咨询与建议

限定检索结果

文献类型

  • 4,562 篇 会议
  • 1,770 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 6,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,644 篇 工学
    • 2,773 篇 计算机科学与技术...
    • 2,266 篇 软件工程
    • 979 篇 信息与通信工程
    • 666 篇 控制科学与工程
    • 489 篇 电气工程
    • 404 篇 生物工程
    • 358 篇 电子科学与技术(可...
    • 358 篇 生物医学工程(可授...
    • 284 篇 网络空间安全
    • 257 篇 动力工程及工程热...
    • 252 篇 光学工程
    • 230 篇 机械工程
    • 228 篇 安全科学与工程
    • 208 篇 化学工程与技术
    • 184 篇 交通运输工程
    • 175 篇 仪器科学与技术
  • 2,025 篇 理学
    • 1,036 篇 数学
    • 562 篇 物理学
    • 468 篇 生物学
    • 337 篇 统计学(可授理学、...
    • 236 篇 化学
    • 213 篇 系统科学
  • 1,098 篇 管理学
    • 674 篇 管理科学与工程(可...
    • 496 篇 图书情报与档案管...
    • 321 篇 工商管理
  • 427 篇 医学
    • 333 篇 临床医学
    • 317 篇 基础医学(可授医学...
    • 240 篇 公共卫生与预防医...
    • 183 篇 药学(可授医学、理...
  • 209 篇 法学
    • 169 篇 社会学
  • 116 篇 经济学
  • 105 篇 农学
  • 62 篇 教育学
  • 29 篇 文学
  • 15 篇 军事学
  • 8 篇 艺术学

主题

  • 345 篇 accuracy
  • 262 篇 deep learning
  • 209 篇 machine learning
  • 190 篇 feature extracti...
  • 187 篇 real-time system...
  • 179 篇 computational mo...
  • 171 篇 internet of thin...
  • 152 篇 convolutional ne...
  • 148 篇 predictive model...
  • 138 篇 support vector m...
  • 128 篇 training
  • 115 篇 optimization
  • 106 篇 security
  • 104 篇 cloud computing
  • 98 篇 data models
  • 97 篇 technological in...
  • 95 篇 artificial intel...
  • 92 篇 data mining
  • 88 篇 machine learning...
  • 87 篇 computer science

机构

  • 115 篇 lovely professio...
  • 112 篇 department of co...
  • 98 篇 department of co...
  • 80 篇 school of comput...
  • 73 篇 gla university d...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 56 篇 school of comput...
  • 51 篇 maharishi school...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 department of co...
  • 42 篇 the islamic univ...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 40 篇 lloyd law colleg...
  • 39 篇 chitkara univers...
  • 38 篇 key laboratory o...
  • 37 篇 beijing engineer...

作者

  • 53 篇 neeraj varshney
  • 45 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 30 篇 bibhuti bhusan d...
  • 29 篇 babu tina
  • 28 篇 jian-ping li
  • 28 篇 tina babu
  • 27 篇 pan jeng-shyang
  • 27 篇 patra sudhansu s...
  • 26 篇 teekam singh
  • 26 篇 asha v.
  • 26 篇 kumar gaurav
  • 24 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 geng xin

语言

  • 4,667 篇 英文
  • 1,679 篇 其他
  • 48 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=Computer Applications in Science and Engineering"
6377 条 记 录,以下是151-160 订阅
排序:
NFT Marketplace: What are NFTs, and how does OpenSea succeed in acquiring the most of the NFT Space  1
NFT Marketplace: What are NFTs, and how does OpenSea succeed...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Thakur, Anil Divya, K. Verma, Sahil Kaur, Maninder Chandigarh University Dept. of Computer Science & Engineering Mohali India Uttaranchal University Dept. of Computer Science & Engineering Dehradun India Guru Gobind Singh College for Women Dept. of Computer Science & Applications Chandigarh India
Nowadays, the world is becoming smarter, so as the technology, the new era is on the boom, which is blockchain because of its different use cases and benefits. The blockchain is a growing list of records called blocks... 详细信息
来源: 评论
Brain Tumor Detection using Optimized Stochastic Gradient Descent Function
Brain Tumor Detection using Optimized Stochastic Gradient De...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Mishra, Annu Chaturvedi, Ravi Prakash Sharma, Hirdesh Kumar, Prashant Asthana, Sameer Parashar, Mayank Sharda School of Engineeringand Technology Department of Computer Science and Engineering Greater Noida India Sharda School of Engineeringand Technology Department of Computer Science and Applications Greater Noida India JEMTEC Department of Computer Science and Engineering Greater Noida India ITS Engineering College Department of Computer Science and Engineering Greater Noida India GNIOT Department of Computer Science and Engineering Greater Noida India
The learning rate of a CNN determines the efficiency of the neural network. In brain tumor detection, the learning rate and the optimization function plays a key role in deciding the final output. The Optimized Stocha... 详细信息
来源: 评论
Natural Language Processing (NLP) based Phonetic Insights for Improving Voice Recognition and Synthesis  4
Natural Language Processing (NLP) based Phonetic Insights fo...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Priyadharshini, N. Subbulakshmi, N. Kalasalingam Academy of Research and Education Department of Computer Applications Krishnankoil India Kalasalingam Academy of Research and Education Department of Computer Computer Science and Engineering Krishnankoil India
Voice analysis in Natural Language Processing (NLP) involves the processing of spoken language to develop applications such as speech recognition, synthesis, and speaker identification. This survey explores the phonet... 详细信息
来源: 评论
Utilizing Artificial Intelligence for Advance Data science and Analysis  2
Utilizing Artificial Intelligence for Advance Data Science a...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Sharma, Deepak Chaudhary, Gaurav Rajput, Kapil Singhal, Amit Sharma, Tarun Kumar Srm Institute of Science and Technology Department of Computer Applications UPModinagar Delhi India Ajay Kumar Garg Engineering College Department of Information Technology UP Ghaziabad India Graphic Era Hill University Computer Science & Engineering Uttarakhand Dehradun India Graphic Era Hill University Computer Science & Engineering UP Ghaziabad India Abes Engineering College Department of Computer Applications UP Ghaziabad India
Data technology has experienced an explosion in popularity and scope over the past few years, inflicting several companies to try to capitalize on the sizeable possibilities the technology has to provide. Agencies are... 详细信息
来源: 评论
DNN-STACK: a stacking technique based on deep neural network for detecting copy-move forgery
收藏 引用
Neural Computing and applications 2025年 第6期37卷 4989-5004页
作者: Krishnalal, G. Jagathy Raj, V.P. Madhu, G. Arun, K.S. School of Engineering Cochin University of Science and Technology Kerala Cochin682022 India School of Management Studies Cochin University of Science and Technology Kerala Cochin682022 India Department of Computer Applications Cochin University of Science and Technology Kerala Cochin682022 India
In recent years, detecting image forgery has become an important topic because of the availability of efficient and sophisticated image-editing software. Copy-move forgery, which involves copying a section of an image... 详细信息
来源: 评论
Polycystic Ovary Syndrome (PCOS) diagnostic methods in machine learning: a systematic literature review
收藏 引用
Multimedia Tools and applications 2025年 第16期84卷 16301-16337页
作者: Arora, Shikha Vedpal Chauhan, Naresh J.C. Bose University of Science and Technology YMCA Haryana Faridabad India Department of Computer Applications J.C. Bose University of Science and Technology YMCA Haryana Faridabad India Department of Computer Engineering J.C. Bose University of Science and Technology YMCA Haryana Faridabad India
Polycystic Ovarian Syndrome, also known as PCOS, is a major hormonal imbalance affecting women primarily in their reproductive age. Women with PCOS may have either infrequent or extended menstrual cycles or ... 详细信息
来源: 评论
Two-Stage Model for Copy-Move Forgery Detection  1st
Two-Stage Model for Copy-Move Forgery Detection
收藏 引用
1st International Conference on Computational Intelligence for engineering and Management applications, CIEMA 2022
作者: Kumari, Ritesh Garg, Hitendra Chawla, Sunil Department of Computer Engineering and Applications GLA University Mathura India Department of Computer Science and Engineering Chandigarh University Mohali India
Digital images can be tempered or modified very easily with many tools available on the internet. Nowadays some software not only enhance and retouch but also copy-move objects of the image in such a way that is hard ... 详细信息
来源: 评论
Copy Move Forgery Detection Using Novel Quadsort Moth Flame Light Gradient Boosting Machine
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1577-1593页
作者: R.Dhanya R.Kalaiselvi Department of Computer Applications Noorul Islam Centre for Higher EducationNagercoil629180India Department of Computer Science Engineering Noorul Islam Centre for Higher EducationNagercoil629180India
A severe problem in modern information systems is Digital media tampering along with fake *** though there is an enhancement in image development,image forgery,either by the photographer or via image manipulations,is ... 详细信息
来源: 评论
Unlocking the Potential of Unlabeled Data: Semi-Supervised Learning for Stratification of Hyperspectral Images  21
Unlocking the Potential of Unlabeled Data: Semi-Supervised L...
收藏 引用
21st OITS International Conference on Information Technology, OCIT 2023
作者: Ranjan, Pallavi Kumar, Rajeev Girdhar, Ashish Delhi Technological University Computer Science and Engineering New Delhi India Kurukshetra University Computer Science and Applications Haryana India
Hyperspectral imaging, a critical technology for spectral data acquisition, plays a pivotal role in various fields, including agriculture, medicine, defense, remote sensing and environmental monitoring. Nonetheless, a... 详细信息
来源: 评论
Performance Analysis of Hybrid Cryptographic Algorithms in Serverless Platforms  1
收藏 引用
3rd International Conference on Advanced Computing and Intelligent Technologies, ICACIT 2023
作者: Raj, Vinay Suresh, Satharla Phridviraj, M.S.B. Department of Computer Applications National Institute of Technology Tiruchirappalli Tamil Nadu Tiruchirappalli India Department of Computer Science and Engineering Kakatiya Institute of Technology & Science Warangal India
Serverless computing has become the buzzword in IT and it has been widely accepted because of its diverse cloud computing benefits. One of the major drawbacks of serverless computing is the security of the data which ... 详细信息
来源: 评论