咨询与建议

限定检索结果

文献类型

  • 1,730 篇 会议
  • 45 册 图书
  • 11 篇 期刊文献

馆藏范围

  • 1,785 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 1,223 篇 工学
    • 1,093 篇 计算机科学与技术...
    • 628 篇 软件工程
    • 254 篇 信息与通信工程
    • 199 篇 电气工程
    • 177 篇 生物工程
    • 99 篇 控制科学与工程
    • 98 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 电子科学与技术(可...
    • 41 篇 机械工程
    • 40 篇 仪器科学与技术
    • 40 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 27 篇 材料科学与工程(可...
  • 455 篇 理学
    • 199 篇 数学
    • 196 篇 生物学
    • 144 篇 物理学
    • 83 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 45 篇 化学
  • 233 篇 管理学
    • 167 篇 图书情报与档案管...
    • 86 篇 管理科学与工程(可...
    • 43 篇 工商管理
  • 182 篇 医学
    • 160 篇 临床医学
    • 72 篇 基础医学(可授医学...
    • 39 篇 药学(可授医学、理...
    • 32 篇 公共卫生与预防医...
  • 34 篇 法学
    • 30 篇 社会学
  • 17 篇 经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 239 篇 machine learning
  • 184 篇 deep learning
  • 140 篇 pattern recognit...
  • 110 篇 feature extracti...
  • 91 篇 support vector m...
  • 88 篇 data mining
  • 79 篇 accuracy
  • 75 篇 training
  • 59 篇 convolutional ne...
  • 51 篇 machine learning...
  • 48 篇 data models
  • 46 篇 artificial intel...
  • 41 篇 computational mo...
  • 40 篇 neural networks
  • 39 篇 face recognition
  • 36 篇 learning systems
  • 36 篇 adversarial mach...
  • 33 篇 predictive model...
  • 32 篇 classification
  • 32 篇 image recognitio...

机构

  • 6 篇 college of compu...
  • 5 篇 xi'an university...
  • 4 篇 badji mokhtar un...
  • 4 篇 shanghai jiao to...
  • 4 篇 institute of big...
  • 4 篇 chitkara centre ...
  • 4 篇 chitkara univers...
  • 4 篇 library shanghai...
  • 3 篇 school of comput...
  • 3 篇 univ chittagong ...
  • 3 篇 chongqing univer...
  • 3 篇 centre of resear...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of design...
  • 3 篇 korea univ dept ...
  • 3 篇 school of automa...
  • 3 篇 university of mi...
  • 3 篇 shenyang jianzhu...
  • 3 篇 xi'an university...

作者

  • 5 篇 venkatesh svetha
  • 4 篇 ashwini kodipall...
  • 4 篇 zhang yan
  • 4 篇 srinivasa gowri
  • 4 篇 kamel mohamed s.
  • 4 篇 lall brejesh
  • 4 篇 trupthi rao
  • 3 篇 andersson karl
  • 3 篇 peng yang
  • 3 篇 malerba donato
  • 3 篇 karl andersson
  • 3 篇 chaudhury santan...
  • 3 篇 de-shuang huang
  • 3 篇 sekhar c. chandr...
  • 3 篇 wang shuo
  • 3 篇 kamata sei-ichir...
  • 3 篇 mohammad shahada...
  • 3 篇 azizi nabiha
  • 3 篇 phung dinh
  • 3 篇 krasotkina olga

语言

  • 1,587 篇 英文
  • 190 篇 其他
  • 26 篇 中文
检索条件"任意字段=4th International Conference on Machine Learning and Data Minining in Pattern Recognition"
1786 条 记 录,以下是1271-1280 订阅
排序:
Parameters Optimization for Nonparallel Support Vector machine by Particle Swarm Optimization
Parameters Optimization for Nonparallel Support Vector Machi...
收藏 引用
4th international conference on Information Technology and Quantitative Management (ITQM) - Promoting Business Analytics and Quantitative Management of Technology
作者: Bamakan, Seyed Mojtaba Hosseini Wang, Huadong Ravasan, Ahad Zare Univ Chinese Acad Sci Key Lab Big Data Min & Knowledge Management Beijing 100190 Peoples R China Univ Chinese Acad Sci Sch Econ & Management Beijing 100190 Peoples R China Chinese Acad Sci Res Ctr Fictitious Econ & Data Sci Beijing 100190 Peoples R China Allameh Tabatabai Univ Dept Ind Management Tehran Iran
Support vector machine is a well-known and computationally powerful machine learning technique for pattern classification and regression problems, which has been successfully applied to solve many practical problems i... 详细信息
来源: 评论
D2PCP: DISSECTING DISTRIBUTED data TO PREDICT CRIME pattern USING HADOOP PLATFORM  4
D2PCP: DISSECTING DISTRIBUTED DATA TO PREDICT CRIME PATTERN ...
收藏 引用
4th IEEE international conference on Parallel, Distributed and Grid Computing (IEEE PDGC)
作者: Partap, Manu Chopra, Anshu Sri Sai Coll Engn & Technol Dept Comp Sci & Engn Badhani Punjab India
Basic numerical synopses normal, least, whole were adequate for the business issues of the 1980s and 1990s. A lot of complex information, however, requires new systems. Perceiving client inclinations requires investig... 详细信息
来源: 评论
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association  12th
A New Strategy for Case-Based Reasoning Retrieval Using Clas...
收藏 引用
12th international conference on machine learning and data Mining (MLDM)
作者: Aljuboori, Ahmed Meziane, Farid Parsons, David Univ Salford Sch Comp Sci & Engn Salford M5 4WT Lancs England
this paper proposes a novel strategy, Case-Based Reasoning Using Association Rules (CBRAR) to improve the performance of the Similarity base Retrieval SBR, classed frequent pattern trees FP-CAR algorithm, in order to ... 详细信息
来源: 评论
Semantic Aware Bayesian Network Model for Actionable Knowledge Discovery in Linked data  1
收藏 引用
12th international conference on machine learning and data Mining (MLDM)
作者: Alharbi, Hasanein Saraee, Mohamad Univ Salford Salford M5 4WT Lancs England
the majority of the conventional mining algorithms treat the mining process as an isolated data-driven procedure and overlook the semantic of the targeted data. As a result, the generated patterns are abundant and end... 详细信息
来源: 评论
Architecture Design of pattern Detection System for Smart Cities datasets  12
Architecture Design of Pattern Detection System for Smart Ci...
收藏 引用
12th IEEE international conference on Intelligent Computer Communication and Processing (ICCP)
作者: Bojan, Valentina-Camelia Raducu, Ionut-Gabriel Pop, Florin Mocanu, Mariana Cristea, Valentin Univ Politehn Bucuresti Dept Comp Sci Fac Automat Control & Comp Bucharest Romania
Nowadays, there is more and more interest in the research and development of systems, applications, tools or frameworks for 'smart' environments. We do not want to bother with useless actions or decisions anym... 详细信息
来源: 评论
Clinical Named Entity recognition: Challenges and opportunities  4
Clinical Named Entity Recognition: Challenges and opportunit...
收藏 引用
4th IEEE international conference on Big data (Big data)
作者: Kundeti, Srinivasa Rao Vijayananda, J. Mujjiga, Srikanth Kalyan, M. Philips Healthcare Data Sci Bangalore Karnataka India
Information Extraction (IE), one of the important tasks in text analysis and Natural Language Processing (NLP), involves extracting meaningful pieces of knowledge from unstructured information sources, as unstructured... 详细信息
来源: 评论
Giving voice to office customers: Best practices in how office handles verbatim text feedback  4
Giving voice to office customers: Best practices in how offi...
收藏 引用
4th IEEE international conference on Big data, Big data 2016
作者: Bentley, Michael Batra, Soumya Office Product Group Microsoft RedmondWA United States
Microsoft Office users submit hundreds of thousands of pieces of verbatim feedback per month. How can an engineer or manager in Office find the signal in this data to make business decisions? this paper presents an ov... 详细信息
来源: 评论
Hyperalignment of Multi-subject fMRI data by Synchronized Projections  4th
Hyperalignment of Multi-subject fMRI Data by Synchronized Pr...
收藏 引用
4th international Workshop on machine learning and Interpretation in Neuroimaging (MLINI) Held at conference on Neural Information Processing Systems (NIPS)
作者: Rustamov, Raif M. Guibas, Leonidas Stanford Univ Dept Comp Sci Stanford CA 94305 USA
Group analysis of fMRI data via multivariate pattern methods requires accurate alignments between neuronal activities of different subjects in order to attain competitive inter-subject classification rates. Hyperalign... 详细信息
来源: 评论
Deep learning in the Automotive Industry: Applications and Tools  4
Deep Learning in the Automotive Industry: Applications and T...
收藏 引用
4th IEEE international conference on Big data (Big data)
作者: Luckow, Andre Cook, Matthew Ashcraftt, Nathan Weill, Edwin Djerekarov, Emil Vorster, Bennie BMW Grp IT Res Ctr Informat Management Amer Greenville SC 29607 USA Clemson Univ Clemson SC USA Univ Cincinnati Cincinnati OH USA
Deep learning refers to a set of machine learning techniques that utilize neural networks with many hidden layers for tasks, such as image classification, speech recognition, language understanding. Deep learning has ... 详细信息
来源: 评论
Reverse Engineering Smart card Malware using Side Channel Analysis with machine learning Techniques  4
Reverse Engineering Smart card Malware using Side Channel An...
收藏 引用
4th IEEE international conference on Big data (Big data)
作者: Tsague, Hippolyte Djonon Twala, Bheki CSIR MDS Smart Token Res Grp Pretoria South Africa Univ Johannesburg Dept Elect & Elect Engn Sci Inst Intelligent Syst Fac Engn Johannesburg South Africa
From inception, side channel leakage has been widely used for the purposes of extracting secret information, such as cryptographic keys, from embedded devices. However, in a few instances it has been utilized for extr... 详细信息
来源: 评论