咨询与建议

限定检索结果

文献类型

  • 4,467 篇 会议
  • 1,750 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 6,261 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,568 篇 工学
    • 2,700 篇 计算机科学与技术...
    • 2,222 篇 软件工程
    • 933 篇 信息与通信工程
    • 618 篇 控制科学与工程
    • 478 篇 电气工程
    • 402 篇 生物工程
    • 355 篇 电子科学与技术(可...
    • 346 篇 生物医学工程(可授...
    • 267 篇 网络空间安全
    • 252 篇 动力工程及工程热...
    • 241 篇 光学工程
    • 221 篇 机械工程
    • 208 篇 安全科学与工程
    • 204 篇 化学工程与技术
    • 168 篇 仪器科学与技术
    • 166 篇 交通运输工程
  • 2,003 篇 理学
    • 1,032 篇 数学
    • 561 篇 物理学
    • 465 篇 生物学
    • 343 篇 统计学(可授理学、...
    • 233 篇 化学
    • 213 篇 系统科学
  • 1,063 篇 管理学
    • 644 篇 管理科学与工程(可...
    • 476 篇 图书情报与档案管...
    • 316 篇 工商管理
  • 412 篇 医学
    • 325 篇 临床医学
    • 308 篇 基础医学(可授医学...
    • 225 篇 公共卫生与预防医...
    • 183 篇 药学(可授医学、理...
  • 201 篇 法学
    • 163 篇 社会学
  • 116 篇 经济学
  • 104 篇 农学
  • 60 篇 教育学
  • 26 篇 文学
  • 15 篇 军事学
  • 7 篇 艺术学

主题

  • 342 篇 accuracy
  • 249 篇 deep learning
  • 203 篇 machine learning
  • 187 篇 feature extracti...
  • 183 篇 real-time system...
  • 177 篇 computational mo...
  • 169 篇 internet of thin...
  • 149 篇 convolutional ne...
  • 147 篇 predictive model...
  • 135 篇 support vector m...
  • 127 篇 training
  • 113 篇 optimization
  • 104 篇 security
  • 101 篇 cloud computing
  • 98 篇 data models
  • 96 篇 technological in...
  • 95 篇 artificial intel...
  • 91 篇 data mining
  • 88 篇 machine learning...
  • 87 篇 computer science

机构

  • 115 篇 lovely professio...
  • 110 篇 department of co...
  • 98 篇 department of co...
  • 78 篇 school of comput...
  • 63 篇 department of co...
  • 62 篇 school of comput...
  • 55 篇 school of comput...
  • 54 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 47 篇 department of co...
  • 45 篇 chitkara centre ...
  • 41 篇 lloyd institute ...
  • 39 篇 chitkara univers...
  • 39 篇 gla university d...
  • 37 篇 key laboratory o...
  • 35 篇 beijing engineer...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 53 篇 neeraj varshney
  • 43 篇 singh kamred udh...
  • 43 篇 varshney neeraj
  • 42 篇 singh teekam
  • 39 篇 rakesh kumar
  • 36 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 32 篇 patra sudhansu s...
  • 30 篇 bibhuti bhusan d...
  • 30 篇 kumar rakesh
  • 30 篇 kumar gaurav
  • 28 篇 jian-ping li
  • 28 篇 tina babu
  • 28 篇 pan jeng-shyang
  • 26 篇 teekam singh
  • 24 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 24 篇 asha v.
  • 24 篇 saloni bansal
  • 23 篇 babu tina

语言

  • 5,037 篇 英文
  • 1,191 篇 其他
  • 45 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Computer Applications in Science and Engineering"
6261 条 记 录,以下是4871-4880 订阅
排序:
Clustering of Words using Dictionary-Learnt Word Representations
Clustering of Words using Dictionary-Learnt Word Representat...
收藏 引用
International Conference on Advances in Computing, Communications and Informatics
作者: Remya R. K. Menon Gargi, S. Samili, S. Department of Computer Science and Applications Amrita School of Engineering Amrita Vishwa Vidyapeetham Amrita University
Language is the way of communication through words. This will help to get a better insight of the world. Natural Language Processing (NLP) mainly concentrate on expanding systems that allow computers to communicate wi... 详细信息
来源: 评论
Privacy-preserving anomaly detection across multi-domain for software defined networks  7th
Privacy-preserving anomaly detection across multi-domain for...
收藏 引用
7th International Conference on the Theory, Technologies and applications of Trusted Systems, INTRUST 2015
作者: Bian, Huishan Zhu, Liehuang Shen, Meng Wang, Mingzhong Xu, Chang Zhang, Qiongyu Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications School of Computer Science Beijing Institute of Technology Beijing China Nanjing China University of the Sunshine Coast Queensland Australia
Software Defined Network (SDN) separates control plane from data plane and provides programmability which adds rich function for anomaly detection. In this case, every organization can manage their own network and det... 详细信息
来源: 评论
Harnessing the discriminatory strength of dictionaries
Harnessing the discriminatory strength of dictionaries
收藏 引用
International Conference on Advances in Computing, Communications and Informatics (ICACCI)
作者: Remya R K Menon Neethu V Kini G Athira Krishnan Department of Computer Science and Applications Amrita School of Engineering Amrita Vishwa Vidyapeetham Amritapuri Kollam
Over the past few years there are many developments in the area of classification in data mining. Classification is a supervised learning method, that maps data into predefined groups or classes. Nowadays classificati... 详细信息
来源: 评论
A novel PUF based on cell error rate distribution of STT-RAM  21
A novel PUF based on cell error rate distribution of STT-RAM
收藏 引用
21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016
作者: Zhang, Xian Guangyu, Sun Zhang, Yaojun Chen, Yiran Li, Hai Wen, Wujie Di, Jia Center for Energy-Efficient Computing and Applications Peking University Beijing100871 China Collaborative Innovation Center of High Performance Computing NUDT Changsha410073 China Department of Electrical and Computer Engineering University of Pittsburgh PittsburghPA15261 United States Department of Electrical and Computer Engineering Florida International University MiamiFL33199 United States Computer Science and Computer Engineering University of Arkansas FayettevilleAR72701 United States
Physical Unclonable Functions (PUFs) have been widely proposed as security primitives to provide device identification and authentication. Recently, PUFs based on Non-volatile Memory (NVM) are widely proposed since th... 详细信息
来源: 评论
Mean-field theory for the Nagel-Schreckenberg model with overtaking strategy
收藏 引用
Journal of Physics: Conference Series 2018年 第1期1113卷
作者: Zhu Su Weibing Deng Jihui Han Wei Li Xu Cai National Engineering Laboratory for Technology of Big Data Applications in Education Central China Normal University Wuhan P. R. China Complexity Science Center Institute of Particle Physics Central China Normal University Wuhan P. R. China School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou P.R. China
Based on the Nagel-Schreckenberg (NS) model with periodic boundary conditions, a modified model considered overtaking strategy (NSOS) has been proposed [1, 2]. In this paper, we focus on the theoretical analysis of tr...
来源: 评论
Arbitrary order 2D virtual elements for polygonal meshes: Part II, inelastic problem
arXiv
收藏 引用
arXiv 2017年
作者: Artioli, E. Beirão da Veiga, L. Lovadina, C. Sacco, E. Department of Civil Engineering and Computer Science University of Rome Tor Vergata Via del Politecnico 1 Rome00133 Italy Department of Mathematics and Applications University of Milan Bicocca Via Roberto Cozzi 55 Milan20125 Italy Department of Mathematics University of Milano Via Cesare Saldini 50 Milano20133 Italy Civil Engineering and Mechanical Engineering University of Cassino and Southern Lazio Via Di Biasio 43 Cassino03043 Italy
The present paper is the second part of a twofold work, whose first part is reported in [3], concerning a newly developed Virtual Element Method (VEM) for 2D continuum problems. The first part of the work proposed a s... 详细信息
来源: 评论
Application-layer clock synchronization for wearables using skin electric potentials induced by powerline radiation
arXiv
收藏 引用
arXiv 2017年
作者: Yan, Zhenyu Li, Yang Tan, Rui Huang, Jun School of Computer Science and Engineering Nanyang Technological University 50 Nanyang Avenue Singapore639798 Singapore Advanced Digital Sciences Center Illinois at Singapore Connexis North Tower 1 Fusionopolis Way #08-10 Singapore138632 Center for Energy Efficient Computing and Applications Peking University 5 Yiheyuan Road Haidian Beijing100871 China
Design of clock synchronization for networked nodes faces a fundamental trade-off between synchronization accuracy and universality for heterogeneous platforms, because a high synchronization accuracy generally requir... 详细信息
来源: 评论
Object verification in two views using Sparse representation  23
Object verification in two views using Sparse representation
收藏 引用
23rd International Conference on Pattern Recognition, ICPR 2016
作者: Hsu, Shih-Chung Chang, I-Cheng Huang, Chung-Lin Department of Electrical Engineering National Tsing-Hua University Hsin-Chu Taiwan Department of Computer Science and Information Dong-Hwa University Hua-Lien Taiwan Department of M-Commerce and Multimedia Applications Asia University Tai-Chung Taiwan
This paper proposes an object verification method by using sparse representation (SR) which has been applied for object representation and recognition. However, SR dictionary does not show sufficient compactness. Our ... 详细信息
来源: 评论
SN 2018agk: A prototypical Type Ia Supernova with a smooth power-law rise in Kepler (K2)
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Qinan Rest, Armin Zenati, Yossef Ridden-Harper, Ryan Dimitriadis, Georgios Narayan, Gautham Villar, V. Ashley Magee, Mark R. Foley, Ryan J. Shaya, Edward J. Garnavich, Peter Wang, Lifan Hu, Lei Bódi, Attila Armstrong, Patrick Auchettl, Katie Barclay, Thomas Barentsen, Geert Bognár, Zsófia Brimacombe, Joseph Bulger, Joanna Burke, Jamison Challis, Peter Chambers, Kenneth Coulter, David A. Csörnyei, Géza Cseh, Borbála Deckers, Maxime Dotson, Jessie L. Galbany, Lluís González-Gaitán, Santiago Gromadzki, Mariusz Gully-Santiago, Michael Hanyecz, Ottó Hedges, Christina Hiramatsu, Daichi Hosseinzadeh, Griffin Howell, D. Andrew Howell, Steve B. Huber, Mark E. Jha, Saurabh W. Jones, David O. Könyves-Tóth, Réka Kalup, Csilla Kilpatrick, Charles D. Kriskovics, Levente Li, Wenxiong Lowe, Thomas B. Margheim, Steven McCully, Curtis Mitra, Ayan Muñoz, Jose A. Nicholl, Matt Nordin, Jakob Pál, András Pan, Yen-Chen Piro, Anthony L. Rest, Sofia Rino-Silvestre, João Rojas-Bravo, César Sárneczky, Krisztián Siebert, Matthew R. Smartt, Stephen J. Smith, Ken Sódor, Ádám Stritzinger, Maximilian D. Szabó, Róbert Szakáts, Róbert Tucker, Brad E. Vinkó, József Wang, Xiaofeng Wheeler, J. Craig Young, David R. Zenteno, Alfredo Zhang, Kaicheng Zsidi, Gabriella Department of Physics and Astronomy The Johns Hopkins University BaltimoreMD21218 United States Space Telescope Science Institute BaltimoreMD21218 United States Israel Excellence Fellowship Department of Astronomy and Astrophysics University of California Santa CruzCA95064 United States School of Physics Trinity College Dublin The University of Dublin Dublin 2 Ireland Department of Astronomy University of Illinois 1002 W. Green St. Urbana-ChampaignIL61801 United States Center for Astrophysical Surveys National Center for Supercomputing Applications UrbanaIL61801 United States Department of Astronomy & Astrophysics The Pennsylvania State University University ParkPA16802 United States Institute for Computational & Data Sciences The Pennsylvania State University University ParkPA16802 United States Institute for Gravitation and the Cosmos The Pennsylvania State University University ParkPA16802 United States Astronomy Department University of Maryland College ParkMD20742 United States University of Notre Dame Notre DameIN46556 United States Mitchell Institute for Fundamental Physics Department of Physics and Astronomy Texas A&M University College StationTX77843 United States Purple Mountain Observatory Chinese Academy of Sciences 10 Yuanhua Road Nanjing210033 China Konkoly Observatory CSFK Konkoly-Thege M. ut 15-17 Budapest1121 Hungary MTA CSFK Lendület Near-Field Cosmology Research Group Konkoly Thege Miklós út 15-17 Budapest1121 Hungary Mt Stromlo Observatory The Research School of Astronomy and Astrophysics Australian National University ACT2601 Australia School of Physics The University of Melbourne VIC3010 Australia University of Maryland Baltimore County 1000 Hilltop Circle BaltimoreMD21250 United States Bay Area Environmental Research Institute P.O. Box 25 Moffett Field CA94035 United States Coral Towers Observatory Cairns Australia Institute for Astronomy University of Hawai'i 2680 Woodlawn Drive HonoluluHI96
We present the 30-min cadence Kepler/K2 light curve of the Type Ia supernova (SN Ia) SN 2018agk, covering approximately one week before explosion, the full rise phase and the decline until 40 days after peak. We addit... 详细信息
来源: 评论
Improving constrained glider trajectories for ocean eddy border sampling within extended mission planning time
Improving constrained glider trajectories for ocean eddy bor...
收藏 引用
2016 IEEE Congress on Evolutionary Computation, CEC 2016
作者: Zamuda, Aleš Daniel Hernández Sosa, José Adler, Leonhard Faculty of Electrical Engineering and Computer Science University of Maribor Smetanova ul. 17 Maribor2000 Slovenia Institute of Intelligent Systems and Numerical Applications in Engineering University of Las Palmas de Gran Canaria Campus de Tafira Las Palmas de Gran Canaria35017 Spain
This paper extends the performance assessment of an underwater glider path planning approach recently proposed for constrained sub-mesoscale eddy border sampling conditions, for situations benefiting from extended mis... 详细信息
来源: 评论