咨询与建议

限定检索结果

文献类型

  • 3,469 篇 会议
  • 1,267 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,766 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,708 篇 工学
    • 2,097 篇 计算机科学与技术...
    • 1,727 篇 软件工程
    • 758 篇 信息与通信工程
    • 511 篇 控制科学与工程
    • 388 篇 电气工程
    • 329 篇 生物工程
    • 296 篇 生物医学工程(可授...
    • 287 篇 电子科学与技术(可...
    • 238 篇 网络空间安全
    • 197 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 186 篇 安全科学与工程
    • 167 篇 机械工程
    • 154 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 124 篇 材料科学与工程(可...
  • 1,520 篇 理学
    • 763 篇 数学
    • 404 篇 物理学
    • 384 篇 生物学
    • 264 篇 统计学(可授理学、...
    • 178 篇 化学
    • 170 篇 系统科学
  • 868 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 388 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 360 篇 医学
    • 280 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 175 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 91 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 286 篇 accuracy
  • 203 篇 deep learning
  • 171 篇 machine learning
  • 156 篇 real-time system...
  • 152 篇 internet of thin...
  • 144 篇 feature extracti...
  • 140 篇 computational mo...
  • 138 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 95 篇 optimization
  • 88 篇 security
  • 85 篇 data models
  • 83 篇 artificial intel...
  • 80 篇 cloud computing
  • 80 篇 technological in...
  • 75 篇 machine learning...
  • 72 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 110 篇 department of co...
  • 100 篇 department of co...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,285 篇 英文
  • 463 篇 其他
  • 25 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4766 条 记 录,以下是4121-4130 订阅
排序:
Personalised high quality search with in a web site: No user profiling
Personalised high quality search with in a web site: No user...
收藏 引用
2nd International Conference on Advances in Computing and Information Technology, ACITY-2012
作者: Joshila Grace, L.K. Maheswari, V. Nagamalai, Dhinaharan Department of Computer Science and Engineering Sathyabama University Jeppiaar Nagar Chennai India Department of Computer Applications Sathyabama University Jeppiaar Nagar Chennai India Network Architect and Security Expert Wireilla Net Solutions PTY Ltd. VIC Australia
The main objective of this work is to make a web site developer to understand the efficiency of the web site. the custom now among the web site users is to select the web site which is satisfying the needs of the user... 详细信息
来源: 评论
Fusion based linked object Web ranking for social networks
Fusion based linked object Web ranking for social networks
收藏 引用
作者: Suri, Pushpa R. Taneja, Harmunish Department of Computer Science and Applications Kurukshetra University Kurukshetra Haryana 136119 India Department of Information Technology M.M. Engineering College M.M. University Mullana Haryana 133203 India
Search is no doubt the most critical aspect of information computing over web. Ranking is pivotal for efficient web search as the search performance mainly depends upon the ranking results. The trade-off between the s... 详细信息
来源: 评论
Cryptanalysis of RSA through formal verification tools
收藏 引用
Journal of Theoretical and Applied Information Technology 2012年 第1期39卷 17-21页
作者: Upadhyay, Sachin Singh, Yaspal Department of Mathematical Sciences and Computer Applications Bundelkhand University Jhansi India Department of Computer Science and Engineering Bundelkhand Institute of Engineering and Technology Jhansi India
In this paper we are basically analyzing the results given by Wiener's, who says that if the private exponent d used in RSA cryptosystem is less than n^.292 than the system is insecure. We will focus on the result... 详细信息
来源: 评论
Fingerprint based authentication system using threshold visual cryptographic technique
Fingerprint based authentication system using threshold visu...
收藏 引用
International Conference on Advances in engineering, science and Management (ICAESM)
作者: Rajeswari Mukesh V.J. Subashini Department of Computer Science and Engineering Meenakshi College of Engineering Chennai India Department of Computer Applications Jerusalem College of Engineering Chennai India
Biometrics deals with automated method of identifying a person or verifying the identity of a person based on the physiological or behavioural characteristic, and so is used for authentication in many of the online tr... 详细信息
来源: 评论
Financial transactions over wired and wireless networks: Technical perspective  1st
收藏 引用
1st International Conference on Emerging Trends in science, engineering and Technology, INCOSET 2012
作者: Jayanthi, J. Gnana Felicita, J. Rabara, S. Albert Gnanaraj, A. Arun Manimozhi, P. Department of Computer Applications J.J. College of Engineering and Technology Tiruchirappalli Tamil Nadu India Department of Management Studies St. Joseph’s College St. Joseph’s Institute of Management Tiruchirappalli Tamil Nadu India Department of Computer Science St. Joseph’s College Tiruchirappalli Tamil Nadu India Axiom Telecom Dubai United Arab Emirates Department of Computer Applications J.J. College of Engineering and Technology Tiruchirappalli Tamil Nadu India
While electronic commerce (E-commerce) which is over wired communication continues to impact the global business environment profoundly, technologies and applications are beginning to focus more on transactions over t... 详细信息
来源: 评论
CA based implementation of March test for high speed memories
CA based implementation of March test for high speed memorie...
收藏 引用
IEEE International Conference on Circuits and Systems (ICCAS)
作者: Mousumi Saha Biplab K Sikdar Department of Computer Applications National Institute of Technology Durgapur India Department of Computer Science and Technology Bengal Engineering and Science University India
This work proposes an efficient realization of March test for fault detection in high speed memories. The realization is based on the theory of a modeling tool called cellular automata (CA). A special class of CA arch... 详细信息
来源: 评论
Quadrupole strong focusing transport for a Ka-band coupled cavity traveling wave tube amplifier
Quadrupole strong focusing transport for a Ka-band coupled c...
收藏 引用
2012 IEEE 13th International Vacuum Electronics Conference, IVEC 2012
作者: Nichols, Kimberley Schamiloglu, Edl Petillo, John Department of Electrical and Computer Engineering University of New Mexico Albuquerque NM 87106 United States Science Applications International Corporation 700 Technology Park Dr. Billerica MA 01821 United States
A proof-of-principle research effort is presented to demonstrate the benefits of using a permanent magnet quadrupole focusing lattice to increase the beam current in a TWT. Recent work by researchers at the Naval Rese... 详细信息
来源: 评论
CAPTCHINO - A Gamification of Image-Based CAPTCHAs to Evaluate Usability Issues
CAPTCHINO - A Gamification of Image-Based CAPTCHAs to Evalua...
收藏 引用
International Conference on Computing sciences (ICCS)
作者: Rahul Saha Riyanka Manna G. Geetha Department of Computer Science and Engineering Lovely Professional University Phagwara India Department of Computer Science and Applications Lovely Professional University Phagwara India
CAPTCHA technology is at a boom in the field of information security. When text CAPTCHAs are at a point of break down, it is the time for the image based CAPTCHAs to get a pace. But often the designers of the CAPTCHA ... 详细信息
来源: 评论
Use of participatory design to enhance accessibility of slate-type devices
Use of participatory design to enhance accessibility of slat...
收藏 引用
Proceedings of the Human Factors and Ergonomics Society 56th Annual Meeting, HFES 2012
作者: Dhillon, Gurjot S. El-Glaly, Yasmine N. Holbach, William H. Smith-Jackson, Tonya L. Quek, Francis Department of Industrial and Systems Engineering Virginia Tech Blacksburg VA United States Department of Computer Science Virginia Tech Blacksburg VA United States Assistive Technologies and Research Applications Virginia Tech Blacksburg VA United States
Individuals with Blindness or Severe Visual Impairment (IBSVI) have not had equivalent access to reading materials, especially for slate-type devices. Features such as highlighting and note taking are essential for ac...
来源: 评论
Complexity Analysis of Image-Based CAPTCHA
Complexity Analysis of Image-Based CAPTCHA
收藏 引用
International Conference on Computing sciences (ICCS)
作者: Riyanka Manna Rahul Saha G. Geetha Department of Computer Science and Engineering Lovely Professional University Punjab India Department of Computer Science and Applications Lovely Professional University Punjab India
In the field of information security, CAPTCHA technology is a recent successful achievement. Apart from using different text CAPTCHAs, image-based CAPTCHAs are also in existence. Though text based CAPTCHAs are in regu... 详细信息
来源: 评论