咨询与建议

限定检索结果

文献类型

  • 3,469 篇 会议
  • 1,267 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,766 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,708 篇 工学
    • 2,097 篇 计算机科学与技术...
    • 1,727 篇 软件工程
    • 758 篇 信息与通信工程
    • 511 篇 控制科学与工程
    • 388 篇 电气工程
    • 329 篇 生物工程
    • 296 篇 生物医学工程(可授...
    • 287 篇 电子科学与技术(可...
    • 238 篇 网络空间安全
    • 197 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 186 篇 安全科学与工程
    • 167 篇 机械工程
    • 154 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 124 篇 材料科学与工程(可...
  • 1,520 篇 理学
    • 763 篇 数学
    • 404 篇 物理学
    • 384 篇 生物学
    • 264 篇 统计学(可授理学、...
    • 178 篇 化学
    • 170 篇 系统科学
  • 868 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 388 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 360 篇 医学
    • 280 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 175 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 91 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 286 篇 accuracy
  • 203 篇 deep learning
  • 171 篇 machine learning
  • 156 篇 real-time system...
  • 152 篇 internet of thin...
  • 144 篇 feature extracti...
  • 140 篇 computational mo...
  • 138 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 95 篇 optimization
  • 88 篇 security
  • 85 篇 data models
  • 83 篇 artificial intel...
  • 80 篇 cloud computing
  • 80 篇 technological in...
  • 75 篇 machine learning...
  • 72 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 110 篇 department of co...
  • 100 篇 department of co...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,285 篇 英文
  • 463 篇 其他
  • 25 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4766 条 记 录,以下是4091-4100 订阅
排序:
CAPTCHINO - A gamification of image-based CAPTCHAs to evaluate usability issues
CAPTCHINO - A gamification of image-based CAPTCHAs to evalua...
收藏 引用
Turing 100 - International Conference on Computing sciences, ICCS 2012
作者: Saha, Rahul Manna, Riyanka Geetha, G. Department of Computer Science and Engineering Lovely Professional University Phagwara India Department of Computer Science and Applications Lovely Professional University Phagwara India
CAPTCHA technology is at a boom in the field of information security. When text CAPTCHAs are at a point of break down, it is the time for the image based CAPTCHAs to get a pace. But often the designers of the CAPTCHA ... 详细信息
来源: 评论
Rethinking the architecture design of data center networks
收藏 引用
Frontiers of computer science 2012年 第5期6卷 596-603页
作者: Kaishun WU Jiang XIAO Lionel M. NI National Engineering Research Center of Digital Life State-Province Joint Laboratory of Digital Home Interactive Applications School of Physics and Engineering Sun Yat-sen University Guangzhou 510006 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China
In the rising tide of the Internet of things, more and more things in the world are connected to the Internet. Recently, data have kept growing at a rate more than four times of that expected in Moore's law. This exp... 详细信息
来源: 评论
Predictive accuracy based on cognitive approach in web based learning
Predictive accuracy based on cognitive approach in web based...
收藏 引用
1st International Conference on Advances in engineering, science and Management, ICAESM-2012
作者: Jayasimman, L. Raj, E. George Dharma Prakash Department of Computer Applications JJ College of Engineering and Tech Tiruchirappalli India Department of Computer Science Bharathidasan University Tiruchirappalli India
With bandwidth increasing at a constant pace, technology in education has become an important part for delivery of educational content to students. Online learning in various forms is gaining popularity but lacks the ... 详细信息
来源: 评论
Mitigating DoS using sensing keys
Mitigating DoS using sensing keys
收藏 引用
Turing 100 - International Conference on Computing sciences, ICCS 2012
作者: Ragavi, V. Geetha, G. Department of Computer Applications Sathyabama University Chennai India Department of Computer Science Engineering Lovely Professional University Phagwara India
Denial of Service (DoS) attacks has become a major problem for users of computer systems connected to the Internet. DoS attackers hijack secondary victim systems and use them to wage a coordinated large-scale attack a... 详细信息
来源: 评论
Forming a network, analyzing and power aware protocol for Zigbee networks
Forming a network, analyzing and power aware protocol for Zi...
收藏 引用
1st International Conference on Advances in engineering, science and Management, ICAESM-2012
作者: Anitha, P. Chandrasekar, C. Department of Master of Computer Applications KSR College of Engineering Tamilnadu India Department of Computer Science Periyar University Tamilnadu India
Recently, the necessity for power saving in Wireless Sensor Networks (WSNs) is crucial particularly in mission essential fields like military and medical applications. A communication network consists of nodes, every ... 详细信息
来源: 评论
Forecasting the Demand of Short-Term Electric Power Load with Large-Scale LP-SVR
收藏 引用
Smart Grid and Renewable Energy 2013年 第6期
作者: Pablo Rivas-Perea Juan Cota-Ruiz2 David Garcia Chaparro Abel Quezada Carreón Francisco J. Enríquez Aguilera Jose-Gerardo Rosiles Department of Computer Science School of Engineering and Computer Science Baylor University Department of Electrical and Computer Engineering Autonomous University of Ciudad Juárez (UACJ) Science Applications International Corporation
来源: 评论
Enhancing flexibility and portability of Execution Preserving Language Transformation using Meta programming
Enhancing flexibility and portability of Execution Preservin...
收藏 引用
2012 International Conference on Power, Signals, Controls and Computation, EPSCICON 2012
作者: Beevi, S. Nadera Prasad, D. Chitra Chandra, S. S. Vinod Department of Computer Applications TKM College of Engineering Kollam India Department of Computer Science and Engineering TKM College of Engineering Kollam India Computer Centre University of Kerala Thiruvananthapuram India
This paper describes flexibility and effectiveness of Execution Preserving Language Transformation (EPLT) using a meta framework. Program transformation is visualized as transforming the program written in legacy code... 详细信息
来源: 评论
A Hybrid k-DCI and Apriori Algorithm for Mining Frequent Itemsets
A Hybrid k-DCI and Apriori Algorithm for Mining Frequent Ite...
收藏 引用
International Conference on Circuits, Power and Computing Technologies
作者: S. Suriya S. P. Shantharajah Assistant Professor Department of Computer Science and Engineering Velammal College of Engineering and Technology Madurai Tamilnadu India. Professor Department of Master of Computer Applications Sona College of Technology Salem Tamilnadu India.
Data mining involves analysis, extraction, refining and representation of required data from large databases. kDCI (k Direct Count and Intersect) algorithm is one of the best scalable algorithms for identifying freque... 详细信息
来源: 评论
A code-based 1-out-of-N oblivious transfer based on McEliece assumptions
收藏 引用
8th International Conference on Information Security Practice and Experience, ISPEC 2012
作者: Preetha, Mathew K. Vasant, Sachin Venkatesan, Sridhar Pandu Rangan, C. Theoretical Computer Science Lab. Department of Computer Science and Engineering Indian Institute of Technology Madras India Department of Mathematics and Computer Applications PSG College of Technology Coimbatore India
In this paper, we propose an efficient code-based 1-out-of-N oblivious transfer, OT1N, based on McEliece assumptions without invoking the OT12 several times as in the paradigm proposed in [20,6]. We also show that the... 详细信息
来源: 评论
W-PAC: An efficient weighted partitioning around cluster head mechanism for ad hoc network  12
W-PAC: An efficient weighted partitioning around cluster hea...
收藏 引用
2nd International Conference on Computational science, engineering and Information, CCSEIT 2012
作者: Thirumurugan, S. George Dharma Prakash Raj, E. Department of Computer Applications JJ College of Engineering and Technology Tiruchirapalli India Department of Computer Science and Engg. Bharathidasan University Tiruchirapalli India
The present scenario has been conquered by the wireless network. It is well understood that the future will also be tied up by the same network. The ad hoc network plays a pivotal role in making communication among no... 详细信息
来源: 评论