咨询与建议

限定检索结果

文献类型

  • 40,039 篇 会议
  • 1,084 册 图书
  • 455 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 41,579 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 23,913 篇 工学
    • 18,120 篇 计算机科学与技术...
    • 14,370 篇 软件工程
    • 6,139 篇 信息与通信工程
    • 3,970 篇 控制科学与工程
    • 3,142 篇 电气工程
    • 2,550 篇 生物工程
    • 2,431 篇 电子科学与技术(可...
    • 2,201 篇 生物医学工程(可授...
    • 2,086 篇 机械工程
    • 1,649 篇 动力工程及工程热...
    • 1,515 篇 光学工程
    • 1,233 篇 仪器科学与技术
    • 1,218 篇 化学工程与技术
    • 1,119 篇 安全科学与工程
    • 953 篇 建筑学
  • 9,611 篇 理学
    • 4,134 篇 数学
    • 3,007 篇 物理学
    • 2,735 篇 生物学
    • 1,227 篇 统计学(可授理学、...
    • 1,140 篇 化学
    • 953 篇 系统科学
  • 6,222 篇 管理学
    • 4,399 篇 管理科学与工程(可...
    • 2,263 篇 工商管理
    • 2,197 篇 图书情报与档案管...
  • 2,203 篇 医学
    • 1,805 篇 临床医学
    • 1,695 篇 基础医学(可授医学...
    • 1,115 篇 公共卫生与预防医...
    • 928 篇 药学(可授医学、理...
  • 1,254 篇 法学
    • 1,026 篇 社会学
  • 920 篇 经济学
    • 914 篇 应用经济学
  • 803 篇 教育学
  • 527 篇 农学
  • 211 篇 文学
  • 195 篇 军事学
  • 38 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 1,357 篇 internet of thin...
  • 1,325 篇 computer archite...
  • 1,066 篇 computational mo...
  • 1,052 篇 accuracy
  • 1,045 篇 real-time system...
  • 845 篇 artificial intel...
  • 819 篇 deep learning
  • 819 篇 wireless sensor ...
  • 686 篇 monitoring
  • 683 篇 application soft...
  • 677 篇 cloud computing
  • 673 篇 training
  • 668 篇 machine learning
  • 641 篇 security
  • 580 篇 computer science
  • 577 篇 feature extracti...
  • 574 篇 protocols
  • 507 篇 software
  • 469 篇 wireless communi...
  • 456 篇 hardware

机构

  • 106 篇 chitkara univers...
  • 67 篇 school of comput...
  • 57 篇 lovely professio...
  • 45 篇 maharishi school...
  • 44 篇 school of comput...
  • 42 篇 department of el...
  • 39 篇 centre of resear...
  • 35 篇 computer science...
  • 33 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 centre of interd...
  • 29 篇 school of comput...
  • 29 篇 department of co...
  • 28 篇 karnataka bangal...
  • 28 篇 graphic era deem...
  • 28 篇 department of co...
  • 27 篇 department of co...
  • 26 篇 computer technol...
  • 25 篇 department of co...
  • 25 篇 chitkara centre ...

作者

  • 36 篇 bernady o. apduh...
  • 33 篇 rakesh kumar
  • 18 篇 amit kumar
  • 16 篇 valeriy vyatkin
  • 15 篇 weiming shen
  • 15 篇 shiva mehta
  • 15 篇 amit joshi
  • 15 篇 muntather almusa...
  • 13 篇 bibhuti bhusan d...
  • 12 篇 gupta richa
  • 12 篇 marina l. gavril...
  • 11 篇 patti gaetano
  • 11 篇 wang lei
  • 11 篇 zhang lei
  • 11 篇 sharma dilip kum...
  • 11 篇 manika manwal
  • 11 篇 alzubaidi laith ...
  • 11 篇 rishabh sharma
  • 10 篇 sharma vikrant
  • 10 篇 anjali t.

语言

  • 40,025 篇 英文
  • 1,266 篇 其他
  • 409 篇 中文
  • 5 篇 法文
  • 3 篇 土耳其文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=International Conference on Computer Technologies in Physical and Engineering Applications"
41579 条 记 录,以下是161-170 订阅
排序:
The Psychology Behind Addictive applications in Technology  5
The Psychology Behind Addictive Applications in Technology
收藏 引用
5th IEEE international conference on Computing, Power, and Communication technologies, IC2PCT 2024
作者: Hans, Aarti Singh, Nongmeikapam Thoiba Kumar, Rohit Kumar, Anshul Choubey, Anish Suresh Chandigarh University Department of Computer Science and Engineering Punjab India
The proliferation of mobile applications in the digital age has introduced a captivating yet disconcerting dimension to human behavior and technology interaction. Mobile applications, ranging from social media platfor... 详细信息
来源: 评论
Brain Tumor Detection using Optimized Stochastic Gradient Descent Function
Brain Tumor Detection using Optimized Stochastic Gradient De...
收藏 引用
2024 international conference on Electrical, Electronics and Computing technologies, ICEECT 2024
作者: Mishra, Annu Chaturvedi, Ravi Prakash Sharma, Hirdesh Kumar, Prashant Asthana, Sameer Parashar, Mayank Sharda School of Engineeringand Technology Department of Computer Science and Engineering Greater Noida India Sharda School of Engineeringand Technology Department of Computer Science and Applications Greater Noida India JEMTEC Department of Computer Science and Engineering Greater Noida India ITS Engineering College Department of Computer Science and Engineering Greater Noida India GNIOT Department of Computer Science and Engineering Greater Noida India
The learning rate of a CNN determines the efficiency of the neural network. In brain tumor detection, the learning rate and the optimization function plays a key role in deciding the final output. The Optimized Stocha... 详细信息
来源: 评论
Intelligent pharmacy management system based on computer vision technology and new medicine delivery robot  5
Intelligent pharmacy management system based on computer vis...
收藏 引用
5th international conference on computer engineering and Application (ICCEA)
作者: Wu, Haoyu Gan, Yulong Wei, Mingxiang He, Daiyang Mou, Hong Li, Difei Tianjin Univ Sci & Technol Dept Comp Sci & Technol Binhai New Area Tianjin Peoples R China Tianjin Univ Sci & Technol Dept Informat Proc Binhai New Area Tianjin Peoples R China Tianjin Univ Sci & Technol Dept Marine Technol Binhai New Area Tianjin Peoples R China
According to the analysis of the research level of "smart pharmacy" at home and abroad, the research level of "smart pharmacy" in China is relatively backward, and the construction method of "... 详细信息
来源: 评论
Development of Augmented Reality Game Using computer Vision Technology  4
Development of Augmented Reality Game Using Computer Vision ...
收藏 引用
4th IEEE international conference on Smart Information Systems and technologies, SIST 2024
作者: Adilzhan, Akzhan Omarov, Nurlan Al-Farabi Kazakh National University Almaty Kazakhstan
This research investigates the development and practical application of an innovative augmented reality (AR) system, empowered by computer vision, designed to enhance children's motivation to engage in physical ac... 详细信息
来源: 评论
Overview of AI4DT&CP@IJCAI 2024: The Second Workshop on AI for Digital Twins and Cyber-physical applications  2
Overview of AI4DT&CP@IJCAI 2024: The Second Workshop on AI f...
收藏 引用
2nd Workshop on AI for Digital Twins and Cyber-physical applications, AI4DT and CP 2024
作者: Lombardo, Gianfranco Theusch, Felix Picone, Marco Recupero, Diego Reforgiato Vizzari, Giuseppe Department of Engineering and Architecture University of Parma Italy Germany Department of Sciences and Methods for Engineering University of Modena and Reggio Emilia Italy Department of Mathematics and Computer Science the University of Cagliari Italy Department of Informatics Systems and Communication Università degli Studi di Milano-Bicocca Milano Italy
The 2024 Workshop on AI for Digital Twins and Cyber-physical applications (AI4DT&CP 2024) is at its second edition, held in conjunction with IJCAI 2024: the 33rd international Joint conference on Artificial Intell... 详细信息
来源: 评论
Gaze Detection and Text Extraction from Images using CNN with DBSCAN-based Filter Design  11
Gaze Detection and Text Extraction from Images using CNN wit...
收藏 引用
11th IEEE international conference on Advances in Computing and Communications, ICACC 2024
作者: Jose, Jithin Ramanujan, Ajeesh College Of Engineering Trivandrum Dept. Of Computer Science And Engineering Trivandrum India
Gaze detection and text extraction are pivotal technologies in the domain of human-computer interaction and computer vision, enabling applications such as assistive technologies, user interface optimization, and autom... 详细信息
来源: 评论
Virtual Reality Meets AI: Revolutionizing physical Education with LiDAR and RL  8
Virtual Reality Meets AI: Revolutionizing Physical Education...
收藏 引用
8th international conference on Electronics, Materials engineering and Nano-Technology, IEMENTech 2025
作者: Sareddy, Mohan Reddy Veerandra Kumar, R. Orasys LLC TX United States Saveetha Engineering College Department of Computer Science and Engineering Thandalam Chennai India
physical education (PE) is changing as a result of the incorporation of cutting-edge technology like LiDAR, virtual reality (VR), and reinforcement learning (RL). The shortcomings of subjective evaluations and environ... 详细信息
来源: 评论
Weapon Detection System For Security And Surveillance Using YOLOv8  2
Weapon Detection System For Security And Surveillance Using ...
收藏 引用
2nd international conference on Advancement in Computation and computer technologies, InCACCT 2024
作者: Arivalagan, Divya Rubankumar, D. Thushiyanth, K. Suresh Kumar, S. Priyadharsini, V. Vignesh, O. Madras Institute of Technology Anna University Department of Electronics Engineering Chennai India QIS College of Engineering and Technology Department of Electronics and Communication Engineering Ongole India Akshaya College of Engineering and Technology Department of Computer Science and Engineering Coimbatore India
The study focuses on developing and refining an advanced object detection model for integration into security systems. It begins with an exploration of challenges during early training epochs, aiming to enhance precis... 详细信息
来源: 评论
applications and Analysis of Factory Production Using computer Vision  23
Applications and Analysis of Factory Production Using Comput...
收藏 引用
23rd international conference on Machine Learning and Cybernetics, ICMLC 2024
作者: Shao, Zhong-Ping Tang, Cheng-Yuan Wu, Yi-Leh Huafan University Department of Mechatronic Engineering New Taipei Taiwan Huafan University Department of Technology for Smart Living New Taipei Taiwan National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei Taiwan
The integration of computer vision technology into factory production offers significant improvements in efficiency, quality, and safety. This study explores the applications and benefits of multi-camera systems and A... 详细信息
来源: 评论
Design of lightweight memory protection solution based on RISC-V processor
Design of lightweight memory protection solution based on RI...
收藏 引用
2024 international conference on computer Network Security and Software engineering, CNSSE 2024
作者: Nie, Kai Zhao, Rongcai Zhang, Xiao Li, Shuyu School of Computer and Artificial Intelligence of zhengzhou University Henan Zhengzhou450001 China
With the rapid advancement of modern processor technologies, the potential threat to processor memory security from external devices necessitates robust memory protection mechanisms. To ensure the stability and securi... 详细信息
来源: 评论