咨询与建议

限定检索结果

文献类型

  • 2,984 篇 会议
  • 176 册 图书
  • 25 篇 期刊文献

馆藏范围

  • 3,184 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,060 篇 工学
    • 1,841 篇 计算机科学与技术...
    • 960 篇 软件工程
    • 343 篇 电气工程
    • 329 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 208 篇 生物工程
    • 150 篇 生物医学工程(可授...
    • 71 篇 光学工程
    • 64 篇 机械工程
    • 62 篇 化学工程与技术
    • 53 篇 电子科学与技术(可...
    • 50 篇 仪器科学与技术
    • 46 篇 安全科学与工程
    • 36 篇 交通运输工程
    • 34 篇 动力工程及工程热...
  • 653 篇 理学
    • 353 篇 数学
    • 245 篇 生物学
    • 141 篇 物理学
    • 135 篇 统计学(可授理学、...
    • 95 篇 系统科学
    • 65 篇 化学
  • 419 篇 管理学
    • 247 篇 图书情报与档案管...
    • 192 篇 管理科学与工程(可...
    • 83 篇 工商管理
  • 263 篇 医学
    • 241 篇 临床医学
    • 123 篇 基础医学(可授医学...
    • 74 篇 药学(可授医学、理...
    • 41 篇 公共卫生与预防医...
  • 54 篇 法学
    • 50 篇 社会学
  • 41 篇 经济学
    • 39 篇 应用经济学
  • 38 篇 教育学
  • 23 篇 农学
  • 6 篇 艺术学
  • 4 篇 文学

主题

  • 579 篇 machine learning
  • 567 篇 data mining
  • 323 篇 pattern recognit...
  • 216 篇 deep learning
  • 201 篇 feature extracti...
  • 154 篇 support vector m...
  • 145 篇 artificial intel...
  • 129 篇 machine learning...
  • 120 篇 accuracy
  • 120 篇 training
  • 91 篇 data mining and ...
  • 90 篇 data models
  • 72 篇 neural networks
  • 71 篇 classification
  • 69 篇 predictive model...
  • 67 篇 face recognition
  • 61 篇 learning systems
  • 52 篇 computer imaging...
  • 50 篇 convolutional ne...
  • 48 篇 classification a...

机构

  • 9 篇 school of comput...
  • 9 篇 chinese academy ...
  • 8 篇 zhejiang univers...
  • 8 篇 chitkara univers...
  • 7 篇 guangdong univer...
  • 7 篇 school of inform...
  • 6 篇 xi'an university...
  • 6 篇 indian statistic...
  • 6 篇 central south un...
  • 6 篇 department of co...
  • 6 篇 unsw sydney
  • 6 篇 xi'an university...
  • 6 篇 southern univers...
  • 5 篇 indian institute...
  • 5 篇 study group aust...
  • 5 篇 peking universit...
  • 4 篇 shanghai jiao to...
  • 4 篇 centre for patte...
  • 4 篇 chongqing univer...
  • 4 篇 national laborat...

作者

  • 11 篇 de-shuang huang
  • 8 篇 petra perner
  • 7 篇 krasotkina olga
  • 7 篇 mottl vadim
  • 7 篇 ying tan
  • 6 篇 zheng-guang wu
  • 6 篇 ryszard tadeusie...
  • 6 篇 marcin korytkows...
  • 6 篇 phung dinh
  • 6 篇 venkatesh svetha
  • 6 篇 hongyi li
  • 6 篇 jacek m. zurada
  • 6 篇 chaojie li
  • 6 篇 biao luo
  • 6 篇 ilias maglogiann...
  • 6 篇 lotfi a. zadeh
  • 6 篇 leszek rutkowski
  • 6 篇 lazaros iliadis
  • 6 篇 long cheng
  • 5 篇 vitoantonio bevi...

语言

  • 2,758 篇 英文
  • 413 篇 其他
  • 42 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=5th International Conference on Machine Learning and Data Mining in Pattern Recognition"
3185 条 记 录,以下是641-650 订阅
排序:
SGDE: Secure Generative data Exchange for Cross-Silo Federated learning  5
SGDE: Secure Generative Data Exchange for Cross-Silo Federat...
收藏 引用
5th international conference on Artificial Intelligence and pattern recognition, AIPR 2022
作者: Lomurno, Eugenio Archetti, Alberto Cazzella, Lorenzo Samele, Stefano Di Perna, Leonardo Matteucci, Matteo Politecnico di Milano Italy
Privacy regulation laws, such as GDPR, impose transparency and security as design pillars for data processing algorithms. In this context, federated learning is one of the most influential frameworks for privacy-prese... 详细信息
来源: 评论
IICETA 2022 - 5th international conference on Engineering Technology and its Applications
IICETA 2022 - 5th International Conference on Engineering Te...
收藏 引用
5th international conference on Engineering Technology and its Applications, IICETA 2022
the proceedings contain 104 papers. the topics discussed include: enhancing recommendation system using adapted personalized PageRank algorithm;diagnosing bacteria samples using data mining: review study;modeling the ...
来源: 评论
Security attack situation awareness based on massive log data mining  5
Security attack situation awareness based on massive log dat...
收藏 引用
5th international conference on Advanced Electronic Materials, Computers and Software Engineering, AEMCSE 2022
作者: Xu, Yin Yu, Pengfei Shen, Wen Li, Ziqian State Grid Customer Service Center Tianjin China State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. Ltd Nanjing China
Security situation awareness usually uses massive log information to discover abnormal attacks based on basic user attributes, user behavioral actions and user interactions through machine learning and other methods. ... 详细信息
来源: 评论
One-Step Multi-view Clustering Based on Low-Rank Tensor Proximity learning  5
One-Step Multi-view Clustering Based on Low-Rank Tensor Prox...
收藏 引用
5th international conference on pattern recognition and Artificial Intelligence, PRAI 2022
作者: Li, Lin Cao, Ying Zhou, Xiaojun Lu, Zhiqiang Li, Dongxiao Song, Li Migu Co. Ltd Beijing China The China Academy of Information and Communications Technology Beijing China Institute of Image Communication and Network Engineering Shanghai Jiao Tong University Shanghai China
Multi-view clustering has achieved impressive performances by employing relationships and complex structures hidden in multi-view data. However, most of methods still suffer from the following two problems. (1) they a... 详细信息
来源: 评论
machine learning Algorithms for Disease Prediction Analysis
Machine Learning Algorithms for Disease Prediction Analysis
收藏 引用
international conference on Smart Systems and Inventive Technology (ICSSIT)
作者: M Govindaraj V Asha Binju Saju M Sagar Rahul Master of Computer Application New Horizon College of Engineering Bengaluru India
People suffer from a wide variety of diseases due to their environment and lifestyle factors. As a result, early disease prediction becomes critical. On the other hand, making a diagnosis solely on symptoms is too dif... 详细信息
来源: 评论
epiDAMIK 5.0: the 5th international Workshop on Epidemiology meets data mining and Knowledge Discovery  22
epiDAMIK 5.0: The 5th International Workshop on Epidemiology...
收藏 引用
28th ACM SIGKDD conference on Knowledge Discovery and data mining (KKD)
作者: Adhikari, Bijaya Yadav, Amulya Pei, Sen Srivastava, Ajitesh Kefayati, Sarah Rodriguez, Alexander Charpignon, Marie-Laure Vullikanti, Anil Prakash, B. Aditya Univ Iowa Iowa City IA 52240 USA Penn State Univ University Pk PA 16802 USA Columbia Univ New York NY USA Univ Southern Calif Los Angeles CA 90007 USA IBM Corp Boston MA USA Georgia Inst Technol Atlanta GA 30332 USA MIT Boston MA USA Univ Virginia Charlottesville VA USA
Similar to previous iterations, the epiDAMIK @ KDD workshop is a forum to promote data driven approaches in epidemiology and public health research. Even after the devastating impact of COVID-19 pandemic, data driven ... 详细信息
来源: 评论
Analysis of data mining-Based Approach for Intrusion Detection System  5
Analysis of Data Mining-Based Approach for Intrusion Detecti...
收藏 引用
5th international conference on Contemporary Computing and Informatics, IC3I 2022
作者: Soewu, Taiwo Hemant Rakhra, Manik Singh, Dalwinder Olabisi Onabanjo University Department of Computer Engineering Ago Iwoye Nigeria Lovely Professional University School of Computer Science and Enginnering Phagwara India Lovely Professional University Department of Computer Science and Engineering Phagwara India
Due to the widespread usage of computers nowadays, there is also a greater likelihood of cyberattacks on systems or networks than previously thought. Intrusion Detection System (IDS) can be a successful method to iden... 详细信息
来源: 评论
Classification of Hepatitis Disease Using learning Vector Quantization 3(LVQ3)  5
Classification of Hepatitis Disease Using Learning Vector Qu...
收藏 引用
5th international conference on Information and Communications Technology, ICOIACT 2022
作者: Bagi, Yufika Sari Mihuandayani Stmik Multicom Bolaang Mongondow Department of Information System Kotamobagu Indonesia
Artificial Neural Network (ANN) is one of the fields of science in Artificial Intelligence (AI) that has been widely applied in various problems such as pattern recognition, forecasting, and classification. learning V... 详细信息
来源: 评论
Hybrid Deep learning based Attack Detection and Classification Model on IoT Environment  5
Hybrid Deep Learning based Attack Detection and Classificati...
收藏 引用
5th IEEE international conference on Electrical, Computer and Communication Technologies, ICECCT 2023
作者: Lal, Jaya Dipti Ayoub, Shahnawaz Hakim, Prashant D. Prabagar, S. Dwivedi, Vijay Kumar Tiwari, Mohit Shri G S Institute of Technology and Science Department of Electronics and Communication Engineering Madhya Pradesh Indore India Shri Venkateshwara University Department of Computer Science Uttar PradeshGujrala Amroha India Thakur College of Science and Commerce Department of Information Technology Maharashtra Mumbai India School of Computer Science and Engineering & Information Science Presidency University Networks and IoT Lab Department of Information Science Engineering Karnataka Bengaluru India Vishwavidyalaya Engineering College Department of Mathematics Chhattisgarh Ambikapur India Bharati Vidyapeeth's College of Engineering Department of Computer Science and Engineering Delhi India
the Internet of things (IoT) is becoming an active research area because of its largescale challenges and implementation. But security is the major concern while seeing the dramatic expansion in its applications and s... 详细信息
来源: 评论
An Effective Automatic recognition Approach of Chinese Herbal Medicine by Micro Image Processing  21
An Effective Automatic Recognition Approach of Chinese Herba...
收藏 引用
21st IEEE international conference on Ubiquitous Computing and Communications / 5th IEEE international conference on data Science and Computational Intelligence / 21st IEEE international conference on Computer and Information Technology
作者: Pang, Guangyao Yu, Zhenming Pan, Honglin Xie, Chengwen Gong, Ping Zhu, Xiaoying Peng, Zizhen Wuzhou Univ Guangxi Key Lab Machine Vis & Intelligent Control Wuzhou 543002 Peoples R China Wuzhou Univ Guangxi Coll & Univ Key Lab Ind Software Technol Wuzhou 543002 Peoples R China
the identification of traditional Chinese medicine is the key to control the quality of traditional Chinese medicine and ensure the safety and effectiveness of clinical medication. Compared with the physical and chemi... 详细信息
来源: 评论