咨询与建议

限定检索结果

文献类型

  • 3,492 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,717 篇 工学
    • 2,100 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 761 篇 信息与通信工程
    • 513 篇 控制科学与工程
    • 390 篇 电气工程
    • 329 篇 生物工程
    • 295 篇 生物医学工程(可授...
    • 289 篇 电子科学与技术(可...
    • 240 篇 网络空间安全
    • 193 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 185 篇 安全科学与工程
    • 167 篇 机械工程
    • 159 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 133 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 768 篇 数学
    • 406 篇 物理学
    • 384 篇 生物学
    • 268 篇 统计学(可授理学、...
    • 182 篇 化学
    • 170 篇 系统科学
  • 869 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 357 篇 医学
    • 280 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 201 篇 公共卫生与预防医...
    • 159 篇 药学(可授医学、理...
  • 174 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 296 篇 accuracy
  • 208 篇 deep learning
  • 175 篇 machine learning
  • 162 篇 real-time system...
  • 156 篇 internet of thin...
  • 150 篇 feature extracti...
  • 146 篇 computational mo...
  • 142 篇 convolutional ne...
  • 123 篇 predictive model...
  • 113 篇 support vector m...
  • 113 篇 training
  • 98 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 83 篇 artificial intel...
  • 83 篇 cloud computing
  • 81 篇 technological in...
  • 78 篇 machine learning...
  • 73 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 111 篇 department of co...
  • 103 篇 department of co...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 3,837 篇 英文
  • 946 篇 其他
  • 27 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4800 条 记 录,以下是3971-3980 订阅
排序:
Fault-Tolerant Topology for Energy-Harvesting Heterogeneous Wireless Sensor Networks
Fault-Tolerant Topology for Energy-Harvesting Heterogeneous ...
收藏 引用
IEEE International Conference on Communications
作者: Zhiyuan Yin Fan Li Meng Shen Yu Wang Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications School of Computer Science Beijing Institute of Technology Department of Computer Science University of North Carolina at Charlotte
Recent advances in ambient energy-harvesting wireless sensor networks (WSNs) technologies have made it possible to power the network by energy generated from the environment and thereby increase its lifetime. Various ... 详细信息
来源: 评论
Consistent data sharing in mobile ad hoc networks
收藏 引用
International Journal of Wireless and Mobile Computing 2015年 第1期9卷 36-42页
作者: Chandrakala, C.B. Prema, K.V. Hareesha, K.S. Department of Information and Communication Manipal Institute of Technology Manipal University Karnataka India Department of Computer Science and Engineering Manipal Institute of Technology Manipal University Karnataka India Department of Computer and Applications Manipal Institute of Technology Manipal University Karnataka India
In Mobile Adhoc Networks (MANETs), data availability is lower in comparison to the conventional fixed networks because of their mobility and resource-constrained characteristics. Replication and caching have been adap... 详细信息
来源: 评论
Indexing large class handwritten character database
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and Computing 2014年 235卷 227-233页
作者: Guru, D.S. Aradhya, V. N. Manjunath Department of Studies in Computer Science University of Mysore Mysore India Department of Master of Computer Applications Sri Jayachamarajendra College of Engineering Mysore India
This paper proposes a method of indexing handwritten characters of a large number of classes by the use of Kd-tree. The Ridgelets and Gabor features are used for the purpose of representation. A multi dimensional feat... 详细信息
来源: 评论
Weighted Particle Swarm Optimization algorithm for Randomized unit testing
Weighted Particle Swarm Optimization algorithm for Randomize...
收藏 引用
International Conference on Electronics, Communication and Computing Technologies (ICECCT)
作者: K. Devika Rani Dhivya V.S Meenakshi Department of CA and SS Sri Krishna Arts and Science College Coimbatore India Department of Computer Applications Dr. Mahalingam College of Engineering & Technology Pollachi India
Randomized testing is an effective method for testing software units. Thoroughness of randomized unit testing is according to the settings of optimal parameters. Randomized testing uses randomization for some aspects ... 详细信息
来源: 评论
Off-line signature verification based on principal component analysis and multi-layer perceptrons
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and Computing 2014年 235卷 101-109页
作者: Shekar, B.H. Bharathi, R.K. Department of Computer Science Mangalore University Mangalore India Department of Master of Computer Applications S.J. College of Engineering MysoreKarnataka India
The off-line signature verification approach based on Principal Component Analysis (PCA)  and Muti-Layer Perceptrons (MLP)  is proposed in this work. The proposed approach involves three major phases. In the... 详细信息
来源: 评论
Reducing Degeneracy in Maximum Entropy Models of Networks
收藏 引用
Physical Review Letters 2015年 第15期114卷 158701-158701页
作者: Szabolcs Horvát Éva Czabarka Zoltán Toroczkai Department of Physics and Interdisciplinary Center for Network Science & Applications University of Notre Dame Notre Dame Indiana 46556 USA Department of Mathematics University of South Carolina Columbia South Carolina 29208 USA Department of Computer Science and Engineering University of Notre Dame Notre Dame Indiana 46556 USA
Based on Jaynes’s maximum entropy principle, exponential random graphs provide a family of principled models that allow the prediction of network properties as constrained by empirical data (observables). However, th... 详细信息
来源: 评论
Performance Evaluation of Cloud Services with Profit Optimization
收藏 引用
Procedia computer science 2015年 54卷 24-30页
作者: M. Jaiganesh B. Ramadoss A. Vincent Antony Kumar S. Mercy Department of Information Technology PSNA College of Engg. and Tech Dindigul Tamilnadu India Department of Computer Applications National Institute of Technology Thiruchirappalli Tamilnadu India Department of Information Science & Engineering Banglore Institute of Technology Banglore Karnataka India
Cloud computing is a promising computing paradigm which allows distribution of services from a pool of resources. The services are required by the clients through on-demand via pay and use method. The greatest utiliza... 详细信息
来源: 评论
F-PAC: A novel soft index based cluster head validation & gateway election mechanism for Ad Hoc Network
收藏 引用
WSEAS Transactions on computers 2014年 13卷 99-106页
作者: Thirmurugan, S. George Dharma Prakash Raj, E. Department of Computer Applications J.J. College of Engg and Tech. Tiruchirapalli India Department of Computer Science and Engineering Bharathidasan University Tiruchirapalli India
In this dynamic scenario the communication no longer happens in predetermined manner. The network as a platform for communication comes with high infrastructure may likely to waste the resources. Thus, the ad hoc scen... 详细信息
来源: 评论
Performance Analysis of an Intrusion Detection System using Panjab University Intrusion Dataset
Performance Analysis of an Intrusion Detection System using ...
收藏 引用
International Conference on Recent Advances in engineering & Computational sciences
作者: Raman Singh Harish Kumar R. K. Singla Chitkara University Research and Innovation Network (CRIN) Chitkara University University Institute of Engineering and Technology Panjab University Department of Computer Science and Applications Panjab University
Intrusion Detection System (IDS) can be used to detect malware by its network activities or behavioral profiles. Common challenges for IDS are large amount of data to process, low detection rate and high rate of false... 详细信息
来源: 评论
Finding high-redshift strong lenses in DES using convolutional neural networks
arXiv
收藏 引用
arXiv 2018年
作者: Jacobs, C. Collett, T. Glazebrook, K. McCarthy, C. Qin, A.K. Abbott, T.M.C. Abdalla, F.B. Annis, J. Avila, S. Bechtol, K. Bertin, E. Brooks, D. Buckley-Geer, E. Burke, D.L. Carnero Rosell, A. Carrasco Kind, M. Carretero, J. da Costa, L.N. Davis, C. de Vicente, J. Desai, S. Diehl, H.T. Doel, P. Eifler, T.F. Flaugher, B. Frieman, J. García-Bellido, J. Gaztanaga, E. Gerdes, D.W. Goldstein, D.A. Gruen, D. Gruendl, R.A. Gschwend, J. Gutierrez, G. Hartley, W.G. Hollowood, D.L. Honscheid, K. Hoyle, B. James, D.J. Kuehn, K. Kuropatkin, N. Lahav, O. Li, T.S. Lima, M. Lin, H. Maia, M.A.G. Martini, P. Miller, C.J. Miquel, R. Nord, B. Plazas, A.A. Sanchez, E. Scarpine, V. Schubnell, M. Serrano, S. Sevilla-Noarbe, I. Smith, M. Soares-Santos, M. Sobreira, F. Suchyta, E. Swanson, M.E.C. Tarle, G. Vikram, V. Walker, A.R. Zhang, Y. Zuntz, J. Centre for Astrophysics & Supercomputing Swinburne University of Technology Victoria3122 Australia Institute of Cosmology & Gravitation University of Portsmouth PortsmouthPO1 3FX United Kingdom School of Software and Electrical Engineering Swinburne University of Technology P.O. Box 218 HawthornVIC3122 Australia Cerro Tololo Inter-American Observatory National Optical Astronomy Observatory Casilla 603 La Serena Chile Department of Physics & Astronomy University College London Gower Street LondonWC1E 6BT United Kingdom Department of Physics and Electronics Rhodes University PO Box 94 Grahamstown6140 South Africa Fermi National Accelerator Laboratory P. O. Box 500 BataviaIL60510 United States LSST 933 North Cherry Avenue TucsonAZ85721 United States CNRS UMR 7095 Institut d’Astrophysique de Paris ParisF-75014 France Sorbonne Universités UPMC Univ Paris 06 UMR 7095 Institut d’Astrophysique de Paris ParisF-75014 France Kavli Institute for Particle Astrophysics & Cosmology Stanford University P. O. Box 2450 StanfordCA94305 United States SLAC National Accelerator Laboratory Menlo ParkCA94025 United States Laboratório Interinstitucional de e-Astronomia - LIneA Rua Gal. José Cristino 77 Rio de Janeiro RJ20921-400 Brazil Observatório Nacional Rua Gal. José Cristino 77 Rio de Janeiro RJ20921-400 Brazil Department of Astronomy University of Illinois at Urbana-Champaign 1002 W. Green Street UrbanaIL61801 United States National Center for Supercomputing Applications 1205 West Clark St. UrbanaIL61801 United States Barcelona Institute of Science and Technology Campus UAB Bellaterra [Barcelona08193 Spain Madrid Spain Department of Physics IIT Hyderabad KandiTelangana502285 India Department of Astronomy/Steward Observatory 933 North Cherry Avenue TucsonAZ85721-0065 United States Jet Propulsion Laboratory California Institute of Technology 4800 Oak Grove Dr. PasadenaCA91109 United States Kavli Institute for Cosmological Physics
We search Dark Energy Survey (DES) Year 3 imaging data for galaxy-galaxy strong gravitational lenses using convolutional neural networks. We generate 250,000 simulated lenses at redshifts > 0.8 from which we create... 详细信息
来源: 评论