咨询与建议

限定检索结果

文献类型

  • 688 篇 会议
  • 89 册 图书
  • 11 篇 期刊文献

馆藏范围

  • 788 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 490 篇 工学
    • 420 篇 计算机科学与技术...
    • 198 篇 软件工程
    • 91 篇 信息与通信工程
    • 84 篇 电气工程
    • 54 篇 控制科学与工程
    • 32 篇 生物医学工程(可授...
    • 30 篇 生物工程
    • 21 篇 光学工程
    • 19 篇 电子科学与技术(可...
    • 13 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 材料科学与工程(可...
    • 9 篇 机械工程
    • 9 篇 安全科学与工程
    • 8 篇 环境科学与工程(可...
    • 8 篇 网络空间安全
  • 153 篇 理学
    • 93 篇 数学
    • 35 篇 生物学
    • 34 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 17 篇 化学
    • 12 篇 系统科学
  • 75 篇 管理学
    • 41 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 69 篇 医学
    • 64 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 10 篇 药学(可授医学、理...
  • 20 篇 法学
    • 16 篇 社会学
  • 9 篇 艺术学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 133 篇 pattern recognit...
  • 47 篇 artificial intel...
  • 43 篇 computer imaging...
  • 31 篇 machine learning
  • 27 篇 feature extracti...
  • 20 篇 affective comput...
  • 19 篇 image processing...
  • 18 篇 cloud computing
  • 17 篇 information syst...
  • 17 篇 neural networks
  • 17 篇 data mining
  • 16 篇 pattern matching
  • 16 篇 computer vision
  • 15 篇 deep learning
  • 15 篇 information syst...
  • 14 篇 pattern classifi...
  • 14 篇 computer communi...
  • 14 篇 computer applica...
  • 14 篇 emotion recognit...
  • 13 篇 support vector m...

机构

  • 7 篇 university of ch...
  • 5 篇 indian statistic...
  • 5 篇 fujian key labor...
  • 5 篇 school of comput...
  • 4 篇 university of te...
  • 4 篇 bournemouth univ...
  • 4 篇 institute of com...
  • 4 篇 school of inform...
  • 4 篇 gdynia maritime ...
  • 3 篇 friedrich alexan...
  • 3 篇 department of co...
  • 3 篇 university of mi...
  • 3 篇 school of electr...
  • 3 篇 institute of hea...
  • 3 篇 universidad esta...
  • 3 篇 johns hopkins un...
  • 3 篇 universidad andr...
  • 3 篇 univ chinese aca...
  • 2 篇 fgan-fom researc...
  • 2 篇 univ mysore dept...

作者

  • 6 篇 de-shuang huang
  • 6 篇 wang da-han
  • 6 篇 suen ching y.
  • 5 篇 yang jie
  • 5 篇 shivakumara pala...
  • 4 篇 julie a. jacko
  • 4 篇 ireneusz czarnow...
  • 4 篇 maier andreas
  • 4 篇 alfonso mateos c...
  • 3 篇 chen yiqiang
  • 3 篇 jianhua tao
  • 3 篇 umapada pal
  • 3 篇 liu cheng-lin
  • 3 篇 filipe portela
  • 3 篇 fotouhi javad
  • 3 篇 akira notsu
  • 3 篇 seiki ubukata
  • 3 篇 katsuhiro honda
  • 3 篇 navab nassir
  • 3 篇 unberath mathias

语言

  • 768 篇 英文
  • 14 篇 其他
  • 11 篇 中文
检索条件"任意字段=Proceedings of the 2019 8th International Conference on Computing and Pattern Recognition"
788 条 记 录,以下是371-380 订阅
排序:
Optimization Heuristics for computing the Voronoi Skeleton  19th
Optimization Heuristics for Computing the Voronoi Skeleton
收藏 引用
19th Annual international conference on Computational Science (ICCS)
作者: Kotsur, Dmytro Tereshchenko, Vasyl Software Competence Ctr Hagenberg SCCH Softwarepk 21 A-4232 Hagenberg Austria Taras Shevchenko Natl Univ Kyiv Volodymyrska Str 60 UA-01033 Kiev Ukraine
A skeletal representation of geometrical objects is widely used in computer graphics, computer vision, image processing, and pattern recognition. therefore, efficient algorithms for computing planar skeletons are of h... 详细信息
来源: 评论
2nd international conference on Recent Trends in Advanced computing, ICRTAC - DISRUP - TIV INNOVATION 2019
2nd International Conference on Recent Trends in Advanced Co...
收藏 引用
8th international Symposium on Highly-Efficient Accelerators and Reconfigurable Technologies, HEART 2017
the proceedings contain 47 papers. the topics discussed include: damage observation in glass fiber reinforced composites via Î88;-tomography;impact response of sandwich panels with polyurethane and polystyrene...
来源: 评论
Test pattern generation using NLFSR for detecting single stuck-at faults  8
Test pattern generation using NLFSR for detecting single stu...
收藏 引用
8th IEEE international conference on Communication and Signal Processing, ICCSP 2019
作者: Varun Teja, N. Prabhu, E. Department of Electronics and Communication Engineering Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India
the generation of test patterns for the detection of faults in VLSI circuits is the most integral part of fault detection. the patterns are generated using Pseudorandom Number Generator (PRNG) and applied to the circu... 详细信息
来源: 评论
8th CCF international conference on Natural Language Processing and Chinese computing, NLPCC 2019
8th CCF International Conference on Natural Language Process...
收藏 引用
8th CCF international conference on Natural Language Processing and Chinese computing, NLPCC 2019
the proceedings contain 65 papers. the special focus in this conference is on Natural Language Processing and Chinese computing. the topics include: Using Bidirectional Transformer-CRF for Spoken Language Understandin...
来源: 评论
A Systematic Literature Review of the Mobile Application for Object recognition for Visually Impaired People
A Systematic Literature Review of the Mobile Application for...
收藏 引用
international conference on Information Technology and Multimedia (ICIM)
作者: Zulfadhlina Amira Nor Hisham Masyura Ahmad Faudzi Azimah Abdul Ghapar Fiza Abdul Rahim College of Computing and Informatics Universiti Tenaga Nasional Malaysia Institute of Informatics and Computing in Energy Universiti Tenaga Nasional Malaysia
Nowadays, mobile applications or also known as mobile apps are one of the most important sources of communication and gives a lot of benefits to a person. Mobile technology advancements have brought an excessive chang... 详细信息
来源: 评论
Texture Image Retrieval Using Multiple Filters and Decoded Sparse Local Binary pattern  8th
Texture Image Retrieval Using Multiple Filters and Decoded S...
收藏 引用
8th international conference on pattern recognition and Machine Intelligence (PReMI)
作者: Hatibaruah, Rakcinpha Nath, Vijay Kumar Hazarika, Deepika Tezpur Univ Dept Elect & Commun Engn Tezpur Assam India
In local pattern based feature extraction, usually the raw spatial image provides limited information about the relationship between the pixels in a local neighborhood. A few recent methods address this issue by first... 详细信息
来源: 评论
proceedings of the 8th international Advance computing conference, IACC 2018
Proceedings of the 8th International Advance Computing Confe...
收藏 引用
8th international Advance computing conference, IACC 2018
the proceedings contain 60 papers. the topics discussed include: 3D-printed sole with variable density using foot plantar pressure measurements;HUPM: efficient high utility pattern mining algorithm for e-business;Pubw...
来源: 评论
Integrating Activity recognition and Nursing Care Records: the System, Experiment, and the Dataset
Integrating Activity Recognition and Nursing Care Records: t...
收藏 引用
international conference on Informatics, Electronics & Vision (ICIEV)
作者: Sozo Inoue Tittaya Mairittha Nattaya Mairittha Tahera Hossain Kyushu Institute of Technology Kitakyushu JAPAN
In this paper, we introduce a system that integrates activity recognition, which collects various activities of the elderly people of a nursing care facility in Japan. this system incorporates various activity levels,... 详细信息
来源: 评论
A New Algorithm for Designing Θ-Fuzzy Associative Memories Based on Subsethood Measures
A New Algorithm for Designing Θ-Fuzzy Associative Memories ...
收藏 引用
IEEE international conference on Fuzzy Systems (FUZZ-IEEE)
作者: Sussner, Peter Esmi, Estevao Florindo, Joao Univ Estadual Campinas Dept Appl Math IMECC Campinas SP Brazil
A (weighted) theta-fuzzy associative memory can be viewed as single hidden layer neural network whose inputs are drawn from an arbitrary bounded lattice L. the xi th hidden node applies a function theta(xi) : L -> ... 详细信息
来源: 评论
Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing  8
Artificial intelligence based network intrusion detection wi...
收藏 引用
8th IEEE international conference on Communication and Signal Processing, ICCSP 2019
作者: Kanimozhi, V. Prem Jacob, T. Department of Computer Science Sathyabama Institute of Science and Technology Chennai India
One of the latest emerging technologies is artificial intelligence, which makes the machine mimic human behavior. the most important component used to detect cyber attacks or malicious activities is the Intrusion Dete... 详细信息
来源: 评论