咨询与建议

限定检索结果

文献类型

  • 2,086 篇 会议
  • 9 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 2,101 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,352 篇 工学
    • 1,054 篇 计算机科学与技术...
    • 863 篇 软件工程
    • 478 篇 信息与通信工程
    • 293 篇 控制科学与工程
    • 282 篇 生物工程
    • 210 篇 电气工程
    • 155 篇 网络空间安全
    • 141 篇 光学工程
    • 139 篇 生物医学工程(可授...
    • 133 篇 电子科学与技术(可...
    • 126 篇 仪器科学与技术
    • 126 篇 安全科学与工程
    • 91 篇 机械工程
    • 85 篇 化学工程与技术
    • 81 篇 动力工程及工程热...
    • 74 篇 材料科学与工程(可...
    • 68 篇 交通运输工程
  • 764 篇 理学
    • 325 篇 数学
    • 298 篇 生物学
    • 194 篇 物理学
    • 143 篇 化学
    • 106 篇 统计学(可授理学、...
  • 355 篇 管理学
    • 222 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 89 篇 工商管理
  • 153 篇 医学
    • 128 篇 临床医学
    • 126 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
    • 77 篇 公共卫生与预防医...
  • 71 篇 法学
    • 60 篇 社会学
  • 42 篇 农学
  • 36 篇 经济学
  • 23 篇 教育学
  • 6 篇 军事学
  • 1 篇 文学

主题

  • 94 篇 object detection
  • 70 篇 artificial intel...
  • 52 篇 deep learning
  • 48 篇 machine learning
  • 41 篇 internet of thin...
  • 37 篇 feature extracti...
  • 30 篇 intrusion detect...
  • 26 篇 support vector m...
  • 25 篇 anomaly detectio...
  • 25 篇 fault detection
  • 24 篇 face recognition
  • 24 篇 computer vision
  • 21 篇 convolutional ne...
  • 16 篇 convolution
  • 14 篇 image processing
  • 13 篇 real-time system...
  • 12 篇 covid-19
  • 12 篇 network security
  • 12 篇 diseases
  • 10 篇 cameras

机构

  • 38 篇 maharishi school...
  • 34 篇 national univers...
  • 32 篇 the islamic univ...
  • 31 篇 school of comput...
  • 30 篇 uttaranchal inst...
  • 29 篇 chitkara univers...
  • 28 篇 centre of interd...
  • 26 篇 lovely professio...
  • 26 篇 department of ar...
  • 21 篇 uttaranchal univ...
  • 20 篇 vishwakarma inst...
  • 19 篇 college of intel...
  • 18 篇 sr university sc...
  • 16 篇 college of pharm...
  • 15 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 department of el...

作者

  • 12 篇 rajesh singh
  • 11 篇 singh rajesh
  • 10 篇 malik bader alaz...
  • 8 篇 mohit tiwari
  • 7 篇 joshi kapil
  • 7 篇 yifeng niu
  • 7 篇 kapil joshi
  • 7 篇 wenxing fu
  • 7 篇 gehlot anita
  • 7 篇 mancang gu
  • 7 篇 alazzam malik ba...
  • 7 篇 kumar bura vijay
  • 7 篇 yi qu
  • 7 篇 tiwari mohit
  • 7 篇 anita gehlot
  • 6 篇 alfurhood badria...
  • 6 篇 malik praveen ku...
  • 6 篇 bura vijay kumar
  • 6 篇 chauhan rahul
  • 6 篇 badria sulaiman ...

语言

  • 1,071 篇 英文
  • 1,030 篇 其他
  • 26 篇 中文
检索条件"任意字段=2023 3rd International Conference on Detection Technology and Intelligence System, DTIS 2023"
2101 条 记 录,以下是941-950 订阅
排序:
Fault detection and fault tole rant control of interturn short circuit of double redundancy motor  3
Fault detection and fault tole rant control of interturn sho...
收藏 引用
2023 3rd international conference on Electrical, Electronics, and Computing technology, EECT 2023
作者: Jin, Tianbao Tian, Wei Zhao, Wenxiang Jiangsu University Zhenjiang China
This paper presents the robust detection of interturn short circuit fault of double redundant permanent magnet synchronous motor. In the static coordinate system and double dq-axis system, the mathematical model of th... 详细信息
来源: 评论
Investigating the Synergies between Decentralized Protocols and Edge intelligence for a Resilient Web3.0 Infrastructure  3
Investigating the Synergies between Decentralized Protocols ...
收藏 引用
3rd IEEE international conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Kaliappan, Seeniappan Niveditha, V.R. Maranan, Ramya Irfan, M.M. Kcg College of Technology Dept. of Mechatronics Engineering TN Chennai India Sathyabama Institute of Science and Technology Dept. of Cse TN Chennai India Saveetha School of Engineering Simats Dept. of Research and Innovation TN Chennai India Sr University Dept. of Eee Telangana Warangal India
This paper presents the results of an in-depth investigation of how edge intelligence and decentralized protocols might work together to create a robust Web3.0 system. An exhaustive literature study is conducted, cove... 详细信息
来源: 评论
Streamlining Information Capture and Retrieval with AI-Enabled systems  3
Streamlining Information Capture and Retrieval with AI-Enabl...
收藏 引用
3rd international conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Sudhamsu, Gadug Agarwal, Ankita Dhivrani, Rekha Bhanu, K.S. Jeyalaxmi, M. Nawadkar, Ashwini R. Faculty of Engineering and Technology Karnataka Bangalore India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Vivekananda Global University Department of Computer Science & Engineering Jaipur India Atlas SkillTech University Department of UGDX Maharastra Mumbai India Prince Shri Venkateshwara Padmavathy Engineering College Department of Science and Humanities Chennai127 India Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India
artificial intelligence (AI) is an emerging era that has proven to have a fantastic capacity to revolutionize how facts are captured and retrieved. AI-enabled systems offer an expansion of abilities to streamline the ... 详细信息
来源: 评论
Non-Invasive Human Body Temperature detection for Online Event Data Recorder  3
Non-Invasive Human Body Temperature Detection for Online Eve...
收藏 引用
3rd international conference on Intelligent Cybernetics technology and Applications, ICICyTA 2023
作者: Sani, Muhammad Ikhsan Ibnugraha, Prajna Deshanta Sari, Marlindia Ike Rizal, Moch Fahru Hanifa, Fanni Husnul Salasa, Salsabila Anza Reksa, Anggi Angga Hartono, Aditya Firmansyah Utama, Nur Cahya Telkom University Dept. of Computer Technology Bandung Indonesia Telkom University Dept. of Digital Marketing Bandung Indonesia Telkom University Dept. of Informatics Bandung Indonesia
The concept of black-box or Event Data Recorder (EDR) implementation on ground vehicle provides an alternative method for preemptive or prescriptive safety procedure. Utilizing all accessible technologies for accident... 详细信息
来源: 评论
A New Design for Protecting Cyber-Attacks and Harmful Threats in IoT Communication Network with Efficient Deep Learning-Based detection system  3
A New Design for Protecting Cyber-Attacks and Harmful Threat...
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Dhinakaran, S. Bansal, Vipul Pant, Kumud Joshi, Sanjeev Kumar Maginmani, Umme Habiba Prasad, Ch. Raghava Rathinam College of Arts and Science Department of Computer Science Tamil Nadu Coimbatore India Kurukshetra University Information Technology Haryana India Graphic Era Deemed to be University Department of Biotechnology Uttarakhand Dehradun India Uttaranchal University Uttaranchal Institute of Technology India Secab Institute Of Engineering and Technology Department Of Computer Science & Engineering Karnataka Vijayapur India KoneruLakshmaiah Education Foundation Department of Electronics and Communication Engineering Andhra Pradesh Vaddeswaram India
Fast progress in both smart devices with limited resources and state-of-the-art communication methods have helped establish the Internet of Things (IoT) as the gold standard for low-power lossy networks. However, beca... 详细信息
来源: 评论
Human-Object Interaction detection Based on Graph Model  3
Human-Object Interaction Detection Based on Graph Model
收藏 引用
3rd international conference on Artificial intelligence and Computer Engineering, ICAICE 2022
作者: Ye, Qing Xu, Xiuju School of Information Science and Technology North China University of Technology Beijing100144 China
Human-Object Interaction (HOI) detection is a fundamental task for understanding real-world scenes. In this paper, a graph model-based human-object interaction detection algorithm is proposed, which aims to make full ... 详细信息
来源: 评论
An Empirical Evaluation of Machine Learning Algorithms for Groundwater Quality Classification  3
An Empirical Evaluation of Machine Learning Algorithms for G...
收藏 引用
3rd international conference on Innovative Practices in technology and Management, ICIPTM 2023
作者: Domakonda, Vinay Kumar Sasirekha, K. Sangeetha, S. Umasankar, L. Nagendiran, S. Kumar, M Jogendra Vignan's Foundation for Science and Technology Department of Mechanical Engineering Andhra Pradesh India R.M.D Engineering College Department of Computer Science Kavarapettai India Veltech Multitech Department of Information Technology Chennai India R.M.K College of Engineering and Technology Department of Electrical and Electronics Chennai India R.M.K Engineering College Department of Artificial Intelligence Kavaraipettai India KoneruLakshmaiah Education Foundation Department of Computer Science Vaddeswaram India
Groundwater is an effective monitoring system is essential, one of the most vulnerable resources. The use of spatial data to measure spatial changes in groundwater one of the most key things of soil monitoring. As a r... 详细信息
来源: 评论
Hate Speech detection in Audio Using SHAP - An Explainable AI  1
收藏 引用
3rd international conference on Advanced Network Technologies and Intelligent Computing (ANTIC)
作者: Imbwaga, Joan L. Chittaragi, Nagaratna B. Koolagudi, Shashidhar G. Natl Inst Technol Mangaluru Karnataka India Siddaganga Inst Technol Tumkur Karnataka India
Hate speech detection is a process of recognition of communication media such as text, audio, and/or video, if it contains hatred and/or encourages violence towards a person or a community of people. This is usually b... 详细信息
来源: 评论
An Enhancing Network Security: A Stacked Ensemble Intrusion detection system for Effective Threat Mitigation  3
An Enhancing Network Security: A Stacked Ensemble Intrusion ...
收藏 引用
3rd international conference on Innovative Mechanisms for Industry Applications, ICIMIA 2023
作者: Vullam, Nagagopiraju Roja, D. Rao, Nagamalleswara Vellela, Sai Srinivas Vuyyuru, Lakshma Reddy Kumar, K Kiran Chalapathi Institute of Engineering and Technology Dept. of CSE AP Guntur India Chalapathi Institute of Technology Dept. of CSE-Data Science AP Guntur India Chalapathi Institute of Technology Dept. of CSE AP Guntur India Koneru Lakshmaiah Education Foundation Dept. of CSE AP Vaddeswaram India
Modern cyber security relies heavily on intrusion detection in network traffic to quickly identify and mitigate security threats. Conventional intrusion detection systems frequently depend on lone, stand-alone models ... 详细信息
来源: 评论
Drowsiness and Lethargy detection Using Machine Learning Techniques  3
Drowsiness and Lethargy Detection Using Machine Learning Tec...
收藏 引用
3rd international conference on Electrical, Computer and Communication Engineering, ECCE 2023
作者: Siddik, Md. Abu Dayan Rahman, Mohammad Shahidur Inst. of Information and Communication Technology Shahjalal University of Science and Technology Sylhet Bangladesh
Drowsiness has severe effects on the safety of human life. The worldwide death rate due to drowsy driving is quite alarming. As the implementation of artificial intelligence (AI) is growing faster, this paper describe... 详细信息
来源: 评论