咨询与建议

限定检索结果

文献类型

  • 2,082 篇 会议
  • 9 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 2,097 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,348 篇 工学
    • 1,052 篇 计算机科学与技术...
    • 861 篇 软件工程
    • 476 篇 信息与通信工程
    • 293 篇 控制科学与工程
    • 282 篇 生物工程
    • 210 篇 电气工程
    • 155 篇 网络空间安全
    • 141 篇 光学工程
    • 139 篇 生物医学工程(可授...
    • 133 篇 电子科学与技术(可...
    • 126 篇 仪器科学与技术
    • 126 篇 安全科学与工程
    • 91 篇 机械工程
    • 85 篇 化学工程与技术
    • 81 篇 动力工程及工程热...
    • 74 篇 材料科学与工程(可...
    • 67 篇 交通运输工程
  • 764 篇 理学
    • 325 篇 数学
    • 298 篇 生物学
    • 194 篇 物理学
    • 143 篇 化学
    • 106 篇 统计学(可授理学、...
  • 355 篇 管理学
    • 222 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 89 篇 工商管理
  • 153 篇 医学
    • 128 篇 临床医学
    • 126 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 71 篇 法学
    • 60 篇 社会学
  • 42 篇 农学
  • 36 篇 经济学
  • 23 篇 教育学
  • 6 篇 军事学
  • 1 篇 文学

主题

  • 94 篇 object detection
  • 70 篇 artificial intel...
  • 52 篇 deep learning
  • 48 篇 machine learning
  • 41 篇 internet of thin...
  • 37 篇 feature extracti...
  • 30 篇 intrusion detect...
  • 25 篇 support vector m...
  • 25 篇 anomaly detectio...
  • 25 篇 fault detection
  • 24 篇 face recognition
  • 24 篇 computer vision
  • 21 篇 convolutional ne...
  • 16 篇 convolution
  • 14 篇 image processing
  • 13 篇 real-time system...
  • 12 篇 covid-19
  • 12 篇 network security
  • 12 篇 diseases
  • 10 篇 cameras

机构

  • 38 篇 maharishi school...
  • 34 篇 national univers...
  • 32 篇 the islamic univ...
  • 31 篇 school of comput...
  • 30 篇 uttaranchal inst...
  • 29 篇 chitkara univers...
  • 28 篇 centre of interd...
  • 26 篇 lovely professio...
  • 26 篇 department of ar...
  • 21 篇 uttaranchal univ...
  • 20 篇 vishwakarma inst...
  • 19 篇 college of intel...
  • 18 篇 sr university sc...
  • 16 篇 college of pharm...
  • 15 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 department of el...

作者

  • 12 篇 rajesh singh
  • 11 篇 singh rajesh
  • 10 篇 malik bader alaz...
  • 8 篇 mohit tiwari
  • 7 篇 yifeng niu
  • 7 篇 kapil joshi
  • 7 篇 wenxing fu
  • 7 篇 gehlot anita
  • 7 篇 mancang gu
  • 7 篇 alazzam malik ba...
  • 7 篇 kumar bura vijay
  • 7 篇 yi qu
  • 7 篇 tiwari mohit
  • 7 篇 anita gehlot
  • 6 篇 alfurhood badria...
  • 6 篇 joshi kapil
  • 6 篇 malik praveen ku...
  • 6 篇 bura vijay kumar
  • 6 篇 chauhan rahul
  • 6 篇 badria sulaiman ...

语言

  • 2,034 篇 英文
  • 63 篇 其他
  • 11 篇 中文
检索条件"任意字段=2023 3rd International Conference on Detection Technology and Intelligence System, DTIS 2023"
2097 条 记 录,以下是2001-2010 订阅
排序:
An Optimal DCP-Based Defogging Method of Improving Objects detection in Adverse Weather
An Optimal DCP-Based Defogging Method of Improving Objects D...
收藏 引用
Networking systems of AI (INSAI), international conference on
作者: Xinyu Qian Peng Sun Duke Kunshan University Duke University Duke Kunshan University
As one of the most important components of practical autonomous driving technology, designing efficient and reliable object detection methods has been the focus of attention in academic and industrial circles for rece... 详细信息
来源: 评论
A Comparative Study of Prediction of Pneumonia and COVID-19 Using Deep Neural Networks
A Comparative Study of Prediction of Pneumonia and COVID-19 ...
收藏 引用
Electronic and Electrical Engineering and Intelligent system (ICE3IS), international conference on
作者: Md Sabbirul Haque Md Siam Taluckder Siam Bin Shawkat Md Ahnaf Shahriyar Md Abu Sayed Chinmoy Modak IEEE Professional Community IEEE Phillip M. Drayer Department of Electrical Engineering Lamar University Computer Science Department American International University Bangladesh College of Technology and Engineering Westcliff University Irvine CA Department of Professional Security Studies New Jersey City University Jersey City New Jersey Department of Computer Science Florida Polytechnic University Lakeland Florida
Pneumonia, a contagious respiratory infection caused by both bacteria and viruses, carries significant global implications. Rapid identification of infected individuals is paramount to effectively curb its transmissio...
来源: 评论
Comparative Evaluation of Exploratory Data Analysis Techniques for Power Theft detection in Residential Distribution Grids
Comparative Evaluation of Exploratory Data Analysis Techniqu...
收藏 引用
Smart Technologies for Power, Energy and Control (STPEC), IEEE international conference on
作者: Swati Agarwal Ayush Srivastava Ranjana Sodhi Tukesh Soni Department of Electrical Engineering Indian Institute of Technology Ropar Rupnagar India Dept. of Mechanical Engineering UIET Punjab University Chandigarh India
This paper presents a comparative evaluation of the performance of various Exploratory Data Analysis (EDA) techniques for detecting power theft in residential distribution networks. The techniques include Pearson Corr...
来源: 评论
Verification Method of Intelligent Prosthetic Algorithm Based on Anthropomorphic Walking Robot
Verification Method of Intelligent Prosthetic Algorithm Base...
收藏 引用
Robotics, Automation and Artificial intelligence (RAAI), IEEE international conference on
作者: Honglei An Lei Sun Hongxu Ma Qing Wei College of Intelligence Science and Technology National University of Defense Technology Changsha China
A key issue in the research of intelligent prosthetics is the verification and analysis of the proposed prosthetic motion planning and control methods. In this paper, it is proposed that using a humanoid walking robot... 详细信息
来源: 评论
Secure Data Reduplication system with Efficient and Reliable Multi-Key Management in Cloud Storage
Secure Data Reduplication System with Efficient and Reliable...
收藏 引用
Innovative Practices in technology and Management (ICIPTM), international conference on
作者: B Jayaram T. Suguna Shaik Fairooz Arul Selvam P S. Vimal Department of Computer Science and Business Systems RMK Engineering College Kavaraipettai Tamil Nadu India Department of Electronics and Communication Engineering Panimalar Engineering College Chennai Tamil Nadu India Department of CSE -AIML Malla Reddy Engineering College Secunderabad Telangana India Department of Computer Science and Engineering Hindusthan College of Engineering and Technology Coimbatore Tamil Nadu India Department of Computational Intelligence School of Computing SRM Institute of Science and Technology Kattankulathur Tamil Nadu India
Malicious hackers may compromise hundreds or millions of machines with little effort, allowing them to shut down networks, steal sensitive data, and compromise critical infrastructure. Data is stolen and used for mali... 详细信息
来源: 评论
Understanding the Limitations of Secure Shell (SSH) in Wireless Network Security
Understanding the Limitations of Secure Shell (SSH) in Wirel...
收藏 引用
Smart Generation Computing, Communication and Networking (SMART GENCON), international conference on
作者: Amit Upadhyay Sandip Kulkarni Sharmistha Roy K. Yuvaraj V. Ashok Sunil D. Kale Department of Computer Science Mangalayatan University Aligarh India Department of Computer Science Himalayan University Itanagar India Department of Coputing & Information Technology Usha Martin University Ranchi India Department of Computer Science Karpagam Academy of Higher Education Coimbatore Department of Mechanical Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai Department of Artificial Intelligence & Data Science Vishwakarma Institute of Information Technology Pune INDIA
comfy Shell (SSH) is an effective community protocol used to securely connect devices over a computer community. It gives information encryption for relaxed conversation among clients and servers, and can be used to g...
来源: 评论
A Complex Road Target detection Algorithm Based on YOLOv5n-SBF  23
A Complex Road Target Detection Algorithm Based on YOLOv5n-S...
收藏 引用
Proceedings of the 2023 3rd international conference on Big Data, Artificial intelligence and Risk Management
作者: Guoyang Lin Huarong Xu School of Computer and Information Engineering Xiamen University of Technology China
Missed detection is usually caused by variations in target scales, dense occlusion, and uneven illumination. To tackle the challenge of missed detection in road target detection during complex environments, an enhance...
来源: 评论
Identification of Fingerprint Orientation Using Improved Generative Adversarial Network with Support Vector Machine
Identification of Fingerprint Orientation Using Improved Gen...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE international conference on
作者: Abbas Hameed Abdul Hussein Gobinath Ravindran Zamen Latef naser Muntather Almusawi Santhiya K College of Pharmacy Ahl Al Bayt University Karbala Iraq Department of Civil Engineering SR University Warangal Telangana India National University of Science and Technology Dhi Qar Iraq The Islamic university Najaf Iraq Department of Artificial intelligence and data science PSG Institute of Technology and Applied Research Coimbatore India
Fingerprint authentication is one of the methods used to prevent the loss of personal data, but the minutiae and angle variance of finger patterns make the process difficult. To overcome the issue, an authentication s...
来源: 评论
An IoT and Information Mining Algorithm-Based Self-Monitoring and Analysis system for Solar Power Plants
An IoT and Information Mining Algorithm-Based Self-Monitorin...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), international conference on
作者: Ali Hadi Abdulwahid Kruti Jani Navdeep Dhaliwal Rajesh Singh A. Bhasha Jayapal Lande Control and Automation Engineering Department Engineering Technical College Southern Technical University Basra Iraq Shri Chimanbhai Patel Post Graduate Institute of Computer Application Ahmedabad Lovely Professional University Phagwara Uttaranchal Institute of Technology Uttaranchal University India Dept of IT St. Martin's Engineering College Secunderabad Telangana India School of Computer Science and Artificial Intelligence SR University Warangal Telangana India
Because of their affordability and sustainability, renewable sources of energy are receiving a lot of study interest. Particularly, solar power plants are regarded as a type of renewable sources of energy that may be ...
来源: 评论
A Scalable Platform to Collect, Store, Visualize and Analyze Big Data in Real- Time
A Scalable Platform to Collect, Store, Visualize and Analyze...
收藏 引用
Innovative Practices in technology and Management (ICIPTM), international conference on
作者: Pravin Ramdas Kshirsagar Dhoma Harshavardhan Reddy Mallika Dhingra Dharmesh Dhabliya Ankur Gupta Department of Artificial Intelligence S B Jain College of Engineering and Technology Nagpur Maharashtra India Trainee Security Analyst JunoClinic Davman Technology Services Private Limited Mumbai Maharashtra India Department of Mathematics and Statistics Manipal University Jaipur Jaipur Rajasthan India Department of Information Technology Vishwakarma Institute of Information Technology Pune Maharashtra India Department of Computer Science and Engineering Vaish College of Engineering Rohtak Haryana India
Examination and evaluation of sentiment The most popular area for dissecting and extracting knowledge from communication data from many sources, such as Facebook, Instagram, Twitter, Amazon, and so on, is known as min... 详细信息
来源: 评论