咨询与建议

限定检索结果

文献类型

  • 57 篇 会议
  • 9 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 68 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 44 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 7 篇 电气工程
    • 5 篇 信息与通信工程
    • 2 篇 动力工程及工程热...
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 地质资源与地质工...
    • 1 篇 交通运输工程
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 理学
    • 5 篇 数学
    • 2 篇 生物学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 26 篇 pattern recognit...
  • 5 篇 feature extracti...
  • 5 篇 artificial intel...
  • 5 篇 training
  • 4 篇 histograms
  • 3 篇 decision support...
  • 3 篇 electroencephalo...
  • 3 篇 handheld compute...
  • 3 篇 soft computing
  • 3 篇 clustering algor...
  • 3 篇 user interfaces ...
  • 3 篇 accuracy
  • 3 篇 computer vision
  • 3 篇 computation by a...
  • 3 篇 image processing...
  • 2 篇 conferences
  • 2 篇 eigenvalues and ...
  • 2 篇 neurons
  • 2 篇 information syst...
  • 2 篇 simulation and m...

机构

  • 2 篇 cyber security r...
  • 2 篇 cyber threat int...
  • 1 篇 faculty of scien...
  • 1 篇 university of so...
  • 1 篇 research institu...
  • 1 篇 edith cowan univ...
  • 1 篇 department of me...
  • 1 篇 univ ostrava ins...
  • 1 篇 berkeley initiat...
  • 1 篇 department of kn...
  • 1 篇 dept. of compute...
  • 1 篇 tech univ ostrav...
  • 1 篇 national laborat...
  • 1 篇 tech univ darmst...
  • 1 篇 hiroshima univ g...
  • 1 篇 dept. of computi...
  • 1 篇 indian statistic...
  • 1 篇 mrc clinical sci...
  • 1 篇 school of inform...
  • 1 篇 leria - ufr scie...

作者

  • 2 篇 joo kooi tan
  • 2 篇 yong gan
  • 2 篇 de-shuang huang
  • 2 篇 hyoungseop kim
  • 2 篇 lu hanqing
  • 2 篇 prashan premarat...
  • 2 篇 kyungsook han
  • 2 篇 chrisina jayne
  • 2 篇 maarof mohd aiza...
  • 2 篇 seiji ishikawa
  • 2 篇 zainal anazida
  • 2 篇 wang jinqiao
  • 1 篇 afaf ben brahim
  • 1 篇 ajith
  • 1 篇 herbert t.
  • 1 篇 jomaa diala
  • 1 篇 ariffin nurfadil...
  • 1 篇 hasna chaibi
  • 1 篇 sk. md. masudul ...
  • 1 篇 kono kazuhiro

语言

  • 66 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"任意字段=7th International Conference of Soft Computing and Pattern Recognition, SoCPaR 2015"
68 条 记 录,以下是1-10 订阅
排序:
Proceedings of the 2015 7th international conference of soft computing and pattern recognition, socpar 2015
Proceedings of the 2015 7th International Conference of Soft...
收藏 引用
7th international conference of soft computing and pattern recognition, socpar 2015
the proceedings contain 63 papers. the topics discussed include: evolutionary multi-view face tracking on pixel replaced image in video sequence;sensitivity analysis of echo state networks for forecasting pseudo-perio...
来源: 评论
8th international conference on soft computing and pattern recognition, socpar 2016
8th International Conference on Soft Computing and Pattern R...
收藏 引用
8th international conference on soft computing and pattern recognition, socpar 2016
the proceedings contain 70 papers. the special focus in this conference is on soft computing and pattern recognition. the topics include: Toward real-time high-frequency stock monitoring system using ***;sensitivity a...
来源: 评论
Proceedings of the 12th international conference on soft computing and pattern recognition (socpar 2020)  1st ed. 2021
Proceedings of the 12th International Conference on Soft Com...
收藏 引用
丛书名: Advances in Intelligent Systems and computing
2021年
作者: Ajith Abraham Yukio Ohsawa Niketa Gandhi M.A. Jabbar Abdelkrim Haqiq Seán McLoone Biju Issac
来源: 评论
FTIP: a Tool for an Image Plagiarism Detection  7
FTIP: a Tool for an Image Plagiarism Detection
收藏 引用
7th international conference of soft computing and pattern recognition (socpar)
作者: Hurtik, Petr Hodakova, Petra Univ Ostrava Inst Res & Applicat Fuzzy Modeling Ctr Excellence IT4Innovat 30 Dubna 22 CZ-70103 Ostrava 1 Czech Republic
the goal of this paper is to introduce a task of image plagiarism detection. More specifically, we propose a method of searching for a plagiarized image in a database. the main requirements for searching in the databa... 详细信息
来源: 评论
Quantitative Network Analysis for Passenger pattern recognition An Analysis of Railway Stations  7
Quantitative Network Analysis for Passenger Pattern Recognit...
收藏 引用
7th international conference of soft computing and pattern recognition (socpar)
作者: Zsifkovits, Martin Nistor, Marian Sorin Meyer-Nieberg, Silja Univ Bundeswehr Munchen Inst Operat Res Neubiberg Germany
As recent attacks in trains and train stations show, the protections of such critical infrastructure plays a major role for public decision makers. thereby, security installations in the railway network are a frequent... 详细信息
来源: 评论
soft Local Binary patterns  7
Soft Local Binary Patterns
收藏 引用
7th international conference of soft computing and pattern recognition (socpar)
作者: Li, Ran Li, Xuezhen Kurita, Takio Hiroshima Univ Grad Sch Engn Higashihiroshima Hiroshima 7398521 Japan Sharp Co Ltd Stuart Network Software Dev Dept Higashihiroshima Hiroshima 7390146 Japan
Local Binary pattern (LBP) is known as one of the most effective local descriptors for image recognition. It is invariant to monotonic gray-scale changes of the image. Local neighborhood information is gathered for ea... 详细信息
来源: 评论
Automated generation of fuzzy rules from large-scale network traffic analysis in Digital Forensics Investigations  7
Automated generation of fuzzy rules from large-scale network...
收藏 引用
7th international conference of soft computing and pattern recognition (socpar)
作者: Shalaginov, Andrii Franke, Katrin Gjovik Univ Coll Norwegian Informat Secur Lab Ctr Cyber & Informat Secur Gjovik Norway
this paper describes ongoing study and first results on the application of Neuro-Fuzzy (NF) to support large-scale forensics investigation in the domain of Network Forensics. In particular we focus on patterns of beni... 详细信息
来源: 评论
Global, Local and Embedded Architectures for Multiclass Classification with Foreign Elements Rejection: an Overview  7
Global, Local and Embedded Architectures for Multiclass Clas...
收藏 引用
7th international conference of soft computing and pattern recognition (socpar)
作者: Homenda, Wladyslaw Jastrzebska, Agnieszka Vilnius Univ Bialystok Fac Econ & Informat Kalvariju G 135 LT-08221 Vilnius Lithuania Warsaw Univ Technol Fac Math & Informat Sci PL-00662 Warsaw Poland
In the paper we look closely at the issue of contaminated data sets, where apart from proper elements we may have garbage. In a typical scenario, further classification of such data sets is always negatively influence... 详细信息
来源: 评论
Face sketch recognition using local invariant features  7
Face sketch recognition using local invariant features
收藏 引用
7th international conference of soft computing and pattern recognition, socpar 2015
作者: tharwat, Alaa Mahdi, Hani Hennawy, Adel El Hassanien, Aboul Ella Faculty of Engineering Suez Canal University Ismailia Egypt Faculty of Engineering Ain Shams University Cairo Egypt Faculty of Computers and Information Cairo University Cairo Egypt Faculty of Computers and Information Beni Suef University Egypt Egypt
Face sketch recognition is one of the recent biometrics, which is used to identify criminals. In this paper, a proposed model is used to identify face sketch images based on local invariant features. In this model, tw... 详细信息
来源: 评论
Image encryption scheme for secure digital images based on 3D cat map and Turing machine  7
Image encryption scheme for secure digital images based on 3...
收藏 引用
7th international conference of soft computing and pattern recognition, socpar 2015
作者: Mohamed, Nehal A. El-Azeim, Mostafa A. Zaghloul, Alaa El-Latif, Ahmed A. Abd Dept. of Computer Science Faculty of Information Technology MUST University 6th October Egypt Dept. of Computer Science Faculty of Information Technology AASTMT Heliopolis Egypt Dept. of Mathematics Faculty of Science Menoufia University Shebin El-Koom Egypt
In present time, in order to provide security of multimedia data while transmission and storage processes, the protection of image data can be accomplished using encryption. this paper presents a new image encryption ... 详细信息
来源: 评论