咨询与建议

限定检索结果

文献类型

  • 1,116 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 1,121 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 692 篇 计算机科学与技术...
    • 565 篇 软件工程
    • 282 篇 信息与通信工程
    • 222 篇 生物工程
    • 129 篇 电气工程
    • 129 篇 控制科学与工程
    • 112 篇 生物医学工程(可授...
    • 95 篇 光学工程
    • 74 篇 机械工程
    • 70 篇 安全科学与工程
    • 64 篇 电子科学与技术(可...
    • 52 篇 交通运输工程
    • 51 篇 动力工程及工程热...
    • 50 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 44 篇 材料科学与工程(可...
  • 474 篇 理学
    • 235 篇 生物学
    • 169 篇 数学
    • 138 篇 物理学
    • 65 篇 统计学(可授理学、...
    • 49 篇 化学
    • 40 篇 系统科学
  • 199 篇 管理学
    • 109 篇 图书情报与档案管...
    • 107 篇 管理科学与工程(可...
    • 69 篇 工商管理
  • 97 篇 医学
    • 96 篇 临床医学
    • 92 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 38 篇 公共卫生与预防医...
  • 47 篇 法学
    • 38 篇 社会学
  • 25 篇 农学
  • 24 篇 教育学
  • 22 篇 经济学
  • 4 篇 军事学

主题

  • 86 篇 object detection
  • 46 篇 artificial intel...
  • 43 篇 deep learning
  • 42 篇 feature extracti...
  • 25 篇 computer vision
  • 25 篇 training
  • 22 篇 support vector m...
  • 21 篇 convolutional ne...
  • 20 篇 covid-19
  • 19 篇 internet of thin...
  • 19 篇 machine learning
  • 18 篇 neural networks
  • 17 篇 high performance...
  • 16 篇 intrusion detect...
  • 16 篇 big data
  • 16 篇 fault detection
  • 15 篇 anomaly detectio...
  • 15 篇 computational mo...
  • 15 篇 visualization
  • 14 篇 convolution

机构

  • 7 篇 nitte meenakshi ...
  • 6 篇 nitte meenakshi ...
  • 6 篇 uttaranchal univ...
  • 5 篇 shenyang institu...
  • 5 篇 graphic era deem...
  • 4 篇 shandong vocatio...
  • 4 篇 college of infor...
  • 4 篇 amity university...
  • 4 篇 school of automa...
  • 4 篇 beijing institut...
  • 4 篇 institute for sa...
  • 3 篇 university of sc...
  • 3 篇 china electric p...
  • 3 篇 school of inform...
  • 3 篇 chongqing vocati...
  • 3 篇 amity university...
  • 3 篇 college of compu...
  • 3 篇 1326 hopyard roa...
  • 3 篇 school of comput...
  • 3 篇 school of comput...

作者

  • 6 篇 guha tapas
  • 5 篇 pareek piyush ku...
  • 5 篇 wang li
  • 4 篇 liu xin
  • 4 篇 al-turjman fadi
  • 4 篇 trisheela s.
  • 4 篇 liu wei
  • 4 篇 zhang yu
  • 4 篇 wang lin
  • 4 篇 gupta ayan das
  • 3 篇 yeruva ajay redd...
  • 3 篇 liu yang
  • 3 篇 ganesh babu c.
  • 3 篇 bhatlawande shri...
  • 3 篇 wu haitao
  • 3 篇 rafi shaik moham...
  • 3 篇 liu fang
  • 3 篇 veena k.
  • 3 篇 li huyong
  • 3 篇 gangodkar durgap...

语言

  • 1,095 篇 英文
  • 26 篇 其他
  • 3 篇 中文
检索条件"任意字段=2022 2nd International Conference on Detection Technology and Intelligence System, DTIS 2022"
1121 条 记 录,以下是51-60 订阅
排序:
Research on Key technology of Interactive Animation Design Combined with Artificial intelligence technology  2
Research on Key Technology of Interactive Animation Design C...
收藏 引用
2nd international conference on Mechatronics, IoT and Industrial Informatics, ICMIII 2024
作者: Gao, Yingwei Changchun University of Architecture and Civil Engineering College of Cultural and Creative Industries Changchun China
Most of the existing character animation generation algorithms introduce motion capture data matching the skeleton, which cannot adapt to the complex and changeable skeleton and dynamic scene requirements. This projec... 详细信息
来源: 评论
Human detection in Aerial Images using Deep Learning Techniques  2
Human Detection in Aerial Images using Deep Learning Techniq...
收藏 引用
2nd international conference on Artificial intelligence and Signal Processing, AISP 2022
作者: Gundu, Sireesha Syed, Hussain Harikiran, J. School of CSE VIT-AP University Andhra Pradesh India
Activity recognition in drone-based surveillance is related to many computer vision problems such as pose estimation, object detection, image retrieval, face recognition, frame tagging in videos, and video action reco... 详细信息
来源: 评论
Performance Analysis of Optical-SAR Cooperative system Based on Mutual Information  2
Performance Analysis of Optical-SAR Cooperative System Based...
收藏 引用
2nd IEEE international conference on Signal, Information and Data Processing, ICSIDP 2024
作者: Wang, Chonghang Xu, Huaping Zhou, Zihan Li, Chunsheng Li, Wei Xu, Liying Beihang University School of Electronic and Information Engineering Beijing China Shanghai Institute of Satellite Engineering Shanghai China
The current research on optical-SAR cooperative work mainly focuses on the fusion of optical and SAR images, while there are fewer studies on how the optical and SAR sensor can cooperate optimally for targets survey. ... 详细信息
来源: 评论
Damage detection system of Ancient Paper Books Based on Machine Vision  2
Damage Detection System of Ancient Paper Books Based on Mach...
收藏 引用
2nd international conference on Algorithms, High Performance Computing and Artificial intelligence, AHPCAI 2022
作者: Wang, Hong Sun, Shaoming Kan, Tao Sun, Genji Hefei Institutes of Physical Science Chinese Academy of Sciences Anhui Hefei230031 China University of Science and Technology of China Anhui Hefei230026 China Zhongke Hefei Institute of Technology Innovation Engineering Anhui Hefei230088 China
In order to improve the intelligence of paper ancient books restoration and reduce the consumption of manpower and material resources, the machine vision detection technology is proposed to detect the damaged area of ... 详细信息
来源: 评论
The Object-Centric Anomaly detection for Aero-engine Blade  24
The Object-Centric Anomaly Detection for Aero-engine Blade
收藏 引用
2nd international conference on Frontiers of Intelligent Manufacturing and Automation, CFIMA 2024
作者: Lv, Xinwei Chen, Haiyong Qi, Xuan Wang, Yining Li, Dongying Zhang, Xingshun Zhang, Haode School of Artificial Intelligence and Data Science Hebei University of Technology Tianjin China
Industrial Anomaly detection (IAD) focuses on the real-time identification of various deviations that affect product quality, such as appearance defects, dimensional inaccuracies, or material performance issues. By pr... 详细信息
来源: 评论
Intrusion detection in Network Security  2
Intrusion Detection in Network Security
收藏 引用
2nd Guangdong-Hong Kong-Macao Greater Bay Area Artificial intelligence and Big Data Forum, AIBDF 2022
作者: Wang, Ru-Xin Wang, Yi Dai, Lei School of Xinjiang Institute of Technology School of Economics Trade and Management Aksu Xinjiang735400 China
With the development of computer network technology, the risk of network intrusion also increases greatly. But the traditional encryption and firewall technology can not meet the security needs of today. Therefore, in... 详细信息
来源: 评论
A detection Method for Local Wire Bond Failure in IGBT Based on High-Frequency Time-Domain Reflective Signal Response Analysis  2
A Detection Method for Local Wire Bond Failure in IGBT Based...
收藏 引用
IEEE 2nd international conference on Power Science and technology (ICPST)
作者: Xie, Wangyu Liu, Chang Wang, Weijie Xiang, Chaoqun Yuan, Weiyu Cheng, Shu China Acad Railway Sci Co Ltd Locomot & Car Res Inst Beijing Peoples R China Beijing Zongheng Electromech Technol Co Ltd Beijing Peoples R China Cent South Univ Traff & Transportat Engn Changsha Peoples R China
Wire bond lift-off and fracture are the main causes of failure in power semiconductor devices, with IGBT being a representative example. The key external characteristic of such failures is an increase in impedance flu... 详细信息
来源: 评论
2nd international conference on Information technology, InCITe 2022
2nd International Conference on Information Technology, InCI...
收藏 引用
2nd international conference on Information technology, InCITe 2022
The proceedings contain 72 papers. The special focus in this conference is on Information technology. The topics include: Recommender system Based on Network Structure Link Analysis Technique Through Community Detecti...
来源: 评论
A high-accuracy ensemble method of convolutional neural networks for damaged building detection on post hurricane satellite images  2
A high-accuracy ensemble method of convolutional neural netw...
收藏 引用
2022 2nd international conference on Artificial intelligence, Big Data and Algorithms, CAIBDA 2022
作者: Zhang, Zhiyang Faculty of Information Technology Macau University of Science and Technology Taipa China
After hurricane disasters, rapid damage assessment is critical to ensure an effective response. However, the current method for building damage assessment requires intense time and human resources. The emerging high-r... 详细信息
来源: 评论
Research on artificial intelligence logistics distribution route management system based on computer information technology  2
Research on artificial intelligence logistics distribution r...
收藏 引用
2nd international Signal Processing, Communications and Engineering Management conference, ISPCEM 2022
作者: Zhang, Zhishuai School of Management Tianjin University of Technology Tianjin China
This paper introduces two shortest path algorithms under computer information technology, and introduces some applications of them in logistics management. Dijkstra algorithm and Floyd algorithm are used to solve the ... 详细信息
来源: 评论