咨询与建议

限定检索结果

文献类型

  • 4,243 篇 会议
  • 8 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 4,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,630 篇 工学
    • 2,777 篇 计算机科学与技术...
    • 2,391 篇 软件工程
    • 1,426 篇 信息与通信工程
    • 661 篇 控制科学与工程
    • 642 篇 电气工程
    • 580 篇 电子科学与技术(可...
    • 545 篇 生物工程
    • 384 篇 生物医学工程(可授...
    • 383 篇 动力工程及工程热...
    • 288 篇 网络空间安全
    • 274 篇 光学工程
    • 243 篇 机械工程
    • 240 篇 安全科学与工程
    • 208 篇 化学工程与技术
    • 202 篇 交通运输工程
    • 188 篇 仪器科学与技术
  • 1,784 篇 理学
    • 807 篇 数学
    • 597 篇 生物学
    • 515 篇 物理学
    • 270 篇 统计学(可授理学、...
    • 230 篇 化学
    • 172 篇 系统科学
  • 1,015 篇 管理学
    • 663 篇 管理科学与工程(可...
    • 440 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 336 篇 医学
    • 317 篇 临床医学
    • 309 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 144 篇 公共卫生与预防医...
  • 190 篇 法学
    • 143 篇 社会学
  • 117 篇 经济学
  • 113 篇 农学
  • 94 篇 教育学
  • 15 篇 军事学
  • 7 篇 文学
  • 2 篇 艺术学

主题

  • 121 篇 internet of thin...
  • 99 篇 convolutional ne...
  • 88 篇 deep learning
  • 81 篇 machine learning
  • 75 篇 wireless communi...
  • 57 篇 blockchain
  • 52 篇 feature extracti...
  • 50 篇 wireless sensor ...
  • 50 篇 5g mobile commun...
  • 47 篇 support vector m...
  • 46 篇 cloud computing
  • 46 篇 computer vision
  • 41 篇 signal processin...
  • 40 篇 signal processin...
  • 37 篇 simulation
  • 36 篇 computational mo...
  • 36 篇 cryptography
  • 35 篇 neural networks
  • 34 篇 forecasting
  • 33 篇 object detection

机构

  • 61 篇 graphic era deem...
  • 31 篇 chitkara univers...
  • 28 篇 college of elect...
  • 27 篇 uttaranchal inst...
  • 20 篇 department of co...
  • 18 篇 macau university...
  • 17 篇 xi'an technologi...
  • 14 篇 uttaranchal inst...
  • 12 篇 anhui university...
  • 12 篇 lloyd institute ...
  • 12 篇 amity university...
  • 12 篇 college of compu...
  • 11 篇 school of electr...
  • 11 篇 pune
  • 11 篇 al-maarif univer...
  • 11 篇 college of infor...
  • 10 篇 faculty of engin...
  • 9 篇 maharashtra pune
  • 9 篇 school of comput...
  • 9 篇 school of inform...

作者

  • 21 篇 feng botao
  • 17 篇 ding xiao
  • 16 篇 singh rajesh
  • 15 篇 surendran r.
  • 13 篇 habelalmateen mo...
  • 13 篇 li yingsong
  • 13 篇 pant bhasker
  • 12 篇 mekruksavanich s...
  • 11 篇 jubair mohammed ...
  • 11 篇 hassan mustafa h...
  • 11 篇 huang zhixiang
  • 11 篇 gangodkar durgap...
  • 11 篇 yang lixia
  • 11 篇 abbas ali hashim
  • 10 篇 rashid sami abdu...
  • 10 篇 rao n. thirupath...
  • 9 篇 jiang tao
  • 9 篇 li qiang
  • 9 篇 temdee punnarumo...
  • 9 篇 kukreja vinay

语言

  • 4,098 篇 英文
  • 158 篇 其他
  • 2 篇 中文
检索条件"任意字段=5th IEEE International Conference on Computer and Communication Engineering Technology, CCET 2022"
4257 条 记 录,以下是51-60 订阅
排序:
Arbitrary-Shaped Text Detection with Gaussian Probability Distance Distribution  5
Arbitrary-Shaped Text Detection with Gaussian Probability Di...
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Guo, Li Chen, Zhongyue Chen, Xiaoping Soochow University School of Electronics and Information Engineering Suzhou China
With the development of semantic segmentation, segmentation-based methods have yielded great success in detecting arbitrary-shaped texts. However, many existing text detection methods use binary discrete distributions... 详细信息
来源: 评论
Knowledge Graph Completion Based on Graph Attention Networks and Text Information  5
Knowledge Graph Completion Based on Graph Attention Networks...
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Hong, Shengyi Qian, Heng Gao, Yongchao Lyu, Hongli Qilu University of Technology School of Computer Science and Technology Jinan China Shandong Computer Science Center National Supercomputing Center in Jinan Jinan China Lakehead University Department of Electrical and Computer Engineering Thunder Bay Canada
In knowledge graphs (KGs), there exist some unsolved problems such as incomplete data, hidden information with incomplete mining and so on. In the most completion models, the information of the triples in the KG is ge... 详细信息
来源: 评论
Construction of Narrative Text Component Recognition Corpus  5
Construction of Narrative Text Component Recognition Corpus
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Zhang, Feng Han, Yingqi Wang, Jiong Liu, Jie Information Science Research Institute China Electronics Technology Corporation Beijing China Wuhan University School of Cyber Science and Engineer Wuhan China Information Engineering College Capital Normal University Beijing China North China University of Technology School of Information Science Beijing China
Textual structure analysis is an important part of Automatic Essay Score (AES), and is also one of the important research directions in Natural Language Processing. At present, there are still deficiencies in the rese... 详细信息
来源: 评论
A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division  5
A Modeling Method of Cyberspace Security Structure Based on ...
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Zhu, Yuwen Yu, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Security Institute of Information Engineering Beijing100000 China
As the cyberspace structure becomes more and more complex, the problems of dynamic network space topology, complex composition structure, large spanning space scale, and a high degree of self-organization are becoming... 详细信息
来源: 评论
Research on Intelligent communication Scheduling System Based on Network Slices  5
Research on Intelligent Communication Scheduling System Base...
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Dou, Chenchen Wang, Xue Dai, Rui State Grid Gansu Electric Power Company Digital Business Department Lanzhou China
the rapid development of smart grid has put forward higher requirements on communication technology. With the rapid development of power wireless communication network, the demand of power business becomes more and mo... 详细信息
来源: 评论
Non-intrusive Load Monitoring for Consistent Shape Loads Based on Convolutional Neural Network  5
Non-intrusive Load Monitoring for Consistent Shape Loads Bas...
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Li, Xiang Guo, Yifan Yan, Meng Wu, Xin North China Electric Power University School of Electrical and Electronic Engineering Beijing China
As the key method for demand-side management in power grid, non-intrusive load monitoring (NILM) keep up to the power consumption of various users in real time and provides data to support the formulation of relevant ... 详细信息
来源: 评论
A-pillar Blind Spot Display Algorithm Based on Line of Sight  5
A-pillar Blind Spot Display Algorithm Based on Line of Sight
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Sui, Shiyu Li, Tianjun Chen, Shengyong Tianjin University of Technology School of Computer Science and Engineering Tianjin China
the closed load-bearing structure of a car is designed to decrease the injuries to drivers in traffic accidents, however, such a design also results in many blind spots in driving which are the main cause of a number ... 详细信息
来源: 评论
Granularity Classification and Feature Fusion Methods in Traffic Sign Detection  5
Granularity Classification and Feature Fusion Methods in Tra...
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Huang, Wei Shi, Xiaohong Xu, Qi Li, Qingshu Yang, Peng Shanghai Maritime University College of Information Engineering Shanghai China
Nowadays, deep learning based on detection algorithms have replaced the traditional manual feature extraction target algorithms and have achieved amazing results in many places with their powerful automatic feature ex... 详细信息
来源: 评论
Tibetan Syllable Prediction with Pre-trained Cross-lingual Language Model  5
Tibetan Syllable Prediction with Pre-trained Cross-lingual L...
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Yi, Zibo Wu, Qingbo Yu, Jie Tang, Yongtao Liu, Xiaodong Peng, Long Ma, Jun Pla Academy of Military Science Information Research Center of Military Science Beijing100142 China National University of Defense Technology College of Computer Hunan Changsha410073 China
In recent years, with the development of Tibetan language information technologies, the Internet Tibetan data is increasing year by year. Due to the need for the Tibetan input method and Tibetan error correction, Tibe... 详细信息
来源: 评论
A Small Target Detection Method Based on Feature Enhancement and Positioning Optimization  5
A Small Target Detection Method Based on Feature Enhancement...
收藏 引用
5th ieee international conference on computer and communication engineering technology, ccet 2022
作者: Li, Qingshu Shi, Xiaohong Xu, Qi Huang, Wei Yang, Peng Shanghai Maritime University College of Information Engineering Shanghai China
Feature Pyramid Network (FPN) is a basic but important component in target detection system. Together with target detection algorithms, such as SSD, Faster R-CNN and YOLO series, they have achieved good detection resu... 详细信息
来源: 评论