咨询与建议

限定检索结果

文献类型

  • 1,116 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 1,121 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 692 篇 计算机科学与技术...
    • 565 篇 软件工程
    • 282 篇 信息与通信工程
    • 222 篇 生物工程
    • 129 篇 电气工程
    • 129 篇 控制科学与工程
    • 112 篇 生物医学工程(可授...
    • 95 篇 光学工程
    • 74 篇 机械工程
    • 70 篇 安全科学与工程
    • 64 篇 电子科学与技术(可...
    • 52 篇 交通运输工程
    • 51 篇 动力工程及工程热...
    • 50 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 44 篇 材料科学与工程(可...
  • 474 篇 理学
    • 235 篇 生物学
    • 169 篇 数学
    • 138 篇 物理学
    • 65 篇 统计学(可授理学、...
    • 49 篇 化学
    • 40 篇 系统科学
  • 199 篇 管理学
    • 109 篇 图书情报与档案管...
    • 107 篇 管理科学与工程(可...
    • 69 篇 工商管理
  • 97 篇 医学
    • 96 篇 临床医学
    • 92 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 38 篇 公共卫生与预防医...
  • 47 篇 法学
    • 38 篇 社会学
  • 25 篇 农学
  • 24 篇 教育学
  • 22 篇 经济学
  • 4 篇 军事学

主题

  • 86 篇 object detection
  • 46 篇 artificial intel...
  • 43 篇 deep learning
  • 42 篇 feature extracti...
  • 25 篇 computer vision
  • 25 篇 training
  • 22 篇 support vector m...
  • 21 篇 convolutional ne...
  • 20 篇 covid-19
  • 19 篇 internet of thin...
  • 19 篇 machine learning
  • 18 篇 neural networks
  • 17 篇 high performance...
  • 16 篇 intrusion detect...
  • 16 篇 big data
  • 16 篇 fault detection
  • 15 篇 anomaly detectio...
  • 15 篇 computational mo...
  • 15 篇 visualization
  • 14 篇 convolution

机构

  • 7 篇 nitte meenakshi ...
  • 6 篇 nitte meenakshi ...
  • 6 篇 uttaranchal univ...
  • 5 篇 shenyang institu...
  • 5 篇 graphic era deem...
  • 4 篇 shandong vocatio...
  • 4 篇 college of infor...
  • 4 篇 amity university...
  • 4 篇 school of automa...
  • 4 篇 beijing institut...
  • 4 篇 institute for sa...
  • 3 篇 university of sc...
  • 3 篇 china electric p...
  • 3 篇 school of inform...
  • 3 篇 chongqing vocati...
  • 3 篇 amity university...
  • 3 篇 college of compu...
  • 3 篇 1326 hopyard roa...
  • 3 篇 school of comput...
  • 3 篇 school of comput...

作者

  • 6 篇 guha tapas
  • 5 篇 pareek piyush ku...
  • 5 篇 wang li
  • 4 篇 liu xin
  • 4 篇 al-turjman fadi
  • 4 篇 trisheela s.
  • 4 篇 liu wei
  • 4 篇 zhang yu
  • 4 篇 wang lin
  • 4 篇 gupta ayan das
  • 3 篇 yeruva ajay redd...
  • 3 篇 liu yang
  • 3 篇 ganesh babu c.
  • 3 篇 bhatlawande shri...
  • 3 篇 wu haitao
  • 3 篇 rafi shaik moham...
  • 3 篇 liu fang
  • 3 篇 veena k.
  • 3 篇 li huyong
  • 3 篇 gangodkar durgap...

语言

  • 1,095 篇 英文
  • 26 篇 其他
  • 3 篇 中文
检索条件"任意字段=2022 2nd International Conference on Detection Technology and Intelligence System, DTIS 2022"
1121 条 记 录,以下是71-80 订阅
排序:
Research on Lightweight Object detection Based on Improved YOLOv8n for Experimental Scenarios  2
Research on Lightweight Object Detection Based on Improved Y...
收藏 引用
2nd international conference on Artificial intelligence and Automation Control, AIAC 2024
作者: Lin, Runqi Zhuang, Jiafan Hao, Zhifeng Fan, Zhun Shantou University Department of Electronic Engineering Shantou515063 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China ShenZhen611731 China
Lightweight object detection algorithms, represented by YOLOv8n, have achieved significant optimization in terms of model size and parameter count. However, the neck network of YOLOv8n is not efficient at fusing conte... 详细信息
来源: 评论
Exploration Study on Learning Styles Identification and Prediction Techniques  2
Exploration Study on Learning Styles Identification and Pred...
收藏 引用
2nd international conference on Innovative Research in Applied Science, Engineering and technology (IRASET)
作者: Jebbari, Mohammed Cherradi, Bouchaib El Gannour, Oussama Hamida, Soufiane Raihani, Abdelhadi Hassan II Univ Casablanca EEIS Lab ENSET Mohammedia Mohammadia Morocco Hassan II Univ Casablanca STIE Team CRMEF Casablanca Settat EEIS LabENSET Mohammedia Mohammadia Morocco
A learning style helps determine each learner preferred method and content by knowing their behaviors and habits. This is why learning style is important in learning (or learning systems), because it shows the learner... 详细信息
来源: 评论
Synthesis of flower-like S-doped SnO2hierarchical structure for gas sensing application at room temperature  2
Synthesis of flower-like S-doped SnO2hierarchical structure ...
收藏 引用
2022 2nd international conference on detection technology and intelligence system, dtis 2022
作者: Zhang, Yunfan Li, Meihua Gao, Xiaodong Gu, Yunlong Mou, Chao Ge, Shikun School of Information and Electronic Engineering Shandong Technology and Business University Yantai264005 China
Ammonia is one of the most common gases in life, which is produced in industrial emissions and agricultural activities. Therefore, effective detection of ammonia at low concentrations is vital for human health. Tin di... 详细信息
来源: 评论
Research on Visualization of Fragment Power Field and Target detection Method of Detonator  2
Research on Visualization of Fragment Power Field and Target...
收藏 引用
2nd international conference on Algorithms, High Performance Computing and Artificial intelligence, AHPCAI 2022
作者: Luo, Qiang Ma, Yangyang Chen, Kai Yang, Qifan Xi'An Modern Control Technology Research Institute Xi'an710065 China
The visual models of the static power field of the fragmentation and the dynamic dispersion of the fragmentation are established, and the fragment velocity information is displayed by means of trajectory lines for the... 详细信息
来源: 评论
PestinaNet- A Real-Time Crop Pest detection system  2
PestinaNet- A Real-Time Crop Pest Detection System
收藏 引用
2nd international conference on Computing and Machine intelligence (ICMI)
作者: Abid, Hammad Nida, Nudrat Irtaza, Aun Univ Engn & Technol Dept Comp Sci Taxila Pakistan Natl Sci & Technol Park NUST Islamabad Pakistan
Crop pests are the major factor that reduce the crop yield and influence the health of crops. However, manual identification of pests is time-consuming, and there is a high probability that some pests would go unnotic... 详细信息
来源: 评论
Research on Network Security State Prediction Method Based on SVM  2
Research on Network Security State Prediction Method Based o...
收藏 引用
2nd IEEE international conference on Electronic technology, Communication and Information, ICETCI 2022
作者: Li, Gen Artificial Intelligence and Data School Guangdong Business and Technology University Zhaoqing Guangdong526020 China
With the rapid development of information technology, the requirements for network security are getting higher and higher. Therefore, it is necessary to set a reasonable algorithm for network security detection and co... 详细信息
来源: 评论
Deep Learning-based Fault detection in the Tennessee Eastman Process  2
Deep Learning-based Fault Detection in the Tennessee Eastman...
收藏 引用
2nd international conference on Artificial intelligence and Smart Energy, ICAIS 2022
作者: Verma, Rashi Yerolla, Raju Besta, Chandra Shekar National Institute of Technology Calicut
Nowadays, every sector has at least one fault that must be detected and diagnosed promptly to ensure appropriate monitoring. Numerous Fault detection and Diagnostic (FDD) techniques have been proposed and implemented.... 详细信息
来源: 评论
Video Recording and Automatic Editing Method Based on Artificial intelligence Algorithm  2
Video Recording and Automatic Editing Method Based on Artifi...
收藏 引用
2nd international conference on Digital Society and Intelligent systems, DSInS 2022
作者: An, Lei Eurasia University Xi'an Shaanxi Xi'an710000 China
With the rise of short video platforms, video recording and automatic editing technology has become increasingly important to the development of short video, artificial intelligence algorithms can use massive video da... 详细信息
来源: 评论
A Real Time Energy Meter Fault detection system using Camera comparing with Conventional Fault detection Technique  2
A Real Time Energy Meter Fault Detection System using Camera...
收藏 引用
2nd international conference on Innovative Practices in technology and Management, ICIPTM 2022
作者: Rakesh, A. Bhavani, N.P.G. Saveetha School Of Engineering Saveetha Institute Of Medical And Technical Sciences Saveetha University Department Of Electronics And Communication Engineering Tamilnadu Chennai India
AIM: The study's major goal is to compare a real-time energy meter fault detection approach to a traditional fault detection technique using a new proposed system of unique remote application. MATERIALS And METHOD... 详细信息
来源: 评论
An intrusion detection model using extreme learning machine  2
An intrusion detection model using extreme learning machine
收藏 引用
2022 2nd conference on High Performance Computing and Communication Engineering, HPCCE 2022
作者: Chen, Chen Yang, Bo Ye, Xiaoyan Wang, Biao State Key Laboratory of Astronautic Dynamics Shaanxi Xi’an710043 China Xi’an Satellite Control Center Shaanxi Xi’an710043 China
In the information age, with the increase of data feature dimensions, the performance of intrusion detection system (IDS) in training time and classification accuracy is declining. A large number of researchers have c... 详细信息
来源: 评论