咨询与建议

限定检索结果

文献类型

  • 85,484 篇 会议
  • 45,957 篇 期刊文献
  • 1,426 册 图书

馆藏范围

  • 132,867 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78,859 篇 工学
    • 50,468 篇 计算机科学与技术...
    • 40,299 篇 软件工程
    • 20,069 篇 信息与通信工程
    • 13,455 篇 控制科学与工程
    • 12,014 篇 电气工程
    • 11,769 篇 电子科学与技术(可...
    • 8,903 篇 生物工程
    • 6,989 篇 生物医学工程(可授...
    • 6,707 篇 光学工程
    • 5,864 篇 机械工程
    • 5,093 篇 化学工程与技术
    • 4,848 篇 动力工程及工程热...
    • 4,589 篇 仪器科学与技术
    • 4,332 篇 材料科学与工程(可...
    • 3,579 篇 网络空间安全
    • 3,148 篇 安全科学与工程
  • 45,629 篇 理学
    • 21,752 篇 数学
    • 15,904 篇 物理学
    • 10,206 篇 生物学
    • 7,109 篇 统计学(可授理学、...
    • 5,581 篇 化学
    • 4,914 篇 系统科学
  • 20,417 篇 管理学
    • 13,124 篇 管理科学与工程(可...
    • 8,005 篇 图书情报与档案管...
    • 5,910 篇 工商管理
  • 7,238 篇 医学
    • 5,841 篇 临床医学
    • 5,171 篇 基础医学(可授医学...
    • 3,168 篇 公共卫生与预防医...
    • 3,132 篇 药学(可授医学、理...
  • 3,769 篇 法学
    • 3,131 篇 社会学
  • 2,363 篇 经济学
  • 1,671 篇 农学
  • 1,303 篇 教育学
  • 772 篇 文学
  • 274 篇 军事学
  • 195 篇 艺术学
  • 15 篇 哲学
  • 8 篇 历史学

主题

  • 3,866 篇 computer science
  • 3,761 篇 accuracy
  • 3,163 篇 deep learning
  • 2,856 篇 feature extracti...
  • 2,820 篇 machine learning
  • 2,666 篇 computational mo...
  • 2,333 篇 training
  • 1,761 篇 artificial intel...
  • 1,758 篇 optimization
  • 1,739 篇 internet of thin...
  • 1,711 篇 support vector m...
  • 1,655 篇 predictive model...
  • 1,608 篇 convolutional ne...
  • 1,573 篇 real-time system...
  • 1,429 篇 wireless sensor ...
  • 1,352 篇 data mining
  • 1,180 篇 data models
  • 1,171 篇 security
  • 1,161 篇 neural networks
  • 1,144 篇 computer archite...

机构

  • 1,086 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 960 篇 physikalisches i...
  • 938 篇 oliver lodge lab...
  • 914 篇 department of co...
  • 836 篇 department of el...
  • 748 篇 university of ch...
  • 701 篇 department of el...
  • 680 篇 department of co...
  • 602 篇 chitkara univers...
  • 596 篇 infn sezione di ...
  • 593 篇 infn laboratori ...
  • 577 篇 infn sezione di ...
  • 558 篇 infn sezione di ...
  • 553 篇 fakultät physik ...
  • 538 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 515 篇 department of ph...
  • 514 篇 school of physic...
  • 512 篇 h.h. wills physi...

作者

  • 260 篇 barter w.
  • 250 篇 a. gomes
  • 241 篇 c. alexa
  • 238 篇 s. chen
  • 235 篇 j. m. izen
  • 233 篇 blake t.
  • 231 篇 d. calvet
  • 230 篇 c. amelung
  • 229 篇 g. bella
  • 229 篇 j. strandberg
  • 226 篇 bellee v.
  • 223 篇 beiter a.
  • 222 篇 betancourt c.
  • 221 篇 amato s.
  • 220 篇 borsato m.
  • 220 篇 j. wang
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 217 篇 boettcher t.
  • 210 篇 g. spigo

语言

  • 108,921 篇 英文
  • 22,494 篇 其他
  • 1,617 篇 中文
  • 69 篇 日文
  • 33 篇 德文
  • 30 篇 法文
  • 25 篇 斯洛文尼亚文
  • 18 篇 朝鲜文
  • 12 篇 俄文
  • 6 篇 阿拉伯文
  • 3 篇 捷克文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 波兰文
检索条件"机构=Department of Computer Science and Engineering Chalmers University of Technology"
132867 条 记 录,以下是4951-4960 订阅
排序:
MaGIC: Multi-modality Guided Image Completion  12
MaGIC: Multi-modality Guided Image Completion
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Wang, Hao Yu, Yongsheng Luo, Tiejian Fan, Heng Zhang, Libo School of Computer Science and Technology University of Chinese Academy of Sciences China Institute of Software Chinese Academy of Sciences China Department of Computer Science University of Rochester United States Department of Computer Science and Engineering University of North Texas United States
Vanilla image completion approaches exhibit sensitivity to large missing regions, attributed to the limited availability of reference information for plausible generation. To mitigate this, existing methods incorporat... 详细信息
来源: 评论
Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System
收藏 引用
computer Systems science & engineering 2022年 第1期40卷 37-51页
作者: Shraddha R.Khonde Venugopal Ulagamuthalvi Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyChennai600119India Department of Computer Engineering M.E.S.College of EngineeringS.P.Pune UniversityPune411001India
Exchange of data in networks necessitates provision of security and *** networks compromised by intruders are those where the exchange of data is at high *** main objective of this paper is to present a solution for s... 详细信息
来源: 评论
Performance Improvement: Modulation Recognition Scheme Using CVCNN-LSTM Method  1
Performance Improvement: Modulation Recognition Scheme Using...
收藏 引用
1st International Conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Krishnamoorthy, Ramkumar Agarwal, Trapty Department of Computer Science and Information Technology Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
The process for automatic modulation recognition (AMR) is important to industrial cognitive radio Models. Although they have made significant strides in modulation detection, state-of-the-art real-valued CNNs compromi... 详细信息
来源: 评论
Empowering NGOs with Remote Sensing and CNN-LSTM Models for Social and Environmental Transformation
收藏 引用
Remote Sensing in Earth Systems sciences 2024年 第4期7卷 554-568页
作者: Ramachandran, Jayakarthik Gupta, Ashwani Kumar Syamala, Maganti Banerjee, Sudipta Baburao, D. Ranadive, Amol Deivasigamani, Shanmugavel Department of Computer Science Saveetha College of Liberal Arts and Sciences SIMATS Chennai India School of Business and Commerce Chandigarh University Unnao India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram AP Guntur India Department of Computer Science and Engineering Symbiosis Institute of Technology Pune India Campus Symbiosis International (Deemed University) (SIU) Maharashtra Pune India Department of Computer Science and Engineering Vidya Jyothi Institute of Technology (VJIT) Telangana Hyderabad India BIMHRD Sri Balaji University Pune India Department of Artificial Intelligence and Data Science Jeppiaar Institute of Technology Anna University Tamilnadu Chennai India
Non-governmental organizations (NGOs) play a pivotal role in addressing some of the most pressing environmental and social challenges across the globe. With the rise of advanced technologies, NGOs have an unprecedente... 详细信息
来源: 评论
Advancing PCB Quality Control:Harnessing YOLOv8 Deep Learning for Real-Time Fault Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 345-367页
作者: Rehman Ullah Khan Fazal Shah Ahmad Ali Khan Hamza Tahir Faculty of Cognitive Sciences and Human Development Universiti Malaysia SarawakKota Samarahan94300Malaysia School of Computer Science and Engineering Anhui University of Science and TechnologyHuainan232001China Department Electronic Quaid-i-Azam UniversityIslamabad45320Pakistan
Printed Circuit Boards(PCBs)are materials used to connect components to one another to form a working *** play a crucial role in modern electronics by connecting various *** trend of integrating more components onto P... 详细信息
来源: 评论
Data Distribution Valuation  38
Data Distribution Valuation
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Xu, Xinyi Wang, Shuaiqi Foo, Chuan-Sheng Low, Bryan Kian Hsiang Fanti, Giulia Department of Computer Science National University of Singapore Singapore Department of Electrical and Computer Engineering Carnegie Mellon University United States Institute for Infocomm Research Agency for Science Technology and Research Singapore
Data valuation is a class of techniques for quantitatively assessing the value of data for applications like pricing in data marketplaces. Existing data valuation methods define a value for a discrete dataset. However...
来源: 评论
MRI techniques using image processing Brain Tumor Detection
MRI techniques using image processing Brain Tumor Detection
收藏 引用
2023 International Conference on Artificial Intelligence and Smart Communication, AISC 2023
作者: Mahesh, T.R. Geetha, G. Deemed-to-be University Faculty of Engineering and Technology Jain Department of Computer Science and Engineering Bangalore India
A brain tumor develops when cells in the brain divide in an abnormal way that is not controlled by the body. This results in the growth of the tumor. Manual dissection of brain tumors identified by MRI is a process th... 详细信息
来源: 评论
Crime Type and Occurrence Prediction Using Machine Learning  2
Crime Type and Occurrence Prediction Using Machine Learning
收藏 引用
2nd IEEE International Conference on Advances in Information technology, ICAIT 2024
作者: Kavya, T.M. Lavanya, T.N. Ithihas, Maddi Shetty, Namitha R. Amrutha, H.N. Hebbar, Sushruth Department of Computer Science and Engineering Adichunchanagiri Institute of Technology Chikkamagaluru India Department of P.G Studies and Research in Computer Science Kuvempu University Karnataka Shivamogga India
Nowadays, crime has become a way to get people and people into trouble. Rising crime has fueled unrest at polling stations across the country. Understanding crime patterns is necessary to identify and respond to these... 详细信息
来源: 评论
ETL Data Pipeline to Analyze Scraped Data  3rd
ETL Data Pipeline to Analyze Scraped Data
收藏 引用
3rd International Conference on Information technology, InCITe 2023
作者: Gandhi, Rashmi Khurana, Sparsh Manchanda, Harsh Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Noida India
In this day and age, corporations are moving towards data driven decision making. They are utilizing data to make applications that can assist them with business intelligence. Data assists them with working on their e... 详细信息
来源: 评论
Comparative Analysis of Dynamic Data Placement Strategy in Distributed Cloud Environment  1st
Comparative Analysis of Dynamic Data Placement Strategy in D...
收藏 引用
1st International Conference on Data engineering and Machine Intelligence, ICDEMI 2023
作者: Shankar, B. Prabhu Singh, Uday Kumar Vijayalakshmi Viji, C. Rajkumar, N. Stalin, M. Nachiappan, Balusamy Department of Computer Science and Engineering Alliance College of Engineering and Design Alliance University Karnataka Bangalore India Department of Computer Science and Engineering CMR Institute of Technology Karnataka Bangalore India Prologis DenverCO80202 United States Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology Chennai India
In general, the dynamic data optimization technique is used to place the user’s data in a cloud system to reduce the latency, intercommunication traffic, data transfer cost, execution cost, load balancing, and bandwi... 详细信息
来源: 评论