咨询与建议

限定检索结果

文献类型

  • 4,147 篇 会议
  • 63 册 图书
  • 20 篇 期刊文献

馆藏范围

  • 4,230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,282 篇 工学
    • 2,670 篇 计算机科学与技术...
    • 2,213 篇 软件工程
    • 1,010 篇 信息与通信工程
    • 529 篇 生物工程
    • 404 篇 控制科学与工程
    • 364 篇 生物医学工程(可授...
    • 352 篇 电气工程
    • 311 篇 光学工程
    • 254 篇 电子科学与技术(可...
    • 215 篇 安全科学与工程
    • 194 篇 化学工程与技术
    • 190 篇 交通运输工程
    • 189 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 180 篇 机械工程
    • 161 篇 网络空间安全
  • 1,689 篇 理学
    • 755 篇 数学
    • 566 篇 生物学
    • 444 篇 物理学
    • 279 篇 统计学(可授理学、...
    • 272 篇 化学
    • 151 篇 系统科学
  • 1,025 篇 管理学
    • 674 篇 图书情报与档案管...
    • 540 篇 管理科学与工程(可...
    • 282 篇 工商管理
  • 286 篇 医学
    • 271 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 196 篇 药学(可授医学、理...
  • 180 篇 法学
    • 129 篇 社会学
  • 122 篇 农学
    • 122 篇 作物学
  • 104 篇 经济学
  • 87 篇 教育学
  • 11 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 110 篇 deep learning
  • 104 篇 feature extracti...
  • 92 篇 computer vision
  • 73 篇 training
  • 68 篇 accuracy
  • 65 篇 computational mo...
  • 65 篇 machine learning
  • 59 篇 image processing
  • 59 篇 artificial intel...
  • 58 篇 data mining
  • 57 篇 semantics
  • 55 篇 convolutional ne...
  • 54 篇 object detection
  • 54 篇 image segmentati...
  • 53 篇 computer archite...
  • 52 篇 smart cities
  • 49 篇 natural language...
  • 48 篇 internet of thin...
  • 46 篇 real-time system...
  • 42 篇 big data

机构

  • 15 篇 college of infor...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 xi'an university...
  • 10 篇 key laboratory o...
  • 10 篇 shanghai institu...
  • 10 篇 school of inform...
  • 9 篇 wuhan university...
  • 9 篇 computer science...
  • 9 篇 school of inform...
  • 8 篇 college of compu...
  • 8 篇 sri lanka instit...
  • 8 篇 school of inform...
  • 8 篇 school of inform...
  • 8 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 xi'an shiyou uni...
  • 8 篇 school of comput...
  • 8 篇 college of compu...

作者

  • 12 篇 wang peng
  • 10 篇 mekruksavanich s...
  • 9 篇 yingsong li
  • 9 篇 temdee punnarumo...
  • 9 篇 zhao hui
  • 9 篇 li yingsong
  • 9 篇 jitpattanakul an...
  • 8 篇 gaol ford lumban
  • 8 篇 li wei
  • 7 篇 nikola zlatanov
  • 7 篇 zhang chao
  • 7 篇 wang chao
  • 7 篇 li liping
  • 7 篇 wang wei
  • 7 篇 sun fuchun
  • 7 篇 wang yang
  • 7 篇 zlatanov nikola
  • 7 篇 wang hao
  • 7 篇 liping li
  • 7 篇 zhang jian

语言

  • 4,058 篇 英文
  • 165 篇 其他
  • 4 篇 中文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"任意字段=7th International Conference on Computer and Information Processing Technology, ISCIPT 2022"
4230 条 记 录,以下是921-930 订阅
排序:
A System for Controlling the GUI by Gestures using a Webcam, Based on MV Algorithms  7
A System for Controlling the GUI by Gestures using a Webcam,...
收藏 引用
7th international Youth conference on Radio Electronics, Electrical and Power Engineering, REEPE 2025
作者: Borisov, Nikita S. Belov, Yuri S. Bauman Moscow State Technical University Information Technology Department Moscow Russia
this article presents a gesture-controlled computer system using a webcam and machine vision (MV) algorithms, which allows for more intuitive and accessible human-computer interaction. the research is of great importa... 详细信息
来源: 评论
Research on Malware Detection System Using Artificial Intelligence  7
Research on Malware Detection System Using Artificial Intell...
收藏 引用
7th IEEE/ACIS international conference on Big Data, Cloud Computing, and Data Science, BCD 2022
作者: Kim, MinSu Joongbu Univ Department of Information Security Engineering Seoul Korea Republic of
Malicious code is a program that accesses and destroys a system or performs malicious actions such as leaking information. Typically, viruses, Trojan horses, and worms attack the system by hiding malicious code throug... 详细信息
来源: 评论
A Fast Deep Learning Based Approach for Unsupervised Anomaly Detection in 3D Data  7
A Fast Deep Learning Based Approach for Unsupervised Anomaly...
收藏 引用
7th international conference on Frontiers of Signal processing, ICFSP 2022
作者: Presa, Sergio Saiz, Fatima A. Barandiaran, Inigo Industry and Advanced Manufacturing Fundación Vicomtech Donostia - San Sebastián Spain University of the Basque Country UPV/EHU Computational Intelligence Group Computer Science Faculty Donostia - San Sebastián Spain
Anomaly detection is an important method in industrial manufacturing environments for defect detection, and consequently, for the quality requirements attainment. there is a strong trend to automate inspection systems... 详细信息
来源: 评论
Implementation of Blockchain technology Using Hash Method in Java for Medical Record Application Development  7
Implementation of Blockchain Technology Using Hash Method in...
收藏 引用
7th IEEE international conference on information technology and Digital Applications, ICITDA 2022
作者: Jaya, Tryan Nugraha, Salvator Elto Davinsi, Gabriel Rolly Moniaga, Jurike V. Jabar, Bakti Amirul Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia
Health problems are not only related to the availability of medical facilities and medical personnel but also include the security of health data. In this regard, the development of blockchain technology provides a br... 详细信息
来源: 评论
Fixed Point Clip: A New Data Augmentation Method for Object Detection  7
Fixed Point Clip: A New Data Augmentation Method for Object ...
收藏 引用
7th international conference on Intelligent Computing and Signal processing, ICSP 2022
作者: Pan, Bei Li, Shanmin Cheng, Yuanshun Yan, Xiaojun Wang, Chao Yang, Chuansheng Zhejiang Ocean University School of Information Engineering Zhoushan China Tianfu College of Swufe Sichuan China Zhejiang Ocean University National Engineering Research Center for Marine Aquaculture Zhoushan China Zhejiang Ocean University Key Laboratory of Oceanographic Big Data Mining and Application of Zhejiang Province Zhoushan China
Data augmentation is one of the most important ways to improve object detection performance. In this paper, we propose a new offline data augmentation method, this method obtains multiple new anchors and new labels by... 详细信息
来源: 评论
To Investigate the Ability of CNN in Learning Specific Frequency Band of Motor Imagery EEG  7
To Investigate the Ability of CNN in Learning Specific Frequ...
收藏 引用
7th international conference on Signal and Image processing, ICSIP 2022
作者: Shi, Chenyun Liu, Lei Zhang, Chao Wu, Xiaopei Anhui University School of Computer Science and Technology Hefei China
Convolutional neural network (CNN) has achieved great success in the fields of image and speech recognition. However, CNN-based models still have limitations in the field of electroencephalogram (EEG)-based brain-comp... 详细信息
来源: 评论
Secured Encrypted Morse Code Communication using Fernet in Defense Applications  7
Secured Encrypted Morse Code Communication using Fernet in D...
收藏 引用
7th IEEE Pune Section international conference, PuneCon 2024
作者: Meena, R. Durga Pandiyarajan, Pandiselvam Narasimha, D Lakshmi Yadav, G. Vara Krishna Poornesh, J. Reddy, C Sanjeev Kishore Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu Virudhunagar India
In today's digital age, ensuring the security and confidentiality of voice communication is crucial. this research work presents an innovative approach that leverages a combination of speech recognition, Morse cod... 详细信息
来源: 评论
Leveraging Machine Learning to Identify Synergistic Drug Combinations for Effective Cancer Treatment  7
Leveraging Machine Learning to Identify Synergistic Drug Com...
收藏 引用
7th international conference on Image information processing, ICIIP 2023
作者: Sujatha, P. Saravanan, K. Sohail, Mohammed Ali Basi Reddy, A. Dixit, Rohit R. Krishnaiah, Nallam Amrita Vishwa Vidyapeetham Department of AI/ML Guntur Amaravati India R.M.K Engineering College Department of Information Technology Tamil Nadu Tiruvallur District India Jazan University College of Computer Science & Information Technology Department of Computer & Network Engineering Jazan Saudi Arabia Mohan Babu University School of Computing Department of Computer Science And Engineering Andhra Pradesh Tirupati India Siemens Healthineers NH03755 United States St.Martin's Engineering College Department of Ai&ml Secunderabad Telangana Dhulapally500100 India
the potential of drug combinations to treat and overcome medication resistance complex genetic diseases is evident. Synergistic drug combinations offer a promising way to enhance drug therapy efficacy and reduce the r... 详细信息
来源: 评论
StatekeepSpec: Securing Speculative Execution via forbidding Change-Of-State  23
StatekeepSpec: Securing Speculative Execution via forbidding...
收藏 引用
23rd IEEE international conference on High Performance Computing and Communications, 7th IEEE international conference on Data Science and Systems, 19th IEEE international conference on Smart City and 7th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Lv, Zhiyuan Zhao, Youjian Huawei Technologies Beijing China Tsinghua University Department of Computer Science and Technology Beijing China
Speculation-based attacks, e.g., Spectre and Meltdown, affect hundreds of millions of computers. these attacks utilize speculative execution to access privileged data and leak it through a side-channel, e.g., typical ... 详细信息
来源: 评论
Energy data anomaly detection based on association rule data mining  7
Energy data anomaly detection based on association rule data...
收藏 引用
7th international conference on Intelligent Computing and Signal processing, ICSP 2022
作者: Wang, Dandan Zhang, Jiexing Wang, Yi Chang, Di Wang, Wei Cui, Xiaomeng Tianjin Sanyuan Electric Information Technology Co. Ltd Tianjin China
In recent years, the world has seen rapid advances in science and technology, and the level of automation in power plants has increased. Modern power plants generate huge amounts of data every hour, which are stored i... 详细信息
来源: 评论