咨询与建议

限定检索结果

文献类型

  • 553 篇 会议

馆藏范围

  • 553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 299 篇 计算机科学与技术...
    • 213 篇 软件工程
    • 143 篇 信息与通信工程
    • 114 篇 生物工程
    • 62 篇 控制科学与工程
    • 47 篇 电气工程
    • 47 篇 生物医学工程(可授...
    • 38 篇 光学工程
    • 37 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 26 篇 仪器科学与技术
    • 18 篇 动力工程及工程热...
    • 17 篇 化学工程与技术
    • 16 篇 安全科学与工程
    • 14 篇 材料科学与工程(可...
    • 14 篇 交通运输工程
    • 13 篇 机械工程
  • 228 篇 理学
    • 118 篇 生物学
    • 114 篇 数学
    • 55 篇 统计学(可授理学、...
    • 51 篇 物理学
    • 30 篇 化学
    • 19 篇 系统科学
  • 101 篇 管理学
    • 51 篇 图书情报与档案管...
    • 50 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 49 篇 医学
    • 39 篇 基础医学(可授医学...
    • 39 篇 临床医学
    • 29 篇 药学(可授医学、理...
    • 21 篇 公共卫生与预防医...
  • 13 篇 农学
  • 12 篇 法学
  • 5 篇 经济学
  • 5 篇 教育学

主题

  • 91 篇 convolutional ne...
  • 66 篇 neural networks
  • 42 篇 artificial neura...
  • 39 篇 deep learning
  • 27 篇 accuracy
  • 26 篇 deep neural netw...
  • 23 篇 recurrent neural...
  • 22 篇 machine learning...
  • 20 篇 machine learning
  • 19 篇 feature extracti...
  • 19 篇 training
  • 18 篇 predictive model...
  • 18 篇 prediction algor...
  • 14 篇 computational mo...
  • 13 篇 support vector m...
  • 12 篇 object detection
  • 12 篇 real-time system...
  • 12 篇 computer vision
  • 11 篇 convolution
  • 11 篇 convolutional ne...

机构

  • 7 篇 chitkara univers...
  • 5 篇 claro m. recto a...
  • 4 篇 henan institute ...
  • 4 篇 university of ch...
  • 4 篇 uttaranchal univ...
  • 3 篇 ies college of t...
  • 3 篇 school of inform...
  • 3 篇 faculty of infor...
  • 3 篇 ies college of t...
  • 3 篇 south china norm...
  • 3 篇 graphic era deem...
  • 3 篇 ies university d...
  • 2 篇 changfeng county...
  • 2 篇 srm institute of...
  • 2 篇 computer vision ...
  • 2 篇 school of mathem...
  • 2 篇 the institute of...
  • 2 篇 jiangsu automati...
  • 2 篇 school of comput...
  • 2 篇 nanjing zhongke ...

作者

  • 3 篇 joshi kapil
  • 2 篇 lei wang
  • 2 篇 harshjeet
  • 2 篇 li yang
  • 2 篇 huang huang
  • 2 篇 jie li
  • 2 篇 zhang shuai
  • 2 篇 buddhi dharam
  • 2 篇 tiwari raj gaura...
  • 2 篇 gu yongjian
  • 2 篇 singh jagendra
  • 2 篇 wang wei
  • 2 篇 m jogendra kumar
  • 2 篇 chauhan rahul
  • 2 篇 chen hao
  • 2 篇 chen liang
  • 2 篇 zhe li
  • 2 篇 lu zhuo
  • 2 篇 wang zhimin
  • 2 篇 ramya s.

语言

  • 536 篇 英文
  • 17 篇 其他
  • 4 篇 中文
检索条件"任意字段=3rd International Conference on Advanced Algorithms and Neural Networks, AANN 2023"
553 条 记 录,以下是541-550 订阅
排序:
Empowering Textile Manufacturing: TensorFlow-Powered Fabric Anomaly Detection for Enhanced Quality Assurance
Empowering Textile Manufacturing: TensorFlow-Powered Fabric ...
收藏 引用
Advancement in Technology (ICONAT), international conference for
作者: R. Murugeswari D. Balakrishnan Umasree Mariappan B. SandeepNarayana D. Karishma G. Akhila Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil Tamil Nadu India Department of Information Technology P.S.R. Engineering College Sivakasi Tamil Nadu India
The textile sector depends heavily on the ability to identify fabric flaws. Problems can be fixed before the fabric clients if they are discovered early. Currently, the appears assure in detecting these flaws. However... 详细信息
来源: 评论
Research on Bad Data Identification Method for Power Information Communication Process
Research on Bad Data Identification Method for Power Informa...
收藏 引用
Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI), IEEE international conference on
作者: Fuxiang Zhang Zheng Li Meng Li Chong Li Haibo Sun State Grid Liaoning Information and Communication Company Shenyang China
In traditional electrical power communication processes, the denoising ability of the existing methods for identifying faulty data is inadequate, which results in a diminished identification efficiency. To address thi... 详细信息
来源: 评论
Enhancing Fingerprint Security Using CNN for Robust Biometric Authentication and Spoof Detection
Enhancing Fingerprint Security Using CNN for Robust Biometri...
收藏 引用
Technological Advancements in Computational Sciences (ICTACS), international conference on
作者: Munish Kumar Ankita Tiwari Shilpa Choudhary Monali Gulhane Bhawna Kaliraman Rashmi Verma Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram India Department of Mathematics Koneru Lakshmaiah Education Foundation Vaddeswaram India Department of Computer Science and Engineering (AI & ML) Neil Gogte Institute of Technology Hyderabad India Department of CSE Symbiosis Institute of Technology (SIT) Nagpur Symbiosis International (Deemed University) (SIU) Pune India Department of Computer Science and Engineering DPG Institute of Technology and Management Gurugram India
Fake fingerprint recognition needs to pose a significant problem in the quickly developing field of biometric security. The creation of creative and effective spoof detection systems has become crucial as weaknesses i...
来源: 评论
advanced AI Techniques for Autonomous Moving Object Detection and Tracking
Advanced AI Techniques for Autonomous Moving Object Detectio...
收藏 引用
international conference on Innovative Mechanisms for Industry Applications (ICIMIA)
作者: G. Meenakshi Sundaram Nalluru Mourya Sai Eatesh Manjiri Ulhas Karande Warish Patel B Kannadasan Harshal Patil Department of Electronics and Communication Engineering Aditya college of Engineering Surampalem Andhra Pradesh India Computer science and business systems R.M.K Engineering College Chennai Tamil Nadu India Department of Computer Science and Engineering Padm. Dr. V. B. Kolte College of Engineering Malkapur Maharashtra India Department of Computer Science and Engineering Parul Institute of Engineering and Technology Parul University Post Limda Waghodia Gujarat India Department of Civil Architectural Engineering and planning Kannadasan Balakrishnan Research Foundation Kalieswari nagar Peraiyur Tamil Nadu India Computer Science and Engineering Symbiosis Institute of Technology Symbiosis International (Deemed University) Pune Maharashtra India
In the domain of autonomous vehicle systems, the accurate detection and tracking of moving objects, particularly vehicles, are of paramount importance for ensuring safe and efficient operations. Conventional methods b...
来源: 评论
VGG-16 Technique to Reduce the Global Food Crises and Enhance the Crop Yields: Deep Learning Approaches
VGG-16 Technique to Reduce the Global Food Crises and Enhanc...
收藏 引用
Applied Artificial Intelligence and Computing (ICAAIC), international conference on
作者: Sivakumar Depuru K Amala Pera Supriya A Basi Reddy Ravala.Sai Gireesh Dept of CSE School of Computing Mohan Babu University Tirupati India Dept.of. ECE Sri Venkateswara College of Engineering (Autonomous) Tirupati A.P India Department of Computer Application Mohan babu University Tirupati Andhra Pradesh India Dept. of. Computer Application Mohan babu University Tirupati A.P India
In the digital era, enhancing agriculture plays a critical role in addressing food crises by improving crop yield and ensuring food security. Early detection and management of crop diseases are paramount for agricultu... 详细信息
来源: 评论
Gesture Recognition Based on Spatial-Temporal Fusion Residual Attention Network
Gesture Recognition Based on Spatial-Temporal Fusion Residua...
收藏 引用
Networking Systems of AI (INSAI), international conference on
作者: Puhao Liu Mengjia Wang Yang Cao School of Cyber Science and Engineering Zhengzhou University Zhengzhou China
In the field of gesture recognition, previous traditional algorithms need to extract and process features by manual means, and when the model encounters different expressions of gestures or different datasets, the rec... 详细信息
来源: 评论
Utilizing Generative Adversarial networks Compensator in 4X4 MIMO 5G Backhaul Convergence with Radio-over Fiber (RoF) System
Utilizing Generative Adversarial Networks Compensator in 4X4...
收藏 引用
Advances in Engineering Science and Technology (AEST), international conference on
作者: Sura Mousa Ali Ehab Abdulrazaaq Hussein Department of Electrical Engineering College of Engineering University of Babylon Baghdad Iraq Department of Electrical Engineering College of Engineering University of Babylon Babylon Iraq
The utilization of fiber systems for transmitting Millimeter-Wave (MMW) signals has gained significant traction in recent years, particularly for advanced wireless communication applications such as 5G and beyond. How... 详细信息
来源: 评论
Age and Gender Classification Using Convolution neural Network
Age and Gender Classification Using Convolution Neural Netwo...
收藏 引用
Delhi Section conference (DELCON), IEEE
作者: Thonduru Anjum Javeriya Sumit Kumar Banshal Gnanaprakasam Thangavel Raka Moni Department of Computer Science and Engineering Alliance University Bangalore India Computer Science and Engineering Daffodil International University Dhaka Bangladesh
This work aims to improve the accuracy of computer vision and deep learning methods for age and gender prediction in real time from individual photos or video frames. Automated techniques to recognize these characteri... 详细信息
来源: 评论
Research on Noise Reduction Method for Broad-Spectrum Electromagnetic Radiation Detection Data Based on Improved Wavenet Model
Research on Noise Reduction Method for Broad-Spectrum Electr...
收藏 引用
Energy, Power and Electrical Technology (ICEPET), international conference on
作者: Jianxin Li Zongchang Luo Jinlin Lin Jiqi Pan Mengzhu Hu Yarong Wei Guangxi Power Grid Equipment Monitoring and Diagnosis Technology Innovation Center Guangxi Key Laboratory of Intelligent Control and Maintenance of Power Equipment Electric Power Research Institute of Guangxi Power Grid Co. LTD. Nanning China Guangxi Power Grid Co. LTD. Nanning China
In the realm of electromagnetic radiation (EMR) data collection and simulation, where noise is an ever-present challenge, this study introduces a novel approach for noise reduction employing an enhanced WaveNet model.... 详细信息
来源: 评论
3rd international conference on Ubiquitous Security, UbiSec 2023
3rd International Conference on Ubiquitous Security, UbiSec ...
收藏 引用
3rd international conference on Ubiquitous Security, UbiSec 2023
The proceedings contain 29 papers. The special focus in this conference is on Ubiquitous Security. The topics include: Impact of Library Code in Binary Similarity Systems;how Does Post-quantum Cryptography A...
来源: 评论