咨询与建议

限定检索结果

文献类型

  • 18,409 篇 会议
  • 217 册 图书
  • 188 篇 期刊文献

馆藏范围

  • 18,811 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 13,438 篇 工学
    • 9,747 篇 计算机科学与技术...
    • 6,612 篇 软件工程
    • 3,603 篇 控制科学与工程
    • 2,471 篇 信息与通信工程
    • 2,304 篇 电气工程
    • 1,741 篇 光学工程
    • 1,517 篇 机械工程
    • 1,118 篇 生物工程
    • 909 篇 电子科学与技术(可...
    • 864 篇 生物医学工程(可授...
    • 785 篇 仪器科学与技术
    • 574 篇 动力工程及工程热...
    • 543 篇 交通运输工程
    • 513 篇 安全科学与工程
    • 499 篇 材料科学与工程(可...
    • 454 篇 化学工程与技术
    • 349 篇 土木工程
    • 335 篇 网络空间安全
  • 5,368 篇 理学
    • 2,366 篇 物理学
    • 2,288 篇 数学
    • 1,231 篇 生物学
    • 598 篇 统计学(可授理学、...
    • 589 篇 系统科学
    • 449 篇 化学
  • 2,423 篇 管理学
    • 1,722 篇 管理科学与工程(可...
    • 830 篇 图书情报与档案管...
    • 687 篇 工商管理
  • 1,096 篇 医学
    • 972 篇 临床医学
    • 561 篇 基础医学(可授医学...
    • 362 篇 药学(可授医学、理...
  • 364 篇 法学
  • 259 篇 经济学
  • 253 篇 农学
  • 218 篇 教育学
  • 64 篇 军事学
  • 25 篇 艺术学
  • 20 篇 文学
  • 3 篇 哲学

主题

  • 1,582 篇 computer vision
  • 370 篇 deep learning
  • 314 篇 computer archite...
  • 282 篇 cameras
  • 255 篇 object detection
  • 253 篇 computational mo...
  • 237 篇 control systems
  • 236 篇 computer science
  • 220 篇 image segmentati...
  • 211 篇 feature extracti...
  • 209 篇 internet of thin...
  • 187 篇 access control
  • 173 篇 machine vision
  • 158 篇 neural networks
  • 137 篇 artificial intel...
  • 133 篇 face recognition
  • 130 篇 process control
  • 130 篇 real-time system...
  • 129 篇 data mining
  • 128 篇 support vector m...

机构

  • 47 篇 chitkara univers...
  • 46 篇 school of comput...
  • 43 篇 school of contro...
  • 29 篇 maharishi school...
  • 24 篇 karnataka bangal...
  • 21 篇 school of comput...
  • 19 篇 maharishi school...
  • 17 篇 chitkara univers...
  • 17 篇 college of compu...
  • 15 篇 university of ch...
  • 15 篇 school of comput...
  • 14 篇 south china univ...
  • 14 篇 dept. of compute...
  • 14 篇 department of co...
  • 14 篇 chitkara univers...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 12 篇 centre of interd...
  • 12 篇 school of comput...

作者

  • 19 篇 wang lei
  • 18 篇 li yang
  • 17 篇 wang wei
  • 16 篇 yang yang
  • 14 篇 liu yang
  • 13 篇 wang hui
  • 13 篇 ryszard tadeusie...
  • 13 篇 marcin korytkows...
  • 12 篇 wang ping
  • 12 篇 wang jian
  • 12 篇 sato jun
  • 12 篇 jacek m. zurada
  • 11 篇 zhang tao
  • 11 篇 sakaue fumihiko
  • 11 篇 zhang lei
  • 11 篇 huang tinglei
  • 11 篇 liu lei
  • 10 篇 lei wang
  • 10 篇 li xin
  • 10 篇 wang jing

语言

  • 16,844 篇 英文
  • 1,863 篇 其他
  • 133 篇 中文
  • 16 篇 俄文
  • 7 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
检索条件"任意字段=Proceedings of the 3rd International Conference on Control and Computer Vision"
18814 条 记 录,以下是4281-4290 订阅
排序:
Sarcasm Detection Using Stacked Bi-Directional LSTM Model  3
Sarcasm Detection Using Stacked Bi-Directional LSTM Model
收藏 引用
3rd international conference on Advances in Computing, Communication control and Networking, ICAC3N 2021
作者: Kumar, Dr. Manoj Patidar, Ashish Delhi Technological University Department of Computer Science and Engineering Delhi India
Sarcasm is one of the sentiments which is being used to communicate a negative opinion utilizing positive words. The world is full of social media and many kinds of the web-based portal and this media stores a huge am... 详细信息
来源: 评论
Fake News Detection using Hybrid of Deep Neural Network and Stacked LSTM  3
Fake News Detection using Hybrid of Deep Neural Network and ...
收藏 引用
3rd international conference on Advances in Computing, Communication control and Networking, ICAC3N 2021
作者: Narayan, Udit Kumar, Ajad Kumar, Kuldeep Dr. B R Ambedkar National Institute of Technology Jalandhar Department of Computer Science and Engineering Punjab Jalandhar India
Fake News is one of the major concerns for the world and it could cause many problems like misleading people, the potential to influence people's opinions, etc. Hence distinguishing fake news is very crucial. Fake... 详细信息
来源: 评论
CNN Implementation for IDS  3
CNN Implementation for IDS
收藏 引用
3rd international conference on Advances in Computing, Communication control and Networking, ICAC3N 2021
作者: Varanasi, Venkata Ramani Razia, Shaik Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh Vaddeswaram India
Real world data is more complex in nature and requires proper handling to use with machine learning techniques. Handling large volumes of data is the key aspect in deep learning (DL). As new attacks are evolving, trad... 详细信息
来源: 评论
Comparative Study between Leading Transfer Learning Architectures for Source Camera Identification  2
Comparative Study between Leading Transfer Learning Architec...
收藏 引用
2nd international conference on Power, control and Computing Technologies, ICPC2T 2022
作者: Chakravarty, Shreya Fating, Shardul Jain, Ishita Varun, Ishika Khandelwal, Richa R. Shri Ramdeobaba College of Engineering and Management Department of Electronics Engineering Nagpur India
The all-embracing use of digital images has revamped the quality of life and security to a great extent. Right from finding an item on online shopping websites through a clicked picture, to CCTV cameras being used for... 详细信息
来源: 评论
Blockchain-Internet of things-Machine Learning: Development of Traceable System for Multi Purposes
Blockchain-Internet of things-Machine Learning: Development ...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), international conference on
作者: K. Kowsalya R. Paritala Jhansi Rani Ritu Malika Bhiyana Manisha Saini Pravin P Patil Computer Science and Applications SRM Institute of Science and Technology India Computer Science and Engineering Department Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India Computer Science Kurukshetra University Computer Science Govt PG College Ambala Cantt Kurukshetra University Kurukshetra Computer Science Govt PG College Ambala Cantt Kurukshetra University Department of Mechanical Engineering Graphic Era Deemed To Be University Dehradun Uttarakhand India
The Iot devices (IoT) and cryptocurrencies may be combined to create a platform that promotes improved and sustainable and credibility. The resulting innovations have been used in a number of industries, most notably ...
来源: 评论
Trust based Mechanism for Detection and Isolation of DDOS Attack in Software Defined Networks  3
Trust based Mechanism for Detection and Isolation of DDOS At...
收藏 引用
3rd international conference on Advances in Computing, Communication control and Networking, ICAC3N 2021
作者: Saini, Chiman Kang, Sandeep Singh Chandigarh University Department of Computer Science and Engineering Mohali India
SDN networks are different from the classic networks in terms of features. Different from SDN, in classic networks, networking tool stake decision regarding the handling of an arriving packet just on the address of it... 详细信息
来源: 评论
Integrating Smart Contracts in IoT Networks Powered by Blockchain Technology
Integrating Smart Contracts in IoT Networks Powered by Block...
收藏 引用
Innovation in Technology (INOCON), IEEE international conference for
作者: Pompi Das Sengupta Aakriti Chauhan Raja Praveen K N Department of Management ARKA JAIN University Jamshedpur Jharkhand India Department of Agri-Business Management Vivekananda Global University Jaipur India Department of Computer Science and Engineering School of Engineering and Technology JAIN Bangalore Karnataka
integrating smart contracts into the Internet of Factors (Iota) networks powered by using block chain technology presents a unique set of challenges and possibilities. Smart contracts offer an automatic technique to f...
来源: 评论
Observer-Based Adaptive Security control for Network control Systems Under TDS Actuator Attacks  3rd
Observer-Based Adaptive Security Control for Network Contro...
收藏 引用
3rd international conference on Neural Computing for Advanced Applications, NCAA 2022
作者: Wang, Liang Zhao, Ping School of Information Science and Engineering Shandong Normal University Jinan250358 China
Networked control systems (NCS) have been used widely in many practical fields. The communication connection in NCS allows agents to communicate with each other quickly, which can quickly respond to abrupt changes in ... 详细信息
来源: 评论
CompDNet-512: Hybrid Deep Learning Architecture for Prediction of COVID-19  3
CompDNet-512: Hybrid Deep Learning Architecture for Predicti...
收藏 引用
3rd international conference on Advances in Computing, Communication control and Networking, ICAC3N 2021
作者: Singh, Gurpreet Anand, Darpan Chandigarh University Computer Science and Engineering Mohali India
With a growing appearance of enormous cases of COVID-19 in people, computational solutions founded on deep learning can play a huge role in performing automated prediction of the corona virus disease. In this article ... 详细信息
来源: 评论
D2D Underlay Cellular Network optimization Using GA Considering OFDMA-ICI
D2D Underlay Cellular Network optimization Using GA Consider...
收藏 引用
Power Electronics & IoT Applications in Renewable Energy and its control (PARC), 2020 international conference on
作者: Nagy Osman Khawla A. Alnajjar Ramesh C. Bansal Department of Electrical Engineering College of Engineering University of Sharjah Sharjah UAE Department of Electrical and Electronics Engineering Higher Colleges of Technology Sharjah UAE Department of Electric Electronic and Computer Engineering University of Pretoria Pretoria South Africa
Direct transmission between devices is now possible due to the emergence of device-to-device D2D technology. The D2D communication underlay cellular network intends to take advantage of device proximity and hence, boo...
来源: 评论