咨询与建议

限定检索结果

文献类型

  • 13,792 篇 期刊文献
  • 12,054 篇 会议
  • 110 册 图书

馆藏范围

  • 25,954 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 16,244 篇 工学
    • 9,193 篇 计算机科学与技术...
    • 7,489 篇 软件工程
    • 3,241 篇 信息与通信工程
    • 2,436 篇 电子科学与技术(可...
    • 2,400 篇 电气工程
    • 2,390 篇 控制科学与工程
    • 2,204 篇 生物工程
    • 2,022 篇 光学工程
    • 1,887 篇 生物医学工程(可授...
    • 1,285 篇 化学工程与技术
    • 1,250 篇 机械工程
    • 1,045 篇 仪器科学与技术
    • 965 篇 材料科学与工程(可...
    • 723 篇 动力工程及工程热...
    • 501 篇 力学(可授工学、理...
    • 461 篇 土木工程
  • 11,047 篇 理学
    • 5,048 篇 物理学
    • 4,045 篇 数学
    • 2,593 篇 生物学
    • 1,488 篇 化学
    • 1,437 篇 统计学(可授理学、...
    • 768 篇 系统科学
  • 3,541 篇 管理学
    • 2,149 篇 管理科学与工程(可...
    • 1,430 篇 图书情报与档案管...
    • 897 篇 工商管理
  • 1,885 篇 医学
    • 1,562 篇 临床医学
    • 1,271 篇 基础医学(可授医学...
    • 801 篇 药学(可授医学、理...
    • 545 篇 公共卫生与预防医...
  • 566 篇 法学
    • 457 篇 社会学
  • 373 篇 农学
  • 336 篇 经济学
  • 268 篇 教育学
  • 97 篇 文学
  • 55 篇 军事学
  • 33 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 515 篇 deep learning
  • 336 篇 feature extracti...
  • 330 篇 computer science
  • 315 篇 machine learning
  • 310 篇 training
  • 248 篇 image segmentati...
  • 244 篇 accuracy
  • 224 篇 semantics
  • 219 篇 computational mo...
  • 181 篇 reinforcement le...
  • 175 篇 neural networks
  • 173 篇 optimization
  • 155 篇 internet of thin...
  • 155 篇 three-dimensiona...
  • 141 篇 data mining
  • 140 篇 deep neural netw...
  • 137 篇 magnetic resonan...
  • 135 篇 object detection
  • 134 篇 support vector m...
  • 131 篇 computer archite...

机构

  • 1,082 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 974 篇 physikalisches i...
  • 960 篇 oliver lodge lab...
  • 641 篇 university of ch...
  • 595 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 525 篇 iccub universita...
  • 518 篇 horia hulubei na...
  • 516 篇 school of physic...
  • 508 篇 department of ph...
  • 500 篇 imperial college...
  • 499 篇 center for high ...
  • 495 篇 nikhef national ...
  • 493 篇 stfc rutherford ...
  • 489 篇 h.h. wills physi...
  • 486 篇 physik-institut ...
  • 481 篇 infn laboratori ...
  • 479 篇 school of physic...
  • 478 篇 school of physic...

作者

  • 273 篇 beiter a.
  • 271 篇 barter w.
  • 268 篇 a. gomes
  • 257 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 245 篇 g. spigo
  • 240 篇 f. siegert
  • 240 篇 s. chen
  • 233 篇 bowcock t.j.v.
  • 228 篇 brundu d.
  • 226 篇 blake t.
  • 224 篇 y. tayalati
  • 218 篇 r. ströhmer
  • 216 篇 m. rijssenbeek
  • 210 篇 s. jin

语言

  • 23,931 篇 英文
  • 1,593 篇 其他
  • 415 篇 中文
  • 20 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 荷兰文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer Science and Engineering Center for Robotics"
25956 条 记 录,以下是181-190 订阅
排序:
Empowering Visible-Infrared Person Re-Identification with Large Foundation Models  38
Empowering Visible-Infrared Person Re-Identification with La...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Hu, Zhangyi Yang, Bin Ye, Mang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
Visible-Infrared Person Re-identification (VI-ReID) is a challenging cross-modal retrieval task due to significant modality differences, primarily resulting from the absence of color information in the infrared modali...
来源: 评论
A novel image encryption algorithm based on new one-dimensional chaos and DNA coding
收藏 引用
Multimedia Tools and Applications 2024年 第36期83卷 84275-84297页
作者: Feng, Sijia Zhao, Maochang Liu, Zhaobin Li, Yuanyu Tianjin public emergency early warning information release center Tianjin Meteorology Information Center Tianjin300074 China School of Information Science & amp Technology Dalian Maritime University Dalian116026 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The bifurcation diagram and Lyapunov exponent show that the system has stro... 详细信息
来源: 评论
PKEST: Public-Key Encryption With Similarity Test for Medical Consortia Cloud Computing
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 680-693页
作者: Chen, Junsong Zeng, Shengke Han, Song Yin, Jin Chen, Peng Xihua University School of Computer and Software Engineering Chengdu610039 China Hangzhou City University School of Computer and Computing Science Hangzhou310015 China Sichuan University West China Biomedical Big Data Center West China Hospital Chengdu610041 China
Cloud computing eliminates the limitations of local hardware architecture while also enabling rapid data sharing between healthcare institutions. Encryption of electronic medical records (EMRs) before uploading to clo... 详细信息
来源: 评论
Harmonizing space–time dynamics for precision in human action recognition
收藏 引用
Multimedia Tools and Applications 2025年 第5期84卷 2805-2832页
作者: Majid, Abdul Wang, Yulin Ullah, Anwar Naiz, Fahim Zarar, Muhammad School of Computer Science Wuhan University Hubei Wuhan430072 China National Engineering Research Center for E-Leaning Central China Normal University Hubei Wuhan430072 China
Human action recognition (HAR) plays a vital role in various fields, including surveillance, healthcare, and human–computer interaction. Recognizing multi-actor actions in crowded scenarios poses a significant challe... 详细信息
来源: 评论
Intelligent Predetermination of Generator Tripping Scheme: Knowledge Fusion-based Deep Reinforcement Learning Framework
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第1期10卷 66-75页
作者: Lingkang Zeng Wei Yao Ze Hu Hang Shuai Zhouping Li Jinyu Wen Shijie Cheng State Key Laboratory of Advanced Electromagnetic Engineering and Technology School of Electrical and Electronics EngineeringHuazhong University of Science and TechnologyWuhan 430074China Dispatching and Control Center Central China Branch of State Grid Corporation of ChinaWuhan 430077China. Department of Electrical Engineering and Computer Science University of TennesseeKnoxvilleTN 37996USA
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming ... 详细信息
来源: 评论
Belief Combination of Classifiers for Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第4期9卷 652-667页
作者: Zuowei Zhang Songtao Ye Yiru Zhang Weiping Ding Hao Wang IEEE the Research Center for Optical Fiber Sensing Zhejiang Laboratory the School of Automation Northwestern Polytechnical University the School of Cyber Engineering Xidian University the Department of Computer Science CY Cergy Paris Université the School of Information Science and Technology Nantong University the School with of Cyber Engineering Xidian University the Department of Computer Science Norwegian University of Science and Technology
Data with missing values,or incomplete information,brings some challenges to the development of classification,as the incompleteness may significantly affect the performance of *** this paper,we handle missing values ... 详细信息
来源: 评论
LKAW: A Robust Watermarking Method Based on Large Kernel Convolution and Adaptive Weight Assignment
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1-17页
作者: Xiaorui Zhang Rui Jiang Wei Sun Aiguo Song Xindong Wei Ruohan Meng Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China School of Instrument Science and Engineering Southeast UniversityNanjing211189China School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Science Engineering Nanyang Technological UniversitySingapore
Robust watermarking requires finding invariant features under multiple attacks to ensure correct *** learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attra... 详细信息
来源: 评论
C2FNet: Coarse-to-Fine Keypoint Localization Network for Monocular 6D Object Pose Estimation
C2FNet: Coarse-to-Fine Keypoint Localization Network for Mon...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Sun, Jiahao Ma, Xin Li, Yibin Center for Robotics School of Control Science and Engineering Shandong University China Engineering Research Center of Intelligent Unmanned System Ministry of Education Jinan China
Estimating the 6D object pose from a singular RGB image is a fundamental task in the field of computer vision. Recent studies have demonstrated that keypoint-based methods exhibit remarkable efficacy. Such methodologi... 详细信息
来源: 评论
A Composite Decomposition Method for Large-Scale Global Optimization
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6304-6319页
作者: Tian, Maojiang Chen, Minyang Du, Wei Tang, Yang Jin, Yaochu Yen, Gary G. Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen518055 China East China University of Science and Technology Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education Shanghai200237 China East China University of Science and Technology Engineering Research Center of Process System Engineering Ministry of Education Shanghai200237 China Westlake University School of Engineering Hangzhou310030 China Oklahoma State University School of Electrical and Computer Engineering StillwaterOK74048 United States
Cooperative coevolution (CC) algorithms, based on the divide-and-conquer strategy, have emerged as the predominant approach to solving large-scale global optimization (LSGO) problems. The efficiency and accuracy of th... 详细信息
来源: 评论
The propagation of Quasi-static region during granular impact
收藏 引用
Particuology 2023年 第12期83卷 1-7页
作者: Moyu Yang Ran Li Yingnan Xiu Qiang Zeng Xiaoyan Ye Hui Yang School of Optical-Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai200093China Center for Particle-Laden Turbulence Key Laboratory of Mechanics on Disaster and Environment in Western China attached to the Ministry of Education of ChinaDepartment of Mechanics and Engineering ScienceSchool of Civil Engineering and MechanicsLanzhou UniversityLanzhou730000China
In this paper,through experiments and DEM simulations,it is found that there is a ring-shaped region named Quasi-static Region between the particles expanding outward and the particles collapsing inward during the imp... 详细信息
来源: 评论