咨询与建议

限定检索结果

文献类型

  • 3,492 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,717 篇 工学
    • 2,100 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 761 篇 信息与通信工程
    • 513 篇 控制科学与工程
    • 390 篇 电气工程
    • 329 篇 生物工程
    • 295 篇 生物医学工程(可授...
    • 289 篇 电子科学与技术(可...
    • 240 篇 网络空间安全
    • 193 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 185 篇 安全科学与工程
    • 167 篇 机械工程
    • 159 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 133 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 768 篇 数学
    • 406 篇 物理学
    • 384 篇 生物学
    • 268 篇 统计学(可授理学、...
    • 182 篇 化学
    • 170 篇 系统科学
  • 869 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 357 篇 医学
    • 280 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 201 篇 公共卫生与预防医...
    • 159 篇 药学(可授医学、理...
  • 174 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 296 篇 accuracy
  • 208 篇 deep learning
  • 175 篇 machine learning
  • 162 篇 real-time system...
  • 156 篇 internet of thin...
  • 150 篇 feature extracti...
  • 146 篇 computational mo...
  • 142 篇 convolutional ne...
  • 123 篇 predictive model...
  • 113 篇 support vector m...
  • 113 篇 training
  • 98 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 83 篇 artificial intel...
  • 83 篇 cloud computing
  • 81 篇 technological in...
  • 78 篇 machine learning...
  • 73 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 111 篇 department of co...
  • 103 篇 department of co...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 3,837 篇 英文
  • 946 篇 其他
  • 27 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4800 条 记 录,以下是4021-4030 订阅
排序:
High dielectric material dependence of carbon nanotube field effect transistor considering non-ballistic conduction
High dielectric material dependence of carbon nanotube field...
收藏 引用
作者: Rouf, Nirjhor Tahmidur Deep, Ashfaqul Haq Hassan, Rusafa Binte Khan, Sabbir Ahmed Hasan, Mahmudul Mominuzzaman, Sharif Mohammad Control and Applications Research Centre BRAC University Dhaka1212 Bangladesh Department of Electrical and Electronic Engineering BRAC University Dhaka1212 Bangladesh BRACU Robotics Research Lab School of Engineering and Computer Science BRAC University Dhaka1212 Bangladesh Department of Electrical and Electronic Engineering Bangladesh University of Engineering and Technology Dhaka1000 Bangladesh
As a result of this reported research, a simulation model to analyse the behaviour of carbon nanotube field effect transistors (CNTFETs) under non-ballistic conditions is explained and the effect of gate dielectric on... 详细信息
来源: 评论
Morphological gradient based approach for text localization in video/scene images
Morphological gradient based approach for text localization ...
收藏 引用
International Conference on Advances in Computing, Communications and Informatics (ICACCI)
作者: B.H. Shekar L. Smitha M. Department of Computer Science Mangalore University Mangalore Karnataka India Department of Master of Computer Applications KVG College of Engineering Sullia Karnataka India
In this work, we present an approach for detecting the text present in videos/scene images based on morphological gradient information. The system detects the gradient information using morphological operations and th... 详细信息
来源: 评论
An enhanced Least Significant Bit steganography method using midpoint circle approach
An enhanced Least Significant Bit steganography method using...
收藏 引用
International Conference on Communications and Signal Processing
作者: Vikas Verma Poonam Rishma Chawla Department of Computer Science and Engineering Ramgarhia Institute of Engineering and Technology Phagwara affiliated to Punjab Technical University Jalandhar India Department of Computer Science and Applications Kamla Nehru College for Women Phagwara India Department of Computer Science and Engineering Ramgarhia Institute of Engineering and Technology Phagwara India
To increase the security of messages sent over internet steganography is used. Various steganography techniques have been proposed so far. Least Significant Bit steganography is one such technique in which least signi... 详细信息
来源: 评论
A novel defense mechanism via Genetic Algorithm for counterfeiting and combating Jelly Fish attack in Mobile Ad-Hoc Networks
A novel defense mechanism via Genetic Algorithm for counterf...
收藏 引用
International Conference on Confluence The Next Generation Information Technology Summit (Confluence)
作者: Manjot Kaur Malti Rani Anand Nayyar Dept of Computer Science and Engineering PIT Kapurthala India Department of Computer Applications & IT KCL Institute of Management and Technology Jalandhar Punjab India
The Mobile Ad Hoc Network is a self controlling infrastructure-less wireless network with no unify administration with numerous characteristics like dynamic topology, multi hop routing, distributed routing and many mo... 详细信息
来源: 评论
Discriminative DCT-MLP based approach for off-line signature verification
Discriminative DCT-MLP based approach for off-line signature...
收藏 引用
International Conference on Advances in Computing, Communications and Informatics (ICACCI)
作者: R.K. Bharathi B.H. Shekar Department of Master of Computer Applications Sri Jayachamarajendra college of Engineering Mysore Karnataka India Department of Computer Science Mangalore University Mangalore Karnataka India
In this paper, we propose to explore the possibility of integrating the appearance based paradigm with frequency domain for off-line signature verification. The proposed approach has four major phases : Preprocessing,... 详细信息
来源: 评论
Performance analysis of clustering using partitioning and hierarchical clustering techniques
International Journal of Database Theory and Application
收藏 引用
International Journal of Database Theory and Application 2014年 第6期7卷 233-240页
作者: Punitha, S.C. Thangaiah, P. Ranjith Jeba Punithavalli, M. Department of Computer Science and Engineering Karunya University Coimbatore India Department of Computer Applications Karunya University Coimbatore India Sri Ramakrishna College of Arts and Science Coimbatore India
Text clustering is the method of combining text or documents which are similar and dissimilar to one another. In several text tasks, this text mining is used such as extraction of information and concept/entity, summa... 详细信息
来源: 评论
Punjabi DeConverter for generating Punjabi from Universal Networking Language
收藏 引用
Journal of Zhejiang University-science C(computers and Electronics) 2013年 第3期14卷 179-196页
作者: Parteek KUMAR Rajendra Kumar SHARMA Department of Computer Science & Engineering Thapar University School of Mathematics & Computer Applications Thapar University
DeConverter is core software in a Universal Networking Language(UNL) system.A UNL system has EnConverter and DeConverter as its two major *** is used to convert a natural language sentence into an equivalent UNL expre... 详细信息
来源: 评论
An extended approach to Non-Replicated dynamic fragment allocation in distributed database systems
An extended approach to Non-Replicated dynamic fragment allo...
收藏 引用
International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
作者: Raju Kumar Neena Gupta Department of Computer Applications Krishna Institute of Engineering & Technology Ghaziabad India Department of Computer Science Dehradun (Second Campus of Gurukul Kangri Vishwavidyalaya Haridwar) India
The trends and necessity of running business organizations from multi-locations and multi-nations caused huge demand for distributed databases. The performance of any distributed database is highly depends on th e fra... 详细信息
来源: 评论
Engagement vs performance: Using electronic portfolios to predict first semester engineering student retention  14
Engagement vs performance: Using electronic portfolios to pr...
收藏 引用
4th International Conference on Learning Analytics and Knowledge, LAK 2014
作者: Aguiar, Everaldo Chawla, Nitesh V. Brockman, Jay Ambrose, G. Alex Goodrich, Victoria Department of Computer Science and Engineering University of Notre Dame Notre Dame IN 46556 United States Interdisciplinary Center for Network Science and Applications University of Notre Dame Notre Dame IN 46556 United States College of Engineering University of Notre Dame Notre Dame IN 46556 United States University of Notre Dame Notre Dame IN 46556 United States
As providers of higher education begin to harness the power of big data analytics, one very fitting application for these new techniques is that of predicting student attrition. The ability to pinpoint students who mi... 详细信息
来源: 评论
New call and handoff call management scheme for reuse partitioning based cellular systems
New call and handoff call management scheme for reuse partit...
收藏 引用
Recent Advances and Innovations in engineering (ICRAIE)
作者: Abhijit Sharma Suvendu Konai Uma Bhattacharya Department of Computer Applications National Institute of Technology Durgapur West Bengal India Department of Computer Science and Technology Indian Institute of Engineering Science and Technology Shibpur Howrah West Bengal India
In cellular networks, blocking occurs when a Base Station has no free channel to allocate to a mobile user. There are two kinds of blocking. New call blocking refers to blocking of newly originated calls and the hando... 详细信息
来源: 评论