咨询与建议

限定检索结果

文献类型

  • 18,409 篇 会议
  • 214 册 图书
  • 195 篇 期刊文献

馆藏范围

  • 18,815 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 13,444 篇 工学
    • 9,750 篇 计算机科学与技术...
    • 6,613 篇 软件工程
    • 3,604 篇 控制科学与工程
    • 2,472 篇 信息与通信工程
    • 2,309 篇 电气工程
    • 1,742 篇 光学工程
    • 1,518 篇 机械工程
    • 1,119 篇 生物工程
    • 911 篇 电子科学与技术(可...
    • 863 篇 生物医学工程(可授...
    • 786 篇 仪器科学与技术
    • 574 篇 动力工程及工程热...
    • 544 篇 交通运输工程
    • 514 篇 安全科学与工程
    • 503 篇 材料科学与工程(可...
    • 454 篇 化学工程与技术
    • 349 篇 土木工程
    • 338 篇 网络空间安全
  • 5,375 篇 理学
    • 2,371 篇 物理学
    • 2,288 篇 数学
    • 1,232 篇 生物学
    • 598 篇 统计学(可授理学、...
    • 590 篇 系统科学
    • 448 篇 化学
  • 2,430 篇 管理学
    • 1,728 篇 管理科学与工程(可...
    • 831 篇 图书情报与档案管...
    • 688 篇 工商管理
  • 1,093 篇 医学
    • 970 篇 临床医学
    • 561 篇 基础医学(可授医学...
    • 362 篇 药学(可授医学、理...
  • 363 篇 法学
  • 259 篇 经济学
  • 252 篇 农学
  • 218 篇 教育学
  • 64 篇 军事学
  • 25 篇 艺术学
  • 20 篇 文学
  • 3 篇 哲学

主题

  • 1,583 篇 computer vision
  • 370 篇 deep learning
  • 314 篇 computer archite...
  • 282 篇 cameras
  • 255 篇 object detection
  • 254 篇 computational mo...
  • 239 篇 control systems
  • 236 篇 computer science
  • 220 篇 image segmentati...
  • 213 篇 feature extracti...
  • 209 篇 internet of thin...
  • 187 篇 access control
  • 173 篇 machine vision
  • 158 篇 neural networks
  • 137 篇 artificial intel...
  • 132 篇 face recognition
  • 130 篇 real-time system...
  • 129 篇 data mining
  • 129 篇 process control
  • 128 篇 support vector m...

机构

  • 47 篇 chitkara univers...
  • 46 篇 school of comput...
  • 44 篇 school of contro...
  • 29 篇 maharishi school...
  • 24 篇 karnataka bangal...
  • 21 篇 school of comput...
  • 19 篇 maharishi school...
  • 17 篇 chitkara univers...
  • 17 篇 college of compu...
  • 15 篇 university of ch...
  • 15 篇 school of comput...
  • 14 篇 south china univ...
  • 14 篇 dept. of compute...
  • 14 篇 department of co...
  • 14 篇 chitkara univers...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 12 篇 centre of interd...
  • 12 篇 school of comput...

作者

  • 19 篇 wang lei
  • 18 篇 li yang
  • 17 篇 wang wei
  • 16 篇 yang yang
  • 14 篇 liu yang
  • 13 篇 wang hui
  • 13 篇 ryszard tadeusie...
  • 13 篇 marcin korytkows...
  • 12 篇 wang ping
  • 12 篇 wang jian
  • 12 篇 sato jun
  • 12 篇 jacek m. zurada
  • 11 篇 zhang tao
  • 11 篇 sakaue fumihiko
  • 11 篇 zhang lei
  • 11 篇 huang tinglei
  • 11 篇 liu lei
  • 10 篇 lei wang
  • 10 篇 li xin
  • 10 篇 wang jing

语言

  • 17,968 篇 英文
  • 743 篇 其他
  • 119 篇 中文
  • 16 篇 俄文
  • 7 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
检索条件"任意字段=Proceedings of the 3rd International Conference on Control and Computer Vision"
18818 条 记 录,以下是4561-4570 订阅
排序:
Accuracy Prediction for Detecting Brain Tumour from MRI Images using ResNet50
Accuracy Prediction for Detecting Brain Tumour from MRI Imag...
收藏 引用
international conference on Innovative Mechanisms for Industry Applications (ICIMIA)
作者: Vidyullatha Sukhavasi Shanmuga Sundari M Neha Gangisetty Naga Shushma Maharaj Computer Science and Engineering BVRIT HYDERABAD College of Engineering for Women Hyderabad Telangana
A critical step in medical care is the utilization of MRI imaging to detect brain tumors. The magnetic resonance imaging (MRI) method creates high-resolution images of the brain, making it the perfect medium for findi...
来源: 评论
Role of Machine Learning in Credit Card Fraud Detection  3
Role of Machine Learning in Credit Card Fraud Detection
收藏 引用
3rd international conference on Advances in Computing, Communication control and Networking, ICAC3N 2021
作者: Ghai, Vivek Kang, Sandeep Singh Chandigarh University Department of Computer Science Engineering Punjab India
Fraud is the occurrence of any activity done using misleading, deceptive, or illegal ways which is done by someone to defraud you of your money (or capital), or otherwise jeopardizes financial well-being of you or you... 详细信息
来源: 评论
S2-Flow: Joint Semantic and Style Editing of Facial Images  33
S2-Flow: Joint Semantic and Style Editing of Facial Images
收藏 引用
33rd British Machine vision conference proceedings, BMVC 2022
作者: Singh, Krishnakant Schaub-Meyer, Simone Roth, Stefan Department of Computer Science TU Darmstadt Germany hessian.AI
The high-quality images yielded by generative adversarial networks (GANs) have motivated investigations into their application for image editing. However, GANs are often limited in the control they provide for perform... 详细信息
来源: 评论
Toward Improving Mobile Health Services in the Kingdom of Saudi Arabia Based on the Saudi 2030 vision  3
Toward Improving Mobile Health Services in the Kingdom of Sa...
收藏 引用
3rd international conference on Electrical, control and Instrumentation Engineering (ICECIE)
作者: Alsaleh, Saad Minist Hlth Res Dept Hail Hlth Cluster Hail Saudi Arabia
Mobile health (mHealth) has a vital role to play as it can improve communication and enhance the health care processes integration. The Saudi Ministry of Health (SMOH)has announced its initiatives to improve health se... 详细信息
来源: 评论
An Integration Of Wireless Communications And Artificial Intelligence For Autonomous Vehicles
An Integration Of Wireless Communications And Artificial Int...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), international conference on
作者: Kadambari Raghuram Ibrahim Altarawni Vijayalakshmi K Ajay Kumar Abhijeetsinh Jadeja Pankaj Chanda Department of Computer Science and Engineering University College of Engineering Kakinada(Autonomous) JNTUK Kakinada Andhra Pradesh Applied Computing and Artificial Intelligent Department Aqaba University of Technology Aqaba SRMIST Ramapuram Campus IT Academics iNurture Education Solution Pvt. Ltd Delhi Faculty Of Computer Science Shri C.J. Patel College Of Computer Studies Sankalchand Patel University Dept of Information Technology Guru Ghasi Das Viswavidyalaya Bilaspur Chattisgarh
The pinnacle of transportation is the development of autonomous driving, which, with the help of CAVs and related traffic management systems, can eventually lead to congestion- and accident-free driving. This vision h...
来源: 评论
Synchronous Rotation Coordinates-Based Low Voltage Ride Through control Technology for Distributed VSG
Synchronous Rotation Coordinates-Based Low Voltage Ride Thro...
收藏 引用
Electrical Engineering and control Science (IC2ECS), international conference on
作者: Yangyang Chen Wei Han Youhao Hu Sustainable Energy and Environment Thrust The Hong Kong University of Science and Technology (Guangzhou) Guangzhou China Department of Electronic & Computer Engineering The Hong Kong University of Science and Technology Hong Kong SAR China HKUST Shenzhen-Hong Kong Collaborative Innovation Research Institute Futian Shenzhen China
Traditional virtual synchronous control strategies lack the ability to perform Low Voltage Ride Through (LVRT) in the event of a fault in the distribution network. When the original power command value is high, the st...
来源: 评论
Revolutionizing COVID-19 Management: Block chain-Enabled Prediction and Secure Storage using Deep Learning Techniques  3
Revolutionizing COVID-19 Management: Block chain-Enabled Pre...
收藏 引用
3rd international conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2023
作者: Arulmozhi, B. Sheeba, J.I. Devaneyan, S. Pradeep Department of Computer Science and Engineering Puducherry Technological University Puducherry605014 India Department of Mechanical Engineering Sri Venkateshwaraa College of Engineering and Technology Puducherry605012 India
The proposed research presents a blockchain-based healthcare system that seeks to address the limitations of current data-sharing methods by providing secure and efficient data transfer, enhancing data privacy and sec... 详细信息
来源: 评论
Research on Individual Recognition and Prediction of Cocaine Addiction Based on Convolutional Neural Networks  23
Research on Individual Recognition and Prediction of Cocaine...
收藏 引用
proceedings of the 3rd international conference on Electronic Information Technology and Smart Agriculture
作者: Hongbo Xiao Jianhua Xiao Lebing Zhang Bo Tang Zhuyou Cao Tianwang Luo School of Computer and Artificial Intelligence Huaihua University China and Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua University China School of Computer and Artificial Intelligence Huaihua University China
In response to the current difficulty in identifying and predicting cocaine addicted individuals based on brain MRI images, this paper designs a deep learning recognition and prediction model based on convolutional ne...
来源: 评论
Identity-Based Access control in IoT: Enhancing Security through Mutual Cryptographic Authentication and Context Awareness
Identity-Based Access Control in IoT: Enhancing Security thr...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE international conference on
作者: Priyanka More Sachin Sakhare Parikshit Mahalle Department of Computer Engineering Smt. Kashibai Navale College of Engineering Vishwakarma Institute of Information Technology Pune India Department of Computer Engineering Vishwakarma Institute of Information Technology Pune India Department of Artificial Intelligence and Data Science Vishwakarma Institute of Information Technology Pune India
The proposed methodology strengthens security and privacy in IoT networks through mutual cryptographic authentication, employing Elliptic Curve Cryptography, Diffe Hellman for key exchange, and encryption methods for ...
来源: 评论
LFPS-HSDN: Link Failure Protection Scheme in Hybrid SDNs  3rd
LFPS-HSDN: Link Failure Protection Scheme in Hybrid SDNs
收藏 引用
3rd international conference on Advanced Intelligent Technologies, ICAIT 2022
作者: Li, Jiahui Qi, Xiaogang Zhang, Haoran Liu, Lifang School of Mathematics and Statistics Xidian University Xi’an710071 China School of Computer Science and Technology Xidian University Xi’an710071 China
Software-Defined Networks (SDNs) decouple the control plane from the data plane of forwarding devices, which can significantly improve network functions, including failure protection. In the current Internet architect... 详细信息
来源: 评论