咨询与建议

限定检索结果

文献类型

  • 724 篇 会议
  • 3 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 729 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 474 篇 工学
    • 379 篇 计算机科学与技术...
    • 273 篇 软件工程
    • 175 篇 信息与通信工程
    • 106 篇 电气工程
    • 81 篇 生物工程
    • 76 篇 生物医学工程(可授...
    • 47 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 29 篇 机械工程
    • 27 篇 光学工程
    • 26 篇 化学工程与技术
    • 18 篇 仪器科学与技术
    • 14 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 13 篇 农业工程
  • 214 篇 理学
    • 114 篇 数学
    • 89 篇 生物学
    • 67 篇 物理学
    • 41 篇 系统科学
    • 38 篇 统计学(可授理学、...
    • 24 篇 化学
  • 95 篇 医学
    • 91 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 46 篇 药学(可授医学、理...
    • 13 篇 公共卫生与预防医...
  • 95 篇 管理学
    • 57 篇 图书情报与档案管...
    • 41 篇 管理科学与工程(可...
    • 16 篇 工商管理
  • 17 篇 农学
    • 17 篇 作物学
  • 11 篇 法学
    • 11 篇 社会学
  • 7 篇 教育学
  • 6 篇 经济学
  • 5 篇 军事学

主题

  • 168 篇 machine learning
  • 50 篇 deep learning
  • 46 篇 support vector m...
  • 46 篇 feature extracti...
  • 41 篇 signal processin...
  • 24 篇 signal processin...
  • 23 篇 machine learning...
  • 18 篇 image processing
  • 18 篇 training
  • 16 篇 artificial intel...
  • 16 篇 accuracy
  • 15 篇 electroencephalo...
  • 14 篇 decision trees
  • 14 篇 computer vision
  • 13 篇 natural language...
  • 13 篇 neural networks
  • 13 篇 classification a...
  • 13 篇 convolutional ne...
  • 12 篇 data mining
  • 12 篇 classification

机构

  • 6 篇 xinjiang key lab...
  • 6 篇 school of inform...
  • 6 篇 fujian provincia...
  • 6 篇 xinjiang key lab...
  • 5 篇 beijing universi...
  • 3 篇 fujian provincia...
  • 2 篇 college of engin...
  • 2 篇 university of jo...
  • 2 篇 school of electr...
  • 2 篇 china electric p...
  • 2 篇 department of ar...
  • 2 篇 department of it...
  • 2 篇 valencian resear...
  • 2 篇 ugam solutions c...
  • 2 篇 department of co...
  • 2 篇 chongqing univ s...
  • 2 篇 guangzhou xinhua...
  • 2 篇 college of elect...
  • 2 篇 school of comput...
  • 2 篇 guangzhou power ...

作者

  • 10 篇 hamdulla askar
  • 6 篇 ablimit mijit
  • 6 篇 li zuoyong
  • 3 篇 vysotska victori...
  • 3 篇 teng shenghua
  • 2 篇 veeresh
  • 2 篇 xue jingfeng
  • 2 篇 mohanty mihir na...
  • 2 篇 agarwal harsh
  • 2 篇 jin lingmin
  • 2 篇 kalinina irina
  • 2 篇 jia cairang
  • 2 篇 renjith p.n.
  • 2 篇 gozhyj aleksandr
  • 2 篇 wen zhang
  • 2 篇 li zheng
  • 2 篇 selvi g. thamara...
  • 2 篇 pandey trilok na...
  • 2 篇 islam md. adnanu...
  • 2 篇 kama mohd nazri

语言

  • 700 篇 英文
  • 28 篇 其他
  • 4 篇 中文
检索条件"任意字段=3rd International Conference on Signal Processing and Machine Learning, SPML 2020"
729 条 记 录,以下是691-700 订阅
排序:
A machine learning approach for classification of sentence polarity
A Machine Learning approach for classification of sentence p...
收藏 引用
international conference on signal processing and Integrated Networks (SPIN)
作者: Neethu Akkarapatty Nisha S Raj Department of Computer Science with Information Systems SCMS School of Engineering & Technology Ernakulam India
Opinion Mining is the process used to determine the attitude/opinion/emotion expressed by a person about a particular topic. Analyzing opinions is an integral part for making decisions. In the era of web, if a person ... 详细信息
来源: 评论
Detection and classification of diseases of Grape plant using opposite colour Local Binary Pattern feature and machine learning for automated Decision Support System
Detection and classification of diseases of Grape plant usin...
收藏 引用
international conference on signal processing and Integrated Networks (SPIN)
作者: Harshal Waghmare Radha Kokare Yogesh Dandawate Dept. of Electronics and Telecommunication Engineering Vishwakarma Institute of Information Technology Pune India
Plant diseases cause major economic and production losses as well as curtailment in both quantity and quality of agricultural production. Now a day's, for supervising large field of crops there is been increased d... 详细信息
来源: 评论
Acoustic signal processing for Anomaly Detection in machine Room Environments: Demo Abstract  16
Acoustic Signal Processing for Anomaly Detection in Machine ...
收藏 引用
Proceedings of the 3rd ACM international conference on Systems for Energy-Efficient Built Environments
作者: Bong Jun Ko Jorge Ortiz Theodoros Salonidis Maroun Touma Dinesh Verma Shiqiang Wang Xiping Wang David Wood IBM T.J. Watson Research Center Yorktown Heights NY United States
We present a system that uses acoustic signals to monitor equipment in commercial buildings, such as in machine rooms with HVAC system components. The system uses an ensemble of machine learning classifiers to effecti...
来源: 评论
machine learning and BCI  3
Machine Learning and BCI
收藏 引用
3rd international Winter conference on Brain-Computer Interface (BCI)
作者: Mueller, Klaus-Robert TU Berlin Machine Learning Grp Marchstr 23 D-10587 Berlin Germany Korea Univ Dept Brain & Cognit Engn Seoul South Korea
A main motivation for multimodal imaging has been the possibility to enhance medical diagnosis[1]. Beyond this original medical motivation the fusion of multiple modalities has created successful interesting research ... 详细信息
来源: 评论
Smart Traffic Optimization Using Image processing  3
Smart Traffic Optimization Using Image Processing
收藏 引用
IEEE 3rd international conference on MOOCs, Innovation and Technology in Education (MITE)
作者: Maheshwari, Pranav Suneja, Deepanshu Singh, Praneet Mutneja, Yogeshwar Carnegie Mellon Univ Sch Comp Sci Inst Robot Pittsburgh PA 15213 USA Infosys Ltd Bangalore Karnataka India TCS Ltd New Delhi India
Currently the traffic control system in place in our country is non-flexible and non-adaptive to the ever growing number of vehicles on the road. It does not take into account the changing density of traffic during th... 详细信息
来源: 评论
Comparative study of Principal Component Analysis based Intrusion Detection approach using machine learning algorithms  3
Comparative study of Principal Component Analysis based Intr...
收藏 引用
3rd international conference on signal processing, Communication and Networking, ICSCN 2015
作者: Chabathula, Krupa Joel Jaidhar, C.D. Ajay Kumara, M.A. Department of IT NITK Surathkal Mangalore India
This paper induces the prominence of variegated machine learning techniques adapted so far for the identifying different network attacks and suggests a preferable Intrusion Detection System (IDS) with the available sy... 详细信息
来源: 评论
3rd international conference on Statistical Language and Speech processing, SLSP 2015
收藏 引用
3rd international conference on Statistical Language and Speech processing, SLSP 2015
The proceedings contain 27 papers. The special focus in this conference is on Statistical Language and Speech processing. The topics include: Towards two-way interaction with reading machines;the prediction of fatigue...
来源: 评论
3rd IAPR TC3 Workshop on Multimodal Pattern Recognition of Social signals in Human-Computer-Interaction, MPRSS 2014
收藏 引用
3rd IAPR TC3 Workshop on Multimodal Pattern Recognition of Social signals in Human-Computer-Interaction, MPRSS 2014
The proceedings contain 18 papers. The special focus in this conference is on Pattern Recognition, machine learning, and Information Fusion Methods with Applications in Social signal processing. The topics include: Au...
来源: 评论
NLP based sentiment analysis on Twitter data using ensemble classifiers
NLP based sentiment analysis on Twitter data using ensemble ...
收藏 引用
international conference on signal processing, Communication and Networking (ICSCN)
作者: Monisha Kanakaraj Ram Mohana Reddy Guddeti Dept. of Information Technology National Institute of Technology Karnataka Mangalore India National Institute of Technology Calicut Calicut Kerala IN
Most sentiment analysis systems use bag-of-words approach for mining sentiments from the online reviews and social media data. Rather considering the whole sentence/ paragraph for analysis, the bag-of-words approach c... 详细信息
来源: 评论
Comparative study of Principal Component Analysis based Intrusion Detection approach using machine learning algorithms
Comparative study of Principal Component Analysis based Intr...
收藏 引用
international conference on signal processing, Communication and Networking (ICSCN)
作者: Krupa Joel Chabathula C.D. Jaidhar M.A. Ajay Kumara Department of IT NITK Surathkal Mangalore India
This paper induces the prominence of variegated machine learning techniques adapted so far for the identifying different network attacks and suggests a preferable Intrusion Detection System (IDS) with the available sy... 详细信息
来源: 评论