咨询与建议

限定检索结果

文献类型

  • 1,747 篇 会议
  • 75 册 图书
  • 45 篇 期刊文献

馆藏范围

  • 1,867 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,271 篇 工学
    • 1,022 篇 计算机科学与技术...
    • 621 篇 软件工程
    • 213 篇 光学工程
    • 205 篇 电气工程
    • 198 篇 信息与通信工程
    • 139 篇 生物医学工程(可授...
    • 137 篇 生物工程
    • 122 篇 控制科学与工程
    • 51 篇 机械工程
    • 48 篇 电子科学与技术(可...
    • 40 篇 化学工程与技术
    • 36 篇 仪器科学与技术
    • 22 篇 安全科学与工程
    • 19 篇 建筑学
    • 19 篇 土木工程
    • 17 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
  • 692 篇 理学
    • 350 篇 数学
    • 277 篇 物理学
    • 191 篇 生物学
    • 108 篇 统计学(可授理学、...
    • 44 篇 化学
    • 30 篇 系统科学
  • 176 篇 管理学
    • 113 篇 图书情报与档案管...
    • 74 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 118 篇 医学
    • 91 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 27 篇 法学
    • 26 篇 社会学
  • 17 篇 农学
  • 12 篇 教育学
  • 7 篇 经济学
  • 7 篇 军事学
  • 5 篇 艺术学
  • 4 篇 文学

主题

  • 425 篇 pattern recognit...
  • 191 篇 pattern recognit...
  • 68 篇 artificial intel...
  • 64 篇 feature extracti...
  • 48 篇 neural networks
  • 42 篇 pattern matching
  • 35 篇 face recognition
  • 35 篇 data mining
  • 33 篇 local binary pat...
  • 33 篇 computer imaging...
  • 30 篇 bioinformatics
  • 27 篇 support vector m...
  • 25 篇 image analysis
  • 24 篇 image processing
  • 24 篇 character recogn...
  • 23 篇 image segmentati...
  • 22 篇 deep learning
  • 22 篇 machine learning
  • 22 篇 image recognitio...
  • 21 篇 pattern classifi...

机构

  • 18 篇 national laborat...
  • 8 篇 chinese acad sci...
  • 6 篇 tsinghua univers...
  • 5 篇 indian statistic...
  • 5 篇 pattern recognit...
  • 5 篇 university of ch...
  • 4 篇 department of co...
  • 4 篇 rehabil inst chi...
  • 4 篇 school of comput...
  • 4 篇 concordia univ c...
  • 4 篇 shanghai jiao to...
  • 4 篇 university of so...
  • 3 篇 centre for patte...
  • 3 篇 univ chinese aca...
  • 3 篇 institute of ima...
  • 3 篇 southwest jiaoto...
  • 3 篇 pattern recognit...
  • 3 篇 chinese acad sci...
  • 3 篇 school of comput...
  • 3 篇 institute for pa...

作者

  • 16 篇 suen ching y.
  • 11 篇 xu bo
  • 8 篇 caelli terry
  • 8 篇 tan tieniu
  • 8 篇 yang jie
  • 7 篇 levi j. hargrove
  • 6 篇 hargrove levi j.
  • 6 篇 zhao jun
  • 6 篇 jain anil k.
  • 6 篇 sun zhenan
  • 6 篇 suen cy
  • 6 篇 ney hermann
  • 6 篇 kropatsch walter...
  • 6 篇 huang taiyi
  • 5 篇 zhou jie
  • 5 篇 de-shuang huang
  • 5 篇 liu cheng-lin
  • 5 篇 zong chengqing
  • 5 篇 oommen b.j.
  • 5 篇 ablameyko s.

语言

  • 1,845 篇 英文
  • 18 篇 其他
  • 5 篇 中文
检索条件"任意字段=6th IAPR International Conference on Pattern Recognition in Bioinformatics"
1867 条 记 录,以下是1821-1830 订阅
排序:
Purity detection of goat milk based on electronic tongue and improved artificial fish swarm optimized extreme learning machine  6th
Purity detection of goat milk based on electronic tongue and...
收藏 引用
6th international-Federation-of-Automatic-Control (IFAC) conference on Sensing, Control and Automation Technologies for Agriculture (AGRICONTROL)
作者: Han, Hui Wang, Zhiqiang Li, Caihong Ma, Zeliang Yang, Zhengwei Ma, Xiyuan Shandong Univ Technol Sch Comp Sci & Technol Zibo 255049 Peoples R China Lianyungang Tech Coll Coll Informat Engn Lianyungang 222000 Peoples R China Korea Univ Dept Comp Sci & Technol Seoul 02841 South Korea
the nutritional value of goat milk is higher than that of cow milk, which is scarce and expensive. therefore, many bad credit enterprises mix cow's milk into goat milk and sell it as pure goat milk, which infringe... 详细信息
来源: 评论
U-stroke pattern modeling for end user identity verification through ubiquitous input device
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in bioinformatics) 2015年 9339卷 219-230页
作者: Bhattasali, Tapalina Chaki, Nabendu Saeed, Khalid Chaki, Rituparna Department of Computer Science and Engineering University of Calcutta Kolkata India Bialystok University of Technology Bialystok Poland A.K.Choudhury School of Information Technology University of Calcutta Kolkata India
Identity verification on ubiquitous input devices is a major concern to validate end-users, because of mobility of the devices. User device interaction (UDI) is capable to capture end-users’ behavioral nature from th... 详细信息
来源: 评论
Transformer Partial Discharge recognition Based on Phase-Preserving Data Augmentation
Transformer Partial Discharge Recognition Based on Phase-Pre...
收藏 引用
Energy, Power and Grid (ICEPG), international conference on
作者: Shifang He Mingtao Yu Zongzhen Yang Binghui Lei Department of China Yangtze Power Co.Ltd. Yichang Xiling Road 1 Hubei China
the identification of transformer Partial Discharge (PD) is crucial for the safe and stable operation of modern power systems. Traditional PD identification methods rely on manual feature extraction, which has limited... 详细信息
来源: 评论
A secret sharing scheme based on game theory and BP neural network*
A secret sharing scheme based on game theory and BP neural n...
收藏 引用
Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys), IEEE international conference on
作者: Qiuxian Li Quanxing Zhou Qixin Pan Lingyun Wang Hongfa Ding College of Big Data Engineering Kaili University Kaili China College of Information Guizhou University of Finance and Economics Guiyang China
In order to solve the problem of low efficiency of traditional secret sharing communication, we design a new rational secret sharing scheme based on BP neural network under the framework of game theory. We first propo... 详细信息
来源: 评论
OP-Triplet-ELM: Identification of real and pseudo microRNA precursors using extreme learning machine with optimal features
收藏 引用
JOURNAL OF bioinformatics AND COMPUTATIONAL BIOLOGY 2016年 第1期14卷 1650006-1650006页
作者: Pian, Cong Zhang, Jin Chen, Yuan-Yuan Chen, Zhi Li, Qin Li, Qiang Zhang, Liang-Yun Nanjing Agr Univ Coll Sci Nanjing 210095 Jiangsu Peoples R China
MicroRNAs (miRNAs) are a set of short (21-24 nt) non-coding RNAs that play significant regulatory roles in the cells. Triplet-SVM-classifier and MiPred (random forest, RF) can identify the real pre-miRNAs from other h... 详细信息
来源: 评论
Doubly Regularized Least Squares Twin Extreme Learning Machine for pattern Classification  23
Doubly Regularized Least Squares Twin Extreme Learning Machi...
收藏 引用
Proceedings of the 2023 6th international conference on Artificial Intelligence and pattern recognition
作者: Qing Wu Ming Yu Lu Chen School of Automation Xi' an University of Posts and Telecommunications China
Least squares twin extreme learning machine (LSTELM) possesses better generalization ability than the standard extreme learning machine (ELM) by finding two nonparallel hyperplanes in ELM random feature space. However...
来源: 评论
Enhancing Typing Dynamics Emotion recognition: A Multi-Class XGBoost Approach for Accurate Sentiment Detection
Enhancing Typing Dynamics Emotion Recognition: A Multi-Class...
收藏 引用
Advancements in Computing (ICAC), international conference on
作者: Sudesh Bandara tharindu Dasath Senula Nanayakkara Samadhi Rathnayake thusithanjana thilakarthna Faculty of Computing Malabe Sri Lanka
this research paper aims to enhance the accuracy and efficiency of emotion recognition through keystroke dynamics by utilizing a multi-class XGBoost model. the study addresses the limitations observed in previous mode... 详细信息
来源: 评论
Face Forgery Detection Algorithm Based on Improved MobileViT Network
Face Forgery Detection Algorithm Based on Improved MobileViT...
收藏 引用
6th international conference on Intelligent Computing and Signal Processing (ICSP)
作者: Tiantian Wang Xiaoqi Lu School of Information Engineering Inner Mongolia University of Science and Technology Baotou China Inner Mongolia Key Laboratory of Pattern Recognition and Intelligent Image Processing Baotou China Institute of Information Engineering Inner Mongolia University of Technology Hohhot China
DeepFakes blur the boundaries between reality and forgery, resulting in the collapse of exiting credit system, causing immeasurable consequences for national security and social order. through analysis of existing fac...
来源: 评论
Spammer Detection on Weibo Social Network
Spammer Detection on Weibo Social Network
收藏 引用
IEEE international conference on Cloud Computing Technology and Science
作者: Zhipeng Zeng Xianghan Zheng Guolong Chen Yuanlong Yu Coll. of Math. & Comput. Sci. Fuzhou Univ. Fuzhou China
Social network has become a very popular way for internet users to communicate and interact online. Users spend a great deal of time on famous social networks (e.g. Facebook, Twitter, Sina Weibo, etc.), reading news, ... 详细信息
来源: 评论
Research on the Detection of Abnormal Cervical Cells Based on Improved YOLOv7
Research on the Detection of Abnormal Cervical Cells Based o...
收藏 引用
6th international conference on Intelligent Computing and Signal Processing (ICSP)
作者: Xuewei Wang Shuang Yuan Lidong Yang Dawei Niu Inner Mongolia Key Laboratory of Pattern Recognition and Intelligent Image Processing Inner Mongolia University of Science and Technology School of Digtial and Intelligence Industry Inner Mongolia China
Cervical cytologic screening is clinically important for the prevention and diagnosis of cervical cancer. Aiming at the many challenges in the detection of abnormal cervical cells, including the difficult detection of... 详细信息
来源: 评论