咨询与建议

限定检索结果

文献类型

  • 2,008 篇 会议
  • 953 篇 期刊文献
  • 8 篇 学位论文
  • 1 册 图书

馆藏范围

  • 2,970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,845 篇 工学
    • 2,294 篇 计算机科学与技术...
    • 1,471 篇 软件工程
    • 797 篇 电气工程
    • 533 篇 信息与通信工程
    • 302 篇 生物医学工程(可授...
    • 232 篇 控制科学与工程
    • 224 篇 生物工程
    • 205 篇 电子科学与技术(可...
    • 140 篇 化学工程与技术
    • 133 篇 光学工程
    • 116 篇 机械工程
    • 105 篇 仪器科学与技术
    • 78 篇 安全科学与工程
    • 46 篇 材料科学与工程(可...
    • 38 篇 测绘科学与技术
    • 33 篇 交通运输工程
  • 943 篇 理学
    • 413 篇 数学
    • 284 篇 生物学
    • 279 篇 物理学
    • 150 篇 化学
    • 145 篇 统计学(可授理学、...
    • 58 篇 系统科学
  • 439 篇 管理学
    • 309 篇 图书情报与档案管...
    • 139 篇 管理科学与工程(可...
    • 29 篇 工商管理
  • 407 篇 医学
    • 325 篇 临床医学
    • 141 篇 基础医学(可授医学...
    • 77 篇 药学(可授医学、理...
  • 47 篇 农学
    • 30 篇 作物学
  • 32 篇 法学
    • 31 篇 社会学
  • 24 篇 艺术学
  • 11 篇 教育学
  • 7 篇 军事学
  • 6 篇 文学
  • 5 篇 经济学
  • 1 篇 历史学

主题

  • 2,970 篇 local binary pat...
  • 150 篇 face recognition
  • 137 篇 feature extracti...
  • 132 篇 support vector m...
  • 72 篇 texture classifi...
  • 51 篇 classification
  • 47 篇 facial expressio...
  • 38 篇 lbp
  • 37 篇 machine learning
  • 34 篇 convolutional ne...
  • 33 篇 deep learning
  • 33 篇 image retrieval
  • 30 篇 image classifica...
  • 30 篇 principal compon...
  • 29 篇 texture analysis
  • 29 篇 discrete wavelet...
  • 28 篇 texture
  • 28 篇 gabor filter
  • 27 篇 svm
  • 23 篇 image processing

机构

  • 11 篇 nanyang technol ...
  • 9 篇 jiangxi sci & te...
  • 8 篇 ngee ann polytec...
  • 6 篇 nanyang technol ...
  • 6 篇 univ nevada dept...
  • 6 篇 institute of aut...
  • 6 篇 jiangxi univ fin...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 xidian univ sch ...
  • 5 篇 chinese acad sci...
  • 5 篇 king saud univ c...
  • 5 篇 school of physic...
  • 5 篇 henan polytech u...
  • 5 篇 indian inst tech...
  • 5 篇 school of commun...
  • 5 篇 univ waterloo de...
  • 4 篇 key lab. of opti...
  • 4 篇 univ chinese aca...
  • 4 篇 southeast univ s...

作者

  • 30 篇 pietikainen matt...
  • 23 篇 zhao guoying
  • 15 篇 xie zhihua
  • 15 篇 muhammad ghulam
  • 15 篇 hussain muhammad
  • 13 篇 hadid abdenour
  • 13 篇 bebis george
  • 10 篇 karanwal shekhar
  • 10 篇 raman balasubram...
  • 10 篇 liu li
  • 10 篇 pietikäinen m
  • 10 篇 pietikäinen matt...
  • 9 篇 acharya u. rajen...
  • 9 篇 suruliandi a.
  • 8 篇 shelton joseph
  • 8 篇 freitas pedro ga...
  • 8 篇 jiang xudong
  • 8 篇 tyagi vipin
  • 8 篇 kaya yilmaz
  • 8 篇 ahonen timo

语言

  • 2,769 篇 英文
  • 140 篇 其他
  • 35 篇 中文
  • 19 篇 土耳其文
  • 3 篇 法文
  • 3 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 西班牙文
检索条件"主题词=Local binary pattern"
2970 条 记 录,以下是701-710 订阅
排序:
Construction of Delaunay Triangles for Face Recognition in Images  14
Construction of Delaunay Triangles for Face Recognition in I...
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Arunarani, A.R. Samuel, Prithi Sumathy, G. Maheshwari, A. Department of Computational Intelligence SRMIST Kattankulathur Campus Chennai India
A Delaunay graph method is a proposed solution to the matching issue in facial recognition. The techniques for feature matching and feature detection are scale-invariant feature transform (SIFT) and speeded-up robust ... 详细信息
来源: 评论
Residential Home Surveillance System
Residential Home Surveillance System
收藏 引用
2023 IEEE World Conference on Communication and Computing, WCONF 2023
作者: Murugan, Kalpana Reddy, Ramireddygari Dinesh Chandralekha, Neeli Ravikiran, Tiruveedi Deepika, Thota Kalasalingam Academy of Research and Education Department of Electronics and Communication Engineering Krishnan Koil India
An unauthorized person, or when someone approaches the home or private space without consent, is referred to as unauthorized access. These issues with unauthorized entry are being dealt with using a variety of techniq... 详细信息
来源: 评论
Automatic Attendance Monitoring System Using LBPH and HAAR Algorithm  9
Automatic Attendance Monitoring System Using LBPH and HAAR A...
收藏 引用
9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023
作者: Rathinamala, S. Karthikeyan, A. Abishek, R. Kannan, C.K. KIT-Kalaignar Karunanidhi Institute of Technology Department of Electrical and Electronics Engineering Coimbatore India
Every office and organization must have an attendance monitoring system. Every institution has a standard attendance policy that requires the professor or assistant to report the student's name and attendance for ... 详细信息
来源: 评论
Video Motion Magnification Based Approach for Improved Recognition of Spontaneous Facial Micro Expressions  3
Video Motion Magnification Based Approach for Improved Recog...
收藏 引用
3rd IEEE Asian Conference on Innovation in Technology, ASIANCON 2023
作者: Mohite, Prajyot H. Shingare, Pratibha P. Department of Electronics and Telecommunication Maharashtra Pune India
Facial expression recognition is studied extensively over decades. Recognition of subtle emotions exhibited as micro-expressions is the most challenging task. Being spontaneous, micro-expressions usually exhibited onl... 详细信息
来源: 评论
Utilising Deep Learning as a Law Enforcement Ally  3
Utilising Deep Learning as a Law Enforcement Ally
收藏 引用
3rd International Conference on Smart Data Intelligence, ICSMDI 2023
作者: Ramani, D. Roja Nirmala, M. Sourabh, V.N. Chaudhary, Shreyas Kumar, Deepesh New Horizon College of Engineering Department of Computer Science and Engineering Bengaluru India
Finding fugitive offenders after they have committed a crime or an illegal act takes time and effort. It is challenging for law enforcement authorities to complete this work on their own given the rising population de... 详细信息
来源: 评论
Coalescing color texture and shape texture for an efficient Image Retrieval  4
Coalescing color texture and shape texture for an efficient ...
收藏 引用
4th IEEE International Conference on Smart Technologies in Computing, Electrical and Electronics, ICSTCEE 2023
作者: Chelladurai, Callins Christiyana Muthumariappan, Sangeetha Chidambaram, Hari Nainyar Pillai Srm Madurai College For Engineering And Technology Computer Science And Engineering Tamilnadu Sivagangai District India
It is crucial to create indexing systems, in order to properly access the images, due to the volume of images in the digital world. Content Based Image Retrieval (CBIR) facilitates the indexing to retrieve similar ima... 详细信息
来源: 评论
Brain Tumour Ordering Using Visual Geometry Group Network
Brain Tumour Ordering Using Visual Geometry Group Network
收藏 引用
2023 International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2023
作者: Balabantaray, Subhalaxmi Rath, Mamata Samal, Tusharakanta Mishra, Manas Ranjan Engineering College Cuttack India C.V.Raman Global University Odisha India
A person's life may be significantly impacted negatively by brain tumours as they can impair cognitive function, causing memory loss, trouble concentrating, and personality or behaviour changes. By examining medic... 详细信息
来源: 评论
Encrypted Image Retrieval Scheme Based on Neural Network and LBP Mapping  29
Encrypted Image Retrieval Scheme Based on Neural Network and...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Wang, Lan Wang, Tian Wang, Zheng Jiangsu College of Finance and Accounting School of Ie Lianyungang222061 China
The privacy-preserving image retrieval research has been a hot issue for cyber-physical system security. Image encryption could effectively meet the growing privacy needs of users. However, the existing searchable enc... 详细信息
来源: 评论
Drug Consumption Detection by Eye Using Image Processing Techniques
Drug Consumption Detection by Eye Using Image Processing Tec...
收藏 引用
2023 International Conference on Computer Communication and Informatics, ICCCI 2023
作者: Pyingkodi, M. Thenmozhi, K. Wilfred Blessing, N.R. Archana, K. Arun Hiruthik, X. Dinesh Kumar, V. Kongu Engineering College Department of Computer Applications Erode India Kristu Jayanti College Department of Computer Science Bengaluru India University of Technology and Applied Sciences-Ibri Department of IT Oman Kongu Engineering College Computer Applications Erode India
Drug usage is a significant global economic issue that results in countless losses. This study suggests a convolutional neural network-based image processing method for identifying drugged eyes. The front-end packages... 详细信息
来源: 评论
local Features Based Spectral Clustering for Defect Detection  1
收藏 引用
2nd International Conference on Pan-African Intelligence and Smart Systems, PAAISS 2022
作者: Tekam Fongouo, Gael Dimitri Mpinda, Berthine Nyunga Tapamo, Jules-Raymond University of KwaZulu-Natal Durban4041 South Africa AIMS-Cameroon Crystal Garden Limbe Cameroon
Metallurgical industries want to be able to effectively control the quality of their products in order to maintain their prestige and increase their customer base. Therefore, the design and implementation of an optima... 详细信息
来源: 评论