咨询与建议

限定检索结果

文献类型

  • 3,117 篇 会议
  • 141 册 图书
  • 24 篇 期刊文献

馆藏范围

  • 3,281 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,141 篇 工学
    • 1,954 篇 计算机科学与技术...
    • 1,095 篇 软件工程
    • 405 篇 信息与通信工程
    • 287 篇 电气工程
    • 267 篇 生物工程
    • 217 篇 控制科学与工程
    • 172 篇 生物医学工程(可授...
    • 79 篇 化学工程与技术
    • 73 篇 光学工程
    • 72 篇 机械工程
    • 68 篇 仪器科学与技术
    • 65 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 55 篇 动力工程及工程热...
    • 54 篇 网络空间安全
  • 777 篇 理学
    • 430 篇 数学
    • 296 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 147 篇 物理学
    • 127 篇 系统科学
    • 90 篇 化学
  • 505 篇 管理学
    • 306 篇 图书情报与档案管...
    • 231 篇 管理科学与工程(可...
    • 95 篇 工商管理
  • 218 篇 医学
    • 193 篇 临床医学
    • 125 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
    • 55 篇 公共卫生与预防医...
  • 72 篇 法学
    • 70 篇 社会学
  • 52 篇 教育学
    • 47 篇 教育学
  • 35 篇 经济学
  • 31 篇 农学
  • 6 篇 艺术学
  • 4 篇 军事学
  • 1 篇 文学

主题

  • 568 篇 data mining
  • 542 篇 machine learning
  • 241 篇 pattern recognit...
  • 195 篇 deep learning
  • 174 篇 feature extracti...
  • 154 篇 artificial intel...
  • 153 篇 support vector m...
  • 113 篇 accuracy
  • 113 篇 machine learning...
  • 111 篇 training
  • 93 篇 data models
  • 80 篇 neural networks
  • 77 篇 data mining and ...
  • 65 篇 classification
  • 62 篇 sentiment analys...
  • 61 篇 classification a...
  • 59 篇 big data
  • 57 篇 predictive model...
  • 50 篇 face recognition
  • 48 篇 prediction algor...

机构

  • 7 篇 maharishi school...
  • 6 篇 guangdong univer...
  • 5 篇 galgotias univer...
  • 5 篇 centre of interd...
  • 5 篇 pune
  • 5 篇 chitkara univers...
  • 5 篇 uttaranchal univ...
  • 5 篇 uttaranchal inst...
  • 5 篇 institute of aut...
  • 4 篇 shanghai jiao to...
  • 4 篇 chitkara univers...
  • 4 篇 school of inform...
  • 4 篇 indian statistic...
  • 4 篇 south china univ...
  • 4 篇 zhejiang univers...
  • 4 篇 maharishi school...
  • 4 篇 department of cs...
  • 4 篇 university of ca...
  • 4 篇 school of comput...
  • 4 篇 department of co...

作者

  • 9 篇 de-shuang huang
  • 7 篇 coenen frans
  • 7 篇 venkatesh svetha
  • 7 篇 petra perner
  • 7 篇 tianrui li
  • 6 篇 ryszard tadeusie...
  • 6 篇 marcin korytkows...
  • 6 篇 jacek m. zurada
  • 6 篇 krasotkina olga
  • 6 篇 lotfi a. zadeh
  • 6 篇 mottl vadim
  • 6 篇 leszek rutkowski
  • 5 篇 vitoantonio bevi...
  • 5 篇 sankar k. pal
  • 4 篇 waiyamai kitsana
  • 4 篇 sozo inoue
  • 4 篇 sergei o. kuznet...
  • 4 篇 duoqian miao
  • 4 篇 shengli xie
  • 4 篇 hepu deng

语言

  • 3,063 篇 英文
  • 209 篇 其他
  • 38 篇 中文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Machine Learning and Data Mining in Pattern Recognition"
3282 条 记 录,以下是801-810 订阅
排序:
High-Dimensional Signal Processing using Classical-Quantum machine learning Pipelines with the TensorFlow Stack, Cirq-NISQ, and Vertica  3
High-Dimensional Signal Processing using Classical-Quantum M...
收藏 引用
3rd IEEE international conference on Quantum Computing and Engineering (QCE)
作者: Melvin, Theresa Northcentral Univ Sch Technol Adv Data Sci & Maching Learning Lab Vertica Scottsdale AZ USA
Modeling High Dimensional Signal data (HDSD) is challenging due to statistical complexities and an imbalance of noise to signal data, which creates ground truth problems. Likewise, enabling recognition and detection a... 详细信息
来源: 评论
Application of text mining technology in power data prediction
Application of text mining technology in power data predicti...
收藏 引用
CIBDA 2022;3rd international conference on Computer Information and Big data Applications
作者: Jian Guo Wu Guo
This paper analyses the main research methods of power text mining technology in detail, and discusses the research hotspots of power text named entity recognition and named entity relationship extraction based on mac...
来源: 评论
Towards Automated Screening via Two-Stage Deep learning: A Pipeline for Classification and Localization of Bleeding from Wireless Capsule Endoscopy Visuals  3rd
Towards Automated Screening via Two-Stage Deep Learning: A P...
收藏 引用
3rd international conference on Advanced Computing and Applications, ICACA 2024
作者: Neogy, Sayan Mazumder, Sabyasachi Chowdhury, Niladri Sur, Tapashri Das, Sahana Budge Budge Institute of Technology West Bengal Kolkata India Ramakrishna Mission Vivekananda Educational and Research Institute West Bengal Howrah India
This study presents an automated two-stage pipeline utilizing deep learning for gastrointestinal bleeding detection in wireless capsule endoscopy visuals. Through transfer learning, convolutional and YOLOv8 architectu... 详细信息
来源: 评论
Pest and Disease Detection Based on data Augmentation
Pest and Disease Detection Based on Data Augmentation
收藏 引用
data Science and Computer Application (ICDSCA), IEEE international conference on
作者: Wenjun Jia Nan Yang Yiping Lu Peng Deng School of Computer Science Southwest Petroleum University Nanchong China
Pest identification plays an increasingly important role in agricultural production, and effective control measures based on the results can reduce the impact of pests and diseases and ensure higher and more stable yi...
来源: 评论
An Enhanced Deep learning Approach for Smartphone-Based Human Activity recognition in IoHT  3rd
An Enhanced Deep Learning Approach for Smartphone-Based Hum...
收藏 引用
3rd international conference on machine learning, Image Processing, Network Security and data Sciences, MIND 2021
作者: Soni, Vaibhav Jaiswal, Shashank Semwal, Vijay Bhaskar Roy, Bholanath Choubey, Dilip Kumar Mallick, Dheeresh K. Department of Computer Science and Engineering Maulana Azad National Institute of Technology Bhopal Madhya Pradesh Bhopal India Department of Computer Science and Engineering Indian Institute of Information Technology Bhagalpur Bihar Bhagalpur India Department of Computer Science and Engineering Birla Institute of Technology Mesra Jharkhand Ranchi India
Human activity recognition (HAR) uses sensor-based technology to predict human activity using sensor-generated time-series data. According to recent studies, researchers have been drawn to the area of HAR as the use o... 详细信息
来源: 评论
A data-Driven Retrospective Analysis of Cyberbullying Using machine learning Algorithms  3
A Data-Driven Retrospective Analysis of Cyberbullying Using ...
收藏 引用
3rd IEEE international conference on Automation and Computation, AUTOCOM 2025
作者: Tripathi, Ashirwad R. Tyagi, Palki Sivaraman, Himani Kumar, Anuj Jain, Sachin Jigyasa University Department of Cs&it Dhradun India
Cyberbullying has become one of the main concerns in today's digital world, posing a great risk to everyone being online and effecting their mental health and their online safety. This research explores the applic... 详细信息
来源: 评论
Privacy issues involved in data mining and countermeasures  2
Privacy issues involved in data mining and countermeasures
收藏 引用
2nd international conference on Mechanical Engineering, Intelligent Manufacturing and Automation Technology, MEMAT 2022
作者: Liu, Jing Law School Xi'an Jiaotong University 28 Xianning West Road Shaanxi Province Xi'an China
data mining can extract valuable information from large amounts of data and has matured in recent years as an important resource for productive life. This technology is a decision support process. It is mainly based o... 详细信息
来源: 评论
Comprehensive Research on Speaker recognition and its Challenges
Comprehensive Research on Speaker Recognition and its Challe...
收藏 引用
Smart data Intelligence (ICSMDI), international conference on
作者: Venkata Syama Sowmya Sri Hari Arun Kumar Annavarapu Vamsi Shesamsetti Sathwik Nalla Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Guntur Andhra Pradesh India
The study of speech is a subfield of the measurement of uniquely identifying and measurable patterns in human activity. It communicates details about a person's characteristics. As an illustration, consider gender... 详细信息
来源: 评论
The Classification of Satellite Galaxies Based on Convolution Neural Networks machine learning Algorithm  3
The Classification of Satellite Galaxies Based on Convolutio...
收藏 引用
3rd international conference for Emerging Technology, INCET 2022
作者: Shetty, Ganesh Srinivasa Raghu, N. Jain University Dept. of Eee Bengaluru India Jain University Bengaluru India
Human exploration in space science unleashed positive achievements of mankind in understanding universe, the whole universe comprises of galaxies, nebula and black holes need to be identifiable in order to extend futu... 详细信息
来源: 评论
A Comparative Study of datasets for Cyber-attacks Detection in Wireless Sensor Networks
A Comparative Study of Datasets for Cyber-attacks Detection ...
收藏 引用
Computing and machine Intelligence (ICMI), international conference on
作者: Shereen Ismail Diana W. Dawoud Hassan Reza School of Electrical Engineering and Computer Science University of North Dakota ND USA College of Engineering and Information Technology University of Dubai Dubai UAE
machine learning (ML) is one of the effective security approaches to build cyber-attacks detection systems in Wireless Sensor Networks (WSNs). ML leverages the power of data analysis and pattern recognition to detect ... 详细信息
来源: 评论