咨询与建议

限定检索结果

文献类型

  • 3,492 篇 会议
  • 1,270 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,792 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,715 篇 工学
    • 2,097 篇 计算机科学与技术...
    • 1,724 篇 软件工程
    • 759 篇 信息与通信工程
    • 511 篇 控制科学与工程
    • 389 篇 电气工程
    • 329 篇 生物工程
    • 295 篇 生物医学工程(可授...
    • 289 篇 电子科学与技术(可...
    • 238 篇 网络空间安全
    • 192 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 185 篇 安全科学与工程
    • 167 篇 机械工程
    • 158 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 135 篇 材料科学与工程(可...
  • 1,523 篇 理学
    • 768 篇 数学
    • 405 篇 物理学
    • 384 篇 生物学
    • 270 篇 统计学(可授理学、...
    • 182 篇 化学
    • 170 篇 系统科学
  • 868 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 388 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 357 篇 医学
    • 280 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 201 篇 公共卫生与预防医...
    • 159 篇 药学(可授医学、理...
  • 174 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 296 篇 accuracy
  • 208 篇 deep learning
  • 175 篇 machine learning
  • 162 篇 real-time system...
  • 156 篇 internet of thin...
  • 150 篇 feature extracti...
  • 146 篇 computational mo...
  • 139 篇 convolutional ne...
  • 123 篇 predictive model...
  • 113 篇 support vector m...
  • 111 篇 training
  • 98 篇 optimization
  • 91 篇 security
  • 86 篇 data models
  • 83 篇 artificial intel...
  • 82 篇 cloud computing
  • 80 篇 technological in...
  • 77 篇 machine learning...
  • 73 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 112 篇 department of co...
  • 105 篇 department of co...
  • 63 篇 department of co...
  • 62 篇 school of comput...
  • 54 篇 gla university d...
  • 52 篇 department of co...
  • 51 篇 maharishi school...
  • 48 篇 department of co...
  • 47 篇 centre of resear...
  • 45 篇 chitkara centre ...
  • 43 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 39 篇 gla university d...
  • 38 篇 chitkara univers...
  • 35 篇 graphic era deem...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 the islamic univ...

作者

  • 52 篇 neeraj varshney
  • 43 篇 singh kamred udh...
  • 43 篇 varshney neeraj
  • 42 篇 singh teekam
  • 39 篇 rakesh kumar
  • 37 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 32 篇 kumar rakesh
  • 30 篇 kumar gaurav
  • 28 篇 tina babu
  • 26 篇 teekam singh
  • 26 篇 saloni bansal
  • 25 篇 kamred udham sin...
  • 25 篇 asha v.
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 22 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 3,829 篇 英文
  • 946 篇 其他
  • 27 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4792 条 记 录,以下是4151-4160 订阅
排序:
CA based implementation of March test for high speed memories
CA based implementation of March test for high speed memorie...
收藏 引用
IEEE International Conference on Circuits and Systems (ICCAS)
作者: Mousumi Saha Biplab K Sikdar Department of Computer Applications National Institute of Technology Durgapur India Department of Computer Science and Technology Bengal Engineering and Science University India
This work proposes an efficient realization of March test for fault detection in high speed memories. The realization is based on the theory of a modeling tool called cellular automata (CA). A special class of CA arch... 详细信息
来源: 评论
Quadrupole strong focusing transport for a Ka-band coupled cavity traveling wave tube amplifier
Quadrupole strong focusing transport for a Ka-band coupled c...
收藏 引用
2012 IEEE 13th International Vacuum Electronics Conference, IVEC 2012
作者: Nichols, Kimberley Schamiloglu, Edl Petillo, John Department of Electrical and Computer Engineering University of New Mexico Albuquerque NM 87106 United States Science Applications International Corporation 700 Technology Park Dr. Billerica MA 01821 United States
A proof-of-principle research effort is presented to demonstrate the benefits of using a permanent magnet quadrupole focusing lattice to increase the beam current in a TWT. Recent work by researchers at the Naval Rese... 详细信息
来源: 评论
CAPTCHINO - A Gamification of Image-Based CAPTCHAs to Evaluate Usability Issues
CAPTCHINO - A Gamification of Image-Based CAPTCHAs to Evalua...
收藏 引用
International Conference on Computing sciences (ICCS)
作者: Rahul Saha Riyanka Manna G. Geetha Department of Computer Science and Engineering Lovely Professional University Phagwara India Department of Computer Science and Applications Lovely Professional University Phagwara India
CAPTCHA technology is at a boom in the field of information security. When text CAPTCHAs are at a point of break down, it is the time for the image based CAPTCHAs to get a pace. But often the designers of the CAPTCHA ... 详细信息
来源: 评论
Use of participatory design to enhance accessibility of slate-type devices
Use of participatory design to enhance accessibility of slat...
收藏 引用
Proceedings of the Human Factors and Ergonomics Society 56th Annual Meeting, HFES 2012
作者: Dhillon, Gurjot S. El-Glaly, Yasmine N. Holbach, William H. Smith-Jackson, Tonya L. Quek, Francis Department of Industrial and Systems Engineering Virginia Tech Blacksburg VA United States Department of Computer Science Virginia Tech Blacksburg VA United States Assistive Technologies and Research Applications Virginia Tech Blacksburg VA United States
Individuals with Blindness or Severe Visual Impairment (IBSVI) have not had equivalent access to reading materials, especially for slate-type devices. Features such as highlighting and note taking are essential for ac...
来源: 评论
Complexity Analysis of Image-Based CAPTCHA
Complexity Analysis of Image-Based CAPTCHA
收藏 引用
International Conference on Computing sciences (ICCS)
作者: Riyanka Manna Rahul Saha G. Geetha Department of Computer Science and Engineering Lovely Professional University Punjab India Department of Computer Science and Applications Lovely Professional University Punjab India
In the field of information security, CAPTCHA technology is a recent successful achievement. Apart from using different text CAPTCHAs, image-based CAPTCHAs are also in existence. Though text based CAPTCHAs are in regu... 详细信息
来源: 评论
Multithread parallelization of Lepp-bisection algorithms
Multithread parallelization of Lepp-bisection algorithms
收藏 引用
作者: Rivara, Maria-Cecilia Rodriguez, Pedro Montenegro, Rafael Jorquera, Gaston Department of Computer Science University of Chile Santiago Chile Department of Information Systems University of Bio-Bio Concepción Chile University of Las Palmas de Gran Canaria University Institute for Intelligent Systems and Numerical Applications for Engineering Spain
Longest edge (nested) algorithms for triangulation refinement in two dimensions are able to produce hierarchies of quality and nested irregular triangulations as needed both for adaptive finite element methods and for... 详细信息
来源: 评论
Finding time and buffer preserving routes in Gaussian intermittent networks
Finding time and buffer preserving routes in Gaussian interm...
收藏 引用
9th International Conference on Information Technology, ITNG 2012
作者: Tahboub, Omar Y. Khan, Javed I. Software Engineering Applications PayPal San Jose CA 95131 United States Media Communications and Networking Research Laboratory Department of Math and Computer Science Kent State University Kent OH 44242 United States
Intermittent networks (IntNET) are networks where all the links in a path may not be available concurrently. Finding routes on such a network is hard. No trivial extension of classical routing protocols is known to pr... 详细信息
来源: 评论
A new computational method to solve fully fuzzy linear systems for negative coefficient matrix
收藏 引用
International Journal of Manufacturing Technology and Management 2012年 第1-3期25卷 19-32页
作者: Kumar, Amit Babbar, Neetu Bansal, Abhinav School of Mathematics and Computer Applications Thapar University Patiala-147004 India Computer Science and Engineering Department Thapar University Patiala-147004 India
In this paper, new computational methods for solving fully fuzzy linear systems (FFLS) when the coefficient matrix is negative are proposed. The proposed methods are very easy to understand and to apply for solving fu... 详细信息
来源: 评论
Mitigating DoS Using Sensing Keys
Mitigating DoS Using Sensing Keys
收藏 引用
International Conference on Computing sciences (ICCS)
作者: V. Ragavi G. Geetha Department of Computer Applications Sathyabama University Chennai India Department of Computer Science Engineering Lovely Professional University Phagwara India
Denial of Service (DoS) attacks has become a major problem for users of computer systems connected to the Internet. DoS attackers hijack secondary victim systems and use them to wage a coordinated large-scale attack a... 详细信息
来源: 评论
Application of Naive Bayes dichotomizer supported with expected risk and discriminant functions in clinical decisions — Case study
Application of Naive Bayes dichotomizer supported with expec...
收藏 引用
International Conference on Advanced Computing, ICAC
作者: Anju Pratap C. S. Kanimozhiselvi Department of Computer Science and Engineering SAINTGITS College of Engineering Pathamuttom Kerala India Department of Computer Applications Kongu Engineering College Erode Tamil Nadu India
In this paper, a case study on the application of Naïve Bayes dichotomizer in clinical decision supporting systems is described. The case study is about the diagnosis of the possibility of having Pervasive Develo... 详细信息
来源: 评论