咨询与建议

限定检索结果

文献类型

  • 6,672 篇 会议
  • 329 册 图书
  • 119 篇 期刊文献

馆藏范围

  • 7,119 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 4,756 篇 工学
    • 3,944 篇 计算机科学与技术...
    • 2,010 篇 软件工程
    • 805 篇 电气工程
    • 763 篇 信息与通信工程
    • 587 篇 控制科学与工程
    • 394 篇 生物工程
    • 380 篇 生物医学工程(可授...
    • 293 篇 光学工程
    • 292 篇 机械工程
    • 212 篇 仪器科学与技术
    • 180 篇 电子科学与技术(可...
    • 138 篇 化学工程与技术
    • 127 篇 材料科学与工程(可...
    • 118 篇 网络空间安全
    • 107 篇 安全科学与工程
    • 91 篇 动力工程及工程热...
  • 1,614 篇 理学
    • 803 篇 数学
    • 487 篇 物理学
    • 486 篇 生物学
    • 272 篇 统计学(可授理学、...
    • 189 篇 化学
    • 141 篇 系统科学
  • 834 篇 管理学
    • 455 篇 管理科学与工程(可...
    • 422 篇 图书情报与档案管...
    • 173 篇 工商管理
  • 678 篇 医学
    • 603 篇 临床医学
    • 254 篇 基础医学(可授医学...
    • 145 篇 药学(可授医学、理...
    • 100 篇 公共卫生与预防医...
  • 121 篇 法学
    • 114 篇 社会学
  • 90 篇 教育学
  • 56 篇 农学
  • 51 篇 经济学
  • 43 篇 艺术学
  • 12 篇 文学
  • 3 篇 军事学
  • 1 篇 哲学

主题

  • 927 篇 pattern recognit...
  • 801 篇 artificial intel...
  • 446 篇 machine learning
  • 291 篇 feature extracti...
  • 237 篇 deep learning
  • 204 篇 accuracy
  • 185 篇 support vector m...
  • 134 篇 data mining
  • 128 篇 training
  • 126 篇 neural networks
  • 126 篇 face recognition
  • 103 篇 local binary pat...
  • 103 篇 computer imaging...
  • 102 篇 computer vision
  • 88 篇 real-time system...
  • 88 篇 image processing...
  • 86 篇 convolutional ne...
  • 85 篇 information syst...
  • 83 篇 pattern matching
  • 83 篇 computational mo...

机构

  • 39 篇 chitkara univers...
  • 33 篇 maharishi school...
  • 27 篇 school of comput...
  • 27 篇 indian stat inst...
  • 25 篇 centre of interd...
  • 25 篇 the islamic univ...
  • 23 篇 department of ar...
  • 23 篇 concordia univ c...
  • 22 篇 national univers...
  • 20 篇 school of comput...
  • 19 篇 univ chinese aca...
  • 18 篇 univ waterloo de...
  • 17 篇 vishwakarma inst...
  • 17 篇 school of comput...
  • 16 篇 national laborat...
  • 15 篇 school of artifi...
  • 15 篇 institute of aut...
  • 14 篇 lovely professio...
  • 14 篇 uttaranchal inst...
  • 14 篇 college of pharm...

作者

  • 54 篇 suen ching y.
  • 24 篇 suen cy
  • 22 篇 kamel mohamed s.
  • 18 篇 lu bao-liang
  • 18 篇 karray fakhri
  • 17 篇 de-shuang huang
  • 17 篇 abraham ajith
  • 14 篇 maji pradipta
  • 13 篇 dash yajnaseni
  • 12 篇 c.y. suen
  • 10 篇 liu cheng-lin
  • 10 篇 venkatesh svetha
  • 10 篇 wong alexander
  • 10 篇 chauhan rahul
  • 10 篇 natarajan s.
  • 10 篇 zheng wei-long
  • 10 篇 liu wei
  • 10 篇 vinay a.
  • 9 篇 zhang lei
  • 9 篇 gill kanwarparta...

语言

  • 6,806 篇 英文
  • 286 篇 其他
  • 58 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Pattern Recognition and Machine Intelligence"
7120 条 记 录,以下是4981-4990 订阅
排序:
Active contour driven by local region force
Active contour driven by local region force
收藏 引用
international conference on Communication Software and Networks, ICCSN
作者: Jianwen Li School of Information Science and Engineering Shandong University Jinan China
Active contour models is one of the most popular and successful segmentation methods. In this paper we propose a new geodesic active contour model combination with an external force field which is based on region info... 详细信息
来源: 评论
A Novel Approach for Face recognition and Age estimation using Local Binary pattern, Discriminative approach using Two layered Back Propagation Network
A Novel Approach for Face Recognition and Age estimation usi...
收藏 引用
Trendz in Information Sciences & Computing (TISC)
作者: P. Karthigayani S. Sridhar Computer Applications Department Sathyabama University Chennai India Sbyte Technology Bangalore India
The recent technology of image processing forms the basic principles of research entitled “A Novel Approach for Face recognition and Age estimation using Local Binary pattern, Discriminative approach using Two layere... 详细信息
来源: 评论
The method of video synopsis based on maximum motion power
The method of video synopsis based on maximum motion power
收藏 引用
2011 3rd Chinese conference on Intelligent Visual Surveillance, IVS 2011
作者: Sun, Haibo Cao, Lijun Xie, Yuantao Zhao, Ming Jiangsu University Zhenjiang 212013 China National Laboratory of Pattern Recognition Institute of Automation Chiness Academy of Sciences Beijing 100190 China West 3rd Ring Middle Road NO. 19 China
This paper has studied on method of video synopsis based on maximum motion power, the events of interest were obtained by the method of background modeling and target tracking. Then these events had a time-shifting an... 详细信息
来源: 评论
Optimization of reliability based on job scheduling
Optimization of reliability based on job scheduling
收藏 引用
international conference on Communication Software and Networks, ICCSN
作者: Seyedehfarzaneh Nojabaei S. H. Tang P. Bayat S. Sulaiman Mechanical and Manufacturing Engineering Department Engineering Faculty UPM Serdang Malaysia Communication Laboratory Institute of Intelligence Technology (ITMA) Serdang Malaysia
Duling is a main concept on distributed control systems. If we have a fair system to decision and job management, this will cause to reach to a reliable industrial system. Especially, in sensitive industries, fairness... 详细信息
来源: 评论
Removing Unrelated Features Based on Linear Dynamical System for Motor-Imagery-Based Brain-Computer Interface
Removing Unrelated Features Based on Linear Dynamical System...
收藏 引用
18th international conference on Neural Information Processing (ICONIP)
作者: Wu, Jie Shi, Li-Chen Lu, Bao-Liang Shanghai Jiao Tong Univ Ctr Brain Like Comp & Machine Intelligence Dept Comp Sci & Engn 800 Doug Chuan Rd Shanghai 200240 Peoples R China Shanghai Jiao Tong Univ MOE-Microsoft Key Lab Intelligent Comp & Intelli Shanghai 200240 Peoples R China
Common spatial pattern (CSP) is very successful in constructing spatial filters for detecting event-related synchronization and event-related desynchronization. In statistics, a CSP filter can optimally separate the m... 详细信息
来源: 评论
Automatic recognition Algorithm of Traffic Signs in Road Tunnel
Automatic Recognition Algorithm of Traffic Signs in Road Tun...
收藏 引用
2011 3rd international Asia conference on Informatics in Control, Automation and Robotics (CAR 2011 LNEE 132)
作者: Wang Weizhi Liu Binghan Fuzhou University
We conduct feature extraction and feature selection of the pattern of traffic signs based on environmental characteristics of the road tunnel, and the color and shape information of traffic signs, then further accompl... 详细信息
来源: 评论
The Repetitive Data Problem of Relevance Vector machine Customer Identification
The Repetitive Data Problem of Relevance Vector Machine Cust...
收藏 引用
2011 3rd IEEE international conference on Information Management and Engineering(ICIME 2011)
作者: LiGang School of Economics & Management Xi’an Technological University Xi’an, China Lizhi, Wang Guilong School of Economics & Management Xi’an Technological University Xi’an, China
The 'repetitive data problem' is pervasive and ubiquitous in the real world, especially in the customer identification problem. Evidences from the experiments with Ripley's dataset indicate the 'repeti... 详细信息
来源: 评论
7th European conference on Modelling Foundations and Applications, ECMFA 2011
7th European Conference on Modelling Foundations and Applica...
收藏 引用
7th European conference on Modelling Foundations and Applications, ECMFA 2011
The proceedings contain 34 papers. The special focus in this conference is on Modelling Foundations and Applications. The topics include: Preventing Information Loss in Incremental Model Synchronization by Reusing Ele...
来源: 评论
Fault propagation pattern based relevant faulty ciphertexts filtering towards DFA on AES
Fault propagation pattern based relevant faulty ciphertexts ...
收藏 引用
international conference on Communication Software and Networks, ICCSN
作者: Na Wang Yongbin Zhou State Key Laboratory of Information Security Institute of Software Chinese Academy and Sciences Beijing China
Basically, Differential Fault Analysis (DFA) against ciphers consists of two stages: fault induction and fault exploitation. Success rate of the latter strongly depends upon the availability of the required type of so... 详细信息
来源: 评论
Simulation of radar topology networks to evolve the electronic warfare survivability metrics
Simulation of radar topology networks to evolve the electron...
收藏 引用
international conference on Electronic Computer Technology
作者: Namrita Waghray P. M. Menghal Radar & Control System Department Faculty of Electronics Military College of Electronics and Mechanical Engineering Secunderabad India
Electronic warfare is a military action whose objective is to control the electromagnetic spectrum. To accomplish this objective, both offensive electronic attack (EA) and electronic protection (EP) actions are requir... 详细信息
来源: 评论