咨询与建议

限定检索结果

文献类型

  • 616 篇 会议
  • 75 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 326 篇 计算机科学与技术...
    • 231 篇 软件工程
    • 96 篇 信息与通信工程
    • 64 篇 控制科学与工程
    • 61 篇 生物工程
    • 48 篇 生物医学工程(可授...
    • 42 篇 电气工程
    • 37 篇 仪器科学与技术
    • 27 篇 光学工程
    • 27 篇 石油与天然气工程
    • 23 篇 化学工程与技术
    • 20 篇 电子科学与技术(可...
    • 19 篇 机械工程
    • 13 篇 环境科学与工程(可...
    • 13 篇 安全科学与工程
    • 12 篇 交通运输工程
  • 198 篇 理学
    • 104 篇 数学
    • 66 篇 生物学
    • 46 篇 化学
    • 32 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 16 篇 系统科学
  • 101 篇 管理学
    • 71 篇 图书情报与档案管...
    • 58 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 41 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
    • 15 篇 特种医学
  • 14 篇 法学
    • 11 篇 社会学
  • 9 篇 教育学
  • 8 篇 农学
  • 7 篇 经济学
  • 1 篇 艺术学

主题

  • 79 篇 pattern recognit...
  • 48 篇 artificial intel...
  • 33 篇 computer imaging...
  • 26 篇 computer applica...
  • 25 篇 machine learning
  • 23 篇 computer vision
  • 18 篇 data mining and ...
  • 18 篇 image processing...
  • 16 篇 image segmentati...
  • 16 篇 data mining
  • 16 篇 computer systems...
  • 16 篇 layout
  • 15 篇 optical computin...
  • 15 篇 shape
  • 14 篇 deep learning
  • 14 篇 feature extracti...
  • 12 篇 pattern matching
  • 12 篇 computer communi...
  • 11 篇 concurrent compu...
  • 11 篇 information stor...

机构

  • 32 篇 shenyang institu...
  • 27 篇 university of ch...
  • 21 篇 shenyang institu...
  • 8 篇 chitkara univers...
  • 7 篇 school of comput...
  • 7 篇 chinese academy ...
  • 6 篇 fujian key labor...
  • 6 篇 guangdong univer...
  • 6 篇 tsinghua univers...
  • 6 篇 zhejiang univers...
  • 6 篇 central south un...
  • 6 篇 unsw sydney
  • 6 篇 university of ch...
  • 5 篇 engineering rese...
  • 5 篇 university of te...
  • 5 篇 dalian universit...
  • 5 篇 university of sy...
  • 5 篇 the 54th researc...
  • 5 篇 institute of aut...
  • 5 篇 school of engine...

作者

  • 10 篇 hornegger joachi...
  • 6 篇 zheng-guang wu
  • 6 篇 hongyi li
  • 6 篇 chaojie li
  • 6 篇 biao luo
  • 6 篇 yu bihui
  • 6 篇 long cheng
  • 5 篇 yihe zhang
  • 5 篇 aiming wu
  • 5 篇 zhou xiaolei
  • 5 篇 baohua qiang
  • 5 篇 hui huang
  • 5 篇 tiwari raj gaura...
  • 5 篇 da-han wang
  • 5 篇 jing dong
  • 5 篇 ajith abraham
  • 5 篇 jiwen lu
  • 5 篇 yongjie yang
  • 5 篇 agarwal ambuj ku...
  • 5 篇 risheng liu

语言

  • 687 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"任意字段=Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition"
696 条 记 录,以下是671-680 订阅
排序:
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog computing  22
Detection Scheme of Impersonation Attack Based on Sarsa(Lamb...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Aiming Wu Shanshan Tu Junwei Liu Yihe Zhang Yongjie Yang Xuetao Bai Engineering Research Center of Intelligent Perception and Autonomous Control faculty of Information Technology Beijing University of Technology China China Mobile (Suzhou) Software Technology Co. Ltd. China Mobile (Suzhou) Software Technology Co. Ltd. China
Fog computing is a technology that provides distributed computing, storage and other services between cloud servers and Internet of things(IoT) devices. It reduces the pressure on cloud servers and utilizes network ed... 详细信息
来源: 评论
Robust Object Detection and Tracking Model for Visually Impaired People Using Deep Convolution Neural Network Model
Robust Object Detection and Tracking Model for Visually Impa...
收藏 引用
Sustainable Communication Networks and Application (ICSCNA), international conference on
作者: R. Priyanka K. Vivekrabinson A. Kathijanasreen W T Chembian Atharvaa Veerasundar Srimathi S Department of Networking and Communications School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of CSE Kalasalingam Academy of Research and Education Krishnankoil CSE department R.M.K College of Engineering and Technology Department of CSE Vel Tech High Tech Dr. Rangarajan Dr.Sakuntala Engineering College 12th Greenwood High International High School Bengaluru Department of Bio Technology Saveetha School of Engineering SIMATS Chennai Tamilnadu India
Visual Impairment (VI) has become the most significant challenge over the past few years. Even to complete their day-to-day activities, visually impaired persons seek assistance. A currency recognition system and auto...
来源: 评论
Overview of the NLPCC 2023 Shared Task: Chinese Medical Instructional Video Question Answering  12th
Overview of the NLPCC 2023 Shared Task: Chinese Medical In...
收藏 引用
12th National CCF conference on Natural Language Processing and Chinese computing, NLPCC 2023
作者: Li, Bin Weng, Yixuan Guo, Hu Sun, Bin Li, Shutao Luo, Yuhao Qi, Mengyao Liu, Xufei Han, Yuwei Liang, Haiwen Gao, Shuting Chen, Chen College of Electrical and Information Engineering Hunan University Changsha China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy Sciences Beijing China
In this paper, we present an overview of the NLPCC 2023 shared task, named Chinese Medical Instructional Video (CMIVQA), which includes three sub-tracks: temporal answer grounding in a single video, video corpus retri... 详细信息
来源: 评论
Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios  22
Embedded Real-time System Trusted Protection Technology for ...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Jin Zhou Zhenhu Ning Qi Wang Yuchen Wang faculty of Information Technology Beijing University Of Technology China Trusted Computing Technology Co.LTD Shenzhen China
Embedded real-time operating systems are widely used in communication, industrial control and weapon intelligent control and other fields. However, due to the complex personnel and environment involved in the developm...
来源: 评论
Semantic Maximum Relevance and Modal Alignment for Cross-Modal Retrieval  22
Semantic Maximum Relevance and Modal Alignment for Cross-Mod...
收藏 引用
proceedings of the 2022 11th international conference on computing and pattern recognition
作者: Pingping Sun Baohua Qiang Zhiguang Liu Xianyi Yang Guangyong Xi Weigang Liu Ruidong Chen Shihao Zhang Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology China Hebei Key Laboratory of Intelligent Information Perception and Processing The 54th Research Institute of CETC China
With the increasing abundance of multimedia data resources, researches on mining the relationship between different modalities to achieve refined cross-modal retrieval are gradually emerging. In this paper, we propose... 详细信息
来源: 评论
Object Detection Algorithm Based on Coordinate Attention and Context Feature Enhancement  22
Object Detection Algorithm Based on Coordinate Attention and...
收藏 引用
proceedings of the 2022 11th international conference on computing and pattern recognition
作者: Lingzhi Liu Baohua Qiang Yuanchun Wang Xianyi Yang Jubo Tian Shihao Zhang Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology China Hebei Key Laboratory of Intelligent Information Perception and Processing The 54th Research Institute of CETC China
In recent years, object detection has been widely used in various fields such as face detection, remote sensing image detection and pedestrian detection. Due to the complex environment in the actual scene, we need to ... 详细信息
来源: 评论
Long-short term anomaly detection in wireless sensor networks based on spatio-temporal correlation in IoT systems  23
Long-short term anomaly detection in wireless sensor network...
收藏 引用
proceedings of the 2023 6th international conference on Artificial Intelligence and pattern recognition
作者: Zhihao Wei Meng Li Jianghao Wei Industrial Big Data Laboratory Xi'an University of Posts and Telecommunications China Nanjing University of Science and Technology China
For the large number of different information sources collected by heterogeneous wireless sensor networks, traditional anomaly detection frameworks usually focus on the data analysis itself and lack a focus on unexpec... 详细信息
来源: 评论
Anomaly Handwritten Text Detection for Automatic Descriptive Answer Evaluation  22
Anomaly Handwritten Text Detection for Automatic Descriptive...
收藏 引用
proceedings of the 2022 11th international conference on computing and pattern recognition
作者: Nilanjana Chatterjee Palaiahnaakote Shivakumara Umapada Pal Tong Lu Yue Lu Computer Vision and Pattern Recognition Unit Indian Statistical Institute India Faculty of Computer Science and Information Technology University of Malaya Malaysia National Key Lab for Novel Software Technology Nanjing University China Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University China
Although there are advanced technologies for character recognition, automatic descriptive answer evaluation is an open challenge for the document image analysis community due to large diversified handwritten text and ...
来源: 评论
A Model robustness optimization method based on adversarial sample detection  22
A Model robustness optimization method based on adversarial ...
收藏 引用
proceedings of the 2022 5th international conference on Artificial Intelligence and pattern recognition
作者: Jiaze Sun Siyuan Long Xianyan Ma Yanmei Tang Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts & Telecommunications China Xi'an University of Posts & Telecommunications China
Deep neural networks are extremely vulnerable due to the existence of adversarial samples. It is a challenging problem to optimize the robustness of the model to protect deep neural networks from the threat of adversa... 详细信息
来源: 评论
Activity Attribute-Based User Behavior Model for Continuous User Authentication  22
Activity Attribute-Based User Behavior Model for Continuous ...
收藏 引用
proceedings of the 2022 12th international conference on Communication and Network Security
作者: Luthfi Azhari Ari Moesriami Barmawi School of Computing Telkom University INA
In general, authentication using a username and password has been used to manage access to the system. this way, it can be arranged so that only authorized people can access a system. However, it does not rule out the... 详细信息
来源: 评论