咨询与建议

限定检索结果

文献类型

  • 3,447 篇 会议
  • 1,260 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,737 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,686 篇 工学
    • 2,081 篇 计算机科学与技术...
    • 1,712 篇 软件工程
    • 753 篇 信息与通信工程
    • 506 篇 控制科学与工程
    • 387 篇 电气工程
    • 329 篇 生物工程
    • 295 篇 生物医学工程(可授...
    • 285 篇 电子科学与技术(可...
    • 237 篇 网络空间安全
    • 195 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 185 篇 安全科学与工程
    • 166 篇 机械工程
    • 152 篇 化学工程与技术
    • 137 篇 交通运输工程
    • 123 篇 材料科学与工程(可...
  • 1,509 篇 理学
    • 757 篇 数学
    • 397 篇 物理学
    • 384 篇 生物学
    • 260 篇 统计学(可授理学、...
    • 178 篇 化学
    • 170 篇 系统科学
  • 861 篇 管理学
    • 518 篇 管理科学与工程(可...
    • 384 篇 图书情报与档案管...
    • 271 篇 工商管理
  • 356 篇 医学
    • 278 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 201 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 171 篇 法学
    • 141 篇 社会学
  • 100 篇 经济学
  • 90 篇 农学
  • 46 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 288 篇 accuracy
  • 201 篇 deep learning
  • 170 篇 machine learning
  • 157 篇 real-time system...
  • 150 篇 internet of thin...
  • 144 篇 feature extracti...
  • 141 篇 computational mo...
  • 137 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 96 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 82 篇 artificial intel...
  • 81 篇 technological in...
  • 80 篇 cloud computing
  • 76 篇 machine learning...
  • 72 篇 data mining
  • 69 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 112 篇 department of co...
  • 99 篇 department of co...
  • 64 篇 department of co...
  • 60 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 45 篇 chitkara centre ...
  • 45 篇 department of co...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 22 篇 babu tina
  • 22 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,449 篇 英文
  • 271 篇 其他
  • 23 篇 中文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Computer Applications in Science and Engineering Department"
4737 条 记 录,以下是311-320 订阅
排序:
A Study on Swarm-Based Approaches for Intrusion Detection System in Cloud Environment
A Study on Swarm-Based Approaches for Intrusion Detection Sy...
收藏 引用
International Conference on Advances in Data-driven Computing and Intelligent Systems, ADCIS 2022
作者: Nishika Solanki, Kamna Dalal, Sandeep University Institute of Engineering and Technology MDU Rohtak India Department of Computer Science and Applications MDU Rohtak India
Cloud is an advanced Internet of Things enabled network. The layered and distributed nature of this network opens this network to the public environment and varied kind of users. Bulk of data is stored on central... 详细信息
来源: 评论
An Improved Multi-Objective Particle Swarm Optimization Routing on MANET
收藏 引用
computer Systems science & engineering 2023年 第2期44卷 1187-1200页
作者: G.Rajeshkumar M.Vinoth Kumar K.Sailaja Kumar Surbhi Bhatia Arwa Mashat Pankaj Dadheech Department of Computer Science and Engineering Erode Sengunthar Engineering CollegePerunduraiErode638057Tamil NaduIndia Department of Information Science and Engineering Dayananda Sagar Academy of Technology and ManagementBangalore560082India Department of Master of Computer Applications M.S.Ramaiah Institute of TechnologyBangalore560054India Department of Information Systems College of Computer Science and Information TechnologyKing Faisal UniversityRiyadh11533Saudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityRabigh21911Saudi Arabia Department of Computer Science and Engineering Swami Keshvanand Institute of TechnologyManagement&GramothanJaipur302017RajasthanIndia
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs ... 详细信息
来源: 评论
Detection of Mango Leaves Disease using CSUBW based Residual Attention with EfficientNet  2
Detection of Mango Leaves Disease using CSUBW based Residual...
收藏 引用
2nd International Conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Kumar V, Sunil Jyothi, A.P. Nagamani, H.S. Sumanth, S. Nitte Meenakshi Institute of Technology Department of Artificial Intelligence and Machine Learning Bengaluru India Ramaiah University of Applied Sciences Faculty of Engineering and Technology Department of Cse Bengaluru India Department of Computer Science Bengaluru India Department of Computer Science and Computer Applications Kolar India
Mangoes are one of the most popular fruits worldwide due to their taste and nutrition. Plant diseases may reduce plant quantity and quality. Disease management to improve crop quality and productivity requires early p... 详细信息
来源: 评论
Heart Disease Prediction Model using various Supervised Learning Algorithm  12
Heart Disease Prediction Model using various Supervised Lear...
收藏 引用
12th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2023
作者: Upadhyay, Sachin Dwivedi, Anjali Verma, Ashutosh Tiwari, Vatsya Gla University Department of Computer Engineering & Application Mathura India Government Girls Polytechnic Computer Science and Engineering Amethi India G.L. Bajaj Group of Institutions Computer Science & Engineering Mathura India Bsa College of Engineering & Technology Department of Computer Science & Applications Mathura India
A computer can learn from data and improve its predictive abilities without requiring human interaction through artificial intelligence (AI) derived from machine learning (ML). Machine learning's core concept is t... 详细信息
来源: 评论
Accurate Anomaly Detection in Medical Images using Transfer Learning and Data Optimization: MRI and CT as Case Studies  5
Accurate Anomaly Detection in Medical Images using Transfer ...
收藏 引用
5th International Conference on Neural Networks and Neurotechnologies, NeuroNT 2024
作者: Nizamli, Yasser Filatov, Anton Yu. Fadel, Weaam Shichkina, Yulia A. Saint Petersburg Electrotechnical University 'LETI' Department of Software Engineering and Computer Applications Saint Petersburg Russia Saint Petersburg Electrotechnical University 'LETI' Department of Computer Science Saint Petersburg Russia
Today, medical imaging techniques are widely used to detect a variety of human conditions and diseases. To speed up the diagnostic process, systems are often automated using deep learning methods, which have been prov... 详细信息
来源: 评论
Phasmatodea Population Evolution Algorithm Based on Spiral Mechanism and Its Application to Data Clustering
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 475-496页
作者: Jeng-Shyang Pan Mengfei Zhang Shu-Chuan Chu Xingsi Xue Václav Snášel College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China Department of Information Management Chaoyang University of TechnologyTaichung41349TaiwanChina Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou350118China Faculty of Electrical Engineering and Computer Science VŠB-Technical University of OstravaOstrava70833Czech Republic
Data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data *** clustering algorithms,such as K-means,are widely used due to their simplicity and *** p... 详细信息
来源: 评论
An efficient speech emotion recognition based on a dual-stream CNN-transformer fusion network
收藏 引用
International Journal of Speech Technology 2023年 第2期26卷 541-557页
作者: Tellai, Mohammed Gao, Lijian Mao, Qirong Department of Computer Science and Communication Engineering Jiangsu University Jiangsu Zhenjiang212013 China Jiangsu Engineering Research Center of Big Data Ubiquitous Perception and Intelligent Agriculture Applications Jiangsu Zhenjiang212013 China
The use of machine learning and artificial intelligence enables us to create intelligent systems. Speech emotion recognition system analyzes the speaker’s speech to determine his/her emotional state. Speech emotion r... 详细信息
来源: 评论
Security model to identify block withholding attack in blockchain
Security model to identify block withholding attack in block...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Keshta, Ismail Reegu, Faheem Ahmad Ahmad, Adeel Saxena, Archana Chandan, Radha Raman Mahalakshmi, V. Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia Department of Computer Applications Invertis University UP Bareilly India Department of Computer Science and Engineering Shambhunath Institute of Engineering and Technology College Jhalwa Prayagraj India Department of Computer Science College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia
Block interception attack, also known as block withholding attack, is an attack method in the blockchain. The attacker penetrates the target mining pool for passive mining to destroy the target mining pool. This paper... 详细信息
来源: 评论
Extractive Summarization on Twi Language Using Text-Rank and Fuzzy Clustering Algorithm  1
Extractive Summarization on Twi Language Using Text-Rank and...
收藏 引用
1st International Conference on Circuits, Power, and Intelligent Systems, CCPIS 2023
作者: Dhole, Sayak Sagnika, Santwana Dominic, Ampofo Mishra, Bhabani Shankar Prasad Fernando, Aloka Dash, Satya Ranjan School of Computer Engineering Kiit Deemed to Be University India School of Computer Applications Kiit Deemed to Be University India University of Moratuwa Department of Computer Science and Engineering Sri Lanka
Twi is a dialect of the Akan language spoken in southern and central Ghana by several million people. About 80% of the Ghanaian population speaks Twi as a first or second language. Summarization is a basic natural lan... 详细信息
来源: 评论
Double Encryption Technique for Sharing and Storing the Images in the Cloud Environment  4
Double Encryption Technique for Sharing and Storing the Imag...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Anusha, P. Maruthi, R. Kumar, D. Maghesh Begum, H. Parveen Periyar Maniammai Institute of Science and Technology Department of Software Engineering Tamil Nadu Thanjavur India Hindustan Institute of Technology and Science Department of Computer Applications Tamil Nadu Chennai India
Cryptography is used by all organizations to protect the data files and ensures confidentiality mainly at the time of sharing and storing in the cloud data storage. The cloud service providers use a wide range of tool... 详细信息
来源: 评论