咨询与建议

限定检索结果

文献类型

  • 4,147 篇 会议
  • 63 册 图书
  • 20 篇 期刊文献

馆藏范围

  • 4,230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,282 篇 工学
    • 2,670 篇 计算机科学与技术...
    • 2,213 篇 软件工程
    • 1,010 篇 信息与通信工程
    • 529 篇 生物工程
    • 404 篇 控制科学与工程
    • 364 篇 生物医学工程(可授...
    • 352 篇 电气工程
    • 311 篇 光学工程
    • 254 篇 电子科学与技术(可...
    • 215 篇 安全科学与工程
    • 194 篇 化学工程与技术
    • 190 篇 交通运输工程
    • 189 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 180 篇 机械工程
    • 161 篇 网络空间安全
  • 1,689 篇 理学
    • 755 篇 数学
    • 566 篇 生物学
    • 444 篇 物理学
    • 279 篇 统计学(可授理学、...
    • 272 篇 化学
    • 151 篇 系统科学
  • 1,025 篇 管理学
    • 674 篇 图书情报与档案管...
    • 540 篇 管理科学与工程(可...
    • 282 篇 工商管理
  • 286 篇 医学
    • 271 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 196 篇 药学(可授医学、理...
  • 180 篇 法学
    • 129 篇 社会学
  • 122 篇 农学
    • 122 篇 作物学
  • 104 篇 经济学
  • 87 篇 教育学
  • 11 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 110 篇 deep learning
  • 104 篇 feature extracti...
  • 92 篇 computer vision
  • 73 篇 training
  • 68 篇 accuracy
  • 65 篇 computational mo...
  • 65 篇 machine learning
  • 59 篇 image processing
  • 59 篇 artificial intel...
  • 58 篇 data mining
  • 57 篇 semantics
  • 55 篇 convolutional ne...
  • 54 篇 object detection
  • 54 篇 image segmentati...
  • 53 篇 computer archite...
  • 52 篇 smart cities
  • 49 篇 natural language...
  • 48 篇 internet of thin...
  • 46 篇 real-time system...
  • 42 篇 big data

机构

  • 15 篇 college of infor...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 xi'an university...
  • 10 篇 key laboratory o...
  • 10 篇 shanghai institu...
  • 10 篇 school of inform...
  • 9 篇 wuhan university...
  • 9 篇 computer science...
  • 9 篇 school of inform...
  • 8 篇 college of compu...
  • 8 篇 sri lanka instit...
  • 8 篇 school of inform...
  • 8 篇 school of inform...
  • 8 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 xi'an shiyou uni...
  • 8 篇 school of comput...
  • 8 篇 college of compu...

作者

  • 12 篇 wang peng
  • 10 篇 mekruksavanich s...
  • 9 篇 yingsong li
  • 9 篇 temdee punnarumo...
  • 9 篇 zhao hui
  • 9 篇 li yingsong
  • 9 篇 jitpattanakul an...
  • 8 篇 gaol ford lumban
  • 8 篇 li wei
  • 7 篇 nikola zlatanov
  • 7 篇 zhang chao
  • 7 篇 wang chao
  • 7 篇 li liping
  • 7 篇 wang wei
  • 7 篇 sun fuchun
  • 7 篇 wang yang
  • 7 篇 zlatanov nikola
  • 7 篇 wang hao
  • 7 篇 liping li
  • 7 篇 zhang jian

语言

  • 4,058 篇 英文
  • 165 篇 其他
  • 4 篇 中文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"任意字段=7th International Conference on Computer and Information Processing Technology, ISCIPT 2022"
4230 条 记 录,以下是1041-1050 订阅
排序:
Network Risk Assessment Method Based on Residual Risk Analysis  1
收藏 引用
7th international conference on Internet of things, ICIOT 2022 held as Part of the Services conference Federation, SCF 2022
作者: Jing, Hao Yan, Peizhi Wang, Gang Liu, Jiewei Fang, Yige School of Information Engineering Inner Mongolia University of Technology Hohhot China
the existing network security theory usually believes that "residual risks" are acceptable to a certain degree. However, the reality is that most attackers can enter the network by using the residual risks. ... 详细信息
来源: 评论
Automated ASPECTS Classification in Acute Ischemic Stroke using EfficientNetV2  7
Automated ASPECTS Classification in Acute Ischemic Stroke us...
收藏 引用
7th IEEE international conference for Convergence in technology, I2CT 2022
作者: Golkonda, Ramananjali Mounica Menon, Vivek Nambiar, Vivek Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri Kollam690 525 India Amrita Institute of Medical Sciences Division of Stroke Medicine Department of Neurology Kochi682 041 India
Etiology of ischemic stroke can be attributed to large vessel occlusions (LVOs), which lead to insufficient supply of oxygen to brain. Early detection and evaluation of infarct core volume plays a crucial role in the ... 详细信息
来源: 评论
An Efficient Reduced-Memory GPU-based Dynamic Programming Strategy for Bounded Knapsack Problems  7
An Efficient Reduced-Memory GPU-based Dynamic Programming St...
收藏 引用
7th international conference on Parallel, Distributed and Grid Computing, PDGC 2022
作者: Biswas, Girish Mukherjee, Nandini Jadavpur University Department of Computer Science and Engineering Kolkata India
Many dynamic programming approaches are existing for 1-0 Knapsack problem (KP) for fast GPU-based solution. these dynamic programming methods can be used for solving the problem of Bounded Knapsack Problem (BKP) after... 详细信息
来源: 评论
BeLLE: Detecting National Differences in Computational thinking and computer Science through an international Challenge  7th
BeLLE: Detecting National Differences in Computational Thin...
收藏 引用
7th international conference on Creative Mathematical Sciences Communication, CMSC 2024
作者: Kaarto, Heidi Bilbao, Javier Pears, Arnold Dagienė, Valentina Kilpi, Janica Parviainen, Marika Pluhár, Zsuzsa Gülbahar, Yasemin Laakso, Mikko-Jussi Turku Research Institute for Learning Analytics University of Turku Turku Finland Bilbao Spain KTH Royal Institute of Technology Stockholm Sweden Vilnius University Institute of Educational Sciences Vilnius Lithuania Eötvös Loránd University Budapest Hungary Teachers College Columbia University New York United States
the Bebras challenge is an international initiative to engage school pupils with computer science and computational thinking via an annual challenge designed by computer science experts and educators. BeLLE is an inte... 详细信息
来源: 评论
Systematic Literature Review of Stemming and Lemmatization Performance for Sentence Similarity  7
Systematic Literature Review of Stemming and Lemmatization P...
收藏 引用
7th IEEE international conference on information technology and Digital Applications, ICITDA 2022
作者: Pramana, Rio Debora Subroto, Jonathan Jansen Gunawan, Alexander Agung Santoso Anderies Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia
In today's era, where the Internet is a huge part of people's life, information Retrieval (IR) is as important as ever for people to retrieve relevant information in a quick way. the sentence similarity task i... 详细信息
来源: 评论
An Intrusion Detection System for Securing IoT Based Sensor Networks from Routing Attacks  7th
An Intrusion Detection System for Securing IoT Based Sensor ...
收藏 引用
7th international conference on computer, Communication and Signal processing, ICCCSP 2023
作者: Subramani, Shalini Selvi, M. Kumar, S. V. N. Santhosh thangaramya, K. Anand, M. Kannan, A. School of Computer Science and Engineering Vellore Institute of Technology Vellore632014 India School of Information Technology and Engineering Vellore Institute of Technology Vellore632014 India Computer Science and Engineering College of Engineering Guindy Anna University Chennai600025 India Department of Electronics and Communication Saveetha Engineering College Chennai602105 India
Internet of things is made up of sensor nodes that can sense the given environment, gather the data from environment and then communicates the data to the sink node and the internet through wireless communication. As ... 详细信息
来源: 评论
Predictive EQCi-Optimized Load Scheduling for Heterogeneous IoT-Data in Fog Computing Environments  7
Predictive EQCi-Optimized Load Scheduling for Heterogeneous ...
收藏 引用
7th international conference on Image information processing, ICIIP 2023
作者: Madasamy, Sridhar Vikkram, R. Basi Reddy, A. Nandhini, T. Gupta, Shipra Nagamani, A. Cognizant Technology Solution 500 Frank W. Burr Boulevard TeaneckNJ07666 United States Karpagam College of Engineering Department of Information Technology Tamilnadu Coimbatore India Mohan Babu University School of Computing Department of Computer Science And Engineering Andhra Pradesh Tirupati India KSR Institute For Engineering And Technology Department of Information Technology TamilNadu Tiruchengode637 215 India Graphic Era Hill University School of Management Uttarakhand Dehradun India Mlr Institute of Technology Department of Computer Science And Engineering Telangana Hyderabad500043 India
this paper presents a pioneering predictive EQCi-optimized load scheduling technique tailored to the complexities of heterogeneous IoT data within fog computing environments. the proposed method strategically assigns ... 详细信息
来源: 评论
Personalized QoE Optimization with Edge-Aided Video Enhancement Services  23
Personalized QoE Optimization with Edge-Aided Video Enhancem...
收藏 引用
23rd IEEE international conference on High Performance Computing and Communications, 7th IEEE international conference on Data Science and Systems, 19th IEEE international conference on Smart City and 7th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Liao, Hanlong Tang, Guoming Liang, Teng Wang, Longguang Guo, Deke National University of Defense Technology Science and Technology on Information Systems Engineering Laboratory Hunan Changsha China Peng Cheng Laboratory Shenzhen China
Video enhancement technologies can not only improve video qualities but also enrich personalized video experiences. With these technologies, the requested videos can be enhanced either on end devices or cloud servers.... 详细信息
来源: 评论
Research on the Online Recognition of the Motion Image of the Adjacent Joints of the Lower Limbs  2022
Research on the Online Recognition of the Motion Image of th...
收藏 引用
7th international conference on Multimedia and Image processing, ICMIP 2022
作者: Wan, Jiale Zhao, Li Bian, Yan Key Laboratory of Information Sensing and Intelligent Control Tianjin University of Technology and Education Tianjin300222 China
At present, offline analysis and research of lower limb motor imagery brain computer interface (MI-BCI) are relatively mature, but there are few researches on the online recognition of lower limb MI-BCI. the online re... 详细信息
来源: 评论
Evaluating the Performance of State-of-the-art Methods and Classifying Covid-19 Infected Tissues  7
Evaluating the Performance of State-of-the-art Methods and C...
收藏 引用
7th IEEE international conference for Convergence in technology, I2CT 2022
作者: Kamruzzaman, M.M. Moinuddin, Md. Liton, Atikul Islam Azad, Mir Mohammad Hossain, Muhammad Anwar Rahman, Wahidur Jouf University College of Computer and Information Sciences Department of Computer Science Sakakah Saudi Arabia Khwaja Yunus Ali University Department of Computer Science and Engineering Sirajganj6751 Bangladesh University of South Asia Department of Computer Science and Engineering Dhaka Bangladesh Hamdard University Bangladesh Department of Computer Science and Engineering Munshiganj1510 Bangladesh Hamdard University Bangladesh Department of Aurvedic Medicine Munshiganj1510 Bangladesh Uttara University Department of Computer Science and Engineering Uttara Dhaka Bangladesh
In this study, the Traditional Convolution Neural Network (TCNN) and state-of-the-art approaches were applied to the datasets of Chest X-ray and CT scan imaging modalities and trained them concurrently. the TCNN's... 详细信息
来源: 评论