咨询与建议

限定检索结果

文献类型

  • 6,672 篇 会议
  • 329 册 图书
  • 119 篇 期刊文献

馆藏范围

  • 7,119 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 4,756 篇 工学
    • 3,944 篇 计算机科学与技术...
    • 2,010 篇 软件工程
    • 805 篇 电气工程
    • 763 篇 信息与通信工程
    • 587 篇 控制科学与工程
    • 394 篇 生物工程
    • 380 篇 生物医学工程(可授...
    • 293 篇 光学工程
    • 292 篇 机械工程
    • 212 篇 仪器科学与技术
    • 180 篇 电子科学与技术(可...
    • 138 篇 化学工程与技术
    • 127 篇 材料科学与工程(可...
    • 118 篇 网络空间安全
    • 107 篇 安全科学与工程
    • 91 篇 动力工程及工程热...
  • 1,614 篇 理学
    • 803 篇 数学
    • 487 篇 物理学
    • 486 篇 生物学
    • 272 篇 统计学(可授理学、...
    • 189 篇 化学
    • 141 篇 系统科学
  • 834 篇 管理学
    • 455 篇 管理科学与工程(可...
    • 422 篇 图书情报与档案管...
    • 173 篇 工商管理
  • 678 篇 医学
    • 603 篇 临床医学
    • 254 篇 基础医学(可授医学...
    • 145 篇 药学(可授医学、理...
    • 100 篇 公共卫生与预防医...
  • 121 篇 法学
    • 114 篇 社会学
  • 90 篇 教育学
  • 56 篇 农学
  • 51 篇 经济学
  • 43 篇 艺术学
  • 12 篇 文学
  • 3 篇 军事学
  • 1 篇 哲学

主题

  • 927 篇 pattern recognit...
  • 801 篇 artificial intel...
  • 446 篇 machine learning
  • 291 篇 feature extracti...
  • 237 篇 deep learning
  • 204 篇 accuracy
  • 185 篇 support vector m...
  • 134 篇 data mining
  • 128 篇 training
  • 126 篇 neural networks
  • 126 篇 face recognition
  • 103 篇 local binary pat...
  • 103 篇 computer imaging...
  • 102 篇 computer vision
  • 88 篇 real-time system...
  • 88 篇 image processing...
  • 86 篇 convolutional ne...
  • 85 篇 information syst...
  • 83 篇 pattern matching
  • 83 篇 computational mo...

机构

  • 39 篇 chitkara univers...
  • 33 篇 maharishi school...
  • 27 篇 school of comput...
  • 27 篇 indian stat inst...
  • 25 篇 centre of interd...
  • 25 篇 the islamic univ...
  • 23 篇 department of ar...
  • 23 篇 concordia univ c...
  • 22 篇 national univers...
  • 20 篇 school of comput...
  • 19 篇 univ chinese aca...
  • 18 篇 univ waterloo de...
  • 17 篇 vishwakarma inst...
  • 17 篇 school of comput...
  • 16 篇 national laborat...
  • 15 篇 school of artifi...
  • 15 篇 institute of aut...
  • 14 篇 lovely professio...
  • 14 篇 uttaranchal inst...
  • 14 篇 college of pharm...

作者

  • 54 篇 suen ching y.
  • 24 篇 suen cy
  • 22 篇 kamel mohamed s.
  • 18 篇 lu bao-liang
  • 18 篇 karray fakhri
  • 17 篇 de-shuang huang
  • 17 篇 abraham ajith
  • 14 篇 maji pradipta
  • 13 篇 dash yajnaseni
  • 12 篇 c.y. suen
  • 10 篇 liu cheng-lin
  • 10 篇 venkatesh svetha
  • 10 篇 wong alexander
  • 10 篇 chauhan rahul
  • 10 篇 natarajan s.
  • 10 篇 zheng wei-long
  • 10 篇 liu wei
  • 10 篇 vinay a.
  • 9 篇 zhang lei
  • 9 篇 gill kanwarparta...

语言

  • 6,806 篇 英文
  • 286 篇 其他
  • 58 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Pattern Recognition and Machine Intelligence"
7120 条 记 录,以下是4961-4970 订阅
排序:
A mobile camera tracking system using GbLN-PSO with an adaptive window
A mobile camera tracking system using GbLN-PSO with an adapt...
收藏 引用
2nd international conference on Computational intelligence, Modelling and Simulation 2011, CIMSim 2011
作者: Musa, Zalili Bakar, Rohani Abu Watada, Junzo Faculty of Computer System and Software Engineering University Malaysia Pahang Kuantan Malaysia Graduate School of Information Production and Systems Waseda University Fukuoka Japan
The availability of high quality and inexpensive video camera, as well as the increasing need for automated video analysis is leading towards a great deal of interest in numerous applications. However the video tracki... 详细信息
来源: 评论
Enriched score access for computer assisted composition in PWGL  1
收藏 引用
3rd international conference on Mathematics and Computation in Music, MCM 2011
作者: Kuuskankare, Mika Sibelius Academy Department for Doctoral Studies in Music and Research Helsinki Finland STMS: IRCAM/CNRS/UPMC Paris France
PWGL is a visual composition environment that can be used to, among other things, solve musical constraints problems. The constraints system within PWGL, PWGLConstraints, allows us to write rules using a special patte... 详细信息
来源: 评论
Study the iris segmentation method for biometric pattern recognition
Study the iris segmentation method for biometric pattern rec...
收藏 引用
international conference on Next Generation Networks and Services (NGNS)
作者: Hentati Raida Moncef Boussellmi Mohamed Abid Research Unit CES National school of Engineers of Sfax Sfax Tunisia
Several system require authenticating a person's identity before giving access to resources. With new advances in technology, biometrics is one of the most promising techniques in recognition human. Biometrics int... 详细信息
来源: 评论
Hiding depth map into stereo image in JPEG format using reversible watermarking  11
Hiding depth map into stereo image in JPEG format using reve...
收藏 引用
3rd international conference on Internet Multimedia Computing and Service, ICIMCS 2011
作者: Wang, Wenyi Zhao, Jiying Tam, Wa James Speranza, Filippo Wang, Zhou School of Information Technology and Engineering University of Ottawa 800 King Edward Ave. Ottawa ON K1N 6N5 Canada Advanced Video Systems Communication Research Centre Canada 3701 Carling Ave. Ottawa ON K2H 8S2 Canada Department of Electrical and Computer Engineering University of Waterloo 200 University Ave. West Waterloo ON N2L 3G1 Canada
This paper presents a lossless data hiding approach based on Discrete Cosine Transform (DCT) as a new application of watermarking. In this application, a depth map obtained from a stereoscopic image pair is embedded i... 详细信息
来源: 评论
Robust Eye Movement recognition Using EOG Signal for Human-Computer Interface
Robust Eye Movement Recognition Using EOG Signal for Human-C...
收藏 引用
2nd international conference on Software Engineering and Computing Systems (ICSECS 2011)
作者: Aungsakun, Siriwadee Phinyomark, Angkoon Phukpattaranont, Pornchai Limsakul, Chusak 15 Kanjanavanich Rd Hat Yai 90112 Songkhla Thailand
Electrooculography (EOG) signal is one of the useful biomedical signals. Development of EOG signal as a control signal has been paid more increasing interest in the last decade. In this study, we are proposing a robus... 详细信息
来源: 评论
Unsupervised texture image classification using self-organizing maps
Unsupervised texture image classification using self-organiz...
收藏 引用
2011 international conference on Artificial intelligence, ICAI 2011
作者: Petrov, Nedyalko Jordanov, Ivan School of Computing University of Portsmouth Buckingham Building Lion Terrace Portsmouth Hampshire PO1 3HE United Kingdom
In this paper we report results from unsupervised texture image classification on a data set of images collected with our intelligent machine vision system for pattern recognition (assuming no a priori human vision ex... 详细信息
来源: 评论
Security of a new password authentication scheme using fuzzy extractor with Smart Card
Security of a new password authentication scheme using fuzzy...
收藏 引用
international conference on Communication Software and Networks, ICCSN
作者: Xiaoyi Duan XiuYing Li Department of Electronics and Information Engineering Beijing Electronic Science and Technology Institute Beijing China
Yang-Yang proposed a new key authentication scheme based on fuzzy extractor with Smart Card. The authors claimed their scheme can resist the guessing attack, the parallel attack, masquerade attack and other attack typ... 详细信息
来源: 评论
3rd international Congress on Tools for Teaching Logic, TICTTL 2011
收藏 引用
3rd international Congress on Tools for Teaching Logic, TICTTL 2011
The proceedings contain 30 papers. The special focus in this conference is on Tools for Teaching Logic. The topics include: Panda: A Proof Assistant in Natural Deduction for All. A Gentzen Style Proof Assistant for Un...
来源: 评论
Notice of Violation of IEEE Publication Principles: Neural network based intelligent local face recognition using local pattern averaging
Notice of Violation of IEEE Publication Principles: Neural n...
收藏 引用
international conference on Electronic Computer Technology
作者: N. Vivekanandan Reddy D. Abhilash Krishna P. Sharath Reddy R. Shirisha Department of Information Technology Sree Chaitanya College of Engineering Karim Nagar India
Notice of Violation of IEEE Publication Principles "Neural network Based Intelligent Local Face recognition Using Local pattern Averaging" by *** Reddy, *** Krishna, *** Reddy, *** in the 2011 3rd Internatio...
来源: 评论
Similarity Calculation with Length Delimiting Dictionary Distance
Similarity Calculation with Length Delimiting Dictionary Dis...
收藏 引用
international conference on Tools for Artificial intelligence (ICTAI)
作者: Andre Burkovski Sebastian Klenk Gunther Heidemann Department for Intelligent Systems University of Stuttgart Stuttgart Germany
The Normalized Compression Distance (NCD) has gained considerable interest in pattern recognition as a similarity measure applicable to unstructured data of very different domains, such as text, DNA sequences, or imag... 详细信息
来源: 评论