咨询与建议

限定检索结果

文献类型

  • 2,086 篇 会议
  • 9 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 2,101 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,352 篇 工学
    • 1,054 篇 计算机科学与技术...
    • 863 篇 软件工程
    • 478 篇 信息与通信工程
    • 293 篇 控制科学与工程
    • 282 篇 生物工程
    • 210 篇 电气工程
    • 155 篇 网络空间安全
    • 141 篇 光学工程
    • 139 篇 生物医学工程(可授...
    • 133 篇 电子科学与技术(可...
    • 126 篇 仪器科学与技术
    • 126 篇 安全科学与工程
    • 91 篇 机械工程
    • 85 篇 化学工程与技术
    • 81 篇 动力工程及工程热...
    • 74 篇 材料科学与工程(可...
    • 68 篇 交通运输工程
  • 764 篇 理学
    • 325 篇 数学
    • 298 篇 生物学
    • 194 篇 物理学
    • 143 篇 化学
    • 106 篇 统计学(可授理学、...
  • 355 篇 管理学
    • 222 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 89 篇 工商管理
  • 153 篇 医学
    • 128 篇 临床医学
    • 126 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 71 篇 法学
    • 60 篇 社会学
  • 42 篇 农学
  • 36 篇 经济学
  • 23 篇 教育学
  • 6 篇 军事学
  • 1 篇 文学

主题

  • 94 篇 object detection
  • 70 篇 artificial intel...
  • 52 篇 deep learning
  • 48 篇 machine learning
  • 41 篇 internet of thin...
  • 37 篇 feature extracti...
  • 30 篇 intrusion detect...
  • 26 篇 support vector m...
  • 25 篇 anomaly detectio...
  • 25 篇 fault detection
  • 24 篇 face recognition
  • 24 篇 computer vision
  • 21 篇 convolutional ne...
  • 16 篇 convolution
  • 14 篇 image processing
  • 13 篇 real-time system...
  • 12 篇 covid-19
  • 12 篇 network security
  • 12 篇 diseases
  • 10 篇 cameras

机构

  • 38 篇 maharishi school...
  • 34 篇 national univers...
  • 32 篇 the islamic univ...
  • 31 篇 school of comput...
  • 30 篇 uttaranchal inst...
  • 29 篇 chitkara univers...
  • 28 篇 centre of interd...
  • 26 篇 lovely professio...
  • 26 篇 department of ar...
  • 21 篇 uttaranchal univ...
  • 20 篇 vishwakarma inst...
  • 19 篇 college of intel...
  • 18 篇 sr university sc...
  • 16 篇 college of pharm...
  • 15 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 department of el...

作者

  • 12 篇 rajesh singh
  • 11 篇 singh rajesh
  • 10 篇 malik bader alaz...
  • 8 篇 mohit tiwari
  • 7 篇 yifeng niu
  • 7 篇 kapil joshi
  • 7 篇 wenxing fu
  • 7 篇 gehlot anita
  • 7 篇 mancang gu
  • 7 篇 alazzam malik ba...
  • 7 篇 kumar bura vijay
  • 7 篇 yi qu
  • 7 篇 tiwari mohit
  • 7 篇 anita gehlot
  • 6 篇 alfurhood badria...
  • 6 篇 joshi kapil
  • 6 篇 malik praveen ku...
  • 6 篇 bura vijay kumar
  • 6 篇 chauhan rahul
  • 6 篇 badria sulaiman ...

语言

  • 2,011 篇 英文
  • 90 篇 其他
  • 14 篇 中文
检索条件"任意字段=2023 3rd International Conference on Detection Technology and Intelligence System, DTIS 2023"
2101 条 记 录,以下是351-360 订阅
排序:
Target detection Based on Taylor Expansion and Bilateral Symmetric Network  3
Target Detection Based on Taylor Expansion and Bilateral Sym...
收藏 引用
3rd IEEE international conference on Computer Communication and Artificial intelligence, CCAI 2023
作者: Li, Zhihui Jia, Xiaoshuo Li, Shuhua Liu, Suping Guangdong University of Science and Technology College of Computer Science Guangdong Dongguan China
In the task of target detection, traditional detection algorithms are prone to weak generalization and low detection accuracy due to the small number of parameters and fixed parameter values. Conversely, CNN-based det... 详细信息
来源: 评论
Analysis of Probability of detection in Relay Assisted WBAN  3rd
Analysis of Probability of Detection in Relay Assisted WBAN
收藏 引用
3rd international conference on Communication, Networks and Computing, CNC 2022
作者: Rafiqi, Hafsa Gupta, Sindhu Hak Jadon, Jitendra Singh Department of Electronics and Communication Engineering Amity School of Engineering and Technology Amity University Sector-125 Noida201303 India Department of Artificial Intelligence Amity School of Engineering and Technology Amity University Sector-125 Noida201303 India
This paper examines the working of a Cognitive Radio based Wireless Body Area Network (WBAN) based on Probability of detection (PD) as a performance metric. The variation in values of Probability of detection (PD) wit... 详细信息
来源: 评论
Parallel intelligence-enabled IoV Information Management system based on Blockchain  3
Parallel Intelligence-enabled IoV Information Management Sys...
收藏 引用
3rd IEEE international conference on Digital Twins and Parallel intelligence, DTPI 2023
作者: Han, Shuangshuang Bai, Yongqiang Chen, Yueyun Tellambura, Chintha University of Science and Technology Beijing School of Computer & Communication Engineering Beijing China University of Alberta Department of Electrical and Computer Engineering Edmonton Canada
The current Internet of Vehicles (IoV) data are facing challenges such as data silos, security and privacy concerns, data quality issues, and collaboration barriers. This paper proposes an IoV Information Management S... 详细信息
来源: 评论
Quantitative Performance Evaluation of Improved U-Net Model in Crack detection  3
Quantitative Performance Evaluation of Improved U-Net Model ...
收藏 引用
3rd IEEE international conference on Social Sciences and intelligence Management, SSIM 2023
作者: Pan, Pei-Yu Wang, Hwang-Cheng Lin, Zhi-Rui National Ilan University Department of Electronic Engineering Ylan Taiwan
We enhanced crack detection by combining channel and spatial attention mechanisms to overcome the limitations of the U-Net model. Detecting cracks is pivotal for ensuring infrastructure and household safety. However, ... 详细信息
来源: 评论
Research on optical amplification technology in steel ball surface defect detection based on EDFA  3
Research on optical amplification technology in steel ball s...
收藏 引用
2023 IEEE 3rd international conference on Data Science and Computer Application, ICDSCA 2023
作者: Gao, Dongdong Li, Guoping University of Jinan Jinan China
When using fiber optic sensing technology to detect surface defects on steel balls, the conventional method of combining photodetectors with hardware amplification circuits to process detection optical signals require... 详细信息
来源: 评论
Research on Automatic Driving Vehicle Auxiliary system Based on Computer intelligent Network  3
Research on Automatic Driving Vehicle Auxiliary System Based...
收藏 引用
3rd IEEE international conference on Power, Electronics and Computer Applications, ICPECA 2023
作者: Zhou, Shaoxuan Sichuan Technology & Business College Intelligent Manufacturing and Information Engineering College Chengdu China
Autonomous vehicles will still be in the stage of man-machine co-driving for a long time, which needs man-machine cooperative control. Based on the development of intelligent connected vehicles, this paper designs the... 详细信息
来源: 评论
Vision-Based Identification of Vacant Seats in Public Transport for the Visually Impaired  3
Vision-Based Identification of Vacant Seats in Public Transp...
收藏 引用
3rd IEEE international conference on Mobile Networks and Wireless Communications, ICMNWC 2023
作者: Pargaonkar, Jay Kulkarni, Parth Paranjpay, Soumil Shilaskar, Swati Vishwakarma Institute of Technology Dept. of Electronics & Telecommunication Pune India
The accessibility of public spaces for visually impaired individuals is a major concern. One of the challenges faced by blind people in public spaces is the difficulty in locating vacant seats. The presented paper dis... 详细信息
来源: 评论
Area Reduction AES Algorithm in Hardware Trojan detection  3
Area Reduction AES Algorithm in Hardware Trojan Detection
收藏 引用
3rd international conference on Artificial intelligence and Smart Energy, ICAIS 2023
作者: MacTino, S. Priya, S. Sridevi Sathya Naveenkumar, R. Napoleon, A. Karunya Institute of Technology and Sciences Department of Electronics and Communication Engineering Coimbatore India Karpagam Academy of Higher Education Department of Electronics and Communication Engineering Coimbatore India
Hardware Trojan (HT) has lately become a significant problem for computer systems, especially those utilised for mission critical functions like medical or military ones. Effects that have been proposed include everyt... 详细信息
来源: 评论
Hidden structural detection practice of coal mine re-mining working face  3
Hidden structural detection practice of coal mine re-mining ...
收藏 引用
3rd IEEE international conference on Information technology, Big Data and Artificial intelligence, ICIBA 2023
作者: Zhi, BaoYan Guo, Gang Li, Rui Song, BingQing Liu, Song China National Coal Shaanxi Yulin Energy & Chemical Co. Ltd China Company Limited China Coal Technology & Engineering China
Hidden structure in coal mine working face is an important hidden danger affecting safety production, and it is also a difficult technical problem to identify, Mine borehole logging analyzer is a comprehensive borehol... 详细信息
来源: 评论
Video Chat using WebRTC with In-built Sign Language detection  3
Video Chat using WebRTC with In-built Sign Language Detectio...
收藏 引用
3rd international conference on Ubiquitous Computing and Intelligent Information systems, ICUIS 2023
作者: Sailesh Kumar, K.L. Srivatsan, M. Sendhan, A. Saran, J.U. Vidhya Sagar, P.V. Vellore Institute of Technology Department of Computer Science and Engineering Vellore India Rajalakshmi Engineering College Department of Computer Science and Engineering Chennai India Rajalakshmi Engineering College Department of Artificial Intelligence and Machine Learning Chennai India
Many research efforts into video conferencing technology have focused on audio-only interactions. Text chat, on the other hand, has many uses and is often used in conjunction with the audio channel in multimedia confe... 详细信息
来源: 评论