咨询与建议

限定检索结果

文献类型

  • 6,791 篇 会议
  • 633 册 图书
  • 130 篇 期刊文献

馆藏范围

  • 7,553 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 3,897 篇 工学
    • 3,088 篇 计算机科学与技术...
    • 1,403 篇 软件工程
    • 792 篇 电气工程
    • 677 篇 信息与通信工程
    • 503 篇 控制科学与工程
    • 299 篇 生物工程
    • 281 篇 生物医学工程(可授...
    • 265 篇 机械工程
    • 191 篇 光学工程
    • 163 篇 电子科学与技术(可...
    • 145 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 59 篇 安全科学与工程
    • 45 篇 材料科学与工程(可...
    • 36 篇 交通运输工程
  • 1,220 篇 理学
    • 671 篇 数学
    • 356 篇 物理学
    • 334 篇 生物学
    • 198 篇 统计学(可授理学、...
    • 147 篇 化学
    • 105 篇 系统科学
  • 553 篇 管理学
    • 314 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 274 篇 医学
    • 230 篇 临床医学
    • 109 篇 基础医学(可授医学...
    • 75 篇 药学(可授医学、理...
  • 66 篇 法学
    • 62 篇 社会学
  • 51 篇 艺术学
    • 49 篇 设计学(可授艺术学...
  • 42 篇 农学
    • 39 篇 作物学
  • 21 篇 教育学
  • 19 篇 文学
  • 18 篇 经济学
  • 5 篇 军事学

主题

  • 3,151 篇 pattern recognit...
  • 534 篇 feature extracti...
  • 430 篇 artificial intel...
  • 385 篇 neural networks
  • 295 篇 data mining
  • 282 篇 machine learning
  • 233 篇 face recognition
  • 224 篇 pattern matching
  • 215 篇 support vector m...
  • 203 篇 image segmentati...
  • 194 篇 pattern classifi...
  • 193 篇 computer imaging...
  • 183 篇 computer science
  • 182 篇 local binary pat...
  • 168 篇 computational mo...
  • 159 篇 computer vision
  • 147 篇 humans
  • 146 篇 testing
  • 143 篇 accuracy
  • 141 篇 training

机构

  • 40 篇 school of comput...
  • 38 篇 national laborat...
  • 25 篇 institute of ima...
  • 24 篇 center for resea...
  • 24 篇 computer vision ...
  • 22 篇 institute of ima...
  • 22 篇 university of ch...
  • 21 篇 department of co...
  • 20 篇 indian statistic...
  • 19 篇 national laborat...
  • 19 篇 institute of com...
  • 16 篇 tongji universit...
  • 16 篇 chinese academy ...
  • 15 篇 institute for pa...
  • 14 篇 national center ...
  • 14 篇 chinese acad sci...
  • 14 篇 częstochowa univ...
  • 13 篇 agh university o...
  • 13 篇 school of electr...
  • 12 篇 indian stat inst...

作者

  • 35 篇 yang jie
  • 31 篇 de-shuang huang
  • 25 篇 tieniu tan
  • 23 篇 umapada pal
  • 19 篇 ryszard tadeusie...
  • 19 篇 liang wang
  • 18 篇 ajith abraham
  • 17 篇 marcin korytkows...
  • 17 篇 lu hanqing
  • 17 篇 jacek m. zurada
  • 17 篇 leszek rutkowski
  • 16 篇 jie yang
  • 16 篇 zhenan sun
  • 16 篇 shamsuddin siti ...
  • 16 篇 pal umapada
  • 15 篇 wang da-han
  • 15 篇 chew lim tan
  • 15 篇 rafał scherer
  • 14 篇 xu changsheng
  • 14 篇 lotfi a. zadeh

语言

  • 7,404 篇 英文
  • 84 篇 其他
  • 77 篇 中文
检索条件"任意字段=International Conference on Soft Computing and Pattern Recognition"
7555 条 记 录,以下是441-450 订阅
排序:
Acceptance and shipping warehouse zones calculation using serverless approach  12
Acceptance and shipping warehouse zones calculation using se...
收藏 引用
12th IEEE international Scientific Technical conference on Dependable Systems, Services and Technologies (DESSERT) - Dependable and Trustworthy AI, IoE, Big Data Analytics for a Safe and Secure World
作者: Muliarevych, Oleksandr Lviv Polytech Natl Univ Dept Elect Comp Machines Lvov Ukraine
This article describes methodology of acceptance and shipping zones calculation during warehouse design procedure. This study demonstrates complexity of searching for optimal design solution because of big number of i... 详细信息
来源: 评论
Research and Implementation of Flow pattern recognition for Gas-liquid Two-phase Flows Based on GoogLeNet  2
Research and Implementation of Flow Pattern Recognition for ...
收藏 引用
2021 2nd international Symposium on Automation, Information and computing, ISAIC 2021
作者: Yuan, Jiaxin Kan, Zhe School of Information and Control Engineering Liaoning Petrochemical University Fushun China
In order to solve the flow pattern recognition problem of gas-liquid two-phase flow in pipelines, this paper uses high-speed photography to sample the flow patterns of transparent pipe sections and combines the GoogLe... 详细信息
来源: 评论
Multi-Module Collaborative Remote Control System for Robot with Target recognition-Tracking-Capture
Multi-Module Collaborative Remote Control System for Robot w...
收藏 引用
IEEE international conference on Real-time computing and Robotics (RCAR)
作者: Deshan Yang Xuesong Wu Kangjia Fu Chong Sun Xiang Zhang Qi Zhang Northwestern Polytechnical University in Xi'an China National Innovation Institute of Defense Technology Beijing China National Innovation Institute of Defense Technology China
This paper introduces a multi-module collaborative remote control system for real-time soft robot operation, integrating visual recognition, tracking, and capture methods. The system comprises a client-side, including... 详细信息
来源: 评论
international conference on Intelligent Manufacturing and Energy Sustainability, ICIMES 2023
International Conference on Intelligent Manufacturing and En...
收藏 引用
international conference on Intelligent Manufacturing and Energy Sustainability, ICIMES 2023
The proceedings contain 53 papers. The special focus in this conference is on Intelligent Manufacturing and Energy Sustainability. The topics include: Computational Studies on Single-Wall Rotating Vaneless Diffuser of...
来源: 评论
Understanding the Influence of Extremely High-Degree Nodes on Graph Anomaly Detection  27th
Understanding the Influence of Extremely High-Degree Nodes...
收藏 引用
27th international conference on pattern recognition, ICPR 2024
作者: Sun, Xun Xiao, Xi Wang, Zhaoguo Hu, Guangwu Jiang, Xuhui Zhang, Bin Li, Hao Shenzhen International Graduate School Tsinghua University Shenzhen China Ministry of Education Chengdu China Shenzhen China Shenzhen Institute of Information Technology Shenzhen China Institute of Computing Technology CAS Beijing China Peng Cheng Laboratory Shenzhen China National Key Laboratory of Advanced Communication Network Shijiazhuang China
Graph Anomaly Detection (GAD) has attracted considerable attention for its potential in detecting anomalies. However, an overlooked issue in prior research is the presence of extremely high-degree node, which can intr... 详细信息
来源: 评论
Genetic Encryption of Safeguarding IoT Image Data with DNA-Based Security Measures
Genetic Encryption of Safeguarding IoT Image Data with DNA-B...
收藏 引用
Sustainable computing and Smart Systems (ICSCSS), international conference on
作者: R. Yuvarani R. Mahaveerakannan Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamilnadu India
In order to secure Internet of Things (IoT) devices, this research has developed a revolutionary lightweight encryption method that draws inspiration from the concepts of DNA. Our approach incorporates secret code uti... 详细信息
来源: 评论
A Novel Ambipolar Ferroelectric Tunnel FINFET Based computing-in-Memory for Quantized Neural Networks with High Area- and Energy-Efficiency
A Novel Ambipolar Ferroelectric Tunnel FINFET Based Computin...
收藏 引用
China Semiconductor Technology international conference (CSTIC)
作者: Runze Han Jin Luo Shengjie Cao Qianqian Huang Ru Huang Academy for Advanced Interdisciplinary Studies Peking University Beijing China School of Integrated Circuits Peking University Beijing China Beijing Advanced Innovation Center for Integrated Circuits Beijing China
In this work, for the first time, a novel ambipolar ferroelectric tunnel FET (FeTFET) based computing-in-memory (CIM) scheme is proposed and experimentally demonstrated for quantized neural networks (QNNs) with high a... 详细信息
来源: 评论
A Proposal of an Improved Maximum Bayes Boundary-Ness Training Method  22
A Proposal of an Improved Maximum Bayes Boundary-Ness Traini...
收藏 引用
5th international conference on Signal Processing and Machine Learning, SPML 2022
作者: Kishishita, Koki Katagiri, Shigeru Ohsaki, Miho Division of Information Science Nara Institute of Science and Technology Japan Graduate School of Science and Engineering Doshisha University Kyoto Japan
One ultimate objective of statistical pattern recognition is to achieve the optimal status that produces Bayes error and its corresponding Bayes boundary. To compute such parameters of pattern recognizers without requ... 详细信息
来源: 评论
Research on Fast Steel Surface Deficiency Detection System based on FPGA  3
Research on Fast Steel Surface Deficiency Detection System b...
收藏 引用
3rd international conference on Applied Mathematics, Modelling, and Intelligent computing, CAMMIC 2023
作者: Wang, Yaoyao Liu, Dengfeng School of Artificial Intelligence and Computer Jiangnan University Wuxi214122 China Jiangsu Provincial Engineering Laboratory of Pattern Recognition and Computational Intelligence Jiangnan University Wuxi214122 China
Convolutional neural network-related applications have now been developed on a variety of platforms, including CPUs, GPUs, and others, but most of them sacrificed energy consumption to achieve good performance. Theref... 详细信息
来源: 评论
Intrusion Detection System based on pattern recognition using CNN
Intrusion Detection System based on Pattern Recognition usin...
收藏 引用
Sustainable computing and Smart Systems (ICSCSS), international conference on
作者: k. Azarudeen S.Harish Kumar T.V. Aswin Vijay P. Thirukumaran V.S Barath Balaji Department of CSE Velammal college of engineering and technology Madurai India
The Intrusion Detection System (IDS) is a security tool that uses pattern recognition algorithms to detect unusual activity in a network. IDS-based pattern recognition techniques search through network traffic for pat...
来源: 评论