咨询与建议

限定检索结果

文献类型

  • 1,730 篇 会议
  • 45 册 图书
  • 11 篇 期刊文献

馆藏范围

  • 1,785 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 1,223 篇 工学
    • 1,093 篇 计算机科学与技术...
    • 628 篇 软件工程
    • 254 篇 信息与通信工程
    • 199 篇 电气工程
    • 177 篇 生物工程
    • 99 篇 控制科学与工程
    • 98 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 电子科学与技术(可...
    • 41 篇 机械工程
    • 40 篇 仪器科学与技术
    • 40 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 27 篇 材料科学与工程(可...
  • 455 篇 理学
    • 199 篇 数学
    • 196 篇 生物学
    • 144 篇 物理学
    • 83 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 45 篇 化学
  • 233 篇 管理学
    • 167 篇 图书情报与档案管...
    • 86 篇 管理科学与工程(可...
    • 43 篇 工商管理
  • 182 篇 医学
    • 160 篇 临床医学
    • 72 篇 基础医学(可授医学...
    • 39 篇 药学(可授医学、理...
    • 32 篇 公共卫生与预防医...
  • 34 篇 法学
    • 30 篇 社会学
  • 17 篇 经济学
  • 14 篇 教育学
  • 11 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 239 篇 machine learning
  • 184 篇 deep learning
  • 140 篇 pattern recognit...
  • 110 篇 feature extracti...
  • 91 篇 support vector m...
  • 88 篇 data mining
  • 79 篇 accuracy
  • 75 篇 training
  • 59 篇 convolutional ne...
  • 51 篇 machine learning...
  • 48 篇 data models
  • 46 篇 artificial intel...
  • 41 篇 computational mo...
  • 40 篇 neural networks
  • 39 篇 face recognition
  • 36 篇 learning systems
  • 36 篇 adversarial mach...
  • 33 篇 predictive model...
  • 32 篇 classification
  • 32 篇 image recognitio...

机构

  • 6 篇 college of compu...
  • 5 篇 xi'an university...
  • 4 篇 badji mokhtar un...
  • 4 篇 shanghai jiao to...
  • 4 篇 institute of big...
  • 4 篇 chitkara centre ...
  • 4 篇 chitkara univers...
  • 4 篇 library shanghai...
  • 3 篇 school of comput...
  • 3 篇 univ chittagong ...
  • 3 篇 chongqing univer...
  • 3 篇 centre of resear...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of design...
  • 3 篇 korea univ dept ...
  • 3 篇 school of automa...
  • 3 篇 university of mi...
  • 3 篇 shenyang jianzhu...
  • 3 篇 xi'an university...

作者

  • 5 篇 venkatesh svetha
  • 4 篇 ashwini kodipall...
  • 4 篇 zhang yan
  • 4 篇 srinivasa gowri
  • 4 篇 kamel mohamed s.
  • 4 篇 lall brejesh
  • 4 篇 trupthi rao
  • 3 篇 andersson karl
  • 3 篇 peng yang
  • 3 篇 malerba donato
  • 3 篇 karl andersson
  • 3 篇 chaudhury santan...
  • 3 篇 de-shuang huang
  • 3 篇 sekhar c. chandr...
  • 3 篇 wang shuo
  • 3 篇 kamata sei-ichir...
  • 3 篇 mohammad shahada...
  • 3 篇 azizi nabiha
  • 3 篇 phung dinh
  • 3 篇 krasotkina olga

语言

  • 1,587 篇 英文
  • 190 篇 其他
  • 26 篇 中文
检索条件"任意字段=4th International Conference on Machine Learning and Data Minining in Pattern Recognition"
1786 条 记 录,以下是1411-1420 订阅
排序:
Monitoring and control of machining process by data mining and pattern recognition
Monitoring and control of machining process by data mining a...
收藏 引用
2012 6th international conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2012
作者: Yacout, Soumaya Meshreki, Mouhab Attia, Helmi Department of Mathematics and Industrial Engineering École Polytechnique Succ. Centre-ville Montréal QC H3C3A7 Canada Aerospace Manufacturing Technology Centre National Research Council Canada 5145 Decelles avenue Montreal QC H3T2B2 Canada
In this paper we present a novel approach to the problem of understanding, monitoring, and controlling the machining process of composites materials. the approach is called Logical Analysis of data (LAD). It is based ... 详细信息
来源: 评论
Computer recognition of facial expressions of emotion  1
收藏 引用
8th international conference on machine learning and data Mining in pattern recognition, MLDM 2012
作者: PiĄtkowska, Ewa Martyna, Jerzy Institute of Applied Computer Science Jagiellonian University Reymonta 4 30-059 Cracow Poland Institute of Computer Science Faculty of Mathematics and Computer Science Jagiellonian University Prof. S. Lojasiewicza 6 30-348 Cracow Poland
In this paper, we study the computer recognition of emotions involved in facial expressions. We propose a recognition system based on a support vector machine (SVM) system as a classifier for detecting of spontaneous ... 详细信息
来源: 评论
Bayesian approach to the concept drift in the pattern recognition problems  1
收藏 引用
8th international conference on machine learning and data Mining in pattern recognition, MLDM 2012
作者: Turkov, Pavel Krasotkina, Olga Mottl, Vadim Tula State University 92 Lenina Ave. Tula 300600 Russia Computing Center Russian Academy of Science 40 Vavilov St. Moscow 119333 Russia
We can face with the pattern recognition problems where the influence of hidden context leads to more or less radical changes in the target concept. this paper proposes the mathematical and algorithmic framework for t... 详细信息
来源: 评论
ICIMCS 2012 - Proceedings of the 4th international conference on Internet Multimedia Computing and Service
ICIMCS 2012 - Proceedings of the 4th International Conferenc...
收藏 引用
4th international conference on Internet Multimedia Computing and Service, ICIMCS 2012
the proceedings contain 52 papers. the topics discussed include: multi-view video dissemination and delivery: challenges and solutions;binary SIFT: towards efficient feature matching verification for image search;Touc...
来源: 评论
Nonlinear-Based Human Activity recognition Using the Kernel Technique
收藏 引用
4th international conference on Networked Digital Technologies, NDT 2012
作者: Diaf, A. Benlamri, R. Boufama, B. University of Windsor Windsor ON N9B 3P4 Canada Lakehead University Thunder Bay ON P7B 5E1 Canada
Kernel-based methods have gained great attention by researchers in the field of pattern recognition and statistical machine learning. they are the most nominated algorithms whenever a non-linear classification model i... 详细信息
来源: 评论
Constructing target concept in multiple instance learning using maximum partial entropy  1
收藏 引用
8th international conference on machine learning and data Mining in pattern recognition, MLDM 2012
作者: Xu, Tao Chiu, David Gondra, Iker School of Computer Science University of Guelph ON Canada Mathematics Statistics Computer Science St. Francis Xavier University NS Canada
Multiple instance learning, when instances are grouped into bags, concerns learning of a target concept from the bags without reference to their instances. In this paper, we advance the problem with a novel method bas... 详细信息
来源: 评论
Performance Evaluation of Various K-anonymity Techniques
Performance Evaluation of Various K-anonymity Techniques
收藏 引用
4th international conference on machine Vision (ICMV) - Computer Vision and Image Analysis - pattern recognition and Basic Technologies
作者: Maheshwarkar, Nidhi Pathak, Kshitij Chourey, Vivekanand Mahakal Inst Technol Informat Technol Ujjain Madhya Pradesh India Mandsaur Inst Technol Digital Commun Mandsaur India
Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medica... 详细信息
来源: 评论
learning from ordered sets and applications in collaborative ranking
Learning from ordered sets and applications in collaborative...
收藏 引用
4th Asian conference on machine learning, ACML 2012
作者: Tran, Truyen Phung, Dinh Venkatesh, Svetha Pattern Recognition and Data Analytics Deakin University Waurn Ponds VIC 3216 Australia Department of Computing Curtin University Bentley WA 6102 Australia
Ranking over sets arise when users choose between groups of items. For example, a group may be of those movies deemed 5 stars to them, or a customized tour package. It turns out, to model this data type properly, we n... 详细信息
来源: 评论
A new learning strategy of general BAMs  1
收藏 引用
8th international conference on machine learning and data Mining in pattern recognition, MLDM 2012
作者: Hoa, Nong thi Duy, Bui the Human Machine Interaction Laboratory Vietnam National University Hanoi Viet Nam
Bi-directional Associative Memory (BAM) is an artificial neural network that consists of two Hopfield networks. the most important advantage of BAM is the ability to recall a stored pattern from a noisy input, which d... 详细信息
来源: 评论
A pattern recognition system for malicious PDF files detection  1
收藏 引用
8th international conference on machine learning and data Mining in pattern recognition, MLDM 2012
作者: Maiorca, Davide Giacinto, Giorgio Corona, Igino University of Cagliari Piazza d'Armi 09123 Cagliari Italy
Malicious PDF files have been used to harm computer security during the past two-three years, and modern antivirus are proving to be not completely effective against this kind of threat. In this paper an innovative te... 详细信息
来源: 评论