咨询与建议

限定检索结果

文献类型

  • 303 篇 期刊文献
  • 241 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 546 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 450 篇 工学
    • 269 篇 计算机科学与技术...
    • 137 篇 电气工程
    • 84 篇 信息与通信工程
    • 56 篇 控制科学与工程
    • 46 篇 软件工程
    • 31 篇 仪器科学与技术
    • 22 篇 机械工程
    • 21 篇 生物医学工程(可授...
    • 19 篇 测绘科学与技术
    • 19 篇 环境科学与工程(可...
    • 15 篇 化学工程与技术
    • 13 篇 电子科学与技术(可...
    • 12 篇 网络空间安全
    • 11 篇 材料科学与工程(可...
    • 9 篇 石油与天然气工程
    • 9 篇 交通运输工程
    • 7 篇 生物工程
  • 123 篇 理学
    • 37 篇 生物学
    • 35 篇 数学
    • 23 篇 物理学
    • 23 篇 化学
    • 13 篇 地球物理学
    • 7 篇 统计学(可授理学、...
  • 85 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 8 篇 公共管理
    • 7 篇 图书情报与档案管...
  • 53 篇 医学
    • 28 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 23 篇 农学
    • 10 篇 作物学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 法学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 546 篇 classification a...
  • 98 篇 machine learning
  • 39 篇 feature extracti...
  • 37 篇 data mining
  • 28 篇 feature selectio...
  • 19 篇 support vector m...
  • 14 篇 deep learning
  • 12 篇 random forest
  • 11 篇 support vector m...
  • 11 篇 decision tree
  • 11 篇 classification a...
  • 10 篇 clustering algor...
  • 9 篇 fault diagnosis
  • 8 篇 ensemble learnin...
  • 8 篇 svm
  • 8 篇 big data
  • 8 篇 artificial intel...
  • 8 篇 accuracy
  • 7 篇 learning (artifi...
  • 7 篇 machine learning...

机构

  • 4 篇 city univ hong k...
  • 3 篇 univ elect sci &...
  • 3 篇 yonsei univ yons...
  • 3 篇 yonsei univ dept...
  • 3 篇 jiangsu univ dep...
  • 2 篇 queens univ dept...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 korea univ sch i...
  • 2 篇 virginia polytec...
  • 2 篇 jiangsu univ sch...
  • 2 篇 shanghai maritim...
  • 2 篇 yunnan univ sch ...
  • 2 篇 tianjin univ col...
  • 2 篇 hubei univ techn...
  • 2 篇 iiit delhi dept ...
  • 2 篇 university of ch...
  • 2 篇 arizona state un...
  • 2 篇 intercell ag a-1...
  • 2 篇 kiit deemed univ...
  • 2 篇 isfahan univ tec...

作者

  • 4 篇 zhou ding-xuan
  • 3 篇 xia ji'an
  • 3 篇 roy asim
  • 3 篇 chen quansheng
  • 3 篇 zhang yan
  • 3 篇 zhao jiewen
  • 3 篇 sharma anuradha
  • 3 篇 peng yi
  • 3 篇 sun yunshan
  • 3 篇 han sanghoon
  • 3 篇 zhang liyi
  • 3 篇 qin yong
  • 3 篇 shen yan
  • 3 篇 yadav monika
  • 2 篇 ding wei
  • 2 篇 cobourn kelly m.
  • 2 篇 priambodo bagus
  • 2 篇 wang jing
  • 2 篇 zhang wenyu
  • 2 篇 shatabda swakkha...

语言

  • 510 篇 英文
  • 31 篇 其他
  • 2 篇 土耳其文
  • 2 篇 中文
检索条件"主题词=classification Algorithm"
546 条 记 录,以下是421-430 订阅
排序:
Patterns of brain structural connectivity differentiate normal weight from overweight subjects
收藏 引用
NEUROIMAGE-CLINICAL 2015年 7卷 506-517页
作者: Gupta, Arpana Mayer, Emeran A. Sanmiguel, Claudia P. Van Horn, John D. Woodworth, Davis Ellingson, Benjamin M. Fling, Connor Love, Aubrey Tillisch, Kirsten Labus, Jennifer S. Univ Calif Los Angeles Gail & Gerald Oppenheimer Family Ctr Neurobiol St IBOP Los Angeles CA USA Univ Calif Los Angeles David Geffen Sch Med Los Angeles CA 90095 USA Univ Calif Los Angeles Div Digest Dis Los Angeles CA USA Univ Calif Los Angeles Ahmanson Lovelace Brain Mapping Ctr Los Angeles CA USA Univ Calif Los Angeles GLA VHA Integrat Med Los Angeles CA USA Univ So Calif Keck Sch Med Inst Neuroimaging & Informat Los Angeles CA 90033 USA Univ Calif Los Angeles David Geffen Sch Med Radiol Los Angeles CA 90095 USA
Background: Alterations in the hedonic component of ingestive behaviors have been implicated as a possible risk factor in the pathophysiology of overweight and obese individuals. Neuroimaging evidence from individuals... 详细信息
来源: 评论
The Application of Negative Selection algorithm in Multi-angle Infrared Vehicle Images Recognition  38
The Application of Negative Selection Algorithm in Multi-ang...
收藏 引用
38th International Conference on Telecommunications and Signal Processing (TSP)
作者: Yu, Xi Fu, Dongmei Yang, Tao Riha, Kamil Univ Sci & Technol Beijing Sch Infommt & Engeering Xueyuan Rd Beijing 100083 Peoples R China Brno Univ Technol Dept Telecommun Tech 12 Brno 61600 Czech Republic
At present, the objects of the vehicle recognition based on image processing are mostly visible images with rich details and limited camera angles. Few studies have been done on the recognition of multi-angle infrared... 详细信息
来源: 评论
ARSkNN-A k-NN Classifier Using Mass Based Similarity Measure
ARS<i>k</i>NN-A <i>k</i>-NN Classifier Using Mass Based Simi...
收藏 引用
International Conference on Information and Communication Technologies (ICICT)
作者: Kumar, Ashish Bhatnagar, Roheet Srivastava, Sumit Manipal Univ Jaipur Jaipur 303007 Rajasthan India
k-Nearest Neighbor (k-NN) classification technique is one of the most elementary and straightforward classification methods. Although distance learning is in the core of k-NN classification, similarity can be preferre... 详细信息
来源: 评论
The data retrieval optimization from the perspective of evidence-based medicine
The data retrieval optimization from the perspective of evid...
收藏 引用
3rd International Conference on Innovative Network Systems and Applications (iNetSApp) held in conjunction with Federated Conference on Computer Science and Information Systems (FedCSIS)
作者: Dobrynin, Vladimir Balykina, Julia Kamalov, Michael Kolbin, Alexey Verbitskaya, Elena Kasimova, Munira St Petersburg State Univ Univ Skaya 7-9 St Petersburg 199034 Russia Pavlov First St Petersburg State Med Univ St Petersburg Russia Tashkent Inst Postgrad Med Educ Tashkent Uzbekistan
The paper is devoted to classification of MEDLINE abstracts into categories that correspond to types of medical interventions - types of patient treatments. This set of categories was extracted from *** web site. Few ... 详细信息
来源: 评论
Blood Donor's safety using Data Mining  1
Blood Donor's safety using Data Mining
收藏 引用
International Conference on Green Computing and Internet of Things (ICGCIoT)
作者: Patil, Rohini Pawar, Pooja Poi, Madhu Patil, Tejashree Ghuse, Namrata SITRC Dept Comp Sci Nasik India
Blood is most essential constituent in human body. Blood centers collect, process and transport blood to hospitals and other health care centers. Sometimes blood is collected directly from blood donors rather than tak... 详细信息
来源: 评论
Classifying and Passing 3D Obstacles for Autonomous Driving  18
Classifying and Passing 3D Obstacles for Autonomous Driving
收藏 引用
18th IEEE International Conference on Intelligent Transportation Systems
作者: Delp, Michael Nagasaka, Naoki Kamata, Nobuhide James, Michael R. Toyota Res Inst North Amer 1555 Woodridge Ave Ann Arbor MI 48105 USA
Highly automated driving in real world situations requires perception and planning to account for other forms of human locomotion, principally bicycles, and pedestrians, in addition to vehicles. Here we present a comp... 详细信息
来源: 评论
Dynamic Partial Reconfiguration implementation of the SVM/KNN multi-classifier on FPGA for Bioinformatics application  37
Dynamic Partial Reconfiguration implementation of the SVM/KN...
收藏 引用
37th Annual International Conference of the IEEE-Engineering-in-Medicine-and-Biology-Society (EMBC)
作者: Hussain, Hanaa M. Benkrid, Khaled Seker, Huseyin PAAET Coll Technol Studies Elect Engn Technol Dept Shuwaikh 70654 Kuwait Univ Edinburgh Sch Engn & Elect Kings BldgMayfield Rd Edinburgh EH9 3JL Midlothian Scotland Northumbria Univ Dept Comp Sci & Digital Technol Fac Engn & Environm Newcastle Upon Tyne NE1 8ST Tyne & Wear England
Bioinformatics data tend to be highly dimensional in nature thus impose significant computational demands. To resolve limitations of conventional computing methods, several alternative high performance computing solut... 详细信息
来源: 评论
Improving Spam Detection in Online Social Networks  1
Improving Spam Detection in Online Social Networks
收藏 引用
2015 International Conference on Cognitive Computing and Information Processing (CCIP)
作者: Gupta, Arushi Kaushal, Rishabh Indira Gandhi Delhi Tech Univ Women Dept Informat Technol Delhi India
Online Social Networks (OSNs) are deemed to be the most sought-after societal tool used by the masses world over to communicate and transmit information. Our dependence on these platforms for seeking opinions, news, u... 详细信息
来源: 评论
An Empirical Comparison of Classifiers to Analyze Intrusion Detection  5
An Empirical Comparison of Classifiers to Analyze Intrusion ...
收藏 引用
5th International Conference on Advanced Computing & Communication Technologies (ACCT)
作者: Aggarwal, Preeti Sharma, Sudhir Kumar Ansal Univ Sch Engn & Technol Gurgaon India
The massive data exchange on the web has deeply increased the risk of malicious activities thereby propelling the research in the area of Intrusion Detection System (IDS). This paper aims to first select ten classific... 详细信息
来源: 评论
Detection and Prevention of Code Injection Attacks on HTML5-based Apps  3
Detection and Prevention of Code Injection Attacks on HTML5-...
收藏 引用
3rd International Conference on Advanced Cloud and Big Data (CBD)
作者: Xiao, Xi Yan, Ruibo Ye, Runguo Li, Qing Peng, Sancheng Jiang, Yong Tsinghua Univ Grad Sch Shenzhen Shenzhen Peoples R China China Elect Standardizat Inst Beijing Peoples R China Zhaoqing Univ Sch Comp Sci Zhaoqing Peoples R China
Security on mobile devices is becoming increasingly important. HTML5 are widely used to develop mobile applications due to its portability on multi platforms. However it is allowed to mix data and code together in web... 详细信息
来源: 评论