咨询与建议

限定检索结果

文献类型

  • 15,153 篇 会议
  • 230 篇 期刊文献
  • 227 册 图书
  • 3 篇 学位论文

馆藏范围

  • 15,613 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 8,090 篇 工学
    • 5,416 篇 计算机科学与技术...
    • 2,792 篇 软件工程
    • 2,444 篇 电气工程
    • 1,573 篇 信息与通信工程
    • 1,005 篇 控制科学与工程
    • 833 篇 光学工程
    • 572 篇 电子科学与技术(可...
    • 552 篇 生物医学工程(可授...
    • 549 篇 机械工程
    • 506 篇 仪器科学与技术
    • 414 篇 生物工程
    • 284 篇 测绘科学与技术
    • 204 篇 航空宇航科学与技...
    • 189 篇 交通运输工程
    • 180 篇 材料科学与工程(可...
    • 145 篇 安全科学与工程
    • 119 篇 化学工程与技术
  • 4,110 篇 理学
    • 2,773 篇 物理学
    • 1,130 篇 数学
    • 467 篇 生物学
    • 325 篇 系统科学
    • 271 篇 统计学(可授理学、...
    • 146 篇 化学
  • 1,616 篇 医学
    • 1,438 篇 临床医学
    • 215 篇 特种医学
    • 201 篇 基础医学(可授医学...
    • 134 篇 药学(可授医学、理...
  • 858 篇 管理学
    • 515 篇 管理科学与工程(可...
    • 378 篇 图书情报与档案管...
    • 130 篇 工商管理
  • 77 篇 法学
  • 67 篇 农学
  • 42 篇 经济学
  • 40 篇 教育学
  • 27 篇 文学
  • 25 篇 军事学
  • 20 篇 艺术学
  • 1 篇 哲学

主题

  • 2,700 篇 image processing
  • 1,407 篇 image segmentati...
  • 1,150 篇 signal processin...
  • 802 篇 real-time system...
  • 757 篇 feature extracti...
  • 746 篇 cameras
  • 557 篇 image edge detec...
  • 534 篇 signal processin...
  • 480 篇 image coding
  • 475 篇 image reconstruc...
  • 447 篇 algorithm design...
  • 378 篇 deep learning
  • 370 篇 object detection
  • 342 篇 computer vision
  • 340 篇 accuracy
  • 338 篇 hardware
  • 331 篇 clustering algor...
  • 330 篇 real time system...
  • 327 篇 image color anal...
  • 317 篇 computer archite...

机构

  • 23 篇 signal and image...
  • 19 篇 samara national ...
  • 17 篇 school of electr...
  • 12 篇 information syst...
  • 11 篇 samara national ...
  • 11 篇 univ texas san a...
  • 11 篇 department of el...
  • 11 篇 school of electr...
  • 10 篇 department of el...
  • 10 篇 electrical compu...
  • 10 篇 center for signa...
  • 9 篇 school of electr...
  • 9 篇 institute of ima...
  • 9 篇 tongji universit...
  • 9 篇 purdue univ sch ...
  • 9 篇 university of ch...
  • 8 篇 shanghai jiao to...
  • 8 篇 information syst...
  • 8 篇 university of to...
  • 8 篇 image processing...

作者

  • 22 篇 anon
  • 13 篇 de-shuang huang
  • 11 篇 jie yang
  • 11 篇 p. pirsch
  • 11 篇 jagdish chand ba...
  • 10 篇 hannig frank
  • 10 篇 panetta karen
  • 10 篇 c.-c.j. kuo
  • 10 篇 j.m. mendel
  • 10 篇 plaza antonio
  • 10 篇 r. chellappa
  • 9 篇 semenishchev e.
  • 9 篇 zelensky a.
  • 9 篇 bovik alan c.
  • 9 篇 wei li
  • 8 篇 frank hannig
  • 8 篇 yves wiaux
  • 8 篇 a.s. willsky
  • 8 篇 mahalanobis a
  • 8 篇 satoshi goto

语言

  • 14,975 篇 英文
  • 538 篇 其他
  • 90 篇 中文
  • 26 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Conference on Image Processing - Algorithms and Systems VI"
15613 条 记 录,以下是591-600 订阅
排序:
Level Set Method Based on Molecular Beam Epitaxy Equation for image Segmentation  8th
Level Set Method Based on Molecular Beam Epitaxy Equation f...
收藏 引用
8th International Scientific conference on Intelligent Information Technologies for Industry, IITI 2024
作者: Kuang, Di Guo, Zhichang Song, Fanghui School of Mathematics Harbin Institute of Technology Heilongjiang Harbin150001 China
image segmentation is an important and complex task in computer vision. The variational level set method has become a popular approach for image segmentation due to its topological invariance. However, the evolution p... 详细信息
来源: 评论
Techniques for Pre-processing CT Angiography (CTA) images for the Diagnosis of Cardiac Disease  2
Techniques for Pre-processing CT Angiography (CTA) Images fo...
收藏 引用
2nd International conference on Augmented Intelligence and Sustainable systems, ICAISS 2023
作者: Punitha, T. Santhi Preethika, S K. Piramu Vistas School of Computing Sciences Chennai India
Artificial Intelligence (AI) is a rapidly developing discipline that concentrates on teaching computers to comprehend and scrutinize images, particularly in the medical field, with a specific emphasis on diagnosing Ca... 详细信息
来源: 评论
Invisible Backdoor Attack with image Contours Triggers  24th
Invisible Backdoor Attack with Image Contours Triggers
收藏 引用
24th International conference on algorithms and Architectures for Parallel processing, ICA3PP 2024
作者: Hou, Yangzhi Yang, Ying Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
In recent years, backdoor attack techniques on neural networks have been widely studied and researched. In this attack mode, the model implanted with a backdoor behaves normally when processing normal inputs, but once... 详细信息
来源: 评论
Classification of Aerial images and Applications: A Deep Learning Perspective  16
Classification of Aerial Images and Applications: A Deep Lea...
收藏 引用
16th International conference on Computational Intelligence and Communication Networks
作者: Monika, Pralayakaveri Reddy, Chinta Midhilesh Venkata Sai Ramesh, S. SRM Inst Sci & Technol Sch Comp Coll Engn & Technol Dept Comp Technol Chennai Tamil Nadu India
Aerial image detection is a crucial technology for a variety of applications, including but not limited to urban planning, environmental monitoring, and disaster management. In this project, we implement deep learning... 详细信息
来源: 评论
Detection of Indian Fake Currency using image processing
Detection of Indian Fake Currency using Image Processing
收藏 引用
2022 International conference on Augmented Intelligence and Sustainable systems, ICAISS 2022
作者: Asha Banu, S.M. Sandhya, S. Sundari, T vijaya Shri Ranjani, P.R. Dept of ECE Sri Krishna College of Engineering and Technology India
The fake currency notes are detected using image processing employing MATLAB in this paper. This project aims in providing the best techniques in image acquisition, and image segmentation. The work uses CANNY's al... 详细信息
来源: 评论
Gigastep - One Billion Steps per Second Multi-agent Reinforcement Learning  37
Gigastep - One Billion Steps per Second Multi-agent Reinforc...
收藏 引用
37th conference on Neural Information processing systems (NeurIPS)
作者: Lechner, Mathias Yin, Lianhao Seyde, Tim Wang, Tsun-Hsuan Xiao, Wei Hasani, Ramin Rountree, Joshua Rus, Daniela MIT CSAIL Cambridge MA 02139 USA US Air Force Washington DC 20330 USA
Multi-agent reinforcement learning (MARL) research is faced with a trade-off: it either uses complex environments requiring large compute resources, which makes it inaccessible to researchers with limited resources, o... 详细信息
来源: 评论
An application of smart visual air conditioning controller to enhance control efficiency in office environments
收藏 引用
RESULTS IN ENGINEERING 2025年 25卷
作者: Tian, Yu Zhao, Zilong Loo, Junn Yong Univ Malaya Fac Engn Dept Mech Engn Kuala Lumpur 50603 Malaysia Monash Univ Malaysia Sch Informat Technol Jalan Lagoon Selatan 47500 Bandar Sunway Selangor Darul Malaysia
Innovative solutions for sustainability and energy efficiency are crucial in green building management. This study presents a novel approach to optimizing air conditioning (AC) system operations in commercial building... 详细信息
来源: 评论
Survey on Deep Learning based Automated systems for the Detection and Grading of Diabetic Retinopathy using Retinal Fundus images
Survey on Deep Learning based Automated Systems for the Dete...
收藏 引用
2023 International conference on Power, Instrumentation, Control and Computing, PICC 2023
作者: vijayan, vinya Salim, A. College of Engineering Trivandrum Affiliated to Apj Abdul Kalam Technological University Dept. of Computer Science and Engineering Kerala India Government Engineering College Thrissur Affiliated to Apj Abdul Kalam Technological University Dept. of Computer Science and Engineering Kerala India
Diabetic Retinopathy is a common cause of blindness in people diagnosed as diabetic and it is developed as a subsequent condition by diabetes mellitus. Retinal fundus image analysis is commonly used for the computer a... 详细信息
来源: 评论
Fish Detection and Quantity Estimation Based on Sonar images  1st
Fish Detection and Quantity Estimation Based on Sonar Images
收藏 引用
1st International conference on Extended Reality, ICXR 2024
作者: Du, Wenxiang Yan, Shuai Qi, Yue State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing100191 China Qingdao Research Institute of Beihang University Qingdao266100 China
Due to the complex underwater environment and dense targets, it is difficult to quickly and accurately calculate the location and quantity of fish targets in marine ranching. We have developed an underwater target det... 详细信息
来源: 评论
Fake Face image Classification by Blending the Scalable Convolution Network and Hierarchical vision Transformer  1
收藏 引用
4th International conference on Computer and Communication Technologies, IC3T 2022
作者: Kerenalli, Sudarshana Yendapalli, Vamsidhar Mylarareddy, C. Department of CSE SoT GITAM University Karnataka Bengaluru562163 India
A face has been used as a primary and unique attribute to authenticate individual users in emerging security approaches. Cybercriminals use the double-edged sword "image processing" capabilities to deceive i... 详细信息
来源: 评论