咨询与建议

限定检索结果

文献类型

  • 34,447 篇 会议
  • 27,186 篇 期刊文献
  • 365 册 图书

馆藏范围

  • 61,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,530 篇 工学
    • 20,984 篇 计算机科学与技术...
    • 16,354 篇 软件工程
    • 6,820 篇 信息与通信工程
    • 5,714 篇 电子科学与技术(可...
    • 5,706 篇 电气工程
    • 4,910 篇 控制科学与工程
    • 3,727 篇 光学工程
    • 3,428 篇 生物工程
    • 2,808 篇 生物医学工程(可授...
    • 2,499 篇 化学工程与技术
    • 2,447 篇 材料科学与工程(可...
    • 2,402 篇 机械工程
    • 2,091 篇 仪器科学与技术
    • 1,595 篇 动力工程及工程热...
    • 1,196 篇 力学(可授工学、理...
    • 925 篇 土木工程
  • 24,821 篇 理学
    • 10,803 篇 物理学
    • 10,647 篇 数学
    • 4,244 篇 生物学
    • 3,363 篇 统计学(可授理学、...
    • 2,930 篇 化学
    • 2,217 篇 系统科学
    • 1,137 篇 地球物理学
  • 7,401 篇 管理学
    • 4,436 篇 管理科学与工程(可...
    • 3,157 篇 图书情报与档案管...
    • 1,910 篇 工商管理
  • 2,671 篇 医学
    • 2,206 篇 临床医学
    • 1,742 篇 基础医学(可授医学...
    • 1,137 篇 药学(可授医学、理...
  • 1,091 篇 法学
    • 923 篇 社会学
  • 620 篇 农学
  • 609 篇 经济学
  • 401 篇 教育学
  • 193 篇 文学
  • 128 篇 军事学
  • 114 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,345 篇 computer science
  • 3,097 篇 laboratories
  • 1,108 篇 computational mo...
  • 874 篇 application soft...
  • 702 篇 computer archite...
  • 610 篇 bandwidth
  • 600 篇 feature extracti...
  • 568 篇 artificial intel...
  • 555 篇 testing
  • 546 篇 costs
  • 543 篇 data mining
  • 543 篇 machine learning
  • 532 篇 semantics
  • 523 篇 protocols
  • 522 篇 delay
  • 501 篇 algorithm design...
  • 476 篇 hardware
  • 463 篇 robustness
  • 458 篇 deep learning
  • 445 篇 control systems

机构

  • 1,108 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 979 篇 oliver lodge lab...
  • 964 篇 physikalisches i...
  • 801 篇 university of ch...
  • 637 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 603 篇 department of co...
  • 602 篇 infn sezione di ...
  • 575 篇 fakultät physik ...
  • 569 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 527 篇 school of physic...
  • 525 篇 department of ph...
  • 517 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 511 篇 iccub universita...
  • 508 篇 nikhef national ...
  • 505 篇 stfc rutherford ...

作者

  • 262 篇 barter w.
  • 244 篇 a. gomes
  • 243 篇 beiter a.
  • 233 篇 c. alexa
  • 231 篇 j. m. izen
  • 230 篇 bellee v.
  • 229 篇 blake t.
  • 225 篇 c. amelung
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 222 篇 brundu d.
  • 222 篇 bowcock t.j.v.
  • 221 篇 amato s.
  • 220 篇 g. spigo
  • 220 篇 s. chen
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 216 篇 j. wang
  • 215 篇 borsato m.

语言

  • 58,521 篇 英文
  • 2,672 篇 其他
  • 776 篇 中文
  • 15 篇 俄文
  • 14 篇 德文
  • 10 篇 法文
  • 9 篇 日文
  • 4 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science Department Computer Graphics Laboratory"
61998 条 记 录,以下是471-480 订阅
排序:
Classification of Multi-view mammogram images using a parallel pre-trained models system  8
Classification of Multi-view mammogram images using a parall...
收藏 引用
8th IEEE International Conference on Image and Signal Processing and their Applications, ISPA 2024
作者: Kacher, Abdelhafidh Merati, Medjeded Mahmoudi, Saïd University of Tiaret LIM Research Laboratory Computer Science Department Algeria University of Mons Faculty of Engineering ILIA Department Belgium
Breast cancer is the main lead of women's cancer-related mortalities. Therefore, early detection is imperative for preventing breast cancer from developing to advanced stages. Moreover, the emergence of computer-a... 详细信息
来源: 评论
Audio-visual keyword transformer for unconstrained sentence-level keyword spotting
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 142-152页
作者: Yidi Li Jiale Ren Yawei Wang Guoquan Wang Xia Li Hong Liu Key Laboratory of Machine Perception Peking UniversityShenzhen Graduate SchoolShenzhenChina College of Electronics and Information Engineering Sichuan UniversityChengduChina Department of Computer Science ETH ZurichZurichSwitzerland
As one of the most effective methods to improve the accuracy and robustness of speech tasks,the audio-visual fusion approach has recently been introduced into the field of Keyword Spotting(KWS).However,existing audio-... 详细信息
来源: 评论
Literature Review for Health Secure Image Steganography and Visual Encryption
Literature Review for Health Secure Image Steganography and ...
收藏 引用
2023 Al-Sadiq International Conference on Communication and Information Technology, AICCIT 2023
作者: Albderi, Ali Jaber Tayh Said, Lamjed Ben Al-Shammary, Dhiah Isg University of Tunis Department of Smart Laboratory Tunis Tunisia College of Computer Science and Information Technology University of Al-Qadisiyah Department of Computer Science Al-Qadisiyah Iraq
The security image of medical data for transmission is considered highly important during communication issues because of the sensitive information of medical. Encryption and steganography are used to ensure that pati... 详细信息
来源: 评论
A real-time semantic based approach for modeling and reasoning in Industry 4.0
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第1期16卷 507-515页
作者: Amara, Fatima Zahra Djezzar, Meriem Hemam, Mounir Tiwari, Sanju ICOSI Laboratory Department of Mathematics and Computer Science University of Abbes Laghrour Khenchela Algeria Universidad Autonoma de Tamaulipas VIC Mexico
In the rapidly evolving landscape of Industry 4.0, the transformation of manufacturing processes is driven by the seamless integration and intelligent utilization of data. The concept of semantic interoperability is c... 详细信息
来源: 评论
PVT v2:Improved baselines with Pyramid Vision Transformer
收藏 引用
Computational Visual Media 2022年 第3期8卷 415-424页
作者: Wenhai Wang Enze Xie Xiang Li Deng-Ping Fan Kaitao Song Ding Liang Tong Lu Ping Luo Ling Shao Shanghai AI Laboratory Shanghai 200232China Department of Computer Science and Technology NanjingUniversityNanjing 210023China Department of Computer Science the University ofHong KongHong Kong 999077China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210014China Computer Vision Lab ETH ZurichZurich 8092Switzerland SenseTime Beijing 100080China Inception Institute of Artificial Intelligence Abu DhabiUnited Arab Emirates
Transformers have recently lead to encouraging progress in computer *** this work,we present new baselines by improving the original Pyramid Vision Transformer(PVT v1)by adding three designs:(i)a linear complexity att... 详细信息
来源: 评论
An Efficient Transferred Cascade System for COVID-19 Detection from Chest X-ray Images
收藏 引用
Informatica (Slovenia) 2024年 第4期48卷 611-622页
作者: Dif, Nassima Elberrichi, Zakaria Ecole Superieure en Informatique LabRI-SBA Lab Sidi Bel Abbes Algeria Computer science Department Djillali Liabes University EEDIS Laboratory Sidi Bel Abbes Algeria
Analysing x-ray images for detecting Covid-19 presents one cost-effective approach. To automate this task, deep learning techniques have been suggested to reduce doctors workload. However, existing datasets classify X... 详细信息
来源: 评论
New Model to Monitor Plant Growth Remotely using ESP32-CAM and Mobile Application  10
New Model to Monitor Plant Growth Remotely using ESP32-CAM a...
收藏 引用
10th International Conference on Wireless Networks and Mobile Communications, WINCOM 2023
作者: Elhattab, Kamal Abouelmehdi, Karim Elatar, Said Chouaib Doukkali University Elites Laboratory Faculty of Sciences Department of Computer Science El Jadida Morocco Chouaib Doukkali University Laroseri Laboratory Faculty of Sciences Department of Computer Science El Jadida Morocco
Agriculture plays an important role in the country's economic growth. The main goal of using smart solutions based on the Internet of Things (IOT), drone surveillance and others is to increase productivity and red... 详细信息
来源: 评论
A Modular Ontology For Smart Campus  12
A Modular Ontology For Smart Campus
收藏 引用
12th Seminary of computer science Research at Feminine, RIF 2023
作者: Djakhdjakha, Lynda Cisse, Hamadoun Farou, Brahim LabSTIC laboratory Department of Computer Science 8 mai 1945 - Guelma University Guelma Algeria Department of Computer Science 8 mai 1945 - Guelma University Guelma Algeria
In the last few years, with the rapid growth of the Internet of Things (IoT), ontologies have been considered as the most significant solution to resolve the heterogeneity problem in smart campus. Although the number ... 详细信息
来源: 评论
A Two-Layer Network Intrusion Detection Method Incorporating LSTM and Stacking Ensemble Learning
收藏 引用
computers, Materials & Continua 2025年 第6期83卷 5129-5153页
作者: Jun Wang Chaoren Ge Yihong Li Huimin Zhao Qiang Fu Kerang Cao Hoekyung Jung College of Computer Science and Technology Shenyang University of Chemical TechnologyShenyang110142China Key Laboratory of Intelligent Technology for Chemical Process Industry of Liaoning Province Shenyang110142China Computer Engineering Department Paichai UniversityDaejeon35345Republic of Korea
Network Intrusion Detection System(NIDS)detection of minority class attacks is always a difficult task when dealing with attacks in complex network *** improve the detection capability of minority-class attacks,this s... 详细信息
来源: 评论
Bio-inspired visual neural network for stop-and-go wave perception in high-density crowd  4
Bio-inspired visual neural network for stop-and-go wave perc...
收藏 引用
4th International Conference on computer Vision, Application, and Algorithm, CVAA 2024
作者: Jiang, Wei Hu, Bin State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Department of Computer Science College of Computer Science & Technology Guizhou University Guiyang550025 China Artificial Intelligence Research Institute of Guizhou University Guizhou University Guiyang550025 China
In high-density crowd, a unique visual motion effect called stop-and-go wave occurs, which could evolve to trampling and compression incidents. However, few computational models have been reported for stop-and-go wave... 详细信息
来源: 评论