咨询与建议

限定检索结果

文献类型

  • 3,117 篇 会议
  • 142 册 图书
  • 22 篇 期刊文献

馆藏范围

  • 3,280 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,140 篇 工学
    • 1,954 篇 计算机科学与技术...
    • 1,096 篇 软件工程
    • 404 篇 信息与通信工程
    • 285 篇 电气工程
    • 267 篇 生物工程
    • 217 篇 控制科学与工程
    • 172 篇 生物医学工程(可授...
    • 79 篇 化学工程与技术
    • 73 篇 光学工程
    • 72 篇 机械工程
    • 67 篇 仪器科学与技术
    • 65 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 55 篇 动力工程及工程热...
    • 54 篇 网络空间安全
  • 776 篇 理学
    • 429 篇 数学
    • 295 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 148 篇 物理学
    • 127 篇 系统科学
    • 89 篇 化学
  • 505 篇 管理学
    • 306 篇 图书情报与档案管...
    • 231 篇 管理科学与工程(可...
    • 95 篇 工商管理
  • 218 篇 医学
    • 193 篇 临床医学
    • 125 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
    • 55 篇 公共卫生与预防医...
  • 72 篇 法学
    • 70 篇 社会学
  • 51 篇 教育学
    • 47 篇 教育学
  • 35 篇 经济学
  • 31 篇 农学
  • 6 篇 艺术学
  • 4 篇 军事学
  • 1 篇 文学

主题

  • 568 篇 data mining
  • 543 篇 machine learning
  • 242 篇 pattern recognit...
  • 195 篇 deep learning
  • 174 篇 feature extracti...
  • 154 篇 artificial intel...
  • 153 篇 support vector m...
  • 113 篇 accuracy
  • 113 篇 machine learning...
  • 110 篇 training
  • 93 篇 data models
  • 80 篇 neural networks
  • 78 篇 data mining and ...
  • 65 篇 classification
  • 62 篇 sentiment analys...
  • 61 篇 classification a...
  • 59 篇 big data
  • 57 篇 predictive model...
  • 50 篇 face recognition
  • 48 篇 prediction algor...

机构

  • 7 篇 maharishi school...
  • 6 篇 guangdong univer...
  • 5 篇 galgotias univer...
  • 5 篇 centre of interd...
  • 5 篇 pune
  • 5 篇 chitkara univers...
  • 5 篇 king fahd univer...
  • 5 篇 uttaranchal univ...
  • 5 篇 uttaranchal inst...
  • 5 篇 institute of aut...
  • 4 篇 indian institute...
  • 4 篇 shanghai jiao to...
  • 4 篇 chitkara univers...
  • 4 篇 school of inform...
  • 4 篇 indian statistic...
  • 4 篇 south china univ...
  • 4 篇 zhejiang univers...
  • 4 篇 maharishi school...
  • 4 篇 department of cs...
  • 4 篇 university of ca...

作者

  • 9 篇 de-shuang huang
  • 7 篇 coenen frans
  • 7 篇 venkatesh svetha
  • 7 篇 petra perner
  • 7 篇 tianrui li
  • 6 篇 ryszard tadeusie...
  • 6 篇 marcin korytkows...
  • 6 篇 jacek m. zurada
  • 6 篇 krasotkina olga
  • 6 篇 lotfi a. zadeh
  • 6 篇 mottl vadim
  • 6 篇 leszek rutkowski
  • 5 篇 vitoantonio bevi...
  • 5 篇 sankar k. pal
  • 4 篇 waiyamai kitsana
  • 4 篇 sozo inoue
  • 4 篇 sergei o. kuznet...
  • 4 篇 duoqian miao
  • 4 篇 shengli xie
  • 4 篇 hepu deng

语言

  • 2,835 篇 英文
  • 436 篇 其他
  • 45 篇 中文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Machine Learning and Data Mining in Pattern Recognition"
3281 条 记 录,以下是2521-2530 订阅
排序:
Multimodal learning analytics  13
Multimodal learning analytics
收藏 引用
3rd international conference on learning Analytics and Knowledge, LAK 2013
作者: Blikstein, Paulo Stanford University Graduate School of Education and Computer Science 520 Galvez Mall CERAS 232 Stanford CA 94305 United States
New high-frequency data collection technologies and machine learning analysis techniques could offer new insights into learning, especially in tasks in which students have ample space to generate unique, personalized ... 详细信息
来源: 评论
An Ubiquitous Domain Driven data mining Approach For Performance Monitoring in Virtual Organizations Using 360 Degree data mining & Opinion mining
An Ubiquitous Domain Driven Data Mining Approach For Perform...
收藏 引用
international conference on pattern recognition, Informatics and Mobile Engineering (PRIME)
作者: Suriyakumari, V. Kathiravan, A. Vijaya Periyar Univ Salem India Govt Arts Coll Autonomous Salem India
Performance evaluation in virtual organizations is one of the most important issues that have been considered due to the transition from industrial age to knowledge era. Virtual organizations, as one of the challenges... 详细信息
来源: 评论
ZhiWo: Activity tagging and recognition system for personal lifelogs  13
ZhiWo: Activity tagging and recognition system for personal ...
收藏 引用
3rd ACM international conference on Multimedia Retrieval, ICMR 2013
作者: Zhou, Lijuan Marissa Gurrin, Cathal Qiu, Zhengwei CLARITY School of Computing Dublin City University Collins Avenue Glasnevin Dublin 9 Dublin Ireland
With the increasing use of mobile devices as personal recording, communication and sensing tools, extracting the semantics of life activities through sensed data (photos, accelerometer, GPS etc.) is gaining widespread... 详细信息
来源: 评论
Interpreting data mining results with linked data for learning analytics: Motivation, case study and directions  13
Interpreting data mining results with linked data for learni...
收藏 引用
3rd international conference on learning Analytics and Knowledge, LAK 2013
作者: D'Aquin, Mathieu Jay, Nicolas Knowledge Media Institute Open University Walton Hall Milton Keynes MK7 6AA United Kingdom Université de Lorraine LORIA UMR 7503 Vandœvre-lès-Nancy F-54506 France
learning Analytics by nature relies on computational information processing activities intended to extract from raw data some interesting aspects that can be used to obtain insights into the behaviours of learners, th... 详细信息
来源: 评论
A Push Strategy for delivering of learning Objects using meta data based association analysis (FP-Tree)
A Push Strategy for delivering of Learning Objects using met...
收藏 引用
3rd international conference on Computer Communication and Informatics (ICCCI)
作者: Sabitha, A. Sai Mehrotra, Deepti Amity Univ Dept CS ASET Noida Uttar Pradesh India ASCS Noida Uttar Pradesh India
learning Materials are structured as learning Objects and are available in learning Object Repository(LOR) which are used in various courses of an Elearning environment. learning Management System aggregates these obj... 详细信息
来源: 评论
Proceedings - 2013 3rd international conference on Advanced Computing and Communication Technologies, ACCT 2013
Proceedings - 2013 3rd International Conference on Advanced ...
收藏 引用
2013 3rd international conference on Advanced Computing and Communication Technologies, ACCT 2013
The proceedings contain 68 papers. The topics discussed include: component criticality approach towards minimizing the risks of system failure;analysis of the techniques for software cost estimation;estimating of soft...
来源: 评论
A New SAFR Tool for Face recognition Using EGV-LBP-CMI-LDA Wrapped with Secured DWT Based Steganography
A New SAFR Tool for Face Recognition Using EGV-LBP-CMI-LDA W...
收藏 引用
3rd IEEE international Advance Computing conference (IACC)
作者: Jhodge, Shami Chiddarwar, Girija Shinde, Gitanjali Sinhgad Coll Management Dept MCA Pune Maharashtra India Sinhgad Coll Engn Dept Comp Engn Pune Maharashtra India SKN Coll Engn Dept Comp Engn Pune Maharashtra India
Face recognition technique nowadays is emerging as the most significant and challenging aspects in terms of security for identification of images in various fields viz. banking, police records, biometric etc. other th... 详细信息
来源: 评论
learning model rules from high-speed data streams  3
Learning model rules from high-speed data streams
收藏 引用
3rd Workshop on Ubiquitous data mining, UDM 2013 - Co-located with the 23rd international Joint conference on Artificial Intelligence, IJCAI 2013
作者: Almeida, Ezilda Ferreira, Carlos Gama, João LIAAD INESC Porto L.A. Portugal
Decision rules are one of the most expressive languages for machine learning. In this paper we present Adaptive Model Rules (AMRules), the first streaming rule learning algorithm for regression problems. In AMRules th... 详细信息
来源: 评论
Evaluating the Effects of Textual Features on Authorship Attribution Accuracy
Evaluating the Effects of Textual Features on Authorship Att...
收藏 引用
3rd international conference on Computer and Knowledge Engineering (ICCKE)
作者: Ramezani, Reza Sheydaei, Navid Kahani, Mohsen Ferdowsi Univ Mashhad Dept Comp Engn DDEmS Lab Mashhad Iran Isfahan Univ Technol DM Lab Esfahan Iran
Authorship attribution (AA) or author identification refers to the problem of identifying the author of an unseen text. From the machine learning point of view, AA can be viewed as a multiclass, single-label text-cate... 详细信息
来源: 评论
Network traffic anomaly detection based on growing hierarchical SOM
Network traffic anomaly detection based on growing hierarchi...
收藏 引用
43rd Annual IEEE/IFIP international conference on Dependable Systems and Networks (DSN)
作者: Huang, Shin-Ying Huang, Yen-Nun Acad Sinica Res Ctr Informat Technol Innovat Taipei 115 Taiwan
Network anomaly detection aims to detect patterns in a given network traffic data that do not conform to an established normal behavior. Distinguishing different anomaly patterns from large amount of data can be a cha... 详细信息
来源: 评论