咨询与建议

限定检索结果

文献类型

  • 4,562 篇 会议
  • 1,770 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 6,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,644 篇 工学
    • 2,773 篇 计算机科学与技术...
    • 2,266 篇 软件工程
    • 979 篇 信息与通信工程
    • 666 篇 控制科学与工程
    • 489 篇 电气工程
    • 404 篇 生物工程
    • 358 篇 电子科学与技术(可...
    • 358 篇 生物医学工程(可授...
    • 284 篇 网络空间安全
    • 257 篇 动力工程及工程热...
    • 252 篇 光学工程
    • 230 篇 机械工程
    • 228 篇 安全科学与工程
    • 208 篇 化学工程与技术
    • 184 篇 交通运输工程
    • 175 篇 仪器科学与技术
  • 2,025 篇 理学
    • 1,036 篇 数学
    • 562 篇 物理学
    • 468 篇 生物学
    • 337 篇 统计学(可授理学、...
    • 236 篇 化学
    • 213 篇 系统科学
  • 1,098 篇 管理学
    • 674 篇 管理科学与工程(可...
    • 496 篇 图书情报与档案管...
    • 321 篇 工商管理
  • 427 篇 医学
    • 333 篇 临床医学
    • 317 篇 基础医学(可授医学...
    • 240 篇 公共卫生与预防医...
    • 183 篇 药学(可授医学、理...
  • 209 篇 法学
    • 169 篇 社会学
  • 116 篇 经济学
  • 105 篇 农学
  • 62 篇 教育学
  • 29 篇 文学
  • 15 篇 军事学
  • 8 篇 艺术学

主题

  • 345 篇 accuracy
  • 262 篇 deep learning
  • 209 篇 machine learning
  • 190 篇 feature extracti...
  • 187 篇 real-time system...
  • 179 篇 computational mo...
  • 171 篇 internet of thin...
  • 152 篇 convolutional ne...
  • 148 篇 predictive model...
  • 138 篇 support vector m...
  • 128 篇 training
  • 115 篇 optimization
  • 106 篇 security
  • 104 篇 cloud computing
  • 98 篇 data models
  • 97 篇 technological in...
  • 95 篇 artificial intel...
  • 92 篇 data mining
  • 88 篇 machine learning...
  • 87 篇 computer science

机构

  • 115 篇 lovely professio...
  • 112 篇 department of co...
  • 98 篇 department of co...
  • 80 篇 school of comput...
  • 73 篇 gla university d...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 56 篇 school of comput...
  • 51 篇 maharishi school...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 department of co...
  • 42 篇 the islamic univ...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 40 篇 lloyd law colleg...
  • 39 篇 chitkara univers...
  • 38 篇 key laboratory o...
  • 37 篇 beijing engineer...

作者

  • 53 篇 neeraj varshney
  • 45 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 30 篇 bibhuti bhusan d...
  • 29 篇 babu tina
  • 28 篇 jian-ping li
  • 28 篇 tina babu
  • 27 篇 pan jeng-shyang
  • 27 篇 patra sudhansu s...
  • 26 篇 teekam singh
  • 26 篇 asha v.
  • 26 篇 kumar gaurav
  • 24 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 geng xin

语言

  • 4,667 篇 英文
  • 1,679 篇 其他
  • 48 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=Computer Applications in Science and Engineering"
6377 条 记 录,以下是531-540 订阅
排序:
Addressing Mobility Based RPL Routing for Low Power Lossy Networks in IoV Networks  2
Addressing Mobility Based RPL Routing for Low Power Lossy Ne...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Diniesh, V.C. Murugesan, G. Jude, M. Joseph Auxilius Prabhakaran, A. Haritha, N. Jeevanaa, S.M. Karthikraja, A. Kongu Engineering College Department of Electronics and Communication Engineering Erode India Madanapalle Institute of Technology and Science Department of Computer Applications AP Madanapalle India Kongu Engineering College Department of Electronics and Communication Erode India
The Internet of Vehicles (IoV) has quickly progressed, linking a myriad of devices to facilitate data-driven applications in several fields. Routing Protocol for Low-power and Lossy Networks (RPL) is crucial to this p... 详细信息
来源: 评论
Quantum Cryptography Techniques for Enhancing Security in IoT Communications
Quantum Cryptography Techniques for Enhancing Security in Io...
收藏 引用
2024 International Conference on Distributed Systems, computer Networks and Cybersecurity, ICDSCNC 2024
作者: Naga, Suresh Bysani Venkata Kotiyal, Arnav Battula, R.S.S. Raju Patil, Harshal Dharangutti, Yogesh Natrayan, L. Eightfold.ai Ex - Cohesity CA United States Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Aditya University Department of Computer Applications Surampalem India Iilm University School of Computer Science & Engineering Greater Noida India Department of Law Pune India School of Engineering Simats Department of Mechanical Engineering Saveetha Kuthambakkam India
A system of wirelessly communicative sensors embedded in a person's clothing. In order to remotely monitor and treat a patient's health, sensor devices are embedded in clothing, skin, and the human body itself... 详细信息
来源: 评论
Energy Theft Detection in Smart Grids:Taxonomy,Comparative Analysis,Challenges,and Future Research Directions
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第4期9卷 578-600页
作者: Mohsin Ahmed Abid Khan Mansoor Ahmed Mouzna Tahir Gwanggil Jeon Giancarlo Fortino Francesco Piccialli the Department of Computer Science COMSATS University Islamabad the Department of Computer Science School of ComputingEngineering and Digital TechnologiesTeesside University the Innovative Value Institute Maynooth University the Department of Computer Science Bahria University the School of Electronic Engineering Xidian University the Department of Embedded Systems Engineering Incheon National University IEEE the Department of Informatics ModelingElectronics and SystemsUniversity of Calabria the Department of Mathematics and Applications“R.Caccioppoli” University of Naples FedericoⅡ
Electricity theft is one of the major issues in developing countries which is affecting their economy *** with the introduction of emerging technologies,this issue became more *** many new energy theft detection(ETD)t... 详细信息
来源: 评论
Comparative Analysis of RAG, Fine-Tuning, and Prompt engineering in Chatbot Development
Comparative Analysis of RAG, Fine-Tuning, and Prompt Enginee...
收藏 引用
2024 International Conference on Future Technologies for Smart Society, ICFTSS 2024
作者: Chaubey, Harshit Kumar Tripathi, Gaurav Ranjan, Rajnish Gopalaiyengar, Srinivasa K. Iiit Naya Raipur Computer Science and Engineering Raipur India Iiit Naya Raipur Electronics and Communication Engineering Raipur India Iit Data Science and Applications Madras Chennai India Iiit Data Science and Artificial Intelligence Naya Raipur Raipur India
This paper examines the integration and comparative effectiveness of Retriever-Augmented Generation (RAG), fine-tuning, and prompt engineering in the development of advanced chatbots. By employing domain-specific fine... 详细信息
来源: 评论
Recognition of Data Breach Method from Story Using Advanced Deep Learning  3
Recognition of Data Breach Method from Story Using Advanced ...
收藏 引用
3rd International Conference for Innovation in Technology, INOCON 2024
作者: Jeba, Samiha Maisha Aurpa, Tanjim Taharat Alom, Md Samiul Joy, Md. Wadud Mahmud Ahamed, Asm Shakil Dash, Satya Ranjan Ahmed, Md Shoaib International University of Business Agriculture and Technology Dept. of Computer Science and Engineering Bangladesh Bangabandhu Sheikh Mujibur Rahman Digital University Department of Data Science Bangladesh Kiit University School of Computer Applications Odisha India Boise State University Department of Computer Science BoiseID United States
We often open our eyes in the morning with the appalling news of data breaches of different popular companies. This is a significant threat not only to giant companies but also to the general people's privacy. Var... 详细信息
来源: 评论
Developing a Blockchain Framework for Enhancing Security in Food Supply Chains
Developing a Blockchain Framework for Enhancing Security in ...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Rakhra, Manik Singh, Pritpal Khanna, Aseem Angra, Prikshat Kumar Kumar, Ashwani Katoch, Navneet Lovely Professional University School of Computer Science and Engineering Phagwara India Lovely Professional University Mittal School of Business Phagwara India Lovely Professional University School of Computer Applications Phagwara India India
This paper proposes a novel blockchain framework aimed at enhancing security measures within food supply chains. By integrating blockchain technology, the framework seeks to ensure transparency, traceability, and tamp... 详细信息
来源: 评论
Hybrid Compiler and Hardware Approach to Mitigate Side-Channel Vulnerabilities in Parallel GPU Architectures  8
Hybrid Compiler and Hardware Approach to Mitigate Side-Chann...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Lungu, Nelson Dash, Bibhuti Bhusan De Chandra, Utpal Dash, Bibek Bikram Pattanayak, Binod Kumar Patra, Sudhansu Shekhar Electrical and Electronical Engineering University of Zambia Lusaka Zambia School of Computer Applications Kiit Deemed to be University Bhubaneswar India HealthWorksAI Bangalore India Iter Siksha 'O' Anusandhan University Department of Computer Science & Engineering Odisha Bhubaneswar India
Graphics processing units (GPUs) have become ubiquitous in computing systems, from personal devices to data centres. Their massively parallel architecture delivers tremendous performance for graphics and general-purpo... 详细信息
来源: 评论
Systematic Review of GAN for Enhancing Efficiency in AI in Gaming
Systematic Review of GAN for Enhancing Efficiency in AI in G...
收藏 引用
2024 International Conference on Advances in Computing Research on science engineering and Technology, ACROSET 2024
作者: Singh, Jasdeep Islam, Sardar M. N. Tewatia, Manav Garg, Deepanshu Fatima, Neda School of Computer Applications Manav Rachna International Institute of Research and Studies Faridabad India Victoria University Department of Computer Science and Engineering Melbourne Australia School of Engineering and Technology Manav Rachna International Institute of Research and Studies Faridabad India
A thorough analysis of Generative Adversarial Networks (GANs) and how they might be used to improve AI gaming efficiency is presented in this research. Game developers now have never-before-seen possibilities for inno... 详细信息
来源: 评论
An Extensive Examination of Different Phases Available in Enhancing the Power of WSN  4
An Extensive Examination of Different Phases Available in En...
收藏 引用
4th IEEE International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2024
作者: Gill, Rupali Kumar, Rakesh Pant, Shivani Deepika, A. Al-Fatlawy, Ramy Riad Angadi, Sanjeevkumar Chitkara University Centre of Research Impact and Outreach Punjab Rajpura140401 India Gla University Department of Computer Engineering & Applications Mathura India Uttaranchal Institute of Technology Uttaranchal University Department of Computer Science Engineering Dehradun248007 India India The Islamic University Najaf Iraq Computer Science and Engineering Nutan College of Engineering and Research Pune Maharashtra Talegaon Dabhade India
In this whole test, we delve into the evolution and transformative ability of Wireless Sensor Networks (WSNs), emphasizing the pivotal position of graphical statistics in elucidating the technological improvements and... 详细信息
来源: 评论
A Hybrid Approach for Automated GUI Testing Using Quasi-Oppositional Genetic Sparrow Search Algorithm
A Hybrid Approach for Automated GUI Testing Using Quasi-Oppo...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Jayalakshmi, N. Sakthivel, K. Psna College of Engineering and Technology Department of Computer Applications Tamil Nadu Dindigul India K.S Rangasamy College of Technology Department of Computer Science and Business Systems Tamil Nadu Tiruchengode India
Testing of GUI is crucial for assessing software reliability, usability, and functionality;however, classical approaches are not sustainable in contemporary applications. It proposes the Quasi-Oppositional Genetic Spa... 详细信息
来源: 评论