咨询与建议

限定检索结果

文献类型

  • 6,097 篇 会议
  • 65 篇 期刊文献
  • 51 册 图书
  • 2 篇 学位论文

馆藏范围

  • 6,215 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,624 篇 工学
    • 2,545 篇 计算机科学与技术...
    • 1,803 篇 软件工程
    • 1,416 篇 信息与通信工程
    • 990 篇 电气工程
    • 423 篇 控制科学与工程
    • 400 篇 电子科学与技术(可...
    • 371 篇 光学工程
    • 349 篇 生物工程
    • 289 篇 生物医学工程(可授...
    • 286 篇 仪器科学与技术
    • 233 篇 机械工程
    • 148 篇 安全科学与工程
    • 138 篇 交通运输工程
    • 114 篇 化学工程与技术
    • 106 篇 材料科学与工程(可...
    • 101 篇 网络空间安全
    • 99 篇 动力工程及工程热...
    • 83 篇 建筑学
  • 1,491 篇 理学
    • 691 篇 数学
    • 542 篇 物理学
    • 374 篇 生物学
    • 232 篇 系统科学
    • 215 篇 统计学(可授理学、...
    • 116 篇 化学
  • 537 篇 管理学
    • 324 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 346 篇 医学
    • 327 篇 临床医学
    • 164 篇 基础医学(可授医学...
    • 110 篇 药学(可授医学、理...
  • 98 篇 法学
  • 60 篇 农学
  • 48 篇 经济学
  • 40 篇 教育学
  • 27 篇 军事学
  • 16 篇 文学
  • 5 篇 艺术学

主题

  • 325 篇 feature extracti...
  • 305 篇 internet of thin...
  • 258 篇 real-time system...
  • 195 篇 internet
  • 189 篇 image segmentati...
  • 170 篇 signal processin...
  • 167 篇 image processing
  • 156 篇 accuracy
  • 146 篇 deep learning
  • 146 篇 image edge detec...
  • 139 篇 signal processin...
  • 130 篇 cameras
  • 129 篇 training
  • 127 篇 image coding
  • 116 篇 image color anal...
  • 106 篇 image retrieval
  • 106 篇 visualization
  • 98 篇 computational mo...
  • 97 篇 robustness
  • 89 篇 signal to noise ...

机构

  • 11 篇 school of comput...
  • 9 篇 faculty of infor...
  • 8 篇 school of cyber ...
  • 8 篇 school of electr...
  • 8 篇 beijing universi...
  • 8 篇 state key labora...
  • 7 篇 school of inform...
  • 7 篇 school of inform...
  • 7 篇 college of elect...
  • 7 篇 institute of sig...
  • 7 篇 harbin institute...
  • 7 篇 college of infor...
  • 7 篇 school of electr...
  • 6 篇 university of sc...
  • 6 篇 school of inform...
  • 6 篇 school of electr...
  • 6 篇 chaoyang univ te...
  • 6 篇 university of el...
  • 6 篇 wuhan university...
  • 6 篇 department of in...

作者

  • 13 篇 yoshitaka sakura...
  • 13 篇 tsuruta setsuo
  • 13 篇 sakurai yoshitak...
  • 13 篇 fan zhun
  • 12 篇 setsuo tsuruta
  • 11 篇 li li
  • 11 篇 wang wei
  • 10 篇 yetongnon kokou
  • 9 篇 dipanda albert
  • 9 篇 zhang yan
  • 9 篇 lee chin-feng
  • 8 篇 zhang lei
  • 8 篇 jing wang
  • 8 篇 wang hao
  • 7 篇 zhu guijie
  • 7 篇 kinshuk
  • 7 篇 jeon gwanggil
  • 7 篇 ahmad tohari
  • 7 篇 shen jau-ji
  • 7 篇 wang xin

语言

  • 5,994 篇 英文
  • 201 篇 其他
  • 35 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Signal-Image Technology and Internet-Based Systems"
6215 条 记 录,以下是311-320 订阅
排序:
Radio Frequency Fingerprint Identification in Low SNR based on SCUNet
Radio Frequency Fingerprint Identification in Low SNR Based ...
收藏 引用
IEEE/CIC international conference on Communications in China (ICCC)
作者: Zhang, Yali Liu, Nan Pan, Zhiwen You, Xiaohu Southeast Univ Natl Mobile Commun Res Lab Nanjing 210096 Peoples R China
Radio Frequency Fingerprint (RFF) identification is a non-password authentication technique, which have been researched in improving the security of the internet of Things (IoT) widely. For traditional access authenti... 详细信息
来源: 评论
CSI Fingerprint and GCN based Indoor Localization Using Graph Structures Fusion  23
CSI Fingerprint and GCN Based Indoor Localization Using Grap...
收藏 引用
23rd IEEE international conference on Communication technology, ICCT 2023
作者: Fan, Shuting Yan, Jun College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China
Since the channel state information (CSI) can provide a fine-grained description of signal propagation process, in this paper, a new CSI fingerprint and graph convolutional network (GCN) based indoor localization algo... 详细信息
来源: 评论
2023 6th international conference on signal Processing and Information Security, ICSPIS 2023
2023 6th International Conference on Signal Processing and I...
收藏 引用
6th international conference on signal Processing and Information Security, ICSPIS 2023
The proceedings contain 44 papers. The topics discussed include: blockchain-enabled DNS: enhancing security and mitigating attacks in domain name systems;deep learning-based human tracking, face mask and social distan...
来源: 评论
A Secure Watermarking based image Integrity Verification in IoMT  4
A Secure Watermarking Based Image Integrity Verification in ...
收藏 引用
4th IEEE international conference on Computing, Communication, and Intelligent systems, ICCCIS 2023
作者: Sulfi, Saeeda Neena Raj, N.R. College of Engineering Trivandrum Department of Computer Science and Engineering Thiruvananthapuram India Mar Baselios College of Engineering and Technology Department of Computer Science and Engineering Thiruvananthapuram India
The internet of Medical Things in healthcare necessitates a secure way to transfer medical images due to the rise of telemedicine. Security breaches in public networks lead to falsification of medical images and furth... 详细信息
来源: 评论
An Advanced IoT and GPS-GSM based Real-Time Automated Data Monitoring Robot with image Processing and Live Streaming for Human Life and Land Mine Detection systems
An Advanced IoT and GPS-GSM Based Real-Time Automated Data M...
收藏 引用
2024 international conference on Computer, Electrical and Communication Engineering, ICCECE 2024
作者: Islam, Md. Muhaiminul Akter, Farzana Hossain, Md. Rakib Faruk Hossain, Md. Mahedy Hasan, S.M. Yakin Srizon, Md. Azmain Rajshahi University of Engineering & Technology Department of Electronics & Telecommunication Engineering Rajshahi6204 Bangladesh Department of Electrical & Electronic Engineering Rajshahi6204 Bangladesh Department of Computer Science & Engineering Rajshahi6204 Bangladesh
An era of automation is currently being experienced, where everything is becoming more automated day by day. Automation technology has been applied everywhere, from smaller to larger scales. Moreover, real-time commun... 详细信息
来源: 评论
Blockchain-based Secure Routing Algorithm with Accumulating Trust in VANETs  18
Blockchain-based Secure Routing Algorithm with Accumulating ...
收藏 引用
18th international conference on Future Networks and Communications (FNC) / 20th international conference on Mobile systems and Pervasive Computing (MobiSPC) / 13th international conference on Sustainable Energy Information technology (SEIT)
作者: Liu, Mengyu Tang, Huizhi Li, Demin Donghua Univ Engn Res Ctr Digitized Textile & Apparel Technol Coll Informat Sci & Technol Minist Educ Shanghai 201620 Peoples R China
The popularity of vehicles and the upgrading of sensors are driving the development of the internet of Vehicles. Therefore, a number of Vehicular Adhoc networks (VANETs) routing algorithms have emerged. However, vehic... 详细信息
来源: 评论
Ray Tracing based RIS-Assisted Corridor Environment Channel Reconstruction at 300GHz  12
Ray Tracing Based RIS-Assisted Corridor Environment Channel ...
收藏 引用
12th IEEE international conference on Information and Communication Networks, ICICN 2024
作者: Zheng, Wenlong Lu, Hao College of Information Science and Engineering Hohai University Nanjing China
Reconfigurable intelligent surfaces (RIS) have emerged as a crucial technology for sixth-generation (6G) communication systems. Mastering the modeling and analysis methods of RIS is essential for its effective impleme... 详细信息
来源: 评论
Neural Network based Landing Assist Using Remote Sensing Data  16
Neural Network Based Landing Assist Using Remote Sensing Dat...
收藏 引用
16th international conference on signal-image technology and internet-based systems (SITIS)
作者: Bharti, Dheeraj Kothari, Mangal Venkatesh, K. S. Indian Inst Technol Kanpur Elect Dept Kanpur India Indian Inst Technol Kanpur Aerosp Dept Kanpur India
This paper presents the application of computer vision and artificial neural networks for autonomous approach and landing and taxiing for an aircraft. In civil aviation and unmanned aircraft system industry, safety ha... 详细信息
来源: 评论
Research on regional signal control algorithm based on multi-agent DDQN  8
Research on regional signal control algorithm based on multi...
收藏 引用
8th international conference on Traffic Engineering and Transportation System, ICTETS 2024
作者: Yu, Yitao Yuan, Tangxiao Xu, Junshan Nanjing University of Science and Technology Nanjing China
Traditional traffic signal timing control and single-intersection control methods face challenges in addressing the complexity and dynamics of modern traffic systems. Methods such as Discrete Traffic State Code(DSTE) ... 详细信息
来源: 评论
VulSAT: Source Code Vulnerability Detection Scheme based on SAT Structure  8
VulSAT: Source Code Vulnerability Detection Scheme Based on ...
收藏 引用
8th international conference on signal and image Processing, ICSIP 2023
作者: Xue, Jintao Yu, Zihan Song, Yubo Qin, Zhongyuan Sun, Xin Wang, Wen Southeast University School of Cyber Science and Engineering Nanjing211189 China State Grid Zhejiang Electric Power Co. Ltd. Research Institute Internet Technology Center Hangzhou310063 China State Grid Zhejiang Electric Power Co. Ltd Internet Department Hangzhou310063 China
The number of software vulnerabilities have increased rapidly, and their forms have shown the characteristics of complexity and diversity, which has brought severe challenges to software systems. Deep learning can aut... 详细信息
来源: 评论