咨询与建议

限定检索结果

文献类型

  • 4,114 篇 会议
  • 63 册 图书
  • 20 篇 期刊文献

馆藏范围

  • 4,197 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,253 篇 工学
    • 2,651 篇 计算机科学与技术...
    • 2,199 篇 软件工程
    • 1,001 篇 信息与通信工程
    • 529 篇 生物工程
    • 396 篇 控制科学与工程
    • 363 篇 生物医学工程(可授...
    • 350 篇 电气工程
    • 304 篇 光学工程
    • 252 篇 电子科学与技术(可...
    • 214 篇 安全科学与工程
    • 193 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 188 篇 交通运输工程
    • 183 篇 动力工程及工程热...
    • 178 篇 机械工程
    • 159 篇 网络空间安全
  • 1,680 篇 理学
    • 753 篇 数学
    • 565 篇 生物学
    • 439 篇 物理学
    • 278 篇 统计学(可授理学、...
    • 271 篇 化学
    • 151 篇 系统科学
  • 1,020 篇 管理学
    • 671 篇 图书情报与档案管...
    • 536 篇 管理科学与工程(可...
    • 279 篇 工商管理
  • 286 篇 医学
    • 271 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 196 篇 药学(可授医学、理...
  • 180 篇 法学
    • 129 篇 社会学
  • 120 篇 农学
    • 120 篇 作物学
  • 104 篇 经济学
  • 86 篇 教育学
  • 11 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 110 篇 deep learning
  • 104 篇 feature extracti...
  • 92 篇 computer vision
  • 73 篇 training
  • 68 篇 accuracy
  • 65 篇 computational mo...
  • 65 篇 machine learning
  • 59 篇 image processing
  • 59 篇 artificial intel...
  • 58 篇 data mining
  • 57 篇 semantics
  • 54 篇 convolutional ne...
  • 53 篇 object detection
  • 53 篇 computer archite...
  • 53 篇 image segmentati...
  • 52 篇 smart cities
  • 49 篇 natural language...
  • 48 篇 internet of thin...
  • 46 篇 real-time system...
  • 42 篇 big data

机构

  • 15 篇 college of infor...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 xi'an university...
  • 10 篇 key laboratory o...
  • 10 篇 shanghai institu...
  • 10 篇 school of inform...
  • 9 篇 wuhan university...
  • 9 篇 computer science...
  • 9 篇 school of inform...
  • 8 篇 college of compu...
  • 8 篇 sri lanka instit...
  • 8 篇 school of inform...
  • 8 篇 school of inform...
  • 8 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 xi'an shiyou uni...
  • 8 篇 school of comput...
  • 8 篇 college of compu...

作者

  • 12 篇 wang peng
  • 10 篇 mekruksavanich s...
  • 9 篇 yingsong li
  • 9 篇 temdee punnarumo...
  • 9 篇 zhao hui
  • 9 篇 li yingsong
  • 9 篇 jitpattanakul an...
  • 8 篇 gaol ford lumban
  • 8 篇 li wei
  • 7 篇 nikola zlatanov
  • 7 篇 zhang chao
  • 7 篇 wang chao
  • 7 篇 li liping
  • 7 篇 wang wei
  • 7 篇 sun fuchun
  • 7 篇 wang yang
  • 7 篇 zlatanov nikola
  • 7 篇 wang hao
  • 7 篇 liping li
  • 7 篇 zhang jian

语言

  • 4,124 篇 英文
  • 66 篇 其他
  • 3 篇 中文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"任意字段=7th International Conference on Computer and Information Processing Technology, ISCIPT 2022"
4197 条 记 录,以下是511-520 订阅
排序:
Deep Learning Based Jujube Quality Assessment: An Automated Surface Defect Detection Approach  24
Deep Learning Based Jujube Quality Assessment: An Automated ...
收藏 引用
7th international conference on Signal processing and Machine Learning, SPML 2024
作者: Gao, Yujie Yuan, Baoxi Zhu, Qing Zhao, Jiyuan Ma, Xiangyang Chen, Jialu Wang, Feng Chu, Peng Wang, Chunlan School of Electronic Information Xijing University China Beijing Hengyue Intelligent Information Technology Co. Ltd. China School of Computer Science Xijing University China Graduate Office Xijing University China
Defects such as bird pecking, splitting, and mildew can affect the quality of red jujubes during their growth, transportation, and processing. To ensure the quality of red jujube products, grading the appearance of th... 详细信息
来源: 评论
Implementing Machine Learning Algorithms to Indentify Distributed Denial-of-Service Attacks  7
Implementing Machine Learning Algorithms to Indentify Distri...
收藏 引用
7th international conference on Image information processing, ICIIP 2023
作者: Mehra, Ankush Singh, Gurpreet Badotra, Sumit Kaur, Balwinder Verma, Amit Lovely Professional University Department of Computer Science And Engineering Punjab Phagwara India Bennett University School of Computer Science Engineering And Technology Greater Noida India University Center For Research And Development Chandigarh University Department of Computer Science And Engineering Mohali Gharuan India
An Internet server, service, or network may be the subject of a distributed denial-of-service (DDoS) assault, in which the attacker attempts to interrupt regular traffic by flooding the target with an excessive amount... 详细信息
来源: 评论
Next Generation Firewall and Self Authentication for Network Security  7
Next Generation Firewall and Self Authentication for Network...
收藏 引用
7th international conference on Image information processing, ICIIP 2023
作者: Singh, Bhagwant Cheema, Sikander Singh Punjabi University Department of Computer Science And Engineering Punjab Patiala India
In the era of the technologies, given the importance of the prevalence of the Internet, network safety is now essential to maintaining the accessibility and confidentiality of networks and data. Regular firewalls cann... 详细信息
来源: 评论
A Ginkgo Detection Algorithm in Complex Environments Based on Improved YOLOv7  9
A Ginkgo Detection Algorithm in Complex Environments Based o...
收藏 引用
9th international conference on Intelligent Computing and Signal processing, ICSP 2024
作者: Ma, Chi Guo, Qiang School of Computer Science and Engineering Huizhou University Huizhou China School of Computer Science and Software Engineering University of Science and Technology LiaoNing Anshan China
Detections of Ginkgoes are prerequisites for later counting and harvesting. Due to the uneven distribution of samples, the detection speed and accuracy of existing algorithms cannot adapt to the impact of complex envi... 详细信息
来源: 评论
Empirical Evaluation of in silico Microsatellites Mining Tools Designed Using Nextgen technology in Crops  7
Empirical Evaluation of in silico Microsatellites Mining Too...
收藏 引用
7th international conference on Computing, Communication and Security, ICCCS 2022 and 2022 4th international conference on Big Data and Computational Intelligence, ICBDCI 2022
作者: Umang Bharti, P.K. Husain, Akhtar Shri Venkateshwara University School of Computer Science UP Gajraula India MJP Rohilkhand University Department of CS & IT UP Bareilly India
Microsatellites are found in genome sequences of all prokaryotes and eukaryotes. they are the primary source of studying genetic variations, molecular breeding, gene discovery, disease identification, and hypervariabi... 详细信息
来源: 评论
Research on Joint Entity-Relation Extraction for the Tibetan 'Epic of King Gesar' Based on Multi-Semantic information Fusion and Global Pointer Network  7
Research on Joint Entity-Relation Extraction for the Tibetan...
收藏 引用
7th international conference on Machine Learning and Natural Language processing, MLNLP 2024
作者: Daiqing, Zhuoma Zhang, Penghui Lang, Jie Qun, Nuo Nyima, Tashi School of Information Science and Technology Tibet University Collaborative Innovation Center for Tibet Informatization MOE and Tibet Autonomous Region Lhasa China Academy of the Zhonghuaminzu Community Tibet University Lhasa China
the 'Epic of King Gesar' is a poetic and historical Tibetan literary work and a treasure of Tibetan culture. Guided by the cultural preservation and inheritance of the Tibetan people in China, the paper deeply... 详细信息
来源: 评论
Slice-based ray casting volume shadow of volumetric datasets  7
Slice-based ray casting volume shadow of volumetric datasets
收藏 引用
7th international conference on computer Graphics and Virtuality, ICCGV 2024
作者: Luo, Dening Ma, Weixiang Guo, Dequan Chengdu University of Information Technology Chengdu610225 China
the realistic volume shadow of volumetric datasets can improve the perception of shape and depth, and further enhance the efficiency of detecting defects, anomalies, and other issues. In this paper, a novel and high-p... 详细信息
来源: 评论
Deep Learning for Cognitive Detection based on P300 Event-Related Potential  7
Deep Learning for Cognitive Detection based on P300 Event-Re...
收藏 引用
7th international conference on Digital Arts, Media and technology, DAMT 2022 and 5th ECTI Northern Section conference on Electrical, Electronics, computer and Telecommunications Engineering, NCON 2022
作者: Chaisricharoen, Roungsan Temdee, Punnarumol Srimaharaj, Wanus Mae Fah Luang University Computer and Communication Engineering for Capacity Building Research Center School of Information Technology Chiang Rai57100 Thailand Payap University The International College Department of Information Technology Chiang Mai50000 Thailand
Due to the mechanical demands on real-time operations of brain signal reflection, manual parsing, and detection of the Event-Related Potential waveform, especially P300 evoked potential is impropriate and too slow. In... 详细信息
来源: 评论
the Problem of Collecting Face Recognition information in Colleges and Universities  7
The Problem of Collecting Face Recognition Information in Co...
收藏 引用
7th international conference on Communication, Image and Signal processing, CCISP 2022
作者: Feng, Zhao Judicial Expertise Center Shandong University of Political Science and Law Jinan China
As China gradually enters the '5G+artificial' intelligent information era, the vigorous development of emerging technologies such as artificial intelligence, face recognition technology has been widely used to... 详细信息
来源: 评论
An LSTM network-based real-time noise suppression tool for conducting audio and video conferences  7
An LSTM network-based real-time noise suppression tool for c...
收藏 引用
7th international conference on Computing in Engineering and technology, ICCET 2022
作者: Gosain, Aarzoo Sood, Apoorvi Department of Information Technology Netaji Subhas University of Technology Dwarka New Delhi India
Background: A real-time noise suppression tool is an essential requirement of today's time. By using such a tool, audio and video conferences can be conducted noiselessly, even in the absence of a quiet office env... 详细信息
来源: 评论