咨询与建议

限定检索结果

文献类型

  • 700 篇 会议
  • 677 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 1,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 603 篇 工学
    • 392 篇 计算机科学与技术...
    • 305 篇 软件工程
    • 100 篇 信息与通信工程
    • 69 篇 电气工程
    • 67 篇 生物医学工程(可授...
    • 64 篇 光学工程
    • 64 篇 生物工程
    • 58 篇 控制科学与工程
    • 42 篇 电子科学与技术(可...
    • 41 篇 机械工程
    • 30 篇 土木工程
    • 28 篇 仪器科学与技术
    • 27 篇 材料科学与工程(可...
    • 19 篇 建筑学
    • 18 篇 动力工程及工程热...
  • 428 篇 理学
    • 210 篇 物理学
    • 164 篇 数学
    • 77 篇 生物学
    • 60 篇 统计学(可授理学、...
    • 29 篇 系统科学
  • 149 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 54 篇 医学
    • 48 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 26 篇 法学
    • 23 篇 社会学
  • 22 篇 经济学
    • 21 篇 应用经济学
  • 19 篇 教育学
    • 18 篇 教育学
  • 11 篇 农学
  • 7 篇 艺术学
  • 1 篇 文学

主题

  • 43 篇 computer graphic...
  • 32 篇 computational mo...
  • 29 篇 visualization
  • 28 篇 machine learning
  • 26 篇 computer science
  • 25 篇 training
  • 24 篇 accuracy
  • 22 篇 artificial intel...
  • 21 篇 deep learning
  • 21 篇 feature extracti...
  • 20 篇 robustness
  • 19 篇 face recognition
  • 19 篇 cloud computing
  • 18 篇 virtual reality
  • 17 篇 image segmentati...
  • 17 篇 computer vision
  • 14 篇 cameras
  • 14 篇 semantics
  • 14 篇 shape
  • 13 篇 application soft...

机构

  • 17 篇 fraunhofer insti...
  • 17 篇 institute for co...
  • 11 篇 institute of com...
  • 11 篇 institute of com...
  • 11 篇 adjunct professo...
  • 9 篇 fraunhofer insti...
  • 9 篇 institute of com...
  • 9 篇 department of gr...
  • 8 篇 department of gr...
  • 8 篇 institute of gra...
  • 7 篇 department of co...
  • 7 篇 norwegian univer...
  • 7 篇 institute for co...
  • 7 篇 norwegian univer...
  • 6 篇 college of aeros...
  • 6 篇 tu darmstadt
  • 6 篇 pune
  • 6 篇 assistant profes...
  • 6 篇 school of comput...
  • 6 篇 technical univer...

作者

  • 15 篇 damer naser
  • 15 篇 bischof horst
  • 13 篇 urszula stańczyk
  • 12 篇 stanczyk urszula
  • 11 篇 egger jan
  • 10 篇 kuijper arjan
  • 10 篇 naser damer
  • 9 篇 schreck tobias
  • 9 篇 pock thomas
  • 7 篇 kirchbuchner flo...
  • 7 篇 mateu sbert
  • 7 篇 huber marco
  • 7 篇 zielosko beata
  • 7 篇 payer christian
  • 7 篇 urschler martin
  • 7 篇 barequet gill
  • 7 篇 raja kiran
  • 7 篇 foszner pawel
  • 6 篇 terhörst philipp
  • 6 篇 schmalstieg diet...

语言

  • 1,351 篇 英文
  • 36 篇 其他
  • 13 篇 中文
  • 1 篇 法文
检索条件"机构=Professor of Computer Graphics Technology and Computer Science"
1401 条 记 录,以下是211-220 订阅
Exploiting Correspondences with All-pairs Correlations for Multi-view Depth Estimation
arXiv
收藏 引用
arXiv 2022年
作者: Cheng, Kai Chen, Hao Yin, Wei Xu, Guangkai Chen, Xuejin The National Engineering Laboratory for Brain Inspired Intelligence Technology and Application University of Science and Technology of China Hefei230026 China The Computer Graphics and Computer Assisted Design Laboratory Zhejiang University Hangzhou310058 China DJI Technology
Multi-view depth estimation plays a critical role in reconstructing and understanding the 3D world. Recent learning-based methods have made significant progress in it. However, multi-view depth estimation is fundament... 详细信息
来源: 评论
Fuzzy Querying in the Cloud-based Environment for Data Stream-driven Predictive Maintenance in AGV-enabled Smart Factories
Fuzzy Querying in the Cloud-based Environment for Data Strea...
收藏 引用
IEEE International Conference on Big Data
作者: Bożena Małysiak-Mrozek Dominik Romanów Piotr Grzesik Paweł Benecki Alexandre Niyomugaba Theodore Habimana Daniel Kostrzewa Krzysztof Tokarz Che-Lun Hung Dariusz Mrozek Department of Distributed Systems and Informatics Devices Silesian University of Technology Gliwice Poland Department of Applied Informatics Silesian University of Technology Gliwice Poland Department of Computer Science INES Ruhengeri - Institute of Applied Sciences Rwanda Department of Graphics Computer Vision and Digital Systems Silesian University of Technology Gliwice Poland Institute of Biomedical Informatics National Yang Ming Chiao Tung University Taipei Taiwan
Fuzzy data processing enables data enrichment and increases data interpretation in industrial environments. In the cloud-based IoT data ingestion pipelines, fuzzy data processing can be implemented in several location... 详细信息
来源: 评论
Texture-based Feature Extraction and Machine Learning Model for the Detection of Acute Lymphoblastic Leukemia
Texture-based Feature Extraction and Machine Learning Model ...
收藏 引用
Mobile Computing and Sustainable Informatics (ICMCSI), International Conference on
作者: Rangini M Sumit Pundir Manzoore Elahi M. Soudagar Daxa Vekariya Harshal Patil S. Rajkumar Assistant Professor Department of Computer Science and Engineering R.M.D. Engineering College Kavarapettai Tamil Nadu India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of VLSI Microelectronics Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai Tamil Nadu India Department of Computer Science & Engineering Parul Institute of Engineering and Technology Parul University Post Limda Gujarat India Computer Science and Engineering Symbiosis Institute of Technology Symbiosis International (Deemed University) Pune Maharashtra India Department of Mechanical Engineering Faculty of Manufacturing Institute of Technology Hawassa University Ethiopia
Acute Lymphocytic Leukaemia (ALL) is a dangerous malignancy that not only attacks adults but also contributes to roughly 25% of children. A precise and on-time diagnosis of cancer is a critical prerequisite for effect...
来源: 评论
The Impact of Deep Belief Networks on the Early Diagnosis of Parkinson's Disease
The Impact of Deep Belief Networks on the Early Diagnosis of...
收藏 引用
Electronics and Sustainable Communication Systems (ICESC), 2020 International Conference on
作者: Satvik Vats Shiva Mehta Computer Science and Engineering Graphic Era Hill University Adjunct professor Graphic Era Deemed to be University Dehradun India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
PD, or Parkinson's Disease, is a neurodegenerative disorder that commonly disorients movement abilities. Hence, correctly identifying this disease at its early stages is essential for appropriate treatment. The co... 详细信息
来源: 评论
A Survey on Cyber Attack Detection: Techniques, Datasets, and Challenge
A Survey on Cyber Attack Detection: Techniques, Datasets, an...
收藏 引用
Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE), International Conference on
作者: G Geetha Manjula Rajagopal K Purna Chand Department of Computing Technologies School of Computing (Research Scholor) SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of Computing Technologies School of Computing (Assistant Professor) SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of Computer Science and Engineering(Data Science) (Professor) B V Raju Institute of Technology Narsapur India
Networking technology is expanded along with cyber threats. Cyber threats are the instances which adversely influences the functional operations of the system or network. It results in various issues such as illegal a...
来源: 评论
A quantifiable framework for ‘Covid-19 exposure’ to support the Vaccine prioritization and resource allocation for resource-constraint societies
收藏 引用
Urban Governance 2021年 第1期1卷 23-29页
作者: Biswas, Rathin Arya, Supreeta Arya, Kavi Project Manager Department of Computer Science and Engineering Indian Institute of Technology Bombay Mumbai 400076 India Ex-Professor Radio-diagnosis Tata Memorial Hospital Mumbai Member Expert Committee National Cancer Grid India Department of Computer Science and Engineering Indian Institute of Technology Bombay Mumbai 400076 India
As the pandemic COVID-19 has severely affected the entire world, it became the utmost necessity of careful prioritization and utilization of limited medical resources, especially for the resource-constraint societies.... 详细信息
来源: 评论
Design and Development of a Novel Algorithm to Predict Fake Logo using Learning based Digital Image Analysis Methodology
Design and Development of a Novel Algorithm to Predict Fake ...
收藏 引用
Mobile Computing and Sustainable Informatics (ICMCSI), International Conference on
作者: N. Nagajothi Shabana Memon G. Mohan Parashuram Shankar Vadar Anita Soni S. Prince Sahaya AP/ Mathematics Nandha Engineering College (Autonomous) Erode- 52 Assistant Professor Bharati Vidyapeeth (Deemed to be University) Institute of Management Kolhapur Associate Professor Department of Mathematics K.S.Rangasamy College of Technology Tiruchengode TamilNadu Assistant Professor Yashwantrao Chavan School of Rural Development Shivaji University Kolhapur Maharashtra India Department of Computer Science and Engineering IES University Bhopal Assistant Professor (Sl.G) Department of Computer Science Engineering Sri Ramkrishna Engineering College Coimbatore
In the realm of fake logo detection, the continuous surge in digital content manipulation necessitates advanced and efficient methodologies for safeguarding brand integrity. This study explores the application of dive...
来源: 评论
Propagation of weakly advantageous mutations in cancer cell population
arXiv
收藏 引用
arXiv 2023年
作者: Polanski, Andrzej Kania, Mateusz Gil, Jaroslaw Labaj, Wojciech Lach, Ewa Szczęsna, Agnieszka Department of Computer Graphics Vision and Digital Systems Silesian University of Technology Akademicka 16 Gliwice44-100 Poland Department of Data Science and Engineering Silesian University of Technology Akademicka 16 Gliwice44-100 Poland
Research into somatic mutations in cancer cell DNA and their role in tumour growth and progression between successive stages is crucial for improving our understanding of cancer evolution. Mathematical and computer mo... 详细信息
来源: 评论
Free vibration analysis of functionally graded porous curved nanobeams on elastic foundation in hygro-thermo-magnetic environment
收藏 引用
Frontiers of Structural and Civil Engineering 2023年 第4期17卷 584-605页
作者: Quoc-Hoa PHAM Parviz MALEKZADEH Van Ke TRAN Trung NGUYEN-THOI Faculty of Engineering and Technology Nguyen Tat Thanh UniversityHo Chi Minh City 700000Vietnam Department of Mechanical Engineering Persian Gulf UniversityBushehr ***Iran Faculty of Mechanical Engineering Le Quy Don Technical UniversityHanoi 100000Vietnam Laboratory for Applied and Industrial Mathematics Institute for Computational Science and Artificial IntelligenceVan Lang UniversityHo Chi Minh City 700000Vietnam Faculty of Mechanical-Electrical and Computer Engineering School of TechnologyVan Lang UniversityHo Chi Minh City 700000Vietnam Bualuang ASEAN Chair Professor Thammasat School of EngineeringThammasat UniversityPathumtani 12120Thailand
Herein,a two-node beam element enriched based on the Lagrange and Hermite interpolation function is proposed to solve the governing equation of a functionally graded porous(FGP)curved nanobeam on an elastic foundation... 详细信息
来源: 评论
Evaluative Analysis of Secure approaches in Simulated Real-World Contexts
Evaluative Analysis of Secure approaches in Simulated Real-W...
收藏 引用
International Conference on ICT in Business Industry & Government (ICTBIG)
作者: A Kannagi Pavan Chaudhary Muthupandi G Associate Professor Department of Computer Science and Information Technology Jain (Deemed to be University) Bangalore India Assistant Professor Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Associate Professor Department of Electronics and Communication Engineering Presidency University Bangalore Karnataka India
This paper introduces a novel methodological approach to evaluating security measures within simulated real-world contexts. By leveraging three distinct algorithms Vulnerability Scoring Algorithm (VSA), the Attack Sim...
来源: 评论