咨询与建议

限定检索结果

文献类型

  • 6,693 篇 会议
  • 327 册 图书
  • 119 篇 期刊文献

馆藏范围

  • 7,138 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 4,787 篇 工学
    • 3,980 篇 计算机科学与技术...
    • 2,011 篇 软件工程
    • 820 篇 信息与通信工程
    • 807 篇 电气工程
    • 645 篇 控制科学与工程
    • 392 篇 生物工程
    • 378 篇 生物医学工程(可授...
    • 334 篇 机械工程
    • 292 篇 光学工程
    • 212 篇 仪器科学与技术
    • 181 篇 电子科学与技术(可...
    • 175 篇 网络空间安全
    • 140 篇 化学工程与技术
    • 128 篇 材料科学与工程(可...
    • 106 篇 安全科学与工程
    • 93 篇 动力工程及工程热...
  • 1,619 篇 理学
    • 817 篇 数学
    • 486 篇 物理学
    • 483 篇 生物学
    • 268 篇 统计学(可授理学、...
    • 189 篇 化学
    • 141 篇 系统科学
  • 836 篇 管理学
    • 451 篇 管理科学与工程(可...
    • 427 篇 图书情报与档案管...
    • 169 篇 工商管理
  • 686 篇 医学
    • 599 篇 临床医学
    • 250 篇 基础医学(可授医学...
    • 145 篇 药学(可授医学、理...
    • 108 篇 公共卫生与预防医...
  • 116 篇 法学
    • 110 篇 社会学
  • 94 篇 教育学
  • 54 篇 农学
  • 50 篇 经济学
  • 43 篇 艺术学
  • 12 篇 文学
  • 3 篇 军事学
  • 1 篇 哲学

主题

  • 927 篇 pattern recognit...
  • 811 篇 artificial intel...
  • 459 篇 machine learning
  • 293 篇 feature extracti...
  • 242 篇 deep learning
  • 203 篇 accuracy
  • 183 篇 support vector m...
  • 135 篇 data mining
  • 129 篇 neural networks
  • 127 篇 training
  • 126 篇 face recognition
  • 105 篇 computer vision
  • 103 篇 local binary pat...
  • 100 篇 computer imaging...
  • 88 篇 real-time system...
  • 88 篇 image processing...
  • 85 篇 information syst...
  • 83 篇 pattern matching
  • 83 篇 computational mo...
  • 83 篇 convolutional ne...

机构

  • 39 篇 chitkara univers...
  • 33 篇 maharishi school...
  • 27 篇 school of comput...
  • 27 篇 indian stat inst...
  • 25 篇 centre of interd...
  • 25 篇 the islamic univ...
  • 23 篇 department of ar...
  • 23 篇 concordia univ c...
  • 22 篇 national univers...
  • 20 篇 school of comput...
  • 19 篇 univ chinese aca...
  • 18 篇 univ waterloo de...
  • 17 篇 vishwakarma inst...
  • 17 篇 school of comput...
  • 16 篇 school of artifi...
  • 16 篇 national laborat...
  • 15 篇 institute of aut...
  • 14 篇 lovely professio...
  • 14 篇 uttaranchal inst...
  • 14 篇 college of pharm...

作者

  • 54 篇 suen ching y.
  • 24 篇 suen cy
  • 22 篇 kamel mohamed s.
  • 18 篇 lu bao-liang
  • 18 篇 karray fakhri
  • 17 篇 de-shuang huang
  • 16 篇 abraham ajith
  • 14 篇 maji pradipta
  • 13 篇 dash yajnaseni
  • 12 篇 c.y. suen
  • 10 篇 liu cheng-lin
  • 10 篇 venkatesh svetha
  • 10 篇 wong alexander
  • 10 篇 chauhan rahul
  • 10 篇 natarajan s.
  • 10 篇 zheng wei-long
  • 10 篇 liu wei
  • 10 篇 vinay a.
  • 9 篇 zhang lei
  • 9 篇 gill kanwarparta...

语言

  • 6,798 篇 英文
  • 313 篇 其他
  • 59 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Pattern Recognition and Machine Intelligence"
7139 条 记 录,以下是131-140 订阅
排序:
A temporal-spatial feature coordination network for change detection of VHR images  3
A temporal-spatial feature coordination network for change d...
收藏 引用
3rd international conference on Geographic Information and Remote Sensing Technology, GIRST 2024
作者: Zeng, Yuxian Zhang, Xinxin College of Computer and Information Engineering Xiamen University of Technology Xiamen361024 China Fujian Key Laboratory of Pattern Recognition and Image Understanding Xiamen University of Technology Xiamen361024 China
Deep learning techniques have significantly improved the accuracy and efficiency of change detection of very high resolution (VHR) images. However, many current models ignore the inherent heterogeneity of bi-temporal ... 详细信息
来源: 评论
A Succinct Study on the DDoS Attack Detection Methods  3rd
A Succinct Study on the DDoS Attack Detection Methods
收藏 引用
3rd international conference on machine Vision and Augmented intelligence, MAI 2023
作者: Shylla, Dapynhunlang Nandan, Durgesh Symbiosis International Symbiosis Institute of Technology Deemed University Pune411042 India
The growth of "distributed denial-of-service" attacks has become one of the most serious threats to Internet security in recent years. They are classified as serious and have the potential to disrupt network... 详细信息
来源: 评论
23rd China National conference on Computational Linguistics, CCL 2024
23rd China National Conference on Computational Linguistics,...
收藏 引用
23rd China National conference on Computational Linguistics, CCL 2024
The proceedings contain 34 papers. The special focus in this conference is on Computational Linguistics. The topics include: Joint Similarity Guidance Hash Coding Based on Adaptive Weight Mixing Strategy For Cros...
来源: 评论
Optimizing Blood Bank Management with Cloud-Hosted Long Short-Term Memory Models for Inventory Forecasting and Utilization  3
Optimizing Blood Bank Management with Cloud-Hosted Long Shor...
收藏 引用
3rd international conference on Electronics and Renewable Systems, ICEARS 2025
作者: Devi, R. Aiyshwariya Sree Southry, S. Rajanarayanan, S. Sekaran, S. Chandra Sivaraman, Audithan Srinivasan, S. R.M.K. College of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India Sona College of Technology Department of Electronics and Communication Engineering Tamil Nadu Salem India Department of Computer Science and Engineering Tamil Nadu Salem India P.S.V College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Krishnagiri India Department of Information Technology Jafferpur New Delhi India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Biomedical Engineering Tamil Nadu Chennai India
This research presents an innovative method for blood bank management using Cloud-based Long Short-Term Memory (LSTM) models for precise inventory forecasting and optimization. The objective of this research is to inc... 详细信息
来源: 评论
CNN-KNN Model for Assessing Hair Health in Telogen Effluvium  3
CNN-KNN Model for Assessing Hair Health in Telogen Effluvium
收藏 引用
3rd international conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Kumar, Gotte Ranjith Shubham Banerjee, Deepak School of Computer Science and Artificial Intelligence SR University Telangana Warangal506371 India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
The abstract provides a concise overview of a study that focuses on predicting hair breakage levels using a CNN-KNN hybrid model. The study evaluates the model's performance across five Breakage Degrees (BDs) by u... 详细信息
来源: 评论
Anomaly-Based Intrusion Detection Systems by using machine Learning based Stacking Ensemble Model  3
Anomaly-Based Intrusion Detection Systems by using Machine L...
收藏 引用
3rd international conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Buvaneswari, P.R. Madhura, G.K. Alasady, Heba Alagarraja, K. Soni, Mukesh School of Electrical and Electronics Engineering Vit Bhopal University Bhopal India Nitte Meenakshi Institute of Technology Department of Artificial Intelligence and Machine Learning Bengaluru India College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Najaf Iraq New Prince Shri Bhavani College of Engineering and Technology Department of Mechanical Engineering Chennai India University Centre for Research & Development Chandigarh University Department of Computer Science and Engineering Mohali India
In recent years, network intrusion refers to unauthorized access to systems or networks by external attackers or insiders aimed at stealing information or deploy malicious software. Traditional approaches for anomaly-... 详细信息
来源: 评论
Role of Explainable Artificial intelligence Approaches in Cybersecurity  3rd
Role of Explainable Artificial Intelligence Approaches in Cy...
收藏 引用
3rd international conference on machine Vision and Augmented intelligence, MAI 2023
作者: Bawane, Nishant Nandan, Durgesh Pune411042 India School of CS & AI S R University Warangal India
The increasing use of Deep Learning (DL) algorithms in cybersecurity, for example in identifying dangerous source code or Android malware, has made Artificial intelligence (AI) and machine Learning (ML) more crucial. ... 详细信息
来源: 评论
Fault Detection Using ReliefF Algorithm with Canonical Correlation Analysis Based on Improved Support Vector machine  3
Fault Detection Using ReliefF Algorithm with Canonical Corre...
收藏 引用
3rd international conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Patchamatla, Pavan Srikanth Subbaraju Ramesh, M. Abas, Hayder Muhamed Pareek, Piyush Kumar Sundaram, N. Kalyana RKInfo-Tech Llc India MKumarasamy College of Engineering Department of Electrical and Electronics Engineering Namakkal India College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Al Diwaniyah Iraq Nitte Meenakshi Institute of Technology Department of Artificial Intelligence and Machine Learning Bengaluru India New Prince Shri Bhavani College of Engineering and Technology Department of Information Technology Chennai India
Recently, the increasing time-complexity of electronic circuit has made fault detection and diagnosis a challenging task. The existing Deep Belief Networks (DBN) has been used for fault detection and circuit diagnosis... 详细信息
来源: 评论
Tokenization's Potential for Santhali Language Processing  3rd
Tokenization's Potential for Santhali Language Processing
收藏 引用
3rd international conference on machine Vision and Augmented intelligence, MAI 2023
作者: Ohm, Anand Kumar Panday, Aman Kumar Singh, Koushlendra Kumar Machine Vision and Intelligence Lab Department of CSE National Institute of Technology Jamshedpur Jharkhand India
Santhali is one of the popular local languages and is mainly spoken by tribal people of States like Jharkhand, Odisha, and West Bengal, as well as a few other parts of the country. Tokenization is one of the major cha... 详细信息
来源: 评论
Auction-Based Optimization with machine Learning for Cyber Threat Detection and Classification Model  3rd
Auction-Based Optimization with Machine Learning for Cyber T...
收藏 引用
3rd international conference on Computing and Communication Networks, ICCCN 2023
作者: Alqahtani, Hamed Department of Information Systems College of Computer Science Center of Artificial Intelligence Unit of Cybersecurity King Khalid University Abha Saudi Arabia
The detection of cyber threats and cybersecurity can be benefitted greatly from the advances in artificial intelligence (AI). Cyber threat detection is the main focus of cybersecurity. It has used various tools and te... 详细信息
来源: 评论