咨询与建议

限定检索结果

文献类型

  • 6,793 篇 会议
  • 630 册 图书
  • 130 篇 期刊文献

馆藏范围

  • 7,552 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 3,899 篇 工学
    • 3,090 篇 计算机科学与技术...
    • 1,403 篇 软件工程
    • 794 篇 电气工程
    • 679 篇 信息与通信工程
    • 503 篇 控制科学与工程
    • 299 篇 生物工程
    • 281 篇 生物医学工程(可授...
    • 265 篇 机械工程
    • 191 篇 光学工程
    • 163 篇 电子科学与技术(可...
    • 145 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 59 篇 安全科学与工程
    • 45 篇 材料科学与工程(可...
    • 36 篇 交通运输工程
  • 1,222 篇 理学
    • 673 篇 数学
    • 356 篇 物理学
    • 334 篇 生物学
    • 198 篇 统计学(可授理学、...
    • 147 篇 化学
    • 105 篇 系统科学
  • 553 篇 管理学
    • 314 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 274 篇 医学
    • 230 篇 临床医学
    • 109 篇 基础医学(可授医学...
    • 75 篇 药学(可授医学、理...
  • 66 篇 法学
    • 62 篇 社会学
  • 51 篇 艺术学
    • 49 篇 设计学(可授艺术学...
  • 42 篇 农学
    • 39 篇 作物学
  • 21 篇 教育学
  • 19 篇 文学
  • 18 篇 经济学
  • 5 篇 军事学

主题

  • 3,150 篇 pattern recognit...
  • 535 篇 feature extracti...
  • 429 篇 artificial intel...
  • 385 篇 neural networks
  • 295 篇 data mining
  • 278 篇 machine learning
  • 234 篇 face recognition
  • 224 篇 pattern matching
  • 215 篇 support vector m...
  • 203 篇 image segmentati...
  • 194 篇 pattern classifi...
  • 193 篇 computer imaging...
  • 183 篇 computer science
  • 182 篇 local binary pat...
  • 168 篇 computational mo...
  • 159 篇 computer vision
  • 147 篇 humans
  • 146 篇 testing
  • 142 篇 accuracy
  • 141 篇 training

机构

  • 40 篇 school of comput...
  • 38 篇 national laborat...
  • 25 篇 institute of ima...
  • 24 篇 center for resea...
  • 24 篇 computer vision ...
  • 22 篇 institute of ima...
  • 22 篇 university of ch...
  • 21 篇 department of co...
  • 20 篇 indian statistic...
  • 19 篇 national laborat...
  • 19 篇 institute of com...
  • 16 篇 tongji universit...
  • 16 篇 chinese academy ...
  • 15 篇 institute for pa...
  • 14 篇 national center ...
  • 14 篇 chinese acad sci...
  • 14 篇 częstochowa univ...
  • 13 篇 agh university o...
  • 13 篇 school of electr...
  • 12 篇 indian stat inst...

作者

  • 35 篇 yang jie
  • 31 篇 de-shuang huang
  • 25 篇 tieniu tan
  • 23 篇 umapada pal
  • 19 篇 ryszard tadeusie...
  • 19 篇 liang wang
  • 18 篇 ajith abraham
  • 17 篇 marcin korytkows...
  • 17 篇 lu hanqing
  • 17 篇 jacek m. zurada
  • 17 篇 leszek rutkowski
  • 16 篇 jie yang
  • 16 篇 zhenan sun
  • 16 篇 shamsuddin siti ...
  • 16 篇 pal umapada
  • 15 篇 wang da-han
  • 15 篇 chew lim tan
  • 15 篇 rafał scherer
  • 14 篇 xu changsheng
  • 14 篇 lotfi a. zadeh

语言

  • 7,403 篇 英文
  • 84 篇 其他
  • 77 篇 中文
检索条件"任意字段=International Conference on Soft Computing and Pattern Recognition"
7554 条 记 录,以下是121-130 订阅
排序:
The Conglomerate Compression Approach for Visual pattern recognition Networks in Edge AI Applications  6
The Conglomerate Compression Approach for Visual Pattern Rec...
收藏 引用
6th IEEE Pune Section international conference, PuneCon 2023
作者: Bhalgaonkar, Seema Munot, Mousami Anuse, Alwin SCTR's Pune Institute of Computer Technology & PES's Mcoe Sppu Dept of E&tc Pune India SCTR's Pune Institute of Computer Technology Sppu Dept of E&tc Pune India School of Ece Dr. Vishwanath Karad MIT-WPU Pune411038 India
Deep Neural Networks have shown remarkable performance in various applications of Visual pattern recognition (VPR). This field continues to grow due to emergence of new architectures, availability of huge data, and po... 详细信息
来源: 评论
Narratives in Teaching Artificial Intelligence Technologies
Narratives in Teaching Artificial Intelligence Technologies
收藏 引用
international conference on soft computing and Measurements (SCM)
作者: Petr N. Afonin I. P. Aleshin E. I. Antonova A. I. Krasnova Russian Customs Academy St. Petersburg Russia Technopark «Quantorium» (Municipal Autonomous institution of additional Education «Vladivostok City Palace of Creativity») Vladivostok Russia Vladivostok Branch of the Russian Customs Academy Vladivostok Russia St. Petersburg named after V. B. Bobkov branch of the Russian Customs Academy St. Petersburg Russia
The article considers the development of a narrative approach to teaching artificial intelligence in a departmental university based on the formation of simulator systems that allow implementing integrated approaches ... 详细信息
来源: 评论
SMS Phishing Dataset for Machine Learning and pattern recognition  1
收藏 引用
14th international conference on soft computing and pattern recognition, SoCPaR 2022, and the 14th World Congress on Nature and Biologically Inspired computing, NaBIC 2022
作者: Mishra, Sandhya Soni, Devpriya Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Sector-128 Noida201304 India
The reliability of the dataset is an essential factor for solving classification problems. Data is required for training, testing, classification, and evaluation of the machine learning models. SMS Phishing (Smishing)... 详细信息
来源: 评论
pattern recognition and Modelling in Electrocardiogram Signals: Early Detection of Myocardial Ischemia and Infraction  2
Pattern Recognition and Modelling in Electrocardiogram Signa...
收藏 引用
2nd international conference on Edge computing and Applications, ICECAA 2023
作者: Muthalagu, R. Ramachandran, R. Anuradha, T. Anupama, P.H. Jose Anand, A. Agni College of Technology Department of Electronics and Communication Engineering Tamil Nadu 600130 India Rajalakshmi Engineering College Department of Bio Medical Engineering Tamil Nadu 602105 India Kcg College of Technology Department of Electrical and Electronics Engineering Tamil Nadu 600097 India Department of Electronics and Communication Engineering KCG College of Technology Tamil Nadu 600097 India
pattern recognition and modeling in electrocardiogram (ECG) signals play an important role in the early detection of myocardial ischemia and infarction, which are serious cardiovascular diseases that require immediate... 详细信息
来源: 评论
Research on pattern recognition of Urban and Rural Consumption Behavior Based on Machine Learning and Its Application in Digital Economy  2
Research on Pattern Recognition of Urban and Rural Consumpti...
收藏 引用
2nd international conference on Mechatronics, IoT and Industrial Informatics, ICMIII 2024
作者: Mu, Xiaowei Liu, Yan Sheng, Zhijun Chen, Jiahui Changchun Normal University Changchun Humanities and Sciences College Changchun China Changchun Humanities and Sciences College Changchun China Changchun University of Science and Technology Changchun China
This paper introduces an SVM algorithm for studying consumer behavior. This model is a new pattern recognition algorithm based on statistical principle. It has unique advantages in dealing with small samples, nonlinea... 详细信息
来源: 评论
Hybrid soft computing Based Approach for Ageing in Face recognition  2
Hybrid Soft Computing Based Approach for Ageing in Face Reco...
收藏 引用
2nd international conference on Advance computing and Innovative Technologies in Engineering, ICACITE 2022
作者: Sinha, Divyanshu Pandey, J.P. Chauhan, Bhavesh Uttarakhand Technical University Dehradun India Madan Mohan Malviya University of Technology Department of Electrical Engineering Gorakhpur India Srmcem Lucknow Department of Electronics and Communication Engineering India
soft computing is a set of techniques for addressing special class of complex problems which involve the use of computationally intelligent systems. The fusion of Deep Learning and soft computing tools like Neural Net... 详细信息
来源: 评论
Privacy-Preserving Average Consensus for Multi-Agent System with Event-Triggered Method  6
Privacy-Preserving Average Consensus for Multi-Agent System ...
收藏 引用
6th IEEE international conference on pattern recognition and Artificial Intelligence, PRAI 2023
作者: Shi, Shuyu Cao, Xinyang Zhang, Qingmiao Chengdu Foreign Languages School International Department Chengdu China
The paper considers the privacy-preserving and communication constraints for multi-Agent systems. Firstly, a lightweight, decentralized, time-varying transformation method is introduced to prevent information leakage ... 详细信息
来源: 评论
Boundary Defense Against Black-box Adversarial Attacks  26
Boundary Defense Against Black-box Adversarial Attacks
收藏 引用
26th international conference on pattern recognition / 8th international Workshop on Image Mining - Theory and Applications (IMTA)
作者: Aithal, Manjushree B. Li, Xiaohua SUNY Binghamton Dept Elect & Comp Engn Binghamton NY 13902 USA
Black-box adversarial attacks generate adversarial samples via iterative optimizations using repeated queries. Defending deep neural networks against such attacks has been challenging. In this paper, we propose an eff... 详细信息
来源: 评论
Evaluating Communication pattern Representations in Execution Trace Gantt Charts
Evaluating Communication Pattern Representations in Executio...
收藏 引用
2024 IEEE Working conference on software Visualization
作者: Scully-Allison, Connor Isaacs, Katherine E. Univ Utah Sci Comp & Imaging Inst SCI Salt Lake City UT 84112 USA
Gantt charts are frequently used to explore execution traces of large-scale parallel programs. In these visualizations, each parallel processor is assigned a row showing the computation state of a processor at a parti... 详细信息
来源: 评论
Multilayer Online Self-Acquired Knowledge Distillation  26
Multilayer Online Self-Acquired Knowledge Distillation
收藏 引用
26th international conference on pattern recognition / 8th international Workshop on Image Mining - Theory and Applications (IMTA)
作者: Tzelepi, Maria Symeonidis, Charalampos Nikolaidis, Nikos Tefas, Anastasios Aristotle Univ Thessaloniki Dept Informat Thessaloniki Greece
Online knowledge distillation has been proposed as an auspicious approach for circumventing the flaws of the conventional offline distillation (i.e., complex, and computationally and memory demanding process). In this... 详细信息
来源: 评论