咨询与建议

限定检索结果

文献类型

  • 18,635 篇 会议
  • 217 册 图书
  • 194 篇 期刊文献

馆藏范围

  • 19,043 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 13,667 篇 工学
    • 9,957 篇 计算机科学与技术...
    • 6,782 篇 软件工程
    • 3,800 篇 控制科学与工程
    • 2,630 篇 信息与通信工程
    • 2,341 篇 电气工程
    • 1,750 篇 光学工程
    • 1,533 篇 机械工程
    • 1,118 篇 生物工程
    • 922 篇 电子科学与技术(可...
    • 869 篇 生物医学工程(可授...
    • 789 篇 仪器科学与技术
    • 584 篇 动力工程及工程热...
    • 546 篇 交通运输工程
    • 516 篇 安全科学与工程
    • 502 篇 材料科学与工程(可...
    • 455 篇 化学工程与技术
    • 351 篇 土木工程
    • 345 篇 网络空间安全
  • 5,521 篇 理学
    • 2,503 篇 物理学
    • 2,430 篇 数学
    • 1,231 篇 生物学
    • 602 篇 统计学(可授理学、...
    • 589 篇 系统科学
    • 579 篇 化学
  • 2,468 篇 管理学
    • 1,760 篇 管理科学与工程(可...
    • 834 篇 图书情报与档案管...
    • 689 篇 工商管理
  • 1,257 篇 医学
    • 1,101 篇 临床医学
    • 563 篇 基础医学(可授医学...
    • 362 篇 药学(可授医学、理...
  • 389 篇 法学
  • 259 篇 经济学
  • 255 篇 农学
  • 219 篇 教育学
  • 64 篇 军事学
  • 45 篇 文学
  • 25 篇 艺术学
  • 3 篇 哲学

主题

  • 1,614 篇 computer vision
  • 409 篇 deep learning
  • 314 篇 computer archite...
  • 282 篇 cameras
  • 263 篇 object detection
  • 251 篇 computational mo...
  • 236 篇 computer science
  • 231 篇 control systems
  • 222 篇 image segmentati...
  • 218 篇 feature extracti...
  • 211 篇 internet of thin...
  • 187 篇 access control
  • 175 篇 machine vision
  • 161 篇 neural networks
  • 143 篇 artificial intel...
  • 133 篇 face recognition
  • 131 篇 support vector m...
  • 128 篇 real-time system...
  • 127 篇 process control
  • 123 篇 data mining

机构

  • 55 篇 chitkara univers...
  • 46 篇 school of comput...
  • 42 篇 school of contro...
  • 29 篇 maharishi school...
  • 24 篇 karnataka bangal...
  • 21 篇 school of comput...
  • 19 篇 maharishi school...
  • 17 篇 chitkara univers...
  • 17 篇 college of compu...
  • 16 篇 university of ch...
  • 15 篇 school of comput...
  • 14 篇 south china univ...
  • 14 篇 dept. of compute...
  • 14 篇 department of co...
  • 14 篇 chitkara univers...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 12 篇 centre of interd...
  • 12 篇 school of comput...

作者

  • 21 篇 wang lei
  • 18 篇 li yang
  • 17 篇 wang wei
  • 16 篇 wang jian
  • 16 篇 yang yang
  • 14 篇 liu yang
  • 13 篇 zhang tao
  • 13 篇 wang hui
  • 13 篇 ryszard tadeusie...
  • 13 篇 marcin korytkows...
  • 12 篇 wang ping
  • 12 篇 sato jun
  • 12 篇 jacek m. zurada
  • 11 篇 sakaue fumihiko
  • 11 篇 zhang lei
  • 11 篇 huang tinglei
  • 11 篇 liu lei
  • 10 篇 lei wang
  • 10 篇 li xin
  • 10 篇 wang jing

语言

  • 16,469 篇 英文
  • 2,470 篇 其他
  • 152 篇 中文
  • 16 篇 俄文
  • 7 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
检索条件"任意字段=Proceedings of the 3rd International Conference on Control and Computer Vision"
19046 条 记 录,以下是4051-4060 订阅
排序:
Exploration and Practice of Course Homework Metaverse Based on Extended Reality Under Edge Computing  1
收藏 引用
3rd EAI international conference on Edge Computing and IoT, EAI ICECI 2022
作者: Fu, Jinrong Liu, Yiwen Yan, Haobo Gao, Yanxia Xiao, Jianhua School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
The metaverse originated from science fiction at first, but it gradually came into reality with the continuous power of technology. Aiming at the problems of course work in Chinese universities, such as its function i... 详细信息
来源: 评论
Object Detection Algorithm Based on Multi-Scaled Convolutional Neural Networks
Object Detection Algorithm Based on Multi-Scaled Convolution...
收藏 引用
international Symposium on Artificial Intelligence and Signal Processing (AISP)
作者: T J Nandhini K Thinakaran Department of Computer Science and Engineering Saveetha School of Engineering Saveetha institute of medical and technical Sciences (SIMATS) Chennai India
Object detection algorithms must first identify all the objects inside an image before machine vision can properly categorize and localize them. Many methods have been proposed to handle this problem, with most of the...
来源: 评论
RTTAC-An Access control Model Based on Blockchain and Role-Trusted Transfer
RTTAC-An Access Control Model Based on Blockchain and Role-T...
收藏 引用
computer Science and Blockchain (CCSB), international conference on
作者: Feng Wang Yang Lu Yang Liu Zhiruo Zhang Henan university of technology Distributed Computing & BlockChain Lab Zhengzhou China
Aiming to address the data security issues in data sharing, current approaches such as RBAC, ABAC, and blockchain-based data sharing platforms suffer from problems like role redundancy, role abuse, complex authorizati...
来源: 评论
Various Aspects of Software Fault Prediction: A Review  3
Various Aspects of Software Fault Prediction: A Review
收藏 引用
3rd international conference on Advances in Computing, Communication control and Networking, ICAC3N 2021
作者: Saini, Nikhil Bhandari, Kirti Kumar, Kuldeep Dr. B R Ambedkar National Institute of Technology Jalandhar Computer Science and Engineering Punjab Jalandhar India
In the domain of software engineering, software fault prediction is a prominent research area. To enhance the quality of software, software fault prediction is introduced. The primary intention of software fault predi... 详细信息
来源: 评论
Securing of Cloud Infrastructure using Enterprise Honeypot  3
Securing of Cloud Infrastructure using Enterprise Honeypot
收藏 引用
3rd international conference on Advances in Computing, Communication control and Networking, ICAC3N 2021
作者: Singh, Kiran Deep Chandigarh University Department of Computer Science and Engineering Punjab Mohali India
An enterprise honeypot is developed to protect virtual machines (VMs) in Cloud Infrastructure (ICI). A Honeyed honeypot with Snort is integrated to identify hidden security flaws and to prevent internal intrusions or ... 详细信息
来源: 评论
Intrusion Detection Method for Industrial control System Based on Parallel CNN-LSTM Neural Network Improved by Self-Attention
Intrusion Detection Method for Industrial Control System Bas...
收藏 引用
Electronic Information Engineering and computer Science (EIECS), 2021 international conference on
作者: Zhefan Zhang Zhiheng Zhao Jinyong Deng Yongzhe Chen School of Electrical Engineering & Automation Harbin Institute of Technology Harbin China
As an important part of the information age, network security has been concerned. Industrial control system is an indispensable part of modern production process, but it is also facing the threat from cyber-attacks. I...
来源: 评论
Design and Optimization of Visual Tracking Algorithm Based on Deep Learning  2
Design and Optimization of Visual Tracking Algorithm Based o...
收藏 引用
2nd international conference on 3D Immersion, Interaction and Multi-Sensory Experiences, ICDIIME 2023
作者: Han, Zihao Cardiff University CF10 3XQ United Kingdom
Visual tracking is a challenge in computer vision. Visual tracking has various practical application scenarios, and is used in intelligent video surveillance system, analysis and research of driver's abnormal beha... 详细信息
来源: 评论
Wet and Wrinkled Finger Recognition Using Voting Classification and GLCM Algorithm  3
Wet and Wrinkled Finger Recognition Using Voting Classificat...
收藏 引用
3rd international conference on Advances in Computing, Communication control and Networking, ICAC3N 2021
作者: Kumar, Puneet Sharma, Suarabh Chandigarh University Department of Computer Science and Engineering Punjab Gharuan140301 India
The automated wrinkle fingerprint recognition techniques rely on some principles from the domain of pattern recognition. There are two prevalent techniques for wrinkle fingerprint recognition. The first method is base... 详细信息
来源: 评论
Research on Cloud Computing Security Technology under computer Big Data Network
Research on Cloud Computing Security Technology under Comput...
收藏 引用
Electronic Technology, Communication and Information (ICETCI), IEEE international conference on
作者: Qiang Zhou Wenjisi Ou Wei Zheng Department of Computer Technology Jiangxi Vocational and Technical College of Information Application Nanchang China
In this paper, a parameter estimation-based security access integration method for computer network smart data is designed. The scale of data clustering is determined according to the distribution and evolution charac...
来源: 评论
Blockchain and Internet-of-Things: A Technological Solution for Issues in Cold Chain
Blockchain and Internet-of-Things: A Technological Solution ...
收藏 引用
Sentiment Analysis and Deep Learning (ICSADL), international conference on
作者: Madhu Arora Vasim Ahmad Rakesh Kumar Nagendar Yamsani Mohd Amir Jigyasha Arora Balaji Institute of Modern Management Sri Balaji University Pune Uttaranchal Institute of Management Uttaranchal Unversity Premnagar Dehradun India School of Computer Science and Artificial Intelligence SR University Warangal India Department of Computer Science and Engineering (WIT) Sudhowala Dehradun
Due to the integration of technology in the form of Artificial Intelligence and Internet of Things into the cold chain, the fourth industrial revolution, often known as “Industry 4.0,” evolves as a new technological... 详细信息
来源: 评论