咨询与建议

限定检索结果

文献类型

  • 1,926 篇 会议
  • 12 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 1,948 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,032 篇 工学
    • 909 篇 计算机科学与技术...
    • 491 篇 软件工程
    • 297 篇 控制科学与工程
    • 122 篇 信息与通信工程
    • 115 篇 电气工程
    • 73 篇 生物工程
    • 44 篇 生物医学工程(可授...
    • 40 篇 仪器科学与技术
    • 34 篇 机械工程
    • 30 篇 电子科学与技术(可...
    • 21 篇 化学工程与技术
    • 21 篇 网络空间安全
    • 13 篇 光学工程
    • 9 篇 动力工程及工程热...
  • 321 篇 理学
    • 211 篇 数学
    • 91 篇 生物学
    • 82 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 28 篇 物理学
    • 17 篇 化学
  • 287 篇 管理学
    • 218 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 35 篇 医学
    • 30 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 21 篇 药学(可授医学、理...
  • 21 篇 法学
    • 20 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 7 篇 教育学
    • 7 篇 教育学
  • 6 篇 军事学
  • 5 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学

主题

  • 493 篇 machine learning
  • 165 篇 data mining
  • 155 篇 computer science
  • 153 篇 machine learning...
  • 141 篇 support vector m...
  • 118 篇 cybernetics
  • 105 篇 neural networks
  • 94 篇 clustering algor...
  • 90 篇 computer network...
  • 88 篇 learning systems
  • 80 篇 educational inst...
  • 80 篇 distributed comp...
  • 66 篇 electronic mail
  • 66 篇 artificial intel...
  • 64 篇 support vector m...
  • 62 篇 algorithm design...
  • 60 篇 humans
  • 59 篇 pattern recognit...
  • 58 篇 testing
  • 57 篇 application soft...

机构

  • 63 篇 department of co...
  • 40 篇 department of co...
  • 24 篇 school of comput...
  • 23 篇 department of co...
  • 14 篇 machine learning...
  • 14 篇 department of co...
  • 14 篇 college of mecha...
  • 13 篇 school of comput...
  • 12 篇 college of compu...
  • 12 篇 institute of com...
  • 11 篇 hebei univ coll ...
  • 8 篇 institute of com...
  • 8 篇 school of comput...
  • 7 篇 department of in...
  • 7 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 department of au...
  • 7 篇 department of in...
  • 6 篇 key laboratory o...
  • 6 篇 key laboratory o...

作者

  • 26 篇 yeung daniel s.
  • 22 篇 d.s. yeung
  • 16 篇 xi-zhao wang
  • 12 篇 hui wang
  • 12 篇 ng wing w. y.
  • 12 篇 tsang eric c. c.
  • 11 篇 e.c.c. tsang
  • 11 篇 daniel s. yeung
  • 11 篇 kuan-quan wang
  • 10 篇 wang xi-zhao
  • 10 篇 yeung
  • 10 篇 tsang
  • 9 篇 jane you
  • 9 篇 you jane
  • 9 篇 zhang david
  • 8 篇 qing he
  • 8 篇 de-gang chen
  • 7 篇 qing-hua li
  • 7 篇 yu zhiwen
  • 7 篇 li le

语言

  • 1,905 篇 英文
  • 40 篇 其他
  • 3 篇 中文
检索条件"任意字段=International Conference on Machine Learning and Computing(ICMLC 2009)"
1948 条 记 录,以下是1501-1510 订阅
排序:
Design and Implementation of Speech Interaction System in Pervasive computing Environment
Design and Implementation of Speech Interaction System in Pe...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Li-fen Jiang Gui-zhang Lu Yun-wei Xin Zhang-lin Li College of Computer and Information Engineering of Tianjin Medical University Tianjin China Institute of Robotics and Information Automatic System Nankai University Tianjin China
Pervasive computing, with its focus on users, has the potential to fundamentally change the way people use computers, which challenges the traditional human-machine interaction mode and requires more natural interacti... 详细信息
来源: 评论
The Improvement on Algorithm of DNA computing on 0-1 Planning Problem
The Improvement on Algorithm of DNA Computing on 0-1 Plannin...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Kang Zhou Xiao-jun Tong Jin Xu Department of Control Science and Engineer Huazhong University of Science and Technology Wuhan China Department of Mathematics and Physics Wuhan Polytechnic University Wuhan China
The old algorithm to solve 0-1 planning problem using DNA computing only searches the feasible solution set from all solution set, then we give an algorithm which can search optimization solution of 0-1 planning probl... 详细信息
来源: 评论
Attributes Reduction Based on Rough Set
Attributes Reduction Based on Rough Set
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: E Xu Xue-dong Gao Wen-dong Tan Department of Computing Science Liaoning Institute of Technology Jinzhou 121001 China School of Management University of Science and Technology Beijing Beijing 100083 China. E-MAIL: Exu21@*** School of Management University of Science and Technology Beijing Beijing China Department of Computing Science Liaoning Institute of Technology Jinzhou China
Attributes reduction is one major problems in rough set theory. A method of attributes reduction based on scan vector is proposed in this paper. Firstly, define a new conception of discernible vector by which we can t... 详细信息
来源: 评论
Fusion of Multiple Features for Palmprint Authentication
Fusion of Multiple Features for Palmprint Authentication
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Xiang-qian Wu Kuan-quan Wang David Zhang School of Computer Science and Technology Harbin Institute of Technology Harbin China Department of Computing Hong Kong Polytechnic University Hong Kong China
A palmprint image contains abundant features, such as the ridges, lines and textures, etc. Different features reflect the different characteristic of the palmprint. Fusion of multiple palmprint features may enhance th... 详细信息
来源: 评论
Experimental Comparison Between Implicit and Explicit MCSs Construction Methods
Experimental Comparison Between Implicit and Explicit MCSs C...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Patrick P.K. Chan Aki F. Chan Eric C. C. Tsang Daniel S. Yeung Dept. of Comput. Hong Kong Polytech. Univ. Kowloon Department of computing The Hong Kong Polytechnic University Kowloon Hong Kong
Multiple classifier machines (MCSs) is a very popular research topic in recent years. It has been proved theoretically and empirically to outperform single classifiers in many scenarios. Creating diverse sets of class... 详细信息
来源: 评论
An Intrusion-Tolerant Intrusion Detection Method Based on Real-Time Sequence Analysis
An Intrusion-Tolerant Intrusion Detection Method Based on Re...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Feng Zhao Qing-hua Li Li Jin School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
One of the most advanced research issues in network security is intrusion-tolerant intrusion detection, which has become another essential technique to protect computer systems and prevent the intrusion from generatin... 详细信息
来源: 评论
An Algorithm of Sticker DNA Chip Model on Making Spanning Tree Problem
An Algorithm of Sticker DNA Chip Model on Making Spanning Tr...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Kang Zhou Xiao-jun Tong Jin Xu Department of Control Science and Engineer Huazhong University of Science and Technology Wuhan China Department of Mathematics and Physics Wuhan Polytechnic University Wuhan China
In this paper, we set up sticker DNA chip model whose essential bio-chemical experiments and their realization of process are discussed. Then we put forward a DNA algorithm of making spanning tree problem and its bio-... 详细信息
来源: 评论
Rule Induction from Numerical Data Based on Rough Sets Theory
Rule Induction from Numerical Data Based on Rough Sets Theor...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Su-yun Zhao Wing W. Y. Ng Eric C. C. Tsang Daniel S. Yeung De-gang Chen Department of computing Hong Kong Polytechnic University Hong Kong China Department of Mathematics and Physics North China Electric Power University Beijing China
To induce rules from numerical data by rough sets, there are two kinds of methods. One is to discretize the original data and then apply the crisp rough sets models. Here the rough sets models which can only deal with... 详细信息
来源: 评论
Construction Engineering Decision Support Enabled by Minimization of Localized Generalization Error of RBFNN
Construction Engineering Decision Support Enabled by Minimiz...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Ming Lu Wing W. Y. Ng Daniel S. Yeung Wah-ho Chan Department of Civil and Structure Engineering Hong Kong Polytechnic University Hong Kong China Media and Life Science Computing Laboratory Shenzhen Graduate School Harbin Institute of Technology Shenzhen China Department of Computing Hong Kong Polytechnic University Hong Kong China
In an attempt to address the limitations of neural modeling in engineering applications, we draw on a novel localized generalization error model to train RBFNN on a dataset obtained from the domain of construction eng... 详细信息
来源: 评论
Fault Tolerant Differential Evolution Based Optimal Reactive Power Flow
Fault Tolerant Differential Evolution Based Optimal Reactive...
收藏 引用
international conference on machine learning and Cybernetics (icmlc)
作者: Sheng Su C.y. Chung K.p. Wong Y.f. Fung D.s. Yeung Department of Electrical Engineering Huazhong University of Science and Technology Wuhan Hubei China Computational Intelligence Applications Research Laboratory Department of Electrical Engineering Hong Kong Polytechnic University Hong Kong China Department of Computing Hong Kong Polytechnic University Hong Kong China
Differential evolution (DE) is a new branch of evolutionary algorithms (EAs) and has been successfully applied to solve the optimal reactive power flow (ORPF) problems in power systems. Although DE can avoid premature... 详细信息
来源: 评论