咨询与建议

限定检索结果

文献类型

  • 4,467 篇 会议
  • 1,763 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 6,274 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,570 篇 工学
    • 2,703 篇 计算机科学与技术...
    • 2,223 篇 软件工程
    • 935 篇 信息与通信工程
    • 621 篇 控制科学与工程
    • 479 篇 电气工程
    • 402 篇 生物工程
    • 355 篇 电子科学与技术(可...
    • 346 篇 生物医学工程(可授...
    • 269 篇 网络空间安全
    • 252 篇 动力工程及工程热...
    • 242 篇 光学工程
    • 221 篇 机械工程
    • 208 篇 安全科学与工程
    • 205 篇 化学工程与技术
    • 169 篇 仪器科学与技术
    • 166 篇 交通运输工程
  • 2,007 篇 理学
    • 1,030 篇 数学
    • 562 篇 物理学
    • 465 篇 生物学
    • 339 篇 统计学(可授理学、...
    • 233 篇 化学
    • 213 篇 系统科学
  • 1,064 篇 管理学
    • 644 篇 管理科学与工程(可...
    • 477 篇 图书情报与档案管...
    • 316 篇 工商管理
  • 412 篇 医学
    • 325 篇 临床医学
    • 308 篇 基础医学(可授医学...
    • 225 篇 公共卫生与预防医...
    • 183 篇 药学(可授医学、理...
  • 201 篇 法学
    • 163 篇 社会学
  • 116 篇 经济学
  • 104 篇 农学
  • 60 篇 教育学
  • 26 篇 文学
  • 15 篇 军事学
  • 8 篇 艺术学

主题

  • 340 篇 accuracy
  • 249 篇 deep learning
  • 202 篇 machine learning
  • 187 篇 feature extracti...
  • 183 篇 real-time system...
  • 177 篇 computational mo...
  • 169 篇 internet of thin...
  • 150 篇 convolutional ne...
  • 147 篇 predictive model...
  • 135 篇 support vector m...
  • 127 篇 training
  • 113 篇 optimization
  • 103 篇 security
  • 102 篇 cloud computing
  • 98 篇 technological in...
  • 98 篇 data models
  • 95 篇 artificial intel...
  • 91 篇 data mining
  • 89 篇 machine learning...
  • 87 篇 computer science

机构

  • 115 篇 lovely professio...
  • 110 篇 department of co...
  • 99 篇 department of co...
  • 79 篇 school of comput...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 47 篇 centre of resear...
  • 47 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 department of co...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 40 篇 lloyd law colleg...
  • 39 篇 chitkara univers...
  • 37 篇 key laboratory o...
  • 37 篇 beijing engineer...
  • 36 篇 the islamic univ...

作者

  • 53 篇 neeraj varshney
  • 42 篇 singh kamred udh...
  • 42 篇 varshney neeraj
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 30 篇 bibhuti bhusan d...
  • 30 篇 kumar rakesh
  • 29 篇 pan jeng-shyang
  • 28 篇 jian-ping li
  • 28 篇 tina babu
  • 28 篇 patra sudhansu s...
  • 27 篇 asha v.
  • 26 篇 teekam singh
  • 26 篇 kumar gaurav
  • 24 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 24 篇 sudhansu shekhar...
  • 23 篇 babu tina

语言

  • 5,050 篇 英文
  • 1,191 篇 其他
  • 45 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Computer Applications in Science and Engineering"
6274 条 记 录,以下是381-390 订阅
排序:
5G in Smart Cities: Enhancing Urban Futures for Sustainable Growth
5G in Smart Cities: Enhancing Urban Futures for Sustainable ...
收藏 引用
2023 International Conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Rajvanshi, Anita Mahajan, Prerna Singh, Alka Tula's Institute Department of Computer Science and Engineering Dehradun India Department of Computer Bangalore India Noida Institute of Engineering and Technology Computer Applications Uttar Pradesh Greater Noida India
This essay delves into the concept of 'Smart Cities,' outlining its numerous benefits. It elucidates the diverse applications and services essential for transforming a city into a Smart City, underscoring the ... 详细信息
来源: 评论
A Novel Approach to Optimize EV's Dealing and Charging
A Novel Approach to Optimize EV's Dealing and Charging
收藏 引用
2023 International Conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Vijay, Sandip Gobi, N. Sharma, Ambrish Kumar Tula's Institute Department of Computer Science and Engineering Dehradun India Department of Computer Bangalore India Computer Applications Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India
It's an interesting idea to investigate the energy market as a potential means of reducing the power costs related to charging electric cars at public charging stations. Through intraday energy markets., several n... 详细信息
来源: 评论
Secure Communication over IoT Networks using Mutual Authentication
Secure Communication over IoT Networks using Mutual Authenti...
收藏 引用
2024 International Conference on Computational Intelligence and Computing applications, ICCICA 2024
作者: Verma, Dinesh Chander Chopra, Amit Kanika Kaushik, Vinita Kaur, Jaspreet Panipat Institute Of Engineering & Technology Department Of Computer Applications Panipat India Maharaja Agrasen University Department Of Computer Science & Engineering H.P Baddi India Thompson Rivers University KamloopsBC Canada
Internet of Things (IoT) network transmit the data in an open environment and it can be intercepted by unauthorized users. Different sensors share their data with each other without authentication and it becomes a maj... 详细信息
来源: 评论
Retinal Scan Denoising Using Generative Adversarial Networks: A Deep Convolutional Approach  5
Retinal Scan Denoising Using Generative Adversarial Networks...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Gowthami, G. Mano Shankari, J. Babu, Tina St. Francis de Sales College Department of Computer Applications Bengaluru India Alliance School of Advanced Computing Department of Computer Science and Engineering Alliance University Bengaluru India
Image denoising is needed if there is a need to remove noise while preserving details or structures in images in computing vision and image processing. Recent advancements in generative adversarial networks (GANs) and... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Deep Learning-Based Approach for Detecting Copy-Move Forgery in Digital Images  27
Deep Learning-Based Approach for Detecting Copy-Move Forgery...
收藏 引用
27th International Symposium on Wireless Personal Multimedia Communications, WPMC 2024
作者: Dar, Navid Ahmad Atsya, Rani Kumar, Anuj Sharda University dept. of Computer Science and Engineering UP Greater Noida India Greater Noida Institute of Technology dept. of computer applications UP Greater Noida India
Copying and pasting a portion of the same image to hide another portion is the most common method of fraudulent image enhancement. Cloning a restricted portion of an image and pasting it once or more inside a comparab... 详细信息
来源: 评论
Oral Cancer Classification Using GLRLM Combined with Fuzzy Cognitive Map and Support Vector Machines from Dental Radiograph Images  1
收藏 引用
1st International Conference on Intelligent Computing for Sustainable Development, ICICSD 2023
作者: Anuradha, K. Fathima, H. Kavithamani, K. Uma, K.P. School of Computer Applications Karpagam College of Engineering Tamil Nadu Othakkal Mandapam India Department of Science and Humanities Hindusthan College of Engineering and Technology Tamil Nadu Coimbatore India
In recent years, Fuzzy Cognitive Maps (FCM) are widely used in medical decision schemes. According to data, oral cancer is the fifth most common cancer in India, with a higher occurrence among men than women. In order... 详细信息
来源: 评论
Intelligent analysis to detect phishing websites using machine learning ensemble techniques
收藏 引用
Human-Intelligent Systems Integration 2024年 第1期6卷 39-47页
作者: Pandey, Mithilesh Kumar Pal, Rekha Pal, Saurabh Kumar, Alok Shukla, Arvind Kumar Yadav, Dhyan Chandra Department of Computer Applications VBS Purvanchal University Jaunpur India Department of Computer Applications Vivek College of Education Bijnor India School of Computer Science & Applications IFTM University Moradabad India Department of Computer Science and Engineering MUIT Lucknow India
The Internet has grown to be a vital part of our everyday existence. Web browsing is the most popular Internet service. A lot of people use their browser for banking, online shopping, bill paying, and mobile phone rec...
来源: 评论
Stacked Bi-LSTM for Advanced Toxicity Detection in Comment Classification  6
Stacked Bi-LSTM for Advanced Toxicity Detection in Comment C...
收藏 引用
6th IEEE International Conference on Artificial Intelligence in engineering and Technology, IICAIET 2024
作者: Kumar, N. Naveen Abraham, Prabhakaran Kaliba, Syed Ibrahim Diniesh, V.C. Maruthamuthu, R. Balamurugan Seshu Kumar, P. Vekkudu, Naveen Madanapalle Institute of Technology & Science Department of Computer Applications Andhra Pradesh Madanapalle India Mai-nefhi College of Engineering and Technology Department of Computer Science and Engineering Mainefhi Eritrea Kongu Engineering College Department of Electronics & Communication Engineering Tamil Nadu Erode India Jain University Department of Information Science and Engineering Karnataka Bangalore India
The surge in Internet usage has revolutionized online forums, providing dynamic forums for active participation and meaningful debates. However, this has also exposed users to the risk of harassment. Efforts to addres... 详细信息
来源: 评论
Deep Convolutional Network Based Machine Intelligence Model for Satellite Cloud Image Classification
收藏 引用
Big Data Mining and Analytics 2023年 第1期6卷 32-43页
作者: Kalyan Kumar Jena Sourav Kumar Bhoi Soumya Ranjan Nayak Ranjit Panigrahi Akash Kumar Bhoi Department of Computer Science and Engineering Parala Maharaja Engineering CollegeBerhampur 761003India Amity School of Engineering and Technology Amity UniversityUttar Pradesh 201303India Department of Computer Applications Sikkim Manipal Institute of TechnologySikkim Manipal UniversitySikkim 737102India Directorate of Research Sikkim Manipal UniversityGangtokSikkim 737102India
As a huge number of satellites revolve around the earth,a great probability exists to observe and determine the change phenomena on the earth through the analysis of satellite images on a real-time ***,classifying sat... 详细信息
来源: 评论