咨询与建议

限定检索结果

文献类型

  • 7,476 篇 会议
  • 123 册 图书
  • 85 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 7,686 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,785 篇 工学
    • 2,677 篇 计算机科学与技术...
    • 1,841 篇 软件工程
    • 1,511 篇 信息与通信工程
    • 1,046 篇 电气工程
    • 431 篇 控制科学与工程
    • 415 篇 光学工程
    • 393 篇 电子科学与技术(可...
    • 304 篇 生物医学工程(可授...
    • 288 篇 生物工程
    • 276 篇 仪器科学与技术
    • 223 篇 机械工程
    • 124 篇 网络空间安全
    • 123 篇 交通运输工程
    • 106 篇 化学工程与技术
    • 105 篇 安全科学与工程
    • 98 篇 动力工程及工程热...
    • 94 篇 材料科学与工程(可...
    • 76 篇 建筑学
  • 1,477 篇 理学
    • 744 篇 数学
    • 555 篇 物理学
    • 311 篇 生物学
    • 246 篇 统计学(可授理学、...
    • 225 篇 系统科学
    • 117 篇 化学
  • 542 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 239 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 379 篇 医学
    • 350 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 109 篇 药学(可授医学、理...
  • 84 篇 法学
  • 51 篇 农学
  • 32 篇 教育学
  • 32 篇 军事学
  • 27 篇 经济学
  • 19 篇 文学
  • 5 篇 艺术学

主题

  • 615 篇 internet of thin...
  • 444 篇 internet
  • 441 篇 feature extracti...
  • 439 篇 image segmentati...
  • 371 篇 signal processin...
  • 361 篇 real-time system...
  • 337 篇 image processing
  • 319 篇 image coding
  • 302 篇 image edge detec...
  • 245 篇 signal processin...
  • 234 篇 image color anal...
  • 209 篇 signal to noise ...
  • 203 篇 cameras
  • 199 篇 accuracy
  • 192 篇 deep learning
  • 185 篇 visualization
  • 158 篇 image reconstruc...
  • 154 篇 image retrieval
  • 147 篇 computational mo...
  • 136 篇 psnr

机构

  • 14 篇 center for signa...
  • 10 篇 university of sc...
  • 10 篇 school of electr...
  • 10 篇 university of el...
  • 10 篇 university of ch...
  • 9 篇 school of cyber ...
  • 9 篇 faculty of infor...
  • 9 篇 signal and infor...
  • 9 篇 signal processin...
  • 9 篇 institute of sig...
  • 9 篇 college of big d...
  • 9 篇 school of comput...
  • 9 篇 hannam universit...
  • 8 篇 tsinghua univers...
  • 8 篇 chitkara centre ...
  • 8 篇 harbin institute...
  • 8 篇 school of intern...
  • 8 篇 school of intern...
  • 7 篇 centre of resear...
  • 7 篇 school of inform...

作者

  • 12 篇 dipanda albert
  • 12 篇 tai-hoon kim
  • 11 篇 wang wei
  • 11 篇 sridha sridharan
  • 11 篇 fan zhun
  • 10 篇 yoshitaka sakura...
  • 10 篇 r.m. mersereau
  • 10 篇 christoph busch
  • 9 篇 hnoohom narit
  • 9 篇 busch christoph
  • 9 篇 li li
  • 9 篇 zhu guijie
  • 9 篇 kutics andrea
  • 8 篇 gwanggil jeon
  • 8 篇 clinton fookes
  • 8 篇 sridharan sridha
  • 8 篇 dominik ślęzak
  • 8 篇 jechang jeong
  • 7 篇 ahmed bouridane
  • 7 篇 jing wang

语言

  • 7,558 篇 英文
  • 107 篇 其他
  • 34 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Signal Image Technology and Internet Based Systems"
7686 条 记 录,以下是321-330 订阅
排序:
Retinex by Autoencoders  16
Retinex by Autoencoders
收藏 引用
16th international conference on signal-image technology and internet-based systems (SITIS)
作者: Pezzoni, Claudio Mio, Corrado Barsotti, Annalisa Univ Milan Dipartimento Informat Giovanni degli Antoni Via Celoria 18 I-20133 Milan Italy Khalifa Univ Sci & Technol EBTIC Abu Dhabi City U Arab Emirates Univ Milan Dipartimento Informat I-20133 Milan Italy
The Retinex algorithms find wide applications as image enhancers, for their capability of preserving edges, while at the same time attenuating smooth gradients and chromatic dominants. They are characterized by the fa... 详细信息
来源: 评论
Generation of image Caption for Visually Challenged People  8th
Generation of Image Caption for Visually Challenged People
收藏 引用
8th international conference on Information System Design and Intelligent Applications, ISDIA 2024
作者: Ravi Teja, K. Sriman, Y. Aneeta Joseph, A. Deepa, R. SRM Institute of Science and Technology Vadapalani Tamil Nadu Chennai India
In recent years, advances in image interpretation and automatic image captioning have attracted lots of researchers to make use of and employ AI models. It integrates both computer vision and natural language processi... 详细信息
来源: 评论
CVulDetector: Cross-domain Vulnerability Detection based on Transfer Learning  8
CVulDetector: Cross-domain Vulnerability Detection Based on ...
收藏 引用
8th international conference on signal and image Processing, ICSIP 2023
作者: Zeng, Guoqiang Zhou, Wen Qin, Zhongyuan Sun, Xin Wang, Wen Southeast University School of Cyber Science and Engineering Nanjing211189 China State Grid Zhejiang Electric Power Co. Ltd. Research Institute Internet Technology Center Hangzhou310063 China State Grid Zhejiang Electric Power Co. Ltd Internet Department Hangzhou310063 China
Software vulnerabilities pose a significant threat to computer security, and accurate identification of vulnerabilities has become a challenging task. Although previous work on deep learning-based vulnerability detect... 详细信息
来源: 评论
Time-frequency Analysis and Convolutional Neural Network based Fuze Jamming signal Recognition  25
Time-frequency Analysis and Convolutional Neural Network Bas...
收藏 引用
25th international conference on Advanced Communication technology (ICACT) - New Cyber Security Risks for Enterprise Amidst COVID-19 Pandemic
作者: Yang, Jikai Bai, Zhiquan Hu, Jiacheng Yang, Yingchao Xian, Zhaoxia Hao, Xinhong Kwak, KyungSup Shandong Univ Sch Informat Sci & Engn Shandong Prov Key Lab Wireless Commun Technol Qingdao 266237 Shandong Peoples R China Beijing Inst Technol Sch Mechatron Engn Beijing 100081 Peoples R China Inha Univ Grad Sch Informat Technol & Telecommun Incheon 22212 South Korea
Fuze jamming signal recognition plays a critical role in the battlefield environment. To improve the performance of fuze jamming signals detection, we propose a fuze jamming signal detector based on time-frequency ana... 详细信息
来源: 评论
An Effective Hybrid image Watermarking Encrypted and Decrypted Technique for Copyright Protection  2
An Effective Hybrid Image Watermarking Encrypted and Decrypt...
收藏 引用
2nd IEEE international conference on Integrated Circuits and Communication systems, ICICACS 2024
作者: Al-Jawahry, Hassan M. Kumar, Bura Vijay Chandra, N Subhash Patil, Rajeshwari Unnisa, Raheem The Islamic University Najaf Iraq Sr University School of Computer Science and Artificial Intelligence Warangal India Cvr College of Engineering Telangana India Nitte Meenakshi Institute of Technology Department of Ai and Ds Bengaluru India Cmr Technical Campus Hyderabad India
image watermarking serves as a visual deterrent, signaling potential infringers that the image is protected by copyright. While various watermarking methods have been developed in the past, existing models encounter l... 详细信息
来源: 评论
LimitNet: Progressive, Content-Aware image Offloading for ExtremelyWeak Devices & Networks  24
LimitNet: Progressive, Content-Aware Image Offloading for Ex...
收藏 引用
22nd Annual international conference on Mobile systems, Applications and Services (MOBISYS)
作者: Hojjat, Ali Haberer, Janek Zainab, Tayyaba Landsiedel, Olaf Univ Kiel Kiel Germany
IoT devices have limited hardware capabilities and are often deployed in remote areas. Consequently, advanced vision models surpass such devices' processing and storage capabilities, requiring offloading of such t... 详细信息
来源: 评论
Artificial Intelligence-Powered internet of Things for Farming and Plant Research  3
Artificial Intelligence-Powered Internet of Things for Farmi...
收藏 引用
3rd international conference on Electronics and Renewable systems, ICEARS 2025
作者: Padma, A. Suresh, P. Narsimlu, G. Amarnath, M. Sreedhar, B.R. Chaitanya Bharathi Institute of Technology Department of Mathematics India
The wearable fiber optic sensors for plants to monitor microenvironment and growth wearable fiber optic plant sensors for microclimate and growth monitoring. The plant agricultural sectors are facing challenges becaus... 详细信息
来源: 评论
Design of a Low-Cost Stochastic Computing-based Median Filter for Digital image Processing  21
Design of a Low-Cost Stochastic Computing-based Median Filte...
收藏 引用
21st international System-on-Chip Design conference, ISOCC 2024
作者: Lee, Donghui Kim, Yongtae Kyungpook National University School of Computer Science and Engineering Daegu Korea Republic of
Stochastic computing (SC) is an approximate computation method that enables the design of low-cost and error-tolerant systems. The median filter (MF) is one of the widely used filters in image processing and is partic... 详细信息
来源: 评论
Research on industrial internet intrusion detection model based on optimized BI-GRU
Research on industrial internet intrusion detection model ba...
收藏 引用
2022 international conference on signal Processing and Communication technology, SPCT 2022
作者: Shi, Wenqiang Wang, Hao Gong, Yuanlin Xu, Hao School of automation Chongqing University of Posts and Telecommunications Chong Qing China
The intrusion detection model based on deep learning has become a research hotspot in the field of network security, aiming at the high FPR and low DR of current intrusion detection systems, this paper proposes an ano... 详细信息
来源: 评论
Toward Reliable Mobile CrowdSensing Data Collection: image Splicing Localization Overview  19
Toward Reliable Mobile CrowdSensing Data Collection: Image S...
收藏 引用
19th IEEE international Wireless Communications and Mobile Computing (IEEE IWCMC)
作者: Abou-Zbiba, Wahiba Benbrahim, Houda El Bakkali, Hanan El Gadi, Hajar Maqour, Zaina Benhaddou, Driss Mohammed V Univ IRDA ENSIAS Rabat Morocco Mohammed V Univ SSL ENSIAS Rabat Morocco Univ Houston Engn Technol Dept Houston TX 77204 USA Alfaisal Univ Dept Elect Engn Coll Engn Riyadh Saudi Arabia
With the advancement of technology, the collection of data used in Intelligent Transportation systems has become increasingly easy, notably with the emergence of the Mobile CrowdSensing paradigm. This paradigm could p... 详细信息
来源: 评论