咨询与建议

限定检索结果

文献类型

  • 4,115 篇 会议
  • 63 册 图书
  • 20 篇 期刊文献

馆藏范围

  • 4,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,254 篇 工学
    • 2,652 篇 计算机科学与技术...
    • 2,200 篇 软件工程
    • 1,001 篇 信息与通信工程
    • 529 篇 生物工程
    • 396 篇 控制科学与工程
    • 363 篇 生物医学工程(可授...
    • 350 篇 电气工程
    • 304 篇 光学工程
    • 252 篇 电子科学与技术(可...
    • 214 篇 安全科学与工程
    • 193 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 188 篇 交通运输工程
    • 183 篇 动力工程及工程热...
    • 178 篇 机械工程
    • 159 篇 网络空间安全
  • 1,680 篇 理学
    • 753 篇 数学
    • 565 篇 生物学
    • 439 篇 物理学
    • 278 篇 统计学(可授理学、...
    • 271 篇 化学
    • 151 篇 系统科学
  • 1,020 篇 管理学
    • 671 篇 图书情报与档案管...
    • 536 篇 管理科学与工程(可...
    • 279 篇 工商管理
  • 286 篇 医学
    • 271 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 196 篇 药学(可授医学、理...
  • 180 篇 法学
    • 129 篇 社会学
  • 120 篇 农学
    • 120 篇 作物学
  • 104 篇 经济学
  • 86 篇 教育学
  • 11 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 110 篇 deep learning
  • 104 篇 feature extracti...
  • 92 篇 computer vision
  • 73 篇 training
  • 68 篇 accuracy
  • 65 篇 computational mo...
  • 65 篇 machine learning
  • 59 篇 image processing
  • 59 篇 artificial intel...
  • 58 篇 data mining
  • 57 篇 semantics
  • 54 篇 convolutional ne...
  • 53 篇 object detection
  • 53 篇 computer archite...
  • 53 篇 image segmentati...
  • 52 篇 smart cities
  • 49 篇 natural language...
  • 48 篇 internet of thin...
  • 46 篇 real-time system...
  • 42 篇 big data

机构

  • 15 篇 college of infor...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 xi'an university...
  • 10 篇 key laboratory o...
  • 10 篇 shanghai institu...
  • 10 篇 school of inform...
  • 9 篇 wuhan university...
  • 9 篇 computer science...
  • 9 篇 school of inform...
  • 8 篇 college of compu...
  • 8 篇 sri lanka instit...
  • 8 篇 school of inform...
  • 8 篇 school of inform...
  • 8 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 xi'an shiyou uni...
  • 8 篇 school of comput...
  • 8 篇 college of compu...

作者

  • 12 篇 wang peng
  • 10 篇 mekruksavanich s...
  • 9 篇 yingsong li
  • 9 篇 temdee punnarumo...
  • 9 篇 zhao hui
  • 9 篇 li yingsong
  • 9 篇 jitpattanakul an...
  • 8 篇 gaol ford lumban
  • 8 篇 li wei
  • 7 篇 nikola zlatanov
  • 7 篇 zhang chao
  • 7 篇 wang chao
  • 7 篇 li liping
  • 7 篇 wang wei
  • 7 篇 sun fuchun
  • 7 篇 wang yang
  • 7 篇 zlatanov nikola
  • 7 篇 wang hao
  • 7 篇 liping li
  • 7 篇 zhang jian

语言

  • 4,124 篇 英文
  • 67 篇 其他
  • 3 篇 中文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"任意字段=7th International Conference on Computer and Information Processing Technology, ISCIPT 2022"
4198 条 记 录,以下是151-160 订阅
排序:
RCAN based MRI super-resolution with applications  7
RCAN based MRI super-resolution with applications
收藏 引用
7th international conference on Electronic information technology and computer Engineering (EITCE)
作者: Liu, Yonghao Shandong Normal Univ Jinan Peoples R China
High-quality Magnetic Resonance Imaging (MRI) provides an aid to reliable diagnosis. By processing medical images, doctors are able to view pathological features more easily;however, since pathological features are us... 详细信息
来源: 评论
Network Intrusion Detection based on IWEasyTL Algorithm  7
Network Intrusion Detection based on IWEasyTL Algorithm
收藏 引用
2022 7th international conference on information Science, computer technology and Transportation, ISCTT 2022
作者: Pei, Chanjuan Shu, Yongan College of Computer Science and Technology Anhui University Hefei China
To achieve higher network intrusion detection performance in the changing network environment, transfer learning is introduced and a network intrusion detection method based on Iterative and Weighted Easy Transfer Lea... 详细信息
来源: 评论
BIM Execution Plan Compilation and Application in Singapore TUAS Water Reclamation Plant  7
BIM Execution Plan Compilation and Application in Singapore ...
收藏 引用
7th international conference on Intelligent Computing and Signal processing, ICSP 2022
作者: Yang, Guicheng Lao, Keke Liu, Wenhui Wang, Xizhen Liu, Tao Li, Zhihao PowerChina Huadong Engineering Corporation Limited Hangzhou China
BIM execution plan(BEP) is the basic guidance of BIM work. the content of BEP and implementation mode of TUAS Water Reclamation Plant(TWRP) BIM work are explained. the BIM design software and simulation software estab... 详细信息
来源: 评论
SAFETY-RELATED computerIZED EMBEDDED SYSTEMS WIth HETEROGENOUS REDUNDANCY  16
SAFETY-RELATED COMPUTERIZED EMBEDDED SYSTEMS WITH HETEROGENO...
收藏 引用
16th international conference on computer Graphics, Visualization, computer Vision and Image processing, CGVCVIP 2022, 8th international conference on Connected Smart Cities, CSC 2022, 7th international conference on Big Data Analytics, Data Mining and Computational Intelligence, BigDaCI 2022, and 11th international conference on theory and Practice in Modern Computing, TPMC 2022 - Held at the 16th Multi conference on computer Science and information Systems, MCCSIS 2022
作者: Khattar, Joseph Hahn, Eike Telawi, Samer Schwarz, Michael Boercsoek, Josef ICAS Institute for Computer Architecture and System Programming University of Kassel Kassel Germany
Recent advancements in the embedded systems field have resulted in more complicated systems with application-specific blocks (IP cores), often known as System on Chip (SoC) devices. Several redundancy-based embedded d... 详细信息
来源: 评论
Cervical Cancer Cell Image Detection Method Based on Improved YOLOv4  7
Cervical Cancer Cell Image Detection Method Based on Improve...
收藏 引用
7th international conference on Intelligent Computing and Signal processing, ICSP 2022
作者: Shi, Can Pan, Qiao Rehman, Mustafain Donghua University College of Computer Science and Technology Shanghai China
Aiming at the problem of frequent false and missed detection due to the dense and scattered distribution of cancer cells in the pathological images of cervical cancer cells, the complex image background, and the rich ... 详细信息
来源: 评论
Study of Cloud Computing technology for Critical Site Security System  7
Study of Cloud Computing Technology for Critical Site Securi...
收藏 引用
7th international conference on Electronic information technology and computer Engineering (EITCE)
作者: Huang, Zhengzhong Tang, Xiangcheng Li, Linhui Luo, Yao'an Zou, Shuoyi Peng, Jiapin Southwest Inst Tech Phys Informat Proc Ctr Chengdu Peoples R China
this article firstly analyses the situation and technology trends of security system, then proposes the conception and structure of the Cloud-based Security System for Critical Site (CSSCS), finally provide an outlook... 详细信息
来源: 评论
Development of P300 detection algorithm for brain computer interface in single trial
Development of P300 detection algorithm for brain computer i...
收藏 引用
7th IEEE international conference on computer and information technology
作者: Ishita, Hiroyuki Sakai, Motoki Watanabe, Jin'ei Chen, Wenxi Wei, Daming Univ Aizu Grad Sch Comp Sci & Engn Fukushima 9658580 Japan
this paper proposed a combinational method to estimate and discriminate the P300 component. the Kalman filter and the wavelet transformation were used to estimate the P300 component and PCA and three discrimination me... 详细信息
来源: 评论
Jamming Waveform Designed in Focused Energy Delivery for Precision Electronic Warfare Scenario  7
Jamming Waveform Designed in Focused Energy Delivery for Pre...
收藏 引用
7th international conference on Intelligent Computing and Signal processing, ICSP 2022
作者: Zhang, Kedi Wang, Jing Zhou, Qingsong Zhang, Jianyun National University of Defense Technology College of Electronic Engineering Hefei China National University of Defense Technology College of Computer Changsha China
Precision electronic warfare (PREW) is an application to solve many problems that are difficult to solve with current electronic warfare methods. However, the current issues related to designing jamming waveforms suit... 详细信息
来源: 评论
Cybersecurity Risk Assessment for Insurance in thailand using Bayesian Network Model  7
Cybersecurity Risk Assessment for Insurance in Thailand usin...
收藏 引用
7th international conference on Digital Arts, Media and technology, DAMT 2022 and 5th ECTI Northern Section conference on Electrical, Electronics, computer and Telecommunications Engineering, NCON 2022
作者: Jeamaon, Aomduan Khemapatapan, Chaiyaporn Dhurakij Pundit University Department of Computer Engineering Bangkok Thailand
this study presents hypothesis algorithm research about factors in Cyber-attacks due to lack of information security standard, Whatever the hazard, cybersecurity threats have become pervasive and continue to every Bus... 详细信息
来源: 评论
the Airborne information processing System Development Research  7
The Airborne Information Processing System Development Resea...
收藏 引用
7th international conference on Dependable Systems and their Applications, DSA 2020
作者: Xie, Jianchun Li, Yahui Wang, Zhonghua Bai, Linting Xi'an Aeronautics Computing Technique Research Institute Avic Aviation Key Laboratory of Science and Technology on Airborne and Missileborne Computer Xi'an China
the airborne information processing system, which is subordinate to the avionics system, is the basic sub-system performing information data processing in the aircraft platform. It provides computing, storage, informa... 详细信息
来源: 评论