咨询与建议

限定检索结果

文献类型

  • 4,114 篇 会议
  • 63 册 图书
  • 20 篇 期刊文献

馆藏范围

  • 4,197 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,253 篇 工学
    • 2,651 篇 计算机科学与技术...
    • 2,199 篇 软件工程
    • 1,001 篇 信息与通信工程
    • 529 篇 生物工程
    • 396 篇 控制科学与工程
    • 363 篇 生物医学工程(可授...
    • 350 篇 电气工程
    • 304 篇 光学工程
    • 252 篇 电子科学与技术(可...
    • 214 篇 安全科学与工程
    • 193 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 188 篇 交通运输工程
    • 183 篇 动力工程及工程热...
    • 178 篇 机械工程
    • 159 篇 网络空间安全
  • 1,680 篇 理学
    • 753 篇 数学
    • 565 篇 生物学
    • 439 篇 物理学
    • 278 篇 统计学(可授理学、...
    • 271 篇 化学
    • 151 篇 系统科学
  • 1,020 篇 管理学
    • 671 篇 图书情报与档案管...
    • 536 篇 管理科学与工程(可...
    • 279 篇 工商管理
  • 286 篇 医学
    • 271 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 196 篇 药学(可授医学、理...
  • 180 篇 法学
    • 129 篇 社会学
  • 120 篇 农学
    • 120 篇 作物学
  • 104 篇 经济学
  • 86 篇 教育学
  • 11 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 110 篇 deep learning
  • 104 篇 feature extracti...
  • 92 篇 computer vision
  • 73 篇 training
  • 68 篇 accuracy
  • 65 篇 computational mo...
  • 65 篇 machine learning
  • 59 篇 image processing
  • 59 篇 artificial intel...
  • 58 篇 data mining
  • 57 篇 semantics
  • 54 篇 convolutional ne...
  • 53 篇 object detection
  • 53 篇 computer archite...
  • 53 篇 image segmentati...
  • 52 篇 smart cities
  • 49 篇 natural language...
  • 48 篇 internet of thin...
  • 46 篇 real-time system...
  • 42 篇 big data

机构

  • 15 篇 college of infor...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 xi'an university...
  • 10 篇 key laboratory o...
  • 10 篇 shanghai institu...
  • 10 篇 school of inform...
  • 9 篇 wuhan university...
  • 9 篇 computer science...
  • 9 篇 school of inform...
  • 8 篇 college of compu...
  • 8 篇 sri lanka instit...
  • 8 篇 school of inform...
  • 8 篇 school of inform...
  • 8 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 xi'an shiyou uni...
  • 8 篇 school of comput...
  • 8 篇 college of compu...

作者

  • 12 篇 wang peng
  • 10 篇 mekruksavanich s...
  • 9 篇 yingsong li
  • 9 篇 temdee punnarumo...
  • 9 篇 zhao hui
  • 9 篇 li yingsong
  • 9 篇 jitpattanakul an...
  • 8 篇 gaol ford lumban
  • 8 篇 li wei
  • 7 篇 nikola zlatanov
  • 7 篇 zhang chao
  • 7 篇 wang chao
  • 7 篇 li liping
  • 7 篇 wang wei
  • 7 篇 sun fuchun
  • 7 篇 wang yang
  • 7 篇 zlatanov nikola
  • 7 篇 wang hao
  • 7 篇 liping li
  • 7 篇 zhang jian

语言

  • 4,124 篇 英文
  • 66 篇 其他
  • 3 篇 中文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"任意字段=7th International Conference on Computer and Information Processing Technology, ISCIPT 2022"
4197 条 记 录,以下是111-120 订阅
排序:
American Sign Language Hand Gesture Interpreter  7
American Sign Language Hand Gesture Interpreter
收藏 引用
7th international conference on Computing in Engineering and technology, ICCET 2022
作者: Parajuli, Pradeep Sharma, Anil Kumar Dept. of Computer Science and Engineering Galgotias University Uttar Pradesh Greater Noida India
For many disabled people who are dumb or deaf sign language is a way of communication, to do communication both people need to know sign language or need a translator between them, but everywhere they are not getting ... 详细信息
来源: 评论
Implementing LDA Topic Modelling Technique to Study User Reviews in Tourism  7
Implementing LDA Topic Modelling Technique to Study User Rev...
收藏 引用
7th international conference on Parallel, Distributed and Grid Computing, PDGC 2022
作者: Chauhan, Amit Mohana, Rajni Jaypee University of Information Technology Department of Computer Science and Information Technology Waknaghat Solan India
Extracting valuable information from unstructured text is a significant difficulty in today's culture due to the ever-increasing proliferation of texts, most of which are generated via online social networks in th... 详细信息
来源: 评论
Robust Adaptive Beamforming Based on SOCP  7
Robust Adaptive Beamforming Based on SOCP
收藏 引用
7th international conference on Intelligent Computing and Signal processing, ICSP 2022
作者: Zhang, JingRong Jin, Songpo Lu, Ming Zhu, Rongqing Zhuang, Shanna Li, HongTao School of Electronic and Optical Engineering Nanjing University of Science and Technology Nanjing China China Electronics Technology Group Corp 54th Research Institute Shijiazhuang China School of Information and Science Technology Shijiazhuang Tiedao University Shijiazhuang China
To suppress interferences in the airspace and improve the robustness of beam, a robust adaptive beamforming algorithm based on second-order cone programming (RAB_SOCP) is proposed in this paper. Using worst-case optim... 详细信息
来源: 评论
Study of Cloud Computing technology for Critical Site Security System  7
Study of Cloud Computing Technology for Critical Site Securi...
收藏 引用
7th international conference on Electronic information technology and computer Engineering (EITCE)
作者: Huang, Zhengzhong Tang, Xiangcheng Li, Linhui Luo, Yao'an Zou, Shuoyi Peng, Jiapin Southwest Inst Tech Phys Informat Proc Ctr Chengdu Peoples R China
this article firstly analyses the situation and technology trends of security system, then proposes the conception and structure of the Cloud-based Security System for Critical Site (CSSCS), finally provide an outlook... 详细信息
来源: 评论
Chinese Named Entity Recognition Based on Character Level Multi Feature Fusion  7
Chinese Named Entity Recognition Based on Character Level Mu...
收藏 引用
7th international conference on Intelligent Computing and Signal processing, ICSP 2022
作者: Zhao, Jianqiang Zhu, Wantong Chen, Cheng Xiamen Meiya Pico Information Co. Ltd Fujian Xiamen China School of Computer Science and Technology Xidian University Shaanxi Xian China
For the task of named entity recognition, this paper proposes a character-level multi-feature fusion named entity recognition method based on the IDCNN model, which can adjust the receptive field range through paramet... 详细信息
来源: 评论
Research Progress of Reversible Data Hiding in Encrypted Domain  7
Research Progress of Reversible Data Hiding in Encrypted Dom...
收藏 引用
2022 7th international conference on information Science, computer technology and Transportation, ISCTT 2022
作者: Ge, Yu Sun, Junjie Zhang, Minqing Engineering University of CAPF Xi’an China Key Laboratory of PAP for Cryptography and Information Security Xi’an China
At present, with the rise of cloud computing and the wide application of cloud storage, the security problem of data storage also appears. Reversible data hiding is an emerging research direction of information hiding... 详细信息
来源: 评论
BIM Execution Plan Compilation and Application in Singapore TUAS Water Reclamation Plant  7
BIM Execution Plan Compilation and Application in Singapore ...
收藏 引用
7th international conference on Intelligent Computing and Signal processing, ICSP 2022
作者: Yang, Guicheng Lao, Keke Liu, Wenhui Wang, Xizhen Liu, Tao Li, Zhihao PowerChina Huadong Engineering Corporation Limited Hangzhou China
BIM execution plan(BEP) is the basic guidance of BIM work. the content of BEP and implementation mode of TUAS Water Reclamation Plant(TWRP) BIM work are explained. the BIM design software and simulation software estab... 详细信息
来源: 评论
Catch me if you can: Achieving complete internet anonymity using open source technologies  7
Catch me if you can: Achieving complete internet anonymity u...
收藏 引用
7th international conference on Computing in Engineering and technology, ICCET 2022
作者: Bangar, Roshan Narkar, Varun Phand, Atharva Lohokare, Jay Computer Engineering College of Engineering Pune Maharashtra India Computer Science Stony Brook University New York United States
Search engines aggressively capture user data for targeted advertisements at the cost of user privacy. We present a framework for complete internet anonymity that blocks search engines from tracking user data based on... 详细信息
来源: 评论
Development of domestic and international computer forensics
Development of domestic and international computer forensics
收藏 引用
7th international conference on Intelligent information Hiding and Multimedia Signal processing, IIHMSP 2011
作者: Xu, Rongsheng Chow, K.P. Yang, Ying Institute of High Energy Physics Chinese Academy of Sciences Beijing China University of Hong Kong Hong Kong Hong Kong Shandong Computer Science Center Jinan China
With the increasing of computer crime, instant emergence of new digital product, new computer technology and computer forensics technology is promoted, developed constantly. this paper described basic information/cont... 详细信息
来源: 评论
Concept of Dynamic Advertisement Composition Model Tailored to Customers' Needs Based on Interactive Customer Input  8
Concept of Dynamic Advertisement Composition Model Tailored ...
收藏 引用
8th international conference on Ambient Systems, Networks and Technologies (ANT) / 7th international conference on Sustainable Energy information technology (SEIT)
作者: Davidekova, Monika Ml, Michal Gregus Comenius Univ Dept Informat Syst Odbojarov 10 Bratislava 85101 Slovakia Comenius Univ Dept Strategy & Entrepreneurship Odbojarov 10 Bratislava 85101 Slovakia
the emergence of information and communication technology changed the world irreversibly through the penetrance in every facet of our lives. It enables interactive communication in real time with immense number of end... 详细信息
来源: 评论