咨询与建议

限定检索结果

文献类型

  • 2,086 篇 会议
  • 9 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 2,101 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,352 篇 工学
    • 1,054 篇 计算机科学与技术...
    • 863 篇 软件工程
    • 478 篇 信息与通信工程
    • 293 篇 控制科学与工程
    • 282 篇 生物工程
    • 210 篇 电气工程
    • 155 篇 网络空间安全
    • 141 篇 光学工程
    • 139 篇 生物医学工程(可授...
    • 133 篇 电子科学与技术(可...
    • 126 篇 仪器科学与技术
    • 126 篇 安全科学与工程
    • 91 篇 机械工程
    • 85 篇 化学工程与技术
    • 81 篇 动力工程及工程热...
    • 74 篇 材料科学与工程(可...
    • 68 篇 交通运输工程
  • 764 篇 理学
    • 325 篇 数学
    • 298 篇 生物学
    • 194 篇 物理学
    • 143 篇 化学
    • 106 篇 统计学(可授理学、...
  • 355 篇 管理学
    • 222 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 89 篇 工商管理
  • 153 篇 医学
    • 128 篇 临床医学
    • 126 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 71 篇 法学
    • 60 篇 社会学
  • 42 篇 农学
  • 36 篇 经济学
  • 23 篇 教育学
  • 6 篇 军事学
  • 1 篇 文学

主题

  • 94 篇 object detection
  • 70 篇 artificial intel...
  • 52 篇 deep learning
  • 48 篇 machine learning
  • 41 篇 internet of thin...
  • 37 篇 feature extracti...
  • 30 篇 intrusion detect...
  • 26 篇 support vector m...
  • 25 篇 anomaly detectio...
  • 25 篇 fault detection
  • 24 篇 face recognition
  • 24 篇 computer vision
  • 21 篇 convolutional ne...
  • 16 篇 convolution
  • 14 篇 image processing
  • 13 篇 real-time system...
  • 12 篇 covid-19
  • 12 篇 network security
  • 12 篇 diseases
  • 10 篇 cameras

机构

  • 38 篇 maharishi school...
  • 34 篇 national univers...
  • 32 篇 the islamic univ...
  • 31 篇 school of comput...
  • 30 篇 uttaranchal inst...
  • 29 篇 chitkara univers...
  • 28 篇 centre of interd...
  • 26 篇 lovely professio...
  • 26 篇 department of ar...
  • 21 篇 uttaranchal univ...
  • 20 篇 vishwakarma inst...
  • 19 篇 college of intel...
  • 18 篇 sr university sc...
  • 16 篇 college of pharm...
  • 15 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 department of el...

作者

  • 12 篇 rajesh singh
  • 11 篇 singh rajesh
  • 10 篇 malik bader alaz...
  • 8 篇 mohit tiwari
  • 7 篇 joshi kapil
  • 7 篇 yifeng niu
  • 7 篇 kapil joshi
  • 7 篇 wenxing fu
  • 7 篇 gehlot anita
  • 7 篇 mancang gu
  • 7 篇 alazzam malik ba...
  • 7 篇 kumar bura vijay
  • 7 篇 yi qu
  • 7 篇 tiwari mohit
  • 7 篇 anita gehlot
  • 6 篇 alfurhood badria...
  • 6 篇 malik praveen ku...
  • 6 篇 bura vijay kumar
  • 6 篇 chauhan rahul
  • 6 篇 badria sulaiman ...

语言

  • 1,071 篇 英文
  • 1,030 篇 其他
  • 26 篇 中文
检索条件"任意字段=2023 3rd International Conference on Detection Technology and Intelligence System, DTIS 2023"
2101 条 记 录,以下是921-930 订阅
排序:
UAV Path Planning Based on Enhanced PSO-GA  1
收藏 引用
3rd CAAI international conference on Artificial intelligence (CICAI)
作者: Xiang, Hongbo Liu, Xiaobo Song, Xinsheng Zhou, Wen China Univ Geosci Key Lab Geol Survey & Evaluat Minist Educ Wuhan 430074 Peoples R China China Univ Geosci Sch Automat Wuhan 430074 Peoples R China
Path planning for unmanned aerial vehicles (UAV) is a key technology for UAV intelligent system in the aspect of model construction. In order to improve the rapidity and optimality of UAV path planning, we propose a h... 详细信息
来源: 评论
Implementation of campus supervision system based on Yolov5 and SlowFast optimization model  3
Implementation of campus supervision system based on Yolov5 ...
收藏 引用
3rd international conference on Green Communication, Network, and Internet of Things, CNIoT 2023
作者: Zhang, Ninghai Wang, Yanchao College of Electronics and Information Engineering Liaoning Institute of Science and Technology Liaoning Province Benxi China
With the end of the COVID-19 epidemic in China, colleges and universities across the country have restored the original order and implemented offline teaching. However, the turnover rate of campus personnel is also gr... 详细信息
来源: 评论
Single-stage face detection method based on feature fusion and data enhancement  3
Single-stage face detection method based on feature fusion a...
收藏 引用
3rd international conference on Artificial intelligence and Computer Engineering, ICAICE 2022
作者: Li, Hua Chen, Yujie Yang, Yang Zhao, Lingdi College of Computer Science and Technology Changchun University of Science and Technology No.7186 Weixing Road Chaoyang District Changchun China
The depth face detector based on an anchor frame has demonstrated good performance with the advancement of science and technology, but tiny faces and partially occluded faces are still difficult to identify under the ... 详细信息
来源: 评论
Analysis of Panoramic Images using Deep Learning For Dental Disease Identification  3
Analysis of Panoramic Images using Deep Learning For Dental ...
收藏 引用
3rd international conference on Artificial intelligence and Smart Energy, ICAIS 2023
作者: Mallick, Mohamed Midhun Kumar, A. Govindaraju, Sakthi Kumar, A. Suresh Kandasamy, Manivel Anitha, P. Rathinam Group of Institutions Coimbaotore India Indian Biological Data Center Center for Biotechnology Database Engineer Faridabab India Galogotias University School of Computing Science and Engineering Delhi NCR India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India Karnavati University Unitedworld School of Computational Intelligence Gujarat India Oasys Institute of Technology Trichy India
Dental caries is a distinct disease strategy caused by the metabolic action of dental biofilm, which continually demineralizes lacquer and dentine. Its commonly known as tooth rot, is one of the most prevalent and lon... 详细信息
来源: 评论
Comparative Evaluation of Exploratory Data Analysis Techniques for Power Theft detection in Residential Distribution Grids  3
Comparative Evaluation of Exploratory Data Analysis Techniqu...
收藏 引用
3rd IEEE international conference on Smart Technologies for Power, Energy and Control, STPEC 2023
作者: Agarwal, Swati Srivastava, Ayush Sodhi, Ranjana Soni, Tukesh Indian Institute of Technology Ropar Department of Electrical Engineering Rupnagar India Uiet Punjab University Dept. of Mechanical Engineering Chandigarh India
This paper presents a comparative evaluation of the performance of various Exploratory Data Analysis (EDA) techniques for detecting power theft in residential distribution networks. The techniques include Pearson Corr... 详细信息
来源: 评论
The Role of Machine Learning Algorithms in Developing Android App and to do Malware detection  3
The Role of Machine Learning Algorithms in Developing Androi...
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Sudhamsu, Gadug Bhatt, Rahul Jakka, Geethamanikanta Jweeg, Muhsin J. Alfurhood, Badria Sulaiman Tripathi, Vikas Department of Computer Science and Engineering Bangalore India Dev Bhoomi Uttarakhand University Department of CSE Uttarakhand Dehradun India University of the Cumberlands Data Analytics Information Technology United States Al-Farahidi University College of Technical Engineering Baghdad Iraq Princess Νourah Hint Ahdulrahman University College of Computer and Information Sciences Department of Computer Sciences Saudi Arabia Graphic Era Deemed to Be University Department CSE India
Because there are so many issues that have had suitable solutions, cybersecurity is now the subject that worries computer scientists and system administrators the most. The rapid development of information technology ... 详细信息
来源: 评论
Multi-task transient stability assessment of power system based on graph neural network with interpretable attribution analysis
收藏 引用
ENERGY REPORTS 2023年 9卷 930-942页
作者: Gu, Sili Qiao, Ji Shi, Wenlong Yang, Fan Zhou, Xiang Zhao, Zixuan China Elect Power Res Inst Dept Artificial Intelligence Applicat Beijing Peoples R China
Transient power angle stability analysis and voltage stability analysis are the key basis of power system security and stability control. The diversified operation modes of power system put forward higher requirements... 详细信息
来源: 评论
Research on the application of YOLOv5 in station interlocking test  3
Research on the application of YOLOv5 in station interlockin...
收藏 引用
3rd international conference on Image Processing and Intelligent Control, IPIC 2023
作者: Cheng, Hao He, Tao Tian, Rui Key Laboratory of Optoelectronic Technology and Intelligent Control Ministry of Education Lanzhou Jiaotong University Gansu Lanzhou China Institute of Automatic Control Lanzhou Jiaotong University Gansu Lanzhou China
With the rapid development of high-speed railway, it is necessary to ensure the safety of railway running, and the computer interlock system is the key equipment to ensure the safety of railway running in the station.... 详细信息
来源: 评论
Research on Accounting Data Encryption Processing system based on Artificial intelligence  3
Research on Accounting Data Encryption Processing System bas...
收藏 引用
3rd international conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, SPIoT2023
作者: Yao, Li Jin, Minyan College of Accounting Zhanjiang Science and Technology College Guangdong Zhanjiang524009 China
To address the issues of low confidentiality and poor real-time performance in the encryption process of accounting system data, a proposed solution based on artificial intelligence is presented. Firstly, by studying ... 详细信息
来源: 评论
A Classification of Attacks in an IDS Using Sparse Convolutional Autoencoder and DNN  1
收藏 引用
3rd international conference on Smart Computing and Cyber Security—Strategic Foresight, Security Challenges and Innovation, SMARTCYBER 2023
作者: Kandula, Pradeep Roy, Monideepa Ghosh, Kuntal Rao, Budipi Nageswara Datta, Sujoy School of Computer Engineering KIIT Bhubaneswar India Machine Intelligence Unit Indian Statistical Institute Kolkata India School of Electronics Engineering KIIT Bhubaneswar India
The network security plays an important role in this modern world. After emerging modern technologies like cloud computing, big data, Internet of Things (IOT), Blockchain and so forth, network security set more comple... 详细信息
来源: 评论