咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是481-490 订阅
排序:
Hybrid Shunted Transformer embedding UNet for remote sensing image semantic segmentation
收藏 引用
Neural Computing and Applications 2024年 第25期36卷 15705-15720页
作者: Zhou, Huacong Xiao, Xiangling Li, Huihui Liu, Xiaoyong Liang, Peng School of Computer Science Guangdong Polytechnic Normal University Guangdong Guangzhou510630 China Guangdong Provincial Key Laboratory of Intellectual Property and Big Data Guangdong Polytechnic Normal University Guangdong Guangzhou510665 China School of Data Science and Engineering Guangdong Polytechnic Normal University Guangdong Guangzhou510630 China Academy of Heyuan Guangdong Polytechnic Normal University Guangdong Heyuan517099 China The Cyberspace Institute of Advanced Technology Guangzhou University Guangdong Guangzhou510006 China
With the development of deep learning, Remote Sensing Image (RSI) semantic segmentation has produced significant advances. However, due to the sparse distribution of the objects and the high similarity between classes... 详细信息
来源: 评论
Research on MAC Protocol of Power Control Based on Node Location in Underwater Acoustic Sensor Network
Research on MAC Protocol of Power Control Based on Node Loca...
收藏 引用
International Conference on Communication technology (ICCT)
作者: Li Li Yongjie Yang Yulong Ma Zhengxin Hao Yongqi Guo School of Computer Science and Technology Shenyang University of Chemical Technology Liaoning Provincial Key Laboratory of Intelligent Technology for Chemical Process Industry Shenyang China School of Computer Science and Technology Shenyang University of Chemical Technology Shenyang China
The problems of high energy consumption and low data transmission quality are common in underwater acoustic sensor networks. Based on the reservation-based MAC protocol (R-MAC), a power control reservation-based MAC p... 详细信息
来源: 评论
An improved Criminisi method for image inpainting  2
An improved Criminisi method for image inpainting
收藏 引用
2022 2nd International Conference on Electrical, Electronics and Computing technology, EECT 2022
作者: Li, C. Chen, H. Han, X. Pan, X. Niu, D. Shandong Provincial Key Laboratory Of Network Based Intelligent Computing University Of Jinan China School Of Computer Science And Technology Shandong University Of Finance And Economics China
The Criminisi method is a classical image inpainting method, which has flaw of unreasonable priority calculation. To overcome this flaw, we propose an improved Criminisi method. To improve the accuracy of a repaired b... 详细信息
来源: 评论
DM-YOLOv5:An Improved Safety Helmet Detection Algorithm at Complex Construction Scenes
DM-YOLOv5:An Improved Safety Helmet Detection Algorithm at C...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Dexu Yao Aimin Li Deqi Liu Mengfan Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
At complex construction sites, detecting whether workers are wearing safety helmets is often affected by occlusion and sunlight change. In addition, the helmets are relatively small, which can easily lead to missed de... 详细信息
来源: 评论
Robust peer-to-peer learning via secure multi-party computation
收藏 引用
Journal of Information and Intelligence 2023年 第4期1卷 341-351页
作者: Yongkang Luo Wenjian Luo Ruizhuo Zhang Hongwei Zhang Yuhui Shi Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and TechnologyHarbin Institute of TechnologyShenzhen 518055China Peng Cheng Laboratory Shenzhen 518055China Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China
To solve the data island problem,federated learning(FL)provides a solution paradigm where each client sends the model parameters but not the data to a server for model ***-to-peer(P2P)federated learning further improv... 详细信息
来源: 评论
Domain Adaptive Lung Nodule Detection in X-Ray Image
Domain Adaptive Lung Nodule Detection in X-Ray Image
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Haifeng Zhao Lixiang Jiang Leilei Ma Dengdi Sun Yanping Fu Anhui Provincial Key Laboratory of Multi-modal Cognitive Computation School of Computer Science and Technology Anhui University Hefei China
Medical images from different healthcare centers exhibit varied data distributions, posing significant challenges for adapting lung nodule detection due to the domain shift between training and application phases. Tra... 详细信息
来源: 评论
FSD-YOLO: An Improved Method for Steel Surface Defect Detection Based on YOLOv5
FSD-YOLO: An Improved Method for Steel Surface Defect Detect...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yuechen Zhang Aimin Li Xiaotong Kong Wenqiang Li Zhiyao Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Steel surface defect detection is very important in industrial quality inspection, and there have been many studies on Steel surface defect detection in recent years. Existing steel surface defect detection algorithms... 详细信息
来源: 评论
Ultrasound SAM Adapter: Adapting SAM for Breast Lesion Segmentation in Ultrasound Images
arXiv
收藏 引用
arXiv 2024年
作者: Tu, Zhengzheng Gu, Le Wang, Xixi Jiang, Bo Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China
Segment Anything Model (SAM) has recently achieved amazing results in the field of natural image segmentation. However, it is not effective for medical image segmentation, owing to the large domain gap between natural... 详细信息
来源: 评论
Braille-to-Chinese Translation System Based on Optical Braille Recognition  2
Braille-to-Chinese Translation System Based on Optical Brail...
收藏 引用
2nd Asia-Pacific Conference on Communications technology and computer science, ACCTCS 2022
作者: Shao, Zirui Yu, Zhi Gu, Yu Wang, Wei School of Software Technology Zhejiang University Hangzhou China College of Computer Science Zhejiang University Zhejiang Provincial Key Laboratory of Service Robot Hangzhou China
Braille is an essential tool for visually impaired people to receiving and transmitting information. However, sighted people without special training cannot read Braille, which will cause inconvenience to scenarios su... 详细信息
来源: 评论
RTS-DETR: Efficient Real-Time DETR for Small Object Detection
RTS-DETR: Efficient Real-Time DETR for Small Object Detectio...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Wenqiang Li Aimin Li Zhiyao Li Xiaotong Kong Yuechen Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In recent years, object detection models DEtection TRansformer (DETR) series based on Transformer architecture have played a huge role in various fields. However, the DETR series models are not satisfactory in small o... 详细信息
来源: 评论