and stopping wireless sensor network attacks. We introduce a fast super deep learning model for cloud-based WSN attack detection in this research. Our offline approach divides data in... 详细信息
来源: 评论
EngageDat-vL: A Multimodal Engagement dataset Comprising of Emotional, Cognitive, and Behavioral Cues in Virtual learning Environment  10th
EngageDat-vL: A Multimodal Engagement Dataset Comprising of ...
收藏 引用
10th Biennial international conference on pattern recognition and machine Intelligence (PReMI)
作者: Akre, Sarthak Palandurkar, Nilesh Iyengar, Akshat Chayande, Gourav Kumar, Praveen Visvesvaraya Natl Inst Technol South Ambazari Rd Nagpur 440010 Maharashtra India
To assess student engagement in an e-learning environment, this work proposes a novel learning analytics dataset collection that combines emotional, cognitive, and behavioral data. The dataset includes facial expressi... 详细信息
来源: 评论
Research and implementation of fingerprint erasure technology for videos based on Google MediaPipe  3
Research and implementation of fingerprint erasure technolog...
收藏 引用
3rd international conference on Computer Vision and data mining, ICCVDM 2022
作者: Zhang, Tao Liu, Hongying Nanjing University of Science & Technology Zijin College Wenlan Rd. 89 Nanjing210033 China
Fingerprints are used in many fields as important biological data of people. As one of people's important personal privacy, fingerprints are also prone to leakage. Images and videos posted on social media are invi... 详细信息
来源: 评论
Integrating IoT and machine learning for Enhanced Forest Fire Detection and Temperature Monitoring  3
Integrating IoT and Machine Learning for Enhanced Forest Fir...
收藏 引用
3rd international conference on Innovative Mechanisms for Industry Applications, ICIMIA 2023
作者: Varun, M. Kesavraj, K. Suman, S. Raj, X Suman Saveetha Engineering College Department of ECE Tamilnadu Chennai India
Forest fires have become more frequent and intense in recent years, which has caused serious problems for public safety and environmental preservation. In the situation, combining Internet of Things (IoT) devices with... 详细信息
来源: 评论
A Review on EMG-based pattern Identification Methods for Effective Controlling of Hand Prostheses  3
A Review on EMG-based Pattern Identification Methods for Eff...
收藏 引用
3rd international conference on Innovative Mechanisms for Industry Applications, ICIMIA 2023
作者: Ramkumar, S. Rema, Dhanusha Devi, T. Archana Elavarasi, K. Selvaganapathi, T. Gokila, S. Department of Computer Science Bangalore India Karpagam Academy of Higher Education Department of Food Technology Coimbatore India Karpagam Academy of Higher Education Department of Electrical and Electronics Engineering Coimbatore India Karpagam Institute of Technology Department of CSE Coimbatore India
The ability of amputees to do daily duties is significantly restricted by upper limb amputation. The myoelectric prosthesis uses impulses from the surviving muscles in the stump to gradually restore function to such s... 详细信息
来源: 评论