咨询与建议

限定检索结果

文献类型

  • 3,578 篇 会议
  • 1,283 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 4,892 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,787 篇 工学
    • 2,161 篇 计算机科学与技术...
    • 1,765 篇 软件工程
    • 803 篇 信息与通信工程
    • 554 篇 控制科学与工程
    • 400 篇 电气工程
    • 331 篇 生物工程
    • 307 篇 生物医学工程(可授...
    • 292 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 204 篇 安全科学与工程
    • 202 篇 光学工程
    • 193 篇 动力工程及工程热...
    • 175 篇 机械工程
    • 162 篇 化学工程与技术
    • 155 篇 交通运输工程
    • 130 篇 材料科学与工程(可...
  • 1,541 篇 理学
    • 774 篇 数学
    • 407 篇 物理学
    • 387 篇 生物学
    • 269 篇 统计学(可授理学、...
    • 184 篇 化学
    • 170 篇 系统科学
  • 900 篇 管理学
    • 550 篇 管理科学与工程(可...
    • 407 篇 图书情报与档案管...
    • 281 篇 工商管理
  • 370 篇 医学
    • 289 篇 临床医学
    • 275 篇 基础医学(可授医学...
    • 213 篇 公共卫生与预防医...
    • 159 篇 药学(可授医学、理...
  • 179 篇 法学
    • 147 篇 社会学
  • 103 篇 经济学
  • 91 篇 农学
  • 49 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 301 篇 accuracy
  • 219 篇 deep learning
  • 181 篇 machine learning
  • 165 篇 real-time system...
  • 158 篇 internet of thin...
  • 152 篇 feature extracti...
  • 147 篇 computational mo...
  • 145 篇 convolutional ne...
  • 124 篇 predictive model...
  • 116 篇 support vector m...
  • 114 篇 training
  • 101 篇 optimization
  • 94 篇 security
  • 87 篇 data models
  • 84 篇 artificial intel...
  • 84 篇 cloud computing
  • 81 篇 technological in...
  • 78 篇 machine learning...
  • 73 篇 data mining
  • 70 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 113 篇 department of co...
  • 102 篇 department of co...
  • 73 篇 gla university d...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 44 篇 the islamic univ...
  • 43 篇 lloyd law colleg...
  • 42 篇 graphic era deem...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 47 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 36 篇 kumar rakesh
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 29 篇 babu tina
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 26 篇 teekam singh
  • 26 篇 saloni bansal
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 24 篇 patra sudhansu s...
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 20 篇 bibhuti bhusan d...

语言

  • 3,514 篇 英文
  • 1,363 篇 其他
  • 29 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4892 条 记 录,以下是3921-3930 订阅
排序:
Preface
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and Computing 2019年 740卷 v-vii页
作者: Kalita, Jugal Balas, Valentina Emilia Borah, Samarjeet Pradhan, Ratika College of Engineering and Applied Science University of Colorado Colorado Springs Colorado SpringsCO United States Automation and Applied Informatics Aurel Vlaicu University of Arad Arad Romania Department of Computer Applications Sikkim Manipal University Sikkim India
来源: 评论
Optical Filter Enabled Continuous Disinfection of Hospital Rooms Using Multi-Sensor Feedback Aided Light Source
收藏 引用
Procedia computer science 2018年 125卷 459-467页
作者: Akshay Kulkarni Vinay Kumar Pankaj Dhule Sanjay Kumar Mishra Anvita Tripathi Rabindra K. Barik Department of Electronics and Communication Engineering Visvesvaraya National Institute of Technology Nagpur-440010 India Senior Medical Officer Visvesvaraya National Institute of Technology Nagpur-440010 India Saraswathi Institute of Medical Science Hapur-245304 India Shankarlal Hospital G.T Road Ghaziabad-201001 India School of Computer Applications KIIT University-751024 India
In this paper, We have implemented an efficient technique for the inactivation of pathogens in the air and on the surfaces of the hospital rooms. These rooms are the main source of the bacterial diseases spreading in ... 详细信息
来源: 评论
Voltage-induced switching of an antiferromagnetically ordered topological Dirac semimetal
收藏 引用
Physical Review B 2018年 第13期97卷 134415-134415页
作者: Youngseok Kim Kisung Kang André Schleife Matthew J. Gilbert Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Urbana Illinois 61801 USA Micro and Nanotechnology Laboratory University of Illinois 208 N. Wright Street Urbana Illinois 61801 USA Department of Materials Science and Engineering University of Illinois at Urbana-Champaign Urbana Illinois 61801 USA Frederick Seitz Materials Research Laboratory University of Illinois at Urbana-Champaign Urbana Illinois 61801 USA National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Urbana Illinois 61801 USA
An antiferromagnetic semimetal has been recently identified as a new member of topological semimetals that may host three-dimensional symmetry-protected Dirac fermions. A reorientation of the Néel vector may brea... 详细信息
来源: 评论
Mist Data: Leveraging Mist Computing for Secure and Scalable Architecture for Smart and Connected Health
收藏 引用
Procedia computer science 2018年 125卷 647-653页
作者: Rabindra K. Barik Amaresh Chandra Dubey Ankita Tripathi T. Pratik Sapna Sasane Rakesh K. Lenka Harishchandra Dubey Kunal Mankodiya Vinay Kumar School of Computer Applications KIIT University Odisha India CDAC Knowledge Park Bengaluru Karnataka 560038 India John Deere India Pvt. Ltd. Pune 411013 India Department of Computer Science and Engineering IIIT Bhubaneswar India Department of Geography Savitribai Phule Pune University India Center for Robust Speech Systems University of Texas at Dallas Richardson TX-75080 USA Wearable Biosensing Lab University of Rhode Island Kingston RI-02881 USA Department of ECE Visvesvaraya National Institute of Technology Nagpur India
The smart health paradigms employ Internet-connected wearables for tele-monitoring, diagnosis providing inexpensive healthcare solutions. Mist computing reduces latency and increases throughput by processing data near... 详细信息
来源: 评论
A novel unsupervised method for new word extraction
收藏 引用
science China(Information sciences) 2016年 第9期59卷 11-21页
作者: Lili MEI Heyan HUANG Xiaochi WEI Xianling MAO Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Department of Computer Science and TechnologyBeijing Institute of Technology
New words could benefit many NLP tasks such as sentence chunking and sentiment analysis. However, automatic new word extraction is a challenging task because new words usually have no fixed language pattern, and even ... 详细信息
来源: 评论
Security analysis of Rhee et al.’s public encryption with keyword search schemes: A review
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2018年 第1期3卷 16-25页
作者: Wu, Tsu-Yang Chen, Chien-Ming Wang, King-Hang Pan, Jeng-Shyang Zheng, Weimin Chu, Shu-Chuan Roddick, John F. Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No33 Xuefunan Road University Town Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology No33 Xuefunan Road University Town Fuzhou350118 China School of Computer Science and Technology Harbin Institute of Technology Shenzhen HIT Campus of University Town of Shenzhen Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong College of Science and Engineering Flinders University Sturt Rd Bedford Park SA5042 Australia
Public key encryption with keyword search (PEKS) provides an efficient way to search encrypted files. Recently, Rhee et al. contributed their knowledge to propose several literatures in this research area. In this pap... 详细信息
来源: 评论
Practical locally private heavy hitters
arXiv
收藏 引用
arXiv 2017年
作者: Bassily, Raef Nissim, Kobbi Stemmer, Uri Thakurta, Abhradeep Center for Information Theory and Applications Department of Computer Science and Engineering University of California San Diego Harvard University Harvard University Department of Computer Science University of California Santa Cruz
We present new practical local differentially private heavy hitters algorithms achieving optimal or near-optimal worst-case error and running time - TreeHist and Bitstogram. In both algorithms, server running time is ... 详细信息
来源: 评论
Interface driven service composition: A highlevel colored PetriNet based approach
Interface driven service composition: A highlevel colored Pe...
收藏 引用
International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)
作者: Megha Gaur Amit Kr Mandal Anirban Sarkar Narayan C Debnath Department of Computer Engineering National Institute of Technology Kurukshetra India Department of Computer Applications National Institute of Technology Durgapur India Department of Computer Science Winona State University MN USA
Service composition refers to the process of developing the complex services from existing services. In order to add or remove functionalities of the composite services and to reduce the human intervention, the servic... 详细信息
来源: 评论
Comments on recent proposed Cui Et Al.’s KASE and Lu Et Al.’s dIBEKS schemes
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2018年 第1期9卷 162-169页
作者: Wu, Tsu-Yang Meng, Chao Wang, King-Hang Chen, Chien-Ming Pan, Jeng-Shyang Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No3 Xueyuan Road University Town Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology No3 Xueyuan Road University Town Fuzhou350118 China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School HIT Campus of University Town of Shenzhen Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
Searchable encryption is a cryptographic primitive used to search an encrypted data in cloud storage. Recently, Cui et al. and Lu et al. proposed two variants of secure searchable encryption schemes, respectively. How... 详细信息
来源: 评论
Spintronic nano-scale harvester of broadband microwave energy
arXiv
收藏 引用
arXiv 2018年
作者: Fang, Bin Carpentieri, Mario Louis, Steven Tiberkevich, Vasyl Slavin, Andrei Krivorotov, Ilya N. Tomasello, Riccardo Giordano, Anna Jiang, Hongwen Cai, Jialin Fan, Yaming Zhang, Zehong Zhang, Baoshun Katine, Jordan A. Wang, Kang L. Amiri, Pedram Khalili Finocchio, Giovanni Zeng, Zhongming Key Laboratory of Nanodevices and Applications Suzhou Institute of Nano-tech and Nano-bionics Chinese Academy of Sciences Ruoshui Road 398 Suzhou215123 China Department of Electrical and Information Engineering Polytechnic of Bari Bari70125 Italy Department of Electrical and Computer Engineering Oakland University RochesterMI48309 United States Department of Physics Oakland University RochesterMI48309 United States Department of Physics and Astronomy University of California IrvineCA92697 United States Department of Mathematical and Computer Sciences Physical Sciences and Earth Sciences University of Messina Messina98166 Italy Department of Physics and Astronomy University of California Los AngelesCA90095 United States Western Digital San JoseCA95138 United States Department of Electrical and Computer Engineering University of California Los AngelesCA90095 United States Department of Electrical Engineering and Computer Science Northwestern University EvanstonIL60208 United States
The harvesting of ambient radio-frequency (RF) energy is an attractive and clean way to realize the idea of self-powered electronics. Here we present a design for a microwave energy harvester based on a nanoscale spin... 详细信息
来源: 评论