咨询与建议

限定检索结果

文献类型

  • 386 篇 会议
  • 268 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 664 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 400 篇 工学
    • 291 篇 计算机科学与技术...
    • 238 篇 软件工程
    • 106 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 49 篇 电气工程
    • 48 篇 生物工程
    • 43 篇 电子科学与技术(可...
    • 41 篇 生物医学工程(可授...
    • 37 篇 光学工程
    • 29 篇 机械工程
    • 22 篇 仪器科学与技术
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 13 篇 网络空间安全
  • 191 篇 理学
    • 89 篇 数学
    • 60 篇 物理学
    • 52 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 17 篇 化学
  • 110 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 42 篇 医学
    • 38 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 20 篇 药学(可授医学、理...
    • 17 篇 公共卫生与预防医...
  • 18 篇 法学
    • 15 篇 社会学
  • 16 篇 教育学
    • 13 篇 教育学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 农学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学
  • 1 篇 军事学

主题

  • 24 篇 deep learning
  • 21 篇 machine learning
  • 19 篇 artificial intel...
  • 18 篇 computer science
  • 17 篇 training
  • 14 篇 semantics
  • 14 篇 accuracy
  • 11 篇 educational inst...
  • 10 篇 data mining
  • 10 篇 visualization
  • 10 篇 feature extracti...
  • 8 篇 neural networks
  • 8 篇 resource managem...
  • 8 篇 wireless sensor ...
  • 8 篇 computational mo...
  • 8 篇 speech recogniti...
  • 8 篇 blockchain
  • 8 篇 students
  • 7 篇 covid-19
  • 7 篇 support vector m...

机构

  • 10 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 technical univer...
  • 7 篇 information and ...
  • 6 篇 school of comput...
  • 6 篇 department of di...
  • 6 篇 school of media ...
  • 6 篇 department of di...
  • 6 篇 school of comput...
  • 6 篇 department of el...
  • 5 篇 department of te...
  • 5 篇 cenbrain neurote...
  • 5 篇 islamic universi...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 city university ...
  • 5 篇 computer and aut...
  • 5 篇 department of in...
  • 5 篇 emphasis researc...
  • 5 篇 infineon technol...

作者

  • 25 篇 eckehard steinba...
  • 8 篇 abdelwahed motwa...
  • 8 篇 sami haddadin
  • 8 篇 verma chaman
  • 8 篇 goyal s.b.
  • 7 篇 raboaca maria si...
  • 7 篇 muhammet sami ya...
  • 7 篇 rajawat anand si...
  • 6 篇 xiao xu
  • 6 篇 ishfaq yaseen
  • 6 篇 sabri mustafa ka...
  • 6 篇 dong yang
  • 6 篇 steinbach eckeha...
  • 6 篇 amal s.mehanna
  • 5 篇 driton salihu
  • 5 篇 shim byonghyo
  • 5 篇 zhao tiesong
  • 5 篇 mihaltan traian ...
  • 5 篇 manar ahmed hamz...
  • 5 篇 amira sayed a.az...

语言

  • 629 篇 英文
  • 31 篇 其他
  • 3 篇 中文
  • 2 篇 日文
检索条件"机构=Information and Technology Department of Computer Engineering Chair of Media Technology"
664 条 记 录,以下是31-40 订阅
排序:
Long-Term Action Anticipation Based on Contextual Alignment
Long-Term Action Anticipation Based on Contextual Alignment
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Constantin Patsch Jinghan Zhang Yuankai Wu Marsil Zakour Driton Salihu Eckehard Steinbach Department of Computer Engineering Chair of Media Technology Munich Institute of Robotics and Machine Intelligence (MIRMI) School of Computation Information and Technology Technical University of Munich
In action anticipation, the model predicts the next future action after a certain observation period. In long-term action anticipation, this idea is further extended to predicting multiple actions and their respective...
来源: 评论
NPRF: Neural Painted Radiosity Fields for Neural Implicit Rendering and Surface Reconstruction
NPRF: Neural Painted Radiosity Fields for Neural Implicit Re...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Driton Salihu Adam Misik Yuankai Wu Constantin Patsch Eckehard Steinbach Department of Computer Engineering Chair of Media Technology Munich Institute of Robotics and Machine Intelligence (MIRMI) Technical University of Munich School of Computation Information and Technology Siemens Technology
In recency, neural signed distance fields have become more popular for reconstructing 3D indoor environments. While great improvements have been made due to missing incident radiance and materials in the surface estim...
来源: 评论
Evaluation of Three Different Operators for Object Highlighting in Medical RGB Images: Canny, Roberts, and LoG in Independent Color Spaces  25
Evaluation of Three Different Operators for Object Highlight...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Ababneh, Jafar Abu-Jassar, Amer Abuowaida, Suhaila Liubchenko, Valentyn Lyashenko, Vyacheslav Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Amman Arab University College of of Computer Sciences and Information Amman Jordan Al Al-Bayt University Faculty of Information Technology Department of Computer Science Al-Mafraq Jordan Kharkiv National University of Radio Electronics Department of Informatics Kharkiv Ukraine Kharkiv National University of Radio Electronics Department of Media Systems and Technology Kharkiv Ukraine
The research presents a comparative analysis of the selection of objects of interest in color medical cytology images. For these purposes, the individual edge detection operators studied are Canny, Roberts, and LoG. T... 详细信息
来源: 评论
Optimal Deep Learning Model Enabled Secure UAV Classification for Industry 4.0
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5349-5367页
作者: Khalid A.Alissa Mohammed Maray Areej A.Malibari Sana Alazwari Hamed Alqahtani Mohamed K.Nour Marwa Obbaya Mohamed A.Shamseldin Mesfer Al Duhayyim SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Industrial and Systems Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif P.O.Box 11099Taif21944Saudi Arabia Department of Information Systems College of Computer ScienceCenter of Artificial IntelligenceUnit of CybersecurityKing Khalid UniversityAbhaSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Biomedical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Mechanical Engineering Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology th... 详细信息
来源: 评论
LEMON: Localized Editing with Mesh Optimization and Neural Shaders
arXiv
收藏 引用
arXiv 2024年
作者: Algan, Furkan Mert Yazgan, Umut Salihu, Driton Eteke, Cem Steinbach, Eckehard Technical University of Munich Chair of Media Technology Munich Institute of Robotics and Machine Intelligence MIRMI School of Computation Information and Technology Department of Computer Engineering Germany
In practical use cases, polygonal mesh editing can be faster than generating new ones, but it can still be challenging and time-consuming for users. Existing solutions for this problem tend to focus on a single task, ... 详细信息
来源: 评论
SNCA:Semi-Supervised Node Classification for Evolving Large Attributed Graphs
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 794-808页
作者: Faima Abbasi Muhammad Muzammal Qiang Qu Farhan Riaz Jawad Ashraf Luxembourg Institute of Science and Technology and University of Luxembourg Esch-Sur-Alzette L-4362Luxembourg Department of Computer and Information Sciences Northumbria UniversityNewcastle NE18STUK Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China School of Computer Science University of LincolnLincoln LN67TSUK Faculty of Computing Engineering and MediaDe Montfort UniversityLeicesterLE19BHUK
Attributed graphs have an additional sign vector for each ***,edge signs represent like or dislike relationship between the node *** has applications in domains,such as recommender systems,personalised search,***,limi... 详细信息
来源: 评论
VLP-KAN: Low-Complexity and Interpretable RSS-Based VLP Using Kolmogorov-Arnold Networks
VLP-KAN: Low-Complexity and Interpretable RSS-Based VLP Usin...
收藏 引用
Annual Conference on Wireless On Demand Network Systems and Services (WONS)
作者: Fabian Seguel Driton Salihu Stefan Hägele Eckehard Steinbach Department of Computer Engineering Chair of Media Technology Munich Institute of Robotics and Machine Intelligence (MIRMI) Technical University of Munich School of Computation Information and Technology München Germany
Received signal strength (RSS)-based Visible Light Positioning (VLP) has gained attention due to its relatively easy infrastructure deployment and high localization accuracy. Different low-complexity geometrical and m... 详细信息
来源: 评论
IoT Devices Authentication Using Artificial Neural Network
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3701-3716页
作者: Syed Shabih Ul Hasan Anwar Ghani Ikram Ud Din Ahmad Almogren Ayman Altameem Department of Computer Science and Software Engineering International Islamic University Islamabad45000Pakistan Department of Information Technology The University of Haripur22620HaripurPakistan Chair of Cyber Security Department of Computer ScienceCollege of Computer and Information SciencesKing Saud UniversityRiyadh11633Saudi Arabia Chair of Cyber Security Department of Natural and Engineering SciencesCollege of Applied Studies and Community ServicesKing Saud UniversityRiyadh11543Saudi Arabia
User authentication is one of the critical concerns of information *** tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobi... 详细信息
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年 13卷 88662-88682页
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Nur Siddiqi, Hafied Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia Research Institute for Future Media Computing College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论
Sim-to-Real Domain Shift in Online Action Detection
Sim-to-Real Domain Shift in Online Action Detection
收藏 引用
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
作者: Constantin Patsch Wael Torjmene Marsil Zakour Yuankai Wu Driton Salihu Eckehard Steinbach Department of Computer Engineering School of Computation Information and Technology Munich Institute of Robotics and Machine Intelligence (MIRMI) Chair of Media Technology Technical University of Munich Muenchen Germany
Human reasoning comprises the ability to understand and reason about the current action solely based on past information. To provide effective assistance in an eldercare or household environment an assistive robot or ... 详细信息
来源: 评论