咨询与建议

限定检索结果

文献类型

  • 3,117 篇 会议
  • 141 册 图书
  • 24 篇 期刊文献

馆藏范围

  • 3,281 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,141 篇 工学
    • 1,954 篇 计算机科学与技术...
    • 1,095 篇 软件工程
    • 405 篇 信息与通信工程
    • 287 篇 电气工程
    • 267 篇 生物工程
    • 217 篇 控制科学与工程
    • 172 篇 生物医学工程(可授...
    • 79 篇 化学工程与技术
    • 73 篇 光学工程
    • 72 篇 机械工程
    • 68 篇 仪器科学与技术
    • 65 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 55 篇 动力工程及工程热...
    • 54 篇 网络空间安全
  • 777 篇 理学
    • 430 篇 数学
    • 296 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 147 篇 物理学
    • 127 篇 系统科学
    • 90 篇 化学
  • 505 篇 管理学
    • 306 篇 图书情报与档案管...
    • 231 篇 管理科学与工程(可...
    • 95 篇 工商管理
  • 218 篇 医学
    • 193 篇 临床医学
    • 125 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
    • 55 篇 公共卫生与预防医...
  • 72 篇 法学
    • 70 篇 社会学
  • 52 篇 教育学
    • 47 篇 教育学
  • 35 篇 经济学
  • 31 篇 农学
  • 6 篇 艺术学
  • 4 篇 军事学
  • 1 篇 文学

主题

  • 568 篇 data mining
  • 542 篇 machine learning
  • 241 篇 pattern recognit...
  • 195 篇 deep learning
  • 174 篇 feature extracti...
  • 154 篇 artificial intel...
  • 153 篇 support vector m...
  • 113 篇 accuracy
  • 113 篇 machine learning...
  • 111 篇 training
  • 93 篇 data models
  • 80 篇 neural networks
  • 77 篇 data mining and ...
  • 65 篇 classification
  • 62 篇 sentiment analys...
  • 61 篇 classification a...
  • 59 篇 big data
  • 57 篇 predictive model...
  • 50 篇 face recognition
  • 48 篇 prediction algor...

机构

  • 7 篇 maharishi school...
  • 6 篇 guangdong univer...
  • 5 篇 galgotias univer...
  • 5 篇 centre of interd...
  • 5 篇 pune
  • 5 篇 chitkara univers...
  • 5 篇 uttaranchal univ...
  • 5 篇 uttaranchal inst...
  • 5 篇 institute of aut...
  • 4 篇 shanghai jiao to...
  • 4 篇 chitkara univers...
  • 4 篇 school of inform...
  • 4 篇 indian statistic...
  • 4 篇 south china univ...
  • 4 篇 zhejiang univers...
  • 4 篇 maharishi school...
  • 4 篇 department of cs...
  • 4 篇 university of ca...
  • 4 篇 school of comput...
  • 4 篇 department of co...

作者

  • 9 篇 de-shuang huang
  • 7 篇 coenen frans
  • 7 篇 venkatesh svetha
  • 7 篇 petra perner
  • 7 篇 tianrui li
  • 6 篇 ryszard tadeusie...
  • 6 篇 marcin korytkows...
  • 6 篇 jacek m. zurada
  • 6 篇 krasotkina olga
  • 6 篇 lotfi a. zadeh
  • 6 篇 mottl vadim
  • 6 篇 leszek rutkowski
  • 5 篇 vitoantonio bevi...
  • 5 篇 sankar k. pal
  • 4 篇 waiyamai kitsana
  • 4 篇 sozo inoue
  • 4 篇 sergei o. kuznet...
  • 4 篇 duoqian miao
  • 4 篇 shengli xie
  • 4 篇 hepu deng

语言

  • 3,063 篇 英文
  • 209 篇 其他
  • 38 篇 中文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Machine Learning and Data Mining in Pattern Recognition"
3282 条 记 录,以下是2711-2720 订阅
排序:
A new machine learning tool for mining brain stroke data
A new machine learning tool for mining brain stroke data
收藏 引用
conference on Human System Interactions, HSI
作者: Teresa Mroczek Jerzy W. Grzymała-Busse Zdzisław S. Hippe Department of Expert Systems and Artificial Intelligence University of Information Technology and Management Rzeszow Poland Department of Electrical Engineering and Computer Science University of Kansas Lawrence KS USA
This paper contains a brief description of a new computer programming tool for supervised machine learning, designed to generate production rules from data. The research tool described - named NGTS - was used for pred... 详细信息
来源: 评论
mining Acute Inflammations of urinary system using GAJA2: A new data mining algorithm
Mining Acute Inflammations of urinary system using GAJA2: A ...
收藏 引用
international conference on Computer Science and Information Technology (CSIT)
作者: Suwimon Kooptiwoot Faculty of Science and Technology Suan Sunandha Rajabhat University Bangkok Thailand
Medical data mining is so challenging. In this paper, we propose a new data mining algorithm called GAJA2, which is a derivation of GAJA [1]. We apply GAJA2 to mine Acute Inflammations data set, a medical data set got... 详细信息
来源: 评论
On Performing Classification Using SVM with Radial Basis and Polynomial Kernel Functions
On Performing Classification Using SVM with Radial Basis and...
收藏 引用
international conference on Emerging Trends in Engineering and Technology, ICETET
作者: Gend Lal Prajapati Arti Patle Department of Computer Science & Engineering Swami Vivekanand College of Engineering Indore India Institute of Engineering & Technology Devi Ahilya University Indore India
Support Vector machines, a new generation learning system based on recent advances in statistical learning theory deliver state-of-the-art performance in real-world applications such as text categorization, hand-writt... 详细信息
来源: 评论
A Convolution Theorem for the Two Dimensional Fractional Fourier Transform in Generalized Sense
A Convolution Theorem for the Two Dimensional Fractional Fou...
收藏 引用
international conference on Emerging Trends in Engineering and Technology, ICETET
作者: Vidya D. Sharma P.B. Deshmukh Department Mathematics IBSS College of Engineering Amravati Maharashtra India
The two dimensional fractional Fourier transform (FrFT), which is a generalization of the Fourier transform, has many applications in several areas including signal processing and optics. Signal processing and pattern... 详细信息
来源: 评论
A novel rule-based Intrusion Detection System using data mining
A novel rule-based Intrusion Detection System using data min...
收藏 引用
international conference on Computer Science and Information Technology (CSIT)
作者: Lei Li De-Zhang Yang Fang-Cheng Shen School of Automation Nanjing University of Posts and Telecommunications Nanjing China
Network security is becoming an increasingly important issue, since the rapid development of the Internet. Network Intrusion Detection System (IDS), as the main security defending technique, is widely used against suc... 详细信息
来源: 评论
Human action recognition using 4W1H and Particle Swarm Optimization Clustering
Human action recognition using 4W1H and Particle Swarm Optim...
收藏 引用
conference on Human System Interactions, HSI
作者: Leon Palafox Hideki Hashimoto Institute of Industrial Science University of Tokyo Tokyo Japan
Tracking and recording human activities have been a major interest in the iSpace, for this purpose different recognition and clustering techniques have been used, like using a learning Classifier System and data Minin... 详细信息
来源: 评论
Conceptual Mapping of Risk Management to data mining
Conceptual Mapping of Risk Management to Data Mining
收藏 引用
international conference on Emerging Trends in Engineering and Technology, ICETET
作者: Terence Johnson Department of Information Technology Padre Conceicao College of Engineering Goa India
Risk Management is a logical and systematic method of identifying, analyzing, treating and monitoring the risks involved in any activity or process. The key to successful risk management lies in the ability to tailor ...
来源: 评论
Spectral clustering algorithm based on adaptive neighbor distance sort order
Spectral clustering algorithm based on adaptive neighbor dis...
收藏 引用
international conference on Information Sciences and Interaction Sciences (ICIS)
作者: Yifei Zhang Junlin Zhou Yan Fu School of Software University of Electronic Science and Technology Chengdu China
Spectral clustering has been widely used in data mining in the past years. The performance of spectral clustering is very sensitive to the selection of scale parameter. Especially, when data has multi-scale it is very... 详细信息
来源: 评论
Constraint-based semi-supervised dimensionality reduction with conflict detection
Constraint-based semi-supervised dimensionality reduction wi...
收藏 引用
international conference on BioMedical Engineering and Informatics (BMEI)
作者: Binhui Chen Qingyuan Bai School of Mathematics and Computer Science Fuzhou University Fuzhou China
Most existing typical semi-supervised learning algorithms focused on the results of learning while facing the conflict on constraints. And most solutions use unsupervised distance-based methods to adjust the conflicti... 详细信息
来源: 评论
Border Security: Supplementing Human Intelligence in a Sensor Network Using Sequential pattern mining
Border Security: Supplementing Human Intelligence in a Senso...
收藏 引用
international conference on Human-Centric Computing (HumanCom)
作者: Anirudh Kondaveeti George Runger Jeremy Rowe Huan Liu School of Computing Informatics and Decision Systems Engineering Arizona State University USA
Sensors are being deployed to improve border security generating enormous collections of data and databases. Unfortunately these sensors can respond to a variety of stimuli, sometimes reacting to meaningful events and... 详细信息
来源: 评论