咨询与建议

限定检索结果

文献类型

  • 1,747 篇 会议
  • 77 册 图书
  • 45 篇 期刊文献

馆藏范围

  • 1,869 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,271 篇 工学
    • 1,023 篇 计算机科学与技术...
    • 621 篇 软件工程
    • 212 篇 光学工程
    • 205 篇 电气工程
    • 198 篇 信息与通信工程
    • 138 篇 生物医学工程(可授...
    • 136 篇 生物工程
    • 122 篇 控制科学与工程
    • 51 篇 机械工程
    • 48 篇 电子科学与技术(可...
    • 40 篇 化学工程与技术
    • 36 篇 仪器科学与技术
    • 22 篇 安全科学与工程
    • 19 篇 建筑学
    • 19 篇 土木工程
    • 17 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
  • 691 篇 理学
    • 350 篇 数学
    • 277 篇 物理学
    • 190 篇 生物学
    • 108 篇 统计学(可授理学、...
    • 44 篇 化学
    • 30 篇 系统科学
  • 176 篇 管理学
    • 113 篇 图书情报与档案管...
    • 74 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 117 篇 医学
    • 90 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 27 篇 法学
    • 26 篇 社会学
  • 17 篇 农学
  • 12 篇 教育学
  • 7 篇 经济学
  • 7 篇 军事学
  • 5 篇 艺术学
  • 4 篇 文学

主题

  • 426 篇 pattern recognit...
  • 191 篇 pattern recognit...
  • 70 篇 artificial intel...
  • 65 篇 feature extracti...
  • 48 篇 neural networks
  • 42 篇 pattern matching
  • 35 篇 face recognition
  • 35 篇 data mining
  • 35 篇 computer imaging...
  • 33 篇 local binary pat...
  • 31 篇 bioinformatics
  • 27 篇 support vector m...
  • 25 篇 image analysis
  • 24 篇 image processing
  • 24 篇 character recogn...
  • 23 篇 image segmentati...
  • 22 篇 deep learning
  • 22 篇 machine learning
  • 22 篇 image recognitio...
  • 21 篇 pattern classifi...

机构

  • 18 篇 national laborat...
  • 8 篇 chinese acad sci...
  • 6 篇 tsinghua univers...
  • 5 篇 indian statistic...
  • 5 篇 pattern recognit...
  • 5 篇 university of ch...
  • 4 篇 department of co...
  • 4 篇 rehabil inst chi...
  • 4 篇 school of comput...
  • 4 篇 concordia univ c...
  • 4 篇 shanghai jiao to...
  • 4 篇 university of so...
  • 3 篇 centre for patte...
  • 3 篇 univ chinese aca...
  • 3 篇 institute of ima...
  • 3 篇 southwest jiaoto...
  • 3 篇 pattern recognit...
  • 3 篇 chinese acad sci...
  • 3 篇 school of comput...
  • 3 篇 institute for pa...

作者

  • 16 篇 suen ching y.
  • 11 篇 xu bo
  • 8 篇 caelli terry
  • 8 篇 tan tieniu
  • 8 篇 yang jie
  • 7 篇 levi j. hargrove
  • 6 篇 hargrove levi j.
  • 6 篇 zhao jun
  • 6 篇 jain anil k.
  • 6 篇 sun zhenan
  • 6 篇 suen cy
  • 6 篇 ney hermann
  • 6 篇 kropatsch walter...
  • 6 篇 huang taiyi
  • 5 篇 zhou jie
  • 5 篇 de-shuang huang
  • 5 篇 liu cheng-lin
  • 5 篇 zong chengqing
  • 5 篇 oommen b.j.
  • 5 篇 ablameyko s.

语言

  • 1,847 篇 英文
  • 18 篇 其他
  • 5 篇 中文
检索条件"任意字段=6th IAPR International Conference on Pattern Recognition in Bioinformatics"
1869 条 记 录,以下是231-240 订阅
排序:
Promo-Zen: A Natural Language Processing Based Promotional Text Message Management System
Promo-Zen: A Natural Language Processing Based Promotional T...
收藏 引用
Advancements in Computing (ICAC), international conference on
作者: Chamath Udugampola Nethmi Weerasingha Department of Computer and Data Science NSBM Green University Homagama Sri Lanka
Promotional Short Message Service (SMS) messages, which provide frequent updates about deals and discounts to consumers, are crucial in developing countries like Sri Lanka, as they help alleviate financial pressure du... 详细信息
来源: 评论
6th international conference on Information, Communication and Computing Technology, ICICCT 2021
6th International Conference on Information, Communication a...
收藏 引用
6th international conference on Information, Communication and Computing Technology, ICICCT 2021
the proceedings contain 20 papers. the special focus in this conference is on Information, Communication and Computing Technology. the topics include: Predicting the Decomposition Level of Forest Trees through Ensembl...
来源: 评论
Credit Card Fraud Detection Using Symbolic Aggregate Approximation
Credit Card Fraud Detection Using Symbolic Aggregate Approxi...
收藏 引用
Blockchain Computing and Applications (BCCA), international conference on
作者: Snit D. Zerea Belsabel T. Woldemichael Feven B. Araya Richard A. Ikuesan College of Technological Innovation Zayed University Abu Dhabi UAE
In the current digital age, credit card fraud is a cybercrime that costs billions of dollars every year through fraudulent transactions. this study aims to identify fraudulent credit card transactions using Symbolic A... 详细信息
来源: 评论
Attack-Aware Capability Assessment Method Based on Specific Semantic Search
Attack-Aware Capability Assessment Method Based on Specific ...
收藏 引用
international conference on Electronic Engineering and Informatics (EEI)
作者: Daojuan Zhang Qi Zhao Yuman Wang Shu Li Zheng Tian Yizhen Sun State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute co. Ltd Beijing China Hunan Provincial Key Laboratory of Internet of Things in Electricity State Grid information & Communication Company of Hunan Electric Power Corporation Changsha China
In this paper, we propose an attack perception capability assessment method based on the specific semantic search for the problem of attack perception capability assessment of security protection equipment for power m... 详细信息
来源: 评论
Image Segmentation of Endoscopic Cataract Based on Semantic Segmentation  6
Image Segmentation of Endoscopic Cataract Based on Semantic ...
收藏 引用
2022 6th international conference on Machine Vision and Information Technology, CMVIT 2022
作者: Chen, Jingshi Ye, Haili Yin, Huayi Wang, Da-Han Li, Jianmin School of Computer and Information Engineering Xiamen University of Technology Xiamen361000 China Fujian Key Laboratory of Pattern Recognition and Image Understanding Xiamen361000 China
Medical imaging technology has become one of the indispensable computer-assisted intervention methods in clinical disease diagnosis and treatment, including identifying and locating lesion areas, detecting and segment... 详细信息
来源: 评论
6th international conference on Interactive Collaborative Robotics, ICR 2021
6th International Conference on Interactive Collaborative Ro...
收藏 引用
6th international conference on Interactive Collaborative Robotics, ICR 2021
the proceedings contain 19 papers. the special focus in this conference is on Interactive Collaborative Robotics. the topics include: the Efficiency Improvement of Robots Group Operation by Means of Workload Relocatio...
来源: 评论
CogIE: An Information Extraction Toolkit for Bridging Texts and CogNet  59
CogIE: An Information Extraction Toolkit for Bridging Texts ...
收藏 引用
Joint conference of 59th Annual Meeting of the Association-for-Computational-Linguistics (ACL) / 11th international Joint conference on Natural Language Processing (IJCNLP) / 6th Workshop on Representation Learning for NLP (RepL4NLP)
作者: Jin, Zhuoran Chen, Yubo Sui, Dianbo Wang, Chenhao Xue, Zhipeng Zhao, Jun Chinese Acad Sci Inst Automat Natl Lab Pattern Recognit Beijing 100190 Peoples R China Univ Chinese Acad Sci Sch Artificial Intelligence Beijing 100049 Peoples R China
CogNet is a knowledge base that integrates three types of knowledge: linguistic knowledge, world knowledge and commonsense knowledge. In this paper, we propose an information extraction toolkit, called CogIE, which is... 详细信息
来源: 评论
Brain Tumor Image Segmentation Based on Grouped Convolution  6
Brain Tumor Image Segmentation Based on Grouped Convolution
收藏 引用
2022 6th international conference on Machine Vision and Information Technology, CMVIT 2022
作者: Wu, Mingliang Ye, Hai-Li Wu, Yun Li, Jianmin School of Computer and Information Engineering Xiamen University of Technology Xiamen361000 China Fujian Key Laboratory of Pattern Recognition and Image Understanding Xiamen361000 China
the automatic segmentation of MRI multi-modal images of brain tumors is one of the important research contents of disease detection and analysis. Due to the heterogeneity of tumors, it is difficult to achieve efficien... 详细信息
来源: 评论
Fault Diagnosis in Power Transmission Line using Decision Tree and Random Forest Classifier
Fault Diagnosis in Power Transmission Line using Decision Tr...
收藏 引用
international conference on Condition Assessment Techniques in Electrical Systems (CATCON)
作者: Somesh Lahiri Chakravarty Abhijnan Maiti Abhinandan De Department of Electrical Engineering Indian Institute of Technology (BHU) Varanasi Uttar Pradesh India Department of Electrical Engineering Indian Institute of Engineering Science and Technology Shibpur West Bengal India
Fault diagnosis includes both detection of the type of fault that has occurred as well as locating the fault on a vast stretch of transmission network. there exists wide scope of application of Artificial Intelligence... 详细信息
来源: 评论
Research on Vulnerability Detection Techniques Based on Static Analysis and Program Slice
Research on Vulnerability Detection Techniques Based on Stat...
收藏 引用
international conference on Electronic Engineering and Informatics (EEI)
作者: Shubin Yuan Chenyu Liu Jianheng Shi Kai Zhang Wei Pu Xinyu Liu Liqun Yang CNOOC Information Technology Co. Ltd. Beijing Branch Beijing China CNOOC Information Technology Co. Ltd. Shenzhen China School of Cyber Science and Technology Beihang University Beijing China
Binary program vulnerabilities are particularly difficult to detect and understand using traditional methods due to their concealment and complexity. To address this challenge, we propose an innovative binary code vul... 详细信息
来源: 评论