咨询与建议

限定检索结果

文献类型

  • 2,086 篇 会议
  • 9 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 2,101 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,352 篇 工学
    • 1,054 篇 计算机科学与技术...
    • 863 篇 软件工程
    • 478 篇 信息与通信工程
    • 293 篇 控制科学与工程
    • 282 篇 生物工程
    • 210 篇 电气工程
    • 155 篇 网络空间安全
    • 141 篇 光学工程
    • 139 篇 生物医学工程(可授...
    • 133 篇 电子科学与技术(可...
    • 126 篇 仪器科学与技术
    • 126 篇 安全科学与工程
    • 91 篇 机械工程
    • 85 篇 化学工程与技术
    • 81 篇 动力工程及工程热...
    • 74 篇 材料科学与工程(可...
    • 68 篇 交通运输工程
  • 764 篇 理学
    • 325 篇 数学
    • 298 篇 生物学
    • 194 篇 物理学
    • 143 篇 化学
    • 106 篇 统计学(可授理学、...
  • 355 篇 管理学
    • 222 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 89 篇 工商管理
  • 153 篇 医学
    • 128 篇 临床医学
    • 126 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 71 篇 法学
    • 60 篇 社会学
  • 42 篇 农学
  • 36 篇 经济学
  • 23 篇 教育学
  • 6 篇 军事学
  • 1 篇 文学

主题

  • 94 篇 object detection
  • 70 篇 artificial intel...
  • 52 篇 deep learning
  • 48 篇 machine learning
  • 41 篇 internet of thin...
  • 37 篇 feature extracti...
  • 30 篇 intrusion detect...
  • 26 篇 support vector m...
  • 25 篇 anomaly detectio...
  • 25 篇 fault detection
  • 24 篇 face recognition
  • 24 篇 computer vision
  • 21 篇 convolutional ne...
  • 16 篇 convolution
  • 14 篇 image processing
  • 13 篇 real-time system...
  • 12 篇 covid-19
  • 12 篇 network security
  • 12 篇 diseases
  • 10 篇 cameras

机构

  • 38 篇 maharishi school...
  • 34 篇 national univers...
  • 32 篇 the islamic univ...
  • 31 篇 school of comput...
  • 30 篇 uttaranchal inst...
  • 29 篇 chitkara univers...
  • 28 篇 centre of interd...
  • 26 篇 lovely professio...
  • 26 篇 department of ar...
  • 21 篇 uttaranchal univ...
  • 20 篇 vishwakarma inst...
  • 19 篇 college of intel...
  • 18 篇 sr university sc...
  • 16 篇 college of pharm...
  • 15 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 department of el...

作者

  • 12 篇 rajesh singh
  • 11 篇 singh rajesh
  • 10 篇 malik bader alaz...
  • 8 篇 mohit tiwari
  • 7 篇 yifeng niu
  • 7 篇 kapil joshi
  • 7 篇 wenxing fu
  • 7 篇 gehlot anita
  • 7 篇 mancang gu
  • 7 篇 alazzam malik ba...
  • 7 篇 kumar bura vijay
  • 7 篇 yi qu
  • 7 篇 tiwari mohit
  • 7 篇 anita gehlot
  • 6 篇 alfurhood badria...
  • 6 篇 joshi kapil
  • 6 篇 malik praveen ku...
  • 6 篇 bura vijay kumar
  • 6 篇 chauhan rahul
  • 6 篇 badria sulaiman ...

语言

  • 2,011 篇 英文
  • 90 篇 其他
  • 14 篇 中文
检索条件"任意字段=2023 3rd International Conference on Detection Technology and Intelligence System, DTIS 2023"
2101 条 记 录,以下是1821-1830 订阅
排序:
Blind Navigation system Based on NS-YOLOV5
Blind Navigation System Based on NS-YOLOV5
收藏 引用
Intelligent Communications and Computing (ICC), international conference on
作者: Geng Cong Liu Yang Hongyan Liu Han Chao Chenzhu Niu Zaozhuang University Artificial Intelligence Institute ZaoZhuang China
In response to the challenges faced by visually impai red individuals when navigating their surroundings, this paper pr esents an enhanced machine vision object detection algorithm kno wn as NS-YOLO, which builds upon...
来源: 评论
Automated Motorcycle Helmet detection Using The Combination of YOLO AND CNN
Automated Motorcycle Helmet Detection Using The Combination ...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), international conference on
作者: Mary Anne Sanchana Sherin Eliyas Department of Computer Applications Hindustan Institute of Technology and Science Padur
Motorcycle accidents are a significant public concern worldwide. Accidents have been increasing rapidly which leads to the loss of several lives. One of the main contributing factors to the severity of injuries in the...
来源: 评论
Machine Learning Based Malware detection system
Machine Learning Based Malware Detection System
收藏 引用
Advancement in Electronics & Communication Engineering (AECE), international conference on
作者: Gunjan Varshney Sudeep Varshney Amrit Suman Kuldeep Chouhan Preetam Suman Department of Electrical Engineering JSS Academy of Technical Education Noida Uttar Pradesh India Computer Science and Engineering Sharda School of Engineering & Technology Greater Noida Uttar Pradesh India Computer Science and Engineering VIT University Bhopal Madhya Pradesh India
As today's time is more dependent towards the internet, there are various types of malwares are being developed on daily basis, as per report presented by Kaspersky around 560,000 instances of malware created dail...
来源: 评论
Phishing URL detection and Reporting system Using Machine Learning Approach
Phishing URL Detection and Reporting System Using Machine Le...
收藏 引用
Technological Advancements in Computational Sciences (ICTACS), international conference on
作者: D. Aman J. Kartheek Reddy B. Manoj Sai D. Dhanalakshmi Shanmugasundaram Hariharan Vinay Kukreja Department of CSE Vardhaman College of Engineering Hyderabad India Department of Computer Science and Engineering Chitkara University Institute of Engineering and Technology Punjab India
Phishing attacks continue to pose a threat to the internet users due to the consequences they bring, including the compromise of sensitive information, financial harm and reputational damage. In this research paper, w...
来源: 评论
Faster Region-Convolutional Neural Network with ResNet50 for Video Stream Object detection
Faster Region-Convolutional Neural Network with ResNet50 for...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE international conference on
作者: Hassan M. Al-Jawahry A. H. A. Hussein G Sunil Mohammed Ayad Alkhafaji Piyush Kumar Pareek The Islamic university Najaf Iraq College of Pharmacy Ahl Al Bayt University Karbala Iraq School of Computer Science & Artificial Intelligence SR University Warangal Telangana India National University of Science and Technology Dhi Qar Iraq Department of AI and ML Nitte Meenakshi Institute of Technology Bengaluru India
Detecting objects through video frames is a difficult process due to several issues, such as poor quality of frames, pose changes, occlusions, video defocusing, and motion blur. The closely arranged frames make it mor...
来源: 评论
Research on the Application of Relationship Graphs in Data Analysis Algorithm Design
Research on the Application of Relationship Graphs in Data A...
收藏 引用
Electronic technology, Communication and Information (ICETCI), IEEE international conference on
作者: Zhu Yancheng College of Artificial Intelligence Shenyang Aerospace University Shenyang China
With the continuous development of statistics and computer science, people’s demand for data mining and potential information analysis is increasing. There are a lot of relational data in the world. As the core of da...
来源: 评论
Development of non-contact detection device for coal moisture based on microwave transmission method
Development of non-contact detection device for coal moistur...
收藏 引用
Power Electronics, Computer Applications (ICPECA), IEEE international conference on
作者: Ruihao Chai Xu Kong Xiaomin Wang College of Electrical Engineering and Automation Shandong University of Science and Technology Qingdao China
In order to quickly and accurately detect the moisture content of coal and realize online non-destructive testing. An on-line measurement system of coal moisture content based on the principle of microwave transmissio... 详细信息
来源: 评论
Analysis of Cyber Security Threats in Payment Gateway technology
Analysis of Cyber Security Threats in Payment Gateway Techno...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), international conference on
作者: Hari Prapan Sharma Somanchi Hari Krishna Vijay Prakash R Mohit Tiwari Tripti Tiwari Madarapu Naresh Kumar Institute of Business Management GLA University Mathura Uttar Pradesh Department of Business Management Vignana Bharathi Institute of Technology School of Computer Science and Artificial Intelligence SR University Warangal Telangana India Department of Computer Science and Engineering Bharati Vidyapeeth’s College of Engineering Delhi Department of Management Studies BVIMR Delhi Ministry of Electronics and Information Technology National Informatics Centre Delhi
There has been a meteoric rise in the use of online payment systems recently. Multiple e-payment systems exist, each designed to provide the highest degree of security while maintaining the greatest possible convenien...
来源: 评论
Covert Channel detection and Generation Techniques: A Survey
Covert Channel Detection and Generation Techniques: A Survey
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), international conference on
作者: Nesmah A. AL-Khulaidi Ammar T. Zahary Muneer A.S Hazaa Adel A. Nasser Department of Computer Networks Yemen Academy for Graduate Studies Sana'a Yemen Department of Computer Science Faculty of Computing and IT University of Science and Technology Sana'a Yemen Department of Computer Science Faculty of Computer and Information System Thamar University Thamar Yemen Department of Information Systems and Computer Science Faculty of Sciences Sa'adah University Sa'adah Yemen
The use of covert communications has become more widespread recently as a solution to the information security issue. Information security can be partially solved by the discovery and creation of covert routes. Covert...
来源: 评论
A Lightweight Improved Yolov5 for Insulator Defect detection
A Lightweight Improved Yolov5 for Insulator Defect Detection
收藏 引用
Computer Science, Electronic Information Engineering and Intelligent Control technology (CEI), IEEE international conference on
作者: Xinping Zhu South China University of Technology Guangzhou China
The safety of insulators is related to the stability of power transmission and economic livelihood. UAV inspection has the importance of improving detection efficiency and adapting to complex terrain. In this paper, b... 详细信息
来源: 评论