咨询与建议

限定检索结果

文献类型

  • 1,904 篇 期刊文献
  • 1,365 篇 会议
  • 32 册 图书

馆藏范围

  • 3,301 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,010 篇 工学
    • 1,295 篇 计算机科学与技术...
    • 1,029 篇 软件工程
    • 450 篇 信息与通信工程
    • 298 篇 电气工程
    • 276 篇 控制科学与工程
    • 273 篇 生物工程
    • 242 篇 光学工程
    • 215 篇 生物医学工程(可授...
    • 213 篇 电子科学与技术(可...
    • 170 篇 机械工程
    • 124 篇 化学工程与技术
    • 109 篇 仪器科学与技术
    • 81 篇 动力工程及工程热...
    • 62 篇 材料科学与工程(可...
    • 57 篇 建筑学
    • 53 篇 核科学与技术
  • 1,523 篇 理学
    • 736 篇 物理学
    • 529 篇 数学
    • 327 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 123 篇 化学
    • 110 篇 系统科学
  • 492 篇 管理学
    • 273 篇 管理科学与工程(可...
    • 230 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 213 篇 医学
    • 172 篇 临床医学
    • 136 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
    • 68 篇 公共卫生与预防医...
  • 66 篇 法学
    • 59 篇 社会学
  • 50 篇 农学
  • 37 篇 经济学
  • 27 篇 教育学
  • 13 篇 军事学
  • 13 篇 艺术学
  • 12 篇 文学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 108 篇 feature extracti...
  • 81 篇 deep learning
  • 70 篇 accuracy
  • 68 篇 computer vision
  • 60 篇 training
  • 57 篇 computational mo...
  • 57 篇 semantics
  • 56 篇 machine learning
  • 49 篇 image segmentati...
  • 47 篇 proton-proton in...
  • 47 篇 laboratories
  • 44 篇 higgs bosons
  • 41 篇 computer science
  • 40 篇 hadron colliders
  • 36 篇 artificial intel...
  • 35 篇 large hadron col...
  • 35 篇 visualization
  • 35 篇 standard model (...
  • 34 篇 data mining
  • 32 篇 neural networks

机构

  • 289 篇 faculty of scien...
  • 289 篇 department for p...
  • 284 篇 department of ph...
  • 281 篇 departamento de ...
  • 278 篇 institute of phy...
  • 276 篇 kirchhoff-instit...
  • 274 篇 department of ph...
  • 268 篇 institute of phy...
  • 267 篇 department of ph...
  • 265 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 fakultät für phy...
  • 242 篇 institut für ast...
  • 235 篇 instituto de fís...
  • 234 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 223 篇 physics departme...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 216 篇 department of ph...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 263 篇 m. klein
  • 262 篇 r. ströhmer
  • 262 篇 m. rijssenbeek
  • 262 篇 s. jin
  • 262 篇 g. gaudio
  • 261 篇 s. mohapatra
  • 260 篇 y. nagasaka
  • 260 篇 s. guindon
  • 259 篇 h. a. gordon
  • 259 篇 h. sakamoto
  • 255 篇 a. kaczmarska

语言

  • 3,057 篇 英文
  • 202 篇 其他
  • 41 篇 中文
  • 2 篇 德文
  • 2 篇 日文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computer and Information Science/Computer Vision Laboratory"
3301 条 记 录,以下是11-20 订阅
排序:
Multispectral point cloud superpoint segmentation
收藏 引用
science China(Technological sciences) 2024年 第4期67卷 1270-1281页
作者: WANG QingWang WANG MingYe ZHANG ZiFeng SONG Jian ZENG Kai SHEN Tao GU YanFeng Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming 650500China Yunnan Key Laboratory of Computer Technologies Application Kunming 650500China School of Electronics and Information Engineering Harbin Institute of TechnologyHarbin 150001China
The multitude of airborne point clouds limits the point cloud processing *** are grouped based on similar points,which can effectively alleviate the demand for computing resources and improve processing ***,existing s... 详细信息
来源: 评论
DDT-Net:Deep Detail Tracking Network for Image Tampering Detection
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3451-3469页
作者: Jim Wong Zhaoxiang Zang Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering China Three Gorges UniversityYichang443002China College of Computer and Information Technology ChinaThree Gorges UniversityYichang443002China Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming650504China
In the field of image forensics,image tampering detection is a critical and challenging *** methods based on manually designed feature extraction typically focus on a specific type of tampering operation,which limits ... 详细信息
来源: 评论
Specificity-preserving RGB-D saliency detection
收藏 引用
Computational Visual Media 2023年 第2期9卷 297-317页
作者: Tao Zhou Deng-Ping Fan Geng Chen Yi Zhou Huazhu Fu School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China Key Laboratory of System Control and Information Processing Ministry of EducationShanghaiChina Computer Vision Lab ETH Z¨urichZ¨urichSwitzerland School of Computer Science and Engineering Northwestern Polytechnical UniversityXi’anChina School of Computer Science and Engineering Southeast UniversityNanjingChina Inception Institute of Artificial Intelligence Abu DhabiUnited Arab Emirates
Salient object detection(SOD)in RGB and depth images has attracted increasing research *** RGB-D SOD models usually adopt fusion strategies to learn a shared representation from RGB and depth modalities,while few meth... 详细信息
来源: 评论
Enhancing V2X QoS: dynamic scheduling scheme over 5G networks and byon
收藏 引用
International Journal of information Technology (Singapore) 2024年 第7期16卷 4427-4433页
作者: Mansouri, Wahida Ali Mohammed Elmourssi, Doaa Elyass, Wiam Almalih Department of Computer Science and Information Technology Faculty of Sciences and Arts Northern Border University LETI Laboratory University of Sfax
Over the years, various research teams have dedicated efforts to create scheduling algorithms that are not only effective but also efficient, with the goal of enhancing the quality of service in Vehicle-to-Everything ... 详细信息
来源: 评论
Solar Radiation Estimation Based on a New Combined Approach of Artificial Neural Networks (ANN) and Genetic Algorithms (GA) in South Algeria
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4725-4740页
作者: Djeldjli Halima Benatiallah Djelloul Ghasri Mehdi Tanougast Camel Benatiallah Ali Benabdelkrim Bouchra Material Sciences Department Faculty of Material SciencesMathematics and Computer ScienceLaboratory of Sustainable Development and Computer Science(LSDCS)University of AdrarAdrar01000Algeria Department of Civil Engineering University of Sistan and BaluchestanZahedan98167-45845Iran Laboratory of Computer Production and Maintenance Engineering(LGIPM)University of LorraineChieulles57070France Laboratory of Energy Environment and Information System(LEEIS) University of AdrarAdrar01000Algeria
When designing solar systems and assessing the effectiveness of their many uses,estimating sun irradiance is a crucial first *** study examined three approaches(ANN,GA-ANN,and ANFIS)for estimating daily global solar r... 详细信息
来源: 评论
Performance Analysis of RouteSegmentation Algorithm in Identifying Perimeter Area Around Travel Route  16
Performance Analysis of RouteSegmentation Algorithm in Ident...
收藏 引用
16th International Conference on information Technology and Electrical Engineering, ICITEE 2024
作者: Bachmid, Muhammad Avied Anshari Haq, Muhammad Yasir Mumtaz, Muhammad Rafly Pinandito, Aryo Universitas Brawijaya Faculty of Computer Science Media Game and Mobile Laboratory Department of Informatics Engineering Malang Indonesia Universitas Brawijaya Faculty of Computer Science Malang Indonesia Universitas Brawijaya Faculty of Computer Science Media Game and Mobile Laboratory Department of Information System Malang Indonesia
Prior study has developed the RouteSegmentation algorithm to identify the perimeter area surrounding a route. In this study, a comparative experiment was carried out to investigate the performance of the RouteSegmenta... 详细信息
来源: 评论
From Missing Pieces to Masterpieces: Image Completion with Context-Adaptive Diffusion
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 6073-6087页
作者: Shamsolmoali, Pourya Zareapoor, Masoumeh Zhou, Huiyu Felsberg, Michael Tao, Dacheng Li, Xuelong University of York Department of Computer Science United Kingdom University of Leicester School of Computing and Mathematical Sciences United Kingdom Linkoping University Computer Vision Laboratory Sweden Nanyang Technological University College of Computing & Data Science Singapore China Northwestern Polytechnical University Key Laboratory of Intelligent Interaction and Applications Ministry of Industry and Information Technology Xi'an China
Image completion is a challenging task, particularly when ensuring that generated content seamlessly integrates with existing parts of an image. While recent diffusion models have shown promise, they often struggle wi... 详细信息
来源: 评论
Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
收藏 引用
computer Modeling in Engineering & sciences 2024年 第2期138卷 1427-1467页
作者: Mohammed Abdalsalam Chunlin Li Abdelghani Dahou Natalia Kryvinska School of Computer Science and Technology Wuhan University of TechnologyWuhan430070China LDDI Laboratory Faculty of Science and TechnologyUniversity of Ahmed DRAIAAdrar01000Algeria Information Systems Department Faculty of ManagementComenius UniversityBratislava82005Slovakia
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli... 详细信息
来源: 评论
Impact of time delay and cooperation strategy on the stability of a predator-prey model with Holling type III functional response
收藏 引用
International Journal of Biomathematics 2023年 第3期16卷 165-193页
作者: I.Benamara A.El Abdllaouit J.Mikramt Laboratory of Mathematics Computer Science&Applications-Security of Information Department of Mathematics Faculty of Sciences Mohammed V University in RabatMorocco
In this paper,we propose and analyze a delayed predator-prey model with Holling type III functional response taking into account cooperation behavior in *** time delay is introduced in the attack rate to represent the... 详细信息
来源: 评论
An MCDM-Based Methodology for Influential Nodes Detection in a Social Network. Facebook as a Case Study
An MCDM-Based Methodology for Influential Nodes Detection in...
收藏 引用
International Conference on Advanced Intelligent Systems for Sustainable Development, AI2SD 2022
作者: Qaffou, Issam Ait Rai, Khaoula LISI Laboratory Computer Science Department Faculty of Science Semlalia Cadi Ayyad University Marrakech Morocco Computer System and Vision Laboratory Faculty of Sciences Ibn Zohr University Agadir Morocco
The identification of influential nodes in a social network is very important for many uses like the control of information spreading. This paper studies how a multi- criteria decision method (MCDM) can find influenti... 详细信息
来源: 评论