咨询与建议

限定检索结果

文献类型

  • 6,797 篇 会议
  • 632 册 图书
  • 126 篇 期刊文献

馆藏范围

  • 7,554 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 3,891 篇 工学
    • 3,084 篇 计算机科学与技术...
    • 1,402 篇 软件工程
    • 793 篇 电气工程
    • 676 篇 信息与通信工程
    • 501 篇 控制科学与工程
    • 298 篇 生物工程
    • 281 篇 生物医学工程(可授...
    • 265 篇 机械工程
    • 189 篇 光学工程
    • 162 篇 电子科学与技术(可...
    • 144 篇 仪器科学与技术
    • 140 篇 化学工程与技术
    • 59 篇 安全科学与工程
    • 45 篇 材料科学与工程(可...
    • 36 篇 交通运输工程
  • 1,220 篇 理学
    • 671 篇 数学
    • 357 篇 物理学
    • 333 篇 生物学
    • 197 篇 统计学(可授理学、...
    • 147 篇 化学
    • 105 篇 系统科学
  • 553 篇 管理学
    • 314 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 273 篇 医学
    • 230 篇 临床医学
    • 109 篇 基础医学(可授医学...
    • 75 篇 药学(可授医学、理...
  • 66 篇 法学
    • 62 篇 社会学
  • 51 篇 艺术学
    • 49 篇 设计学(可授艺术学...
  • 42 篇 农学
    • 39 篇 作物学
  • 21 篇 教育学
  • 19 篇 文学
  • 17 篇 经济学
  • 5 篇 军事学

主题

  • 3,153 篇 pattern recognit...
  • 537 篇 feature extracti...
  • 434 篇 artificial intel...
  • 385 篇 neural networks
  • 295 篇 data mining
  • 282 篇 machine learning
  • 233 篇 face recognition
  • 224 篇 pattern matching
  • 216 篇 support vector m...
  • 203 篇 image segmentati...
  • 195 篇 computer imaging...
  • 194 篇 pattern classifi...
  • 183 篇 computer science
  • 182 篇 local binary pat...
  • 172 篇 computational mo...
  • 152 篇 training
  • 147 篇 computer vision
  • 145 篇 testing
  • 141 篇 humans
  • 139 篇 accuracy

机构

  • 40 篇 school of comput...
  • 38 篇 national laborat...
  • 25 篇 institute of ima...
  • 24 篇 center for resea...
  • 24 篇 computer vision ...
  • 22 篇 institute of ima...
  • 22 篇 university of ch...
  • 21 篇 department of co...
  • 20 篇 indian statistic...
  • 19 篇 national laborat...
  • 19 篇 institute of com...
  • 16 篇 tongji universit...
  • 16 篇 chinese academy ...
  • 15 篇 institute for pa...
  • 14 篇 national center ...
  • 14 篇 chinese acad sci...
  • 14 篇 częstochowa univ...
  • 13 篇 agh university o...
  • 13 篇 school of electr...
  • 12 篇 indian stat inst...

作者

  • 35 篇 yang jie
  • 31 篇 de-shuang huang
  • 25 篇 tieniu tan
  • 23 篇 umapada pal
  • 19 篇 ryszard tadeusie...
  • 19 篇 liang wang
  • 18 篇 ajith abraham
  • 17 篇 marcin korytkows...
  • 17 篇 lu hanqing
  • 17 篇 jacek m. zurada
  • 17 篇 leszek rutkowski
  • 16 篇 jie yang
  • 16 篇 zhenan sun
  • 16 篇 shamsuddin siti ...
  • 16 篇 pal umapada
  • 15 篇 wang da-han
  • 15 篇 chew lim tan
  • 15 篇 rafał scherer
  • 14 篇 xu changsheng
  • 14 篇 lotfi a. zadeh

语言

  • 7,273 篇 英文
  • 216 篇 其他
  • 81 篇 中文
检索条件"任意字段=International Conference on Soft Computing and Pattern Recognition"
7556 条 记 录,以下是611-620 订阅
排序:
Enhancing 3D Referential Grounding by Learning Coarse Spatial Relationships  27th
Enhancing 3D Referential Grounding by Learning Coarse Spati...
收藏 引用
27th international conference on pattern recognition, ICPR 2024
作者: Joshi, Soham Tripathi, Aditay Gopalakrishnan, Viswanath Chakraborty, Anirban International Institute of Information Technology Bangalore India Indian Institute of Science Bengaluru India
Large-scale pre-training is commonly used in 2D referential grounding tasks owing to the easy availability of a large number of image-text pairs with corresponding bounding box annotations. However, for 3D referential... 详细信息
来源: 评论
Abundant Semantic Information Module for Object Detection  2
Abundant Semantic Information Module for Object Detection
收藏 引用
2nd international conference on Algorithms, High Performance computing and Artificial Intelligence, AHPCAI 2022
作者: Wu, Taida Li, Qishen Li, Qiufeng Gao, Jun School of Information Engineering Nanchang Hangkong University Jiangxi Nanchang China School of Software Nanchang Hangkong University Jiangxi Nanchang China Key Laboratory of Jiangxi Province for Image Processing and Pattern Recognition Jiangxi Nanchang China Jiangxi Nanchang China
Nowadays, with the high-speed iteration of convolution neural network, the efficient object detector emerges one after another. As an important branch of computer vision, object detection aims to detect where and what... 详细信息
来源: 评论
Computation Caching in Mobile Convolutional Neural Network Inference
Computation Caching in Mobile Convolutional Neural Network I...
收藏 引用
IEEE international conference on Performance, computing and Communications (IPCCC)
作者: James Mariani Li Xiao Department of Computer Science Michigan State University
Computer vision on smartphones is commonly achieved through the use of convolutional neural networks (CNNs). CNNs offer accurate image recognition, but struggle with latency when run with resource constraints. Current... 详细信息
来源: 评论
Relaxed Dissimilarity-based Symbolic Histogram Variants for Granular Graph Embedding  13
Relaxed Dissimilarity-based Symbolic Histogram Variants for ...
收藏 引用
13th international Joint conference on Computational Intelligence (IJCCI) / 13th international conference on Evolutionary Computation Theory and Applications (ECTA)
作者: Baldini, Luca Martino, Alessio Rizzi, Antonello Univ Roma La Sapienza Dept Informat Engn Elect & Telecommun Via Eudossiana 18 I-00184 Rome Italy Italian Natl Res Council Inst Cognit Sci & Technol ISTC CNR Via San Martino della Battaglia 44 I-00185 Rome Italy LUISS Univ Dept Business & Management Viale Romania 32 I-00197 Rome Italy
Graph embedding is an established and popular approach when designing graph-based pattern recognition systems. Amongst the several strategies, in the last ten years, Granular computing emerged as a promising framework... 详细信息
来源: 评论
Blockchain and Machine Learning for Advanced pattern recognition in Biometric Security Systems
Blockchain and Machine Learning for Advanced Pattern Recogni...
收藏 引用
international conference on Contemporary computing and Informatics (IC3I)
作者: K Mayuri B S Smitha Ginni Nijhawan Bolleddu Devananda Rao Shubhi Gupta Ali Albawi Department of Computer Science and Engineering Institute of Aeronautical Engineering Hyderabad Telangana India New Horizon College of Engineering Bangalore India Lovely Professional University Phagwara Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Telangana India Amity School of Engineering Technology Amity University Greater Noida Uttar Pradesh India Radiology Techniques Department College of Medical Technology The Islamic University Najaf Iraq
Blockchain and machine learning allow biometric security systems to recognize complex patterns. This study analyzes how two unique technologies may improve fingerprint system safety and reliability. To demonstrate blo... 详细信息
来源: 评论
Swin Transformer with Multi-Scale Residual Attention for Semantic Segmentation of Remote Sensing Images  11
Swin Transformer with Multi-Scale Residual Attention for Sem...
收藏 引用
11th international conference on computing and pattern recognition, ICCPR 2022
作者: Lin, Yuanyang Wang, Da-Han Wu, Yun Zhu, Shunzhi Fujian Key Laboratory of Pattern Recognition and Image Understanding Xiamen University of Technology Xiamen361024 China
Semantic segmentation of remote sensing images usually faces the problems of unbalanced foreground-background, large variation of object scales, and significant similarity of different classes. The FCN-based fully con... 详细信息
来源: 评论
Intricacy of CNN and RL with Substantiation of CNN Model in Simulated Self-Driving Environment
Intricacy of CNN and RL with Substantiation of CNN Model in ...
收藏 引用
Cognitive computing in Engineering, Communications, Sciences and Biomedical Health Informatics (IC3ECSBHI), international conference on
作者: Trilok Kumar Saini Akanksha Maurya Devanshu Dhyani Anju Saini Defence Electronics Applications Laboratory DRDO Dehradun India Dept. of Computer Science and Engg. Graphic Era Deemed to be University Dehradun India Dept. of Mathematics Graphic Era Deemed to be University Dehradun India
Machine Learning (ML) has emerged as a technological revolution that has incarnated advancements across various domains. Incorporating machine learning in technology opens a new paradigm for technology innovation. The... 详细信息
来源: 评论
Audio Encryption Using AES and Cellular Automata
Audio Encryption Using AES and Cellular Automata
收藏 引用
international conference on computing and Networking Technology (ICCNT)
作者: Amireddy Shashank Reddy Dishan Narsimhachari Achar Madithilveedu Sheethal Mol Niharika Panda Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Securing digital audio data during any transmission or storage is essential for ensuring privacy and confidentiality. Traditional encryption techniques like Advanced Encryption Standard (AES) offer high security, but ... 详细信息
来源: 评论
Evaluation of Vietnamese Speech recognition Platforms  21
Evaluation of Vietnamese Speech Recognition Platforms
收藏 引用
5th international conference on Machine Learning and soft computing, ICMLSC 2021
作者: Diep, Hai Thanh Nguyen, Thi-My-Thanh Le, Bich Ngoc Dao, Quy Xuan Eastern International University Viet Nam
The purpose of this paper is to evaluate the performance of Vietnamese speech recognition systems provided by top Vietnamese companies such as Vais, Vtcc, Fpt, and Google. This paper presents the results in applying V... 详细信息
来源: 评论
Language-agnostic speech anger identification  44
Language-agnostic speech anger identification
收藏 引用
44th international conference on Telecommunications and Signal Processing (TSP)
作者: Saitta, Alessandra Ntalampiras, Stavros Univ Milan Dept Comp Sci Milan Italy
Following the constantly increasing adoption of affective computing based solutions, this paper investigates the feasibility of multilingual anger identification. To this end, we formed such a corpus by suitably combi... 详细信息
来源: 评论