咨询与建议

限定检索结果

文献类型

  • 4,562 篇 会议
  • 1,770 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 6,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,644 篇 工学
    • 2,773 篇 计算机科学与技术...
    • 2,266 篇 软件工程
    • 979 篇 信息与通信工程
    • 666 篇 控制科学与工程
    • 489 篇 电气工程
    • 404 篇 生物工程
    • 358 篇 电子科学与技术(可...
    • 358 篇 生物医学工程(可授...
    • 284 篇 网络空间安全
    • 257 篇 动力工程及工程热...
    • 252 篇 光学工程
    • 230 篇 机械工程
    • 228 篇 安全科学与工程
    • 208 篇 化学工程与技术
    • 184 篇 交通运输工程
    • 175 篇 仪器科学与技术
  • 2,025 篇 理学
    • 1,036 篇 数学
    • 562 篇 物理学
    • 468 篇 生物学
    • 337 篇 统计学(可授理学、...
    • 236 篇 化学
    • 213 篇 系统科学
  • 1,098 篇 管理学
    • 674 篇 管理科学与工程(可...
    • 496 篇 图书情报与档案管...
    • 321 篇 工商管理
  • 427 篇 医学
    • 333 篇 临床医学
    • 317 篇 基础医学(可授医学...
    • 240 篇 公共卫生与预防医...
    • 183 篇 药学(可授医学、理...
  • 209 篇 法学
    • 169 篇 社会学
  • 116 篇 经济学
  • 105 篇 农学
  • 62 篇 教育学
  • 29 篇 文学
  • 15 篇 军事学
  • 8 篇 艺术学

主题

  • 345 篇 accuracy
  • 262 篇 deep learning
  • 209 篇 machine learning
  • 190 篇 feature extracti...
  • 187 篇 real-time system...
  • 179 篇 computational mo...
  • 171 篇 internet of thin...
  • 152 篇 convolutional ne...
  • 148 篇 predictive model...
  • 138 篇 support vector m...
  • 128 篇 training
  • 115 篇 optimization
  • 106 篇 security
  • 104 篇 cloud computing
  • 98 篇 data models
  • 97 篇 technological in...
  • 95 篇 artificial intel...
  • 92 篇 data mining
  • 88 篇 machine learning...
  • 87 篇 computer science

机构

  • 115 篇 lovely professio...
  • 112 篇 department of co...
  • 98 篇 department of co...
  • 80 篇 school of comput...
  • 73 篇 gla university d...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 56 篇 school of comput...
  • 51 篇 maharishi school...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 department of co...
  • 42 篇 the islamic univ...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 40 篇 lloyd law colleg...
  • 39 篇 chitkara univers...
  • 38 篇 key laboratory o...
  • 37 篇 beijing engineer...

作者

  • 53 篇 neeraj varshney
  • 45 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 30 篇 bibhuti bhusan d...
  • 29 篇 babu tina
  • 28 篇 jian-ping li
  • 28 篇 tina babu
  • 27 篇 pan jeng-shyang
  • 27 篇 patra sudhansu s...
  • 26 篇 teekam singh
  • 26 篇 asha v.
  • 26 篇 kumar gaurav
  • 24 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 geng xin

语言

  • 4,667 篇 英文
  • 1,679 篇 其他
  • 48 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=Computer Applications in Science and Engineering"
6377 条 记 录,以下是411-420 订阅
排序:
Secure Communication over IoT Networks using Mutual Authentication
Secure Communication over IoT Networks using Mutual Authenti...
收藏 引用
2024 International Conference on Computational Intelligence and Computing applications, ICCICA 2024
作者: Verma, Dinesh Chander Chopra, Amit Kanika Kaushik, Vinita Kaur, Jaspreet Panipat Institute Of Engineering & Technology Department Of Computer Applications Panipat India Maharaja Agrasen University Department Of Computer Science & Engineering H.P Baddi India Thompson Rivers University KamloopsBC Canada
Internet of Things (IoT) network transmit the data in an open environment and it can be intercepted by unauthorized users. Different sensors share their data with each other without authentication and it becomes a maj... 详细信息
来源: 评论
Leveraging Machine Learning for Pattern-Based Detection of Respiratory Illnesses
Leveraging Machine Learning for Pattern-Based Detection of R...
收藏 引用
2025 International Conference on Artificial Intelligence and Data engineering, AIDE 2025
作者: Shetty, Anusha Prashanth Deepthi, L. Puthran, Raksha Shetty, Surendra Hegde, Pavan Kumar, Shravan NMAM Insitute of Technology Department of Master of Computer Applications Karkala Nitte India Sahyadri College of Engineering and Management Department of Computer Science and Engineering Mangalore India Father Muller Medical College and Hospital Department of Paediatrics Mangalore India
Lung sound analysis presents a promising, noninvasive, and potentially cost-effective approach for detecting respiratory diseases. This research aims to assess the feasibility of using lung sounds for pattern recognit... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Deep Learning-Based Approach for Detecting Copy-Move Forgery in Digital Images  27
Deep Learning-Based Approach for Detecting Copy-Move Forgery...
收藏 引用
27th International Symposium on Wireless Personal Multimedia Communications, WPMC 2024
作者: Dar, Navid Ahmad Atsya, Rani Kumar, Anuj Sharda University dept. of Computer Science and Engineering UP Greater Noida India Greater Noida Institute of Technology dept. of computer applications UP Greater Noida India
Copying and pasting a portion of the same image to hide another portion is the most common method of fraudulent image enhancement. Cloning a restricted portion of an image and pasting it once or more inside a comparab... 详细信息
来源: 评论
Retinal Scan Denoising Using Generative Adversarial Networks: A Deep Convolutional Approach  5
Retinal Scan Denoising Using Generative Adversarial Networks...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Gowthami, G. Mano Shankari, J. Babu, Tina St. Francis de Sales College Department of Computer Applications Bengaluru India Alliance School of Advanced Computing Department of Computer Science and Engineering Alliance University Bengaluru India
Image denoising is needed if there is a need to remove noise while preserving details or structures in images in computing vision and image processing. Recent advancements in generative adversarial networks (GANs) and... 详细信息
来源: 评论
Stacked Bi-LSTM for Advanced Toxicity Detection in Comment Classification  6
Stacked Bi-LSTM for Advanced Toxicity Detection in Comment C...
收藏 引用
6th IEEE International Conference on Artificial Intelligence in engineering and Technology, IICAIET 2024
作者: Kumar, N. Naveen Abraham, Prabhakaran Kaliba, Syed Ibrahim Diniesh, V.C. Maruthamuthu, R. Balamurugan Seshu Kumar, P. Vekkudu, Naveen Madanapalle Institute of Technology & Science Department of Computer Applications Andhra Pradesh Madanapalle India Mai-nefhi College of Engineering and Technology Department of Computer Science and Engineering Mainefhi Eritrea Kongu Engineering College Department of Electronics & Communication Engineering Tamil Nadu Erode India Jain University Department of Information Science and Engineering Karnataka Bangalore India
The surge in Internet usage has revolutionized online forums, providing dynamic forums for active participation and meaningful debates. However, this has also exposed users to the risk of harassment. Efforts to addres... 详细信息
来源: 评论
Deep Convolutional Network Based Machine Intelligence Model for Satellite Cloud Image Classification
收藏 引用
Big Data Mining and Analytics 2023年 第1期6卷 32-43页
作者: Kalyan Kumar Jena Sourav Kumar Bhoi Soumya Ranjan Nayak Ranjit Panigrahi Akash Kumar Bhoi Department of Computer Science and Engineering Parala Maharaja Engineering CollegeBerhampur 761003India Amity School of Engineering and Technology Amity UniversityUttar Pradesh 201303India Department of Computer Applications Sikkim Manipal Institute of TechnologySikkim Manipal UniversitySikkim 737102India Directorate of Research Sikkim Manipal UniversityGangtokSikkim 737102India
As a huge number of satellites revolve around the earth,a great probability exists to observe and determine the change phenomena on the earth through the analysis of satellite images on a real-time ***,classifying sat... 详细信息
来源: 评论
Intelligent analysis to detect phishing websites using machine learning ensemble techniques
收藏 引用
Human-Intelligent Systems Integration 2024年 第1期6卷 39-47页
作者: Pandey, Mithilesh Kumar Pal, Rekha Pal, Saurabh Kumar, Alok Shukla, Arvind Kumar Yadav, Dhyan Chandra Department of Computer Applications VBS Purvanchal University Jaunpur India Department of Computer Applications Vivek College of Education Bijnor India School of Computer Science & Applications IFTM University Moradabad India Department of Computer Science and Engineering MUIT Lucknow India
The Internet has grown to be a vital part of our everyday existence. Web browsing is the most popular Internet service. A lot of people use their browser for banking, online shopping, bill paying, and mobile phone rec...
来源: 评论
Blood Cell Classification and Counting in Hematology through Deep Learning  4
Blood Cell Classification and Counting in Hematology through...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Ananthi, P. Devi, K. Nirmala Ramya, T.E. Shanmugapriya, P. Aradhya, T. Kongu Engineering College Department of Computer Technology Perundurai Tamil Nadu Erode India Madanapalle Institute of Technology & Science Department of Computer Applications India Kongu Engineering College Perundurai Tamil Nadu Erode India
Medical diagnosis is one of the areas that has been greatly influenced by the progress of computer vision technologies. This study presents a unique approach for the detection and counting of blood cells in hematology... 详细信息
来源: 评论
Harnessing the Potential of the Internet of Things: Navigating Choices Between Fog and Cloud Infrastructure in Agriculture  1
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Singh, Malikhan Arora, Kavita Pathak, Sonal Quraishi, Suhail Javed Singh, Anupam Ather, Danish Computer Science and Engineering Modern Institute of Technology and Research Centre Rajasthan Alwar India School of Computer Applications Manav Rachna International Institute of Research and Studies Haryana Faridabad India Department of Computer Science and Engineering Graphic era Hill University Dehradun India Amity University in Tashkent Tashkent Uzbekistan
In recent years, the Internet of Things (IoT) has become a pivotal force in transforming various sectors, with agriculture being a prominent beneficiary. The integration of smart devices, sensors, and data-driven deci... 详细信息
来源: 评论