咨询与建议

限定检索结果

文献类型

  • 3,469 篇 会议
  • 1,267 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,766 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,708 篇 工学
    • 2,097 篇 计算机科学与技术...
    • 1,727 篇 软件工程
    • 758 篇 信息与通信工程
    • 511 篇 控制科学与工程
    • 388 篇 电气工程
    • 329 篇 生物工程
    • 296 篇 生物医学工程(可授...
    • 287 篇 电子科学与技术(可...
    • 238 篇 网络空间安全
    • 197 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 186 篇 安全科学与工程
    • 167 篇 机械工程
    • 154 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 124 篇 材料科学与工程(可...
  • 1,520 篇 理学
    • 763 篇 数学
    • 404 篇 物理学
    • 384 篇 生物学
    • 264 篇 统计学(可授理学、...
    • 178 篇 化学
    • 170 篇 系统科学
  • 868 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 388 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 360 篇 医学
    • 280 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 175 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 91 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 286 篇 accuracy
  • 203 篇 deep learning
  • 171 篇 machine learning
  • 156 篇 real-time system...
  • 152 篇 internet of thin...
  • 144 篇 feature extracti...
  • 140 篇 computational mo...
  • 138 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 95 篇 optimization
  • 88 篇 security
  • 85 篇 data models
  • 83 篇 artificial intel...
  • 80 篇 cloud computing
  • 80 篇 technological in...
  • 75 篇 machine learning...
  • 72 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 110 篇 department of co...
  • 100 篇 department of co...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,285 篇 英文
  • 463 篇 其他
  • 25 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4766 条 记 录,以下是4161-4170 订阅
排序:
Trust-Based Anonymous Communication for malicious user disclosure in Mobile Ad Hoc Networks
Trust-Based Anonymous Communication for malicious user discl...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: M. Gunasekaran K. Premalatha Department of Computer Applications Bannari Amman Institute of Technology Sathyamangalam Tamil Nadu India Department of Computer Science and Engineering Bannari Amman Institute of Technology Sathyamangalam Tamil Nadu India
Security is a major concern while implementing Mobile Ad Hoc Networks (MANET) for communication in an adverse environment. The dynamism in network topology and the absence of centralized administration, MANET is susce... 详细信息
来源: 评论
Credit card fraud detection using decision tree for tracing email and IP
收藏 引用
International Journal of computer science Issues 2012年 第5 5-2期9卷 406-412页
作者: Dhanapal, R. Gayathiri, P. Department of Computer Applications Eswari Engineering College Chennai-600089 India Research Scholar in Manonmaniam Sundaranar University Department of Computer Science Kanchi Sri Krishna College Kanchipuram India
Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without ... 详细信息
来源: 评论
Unsupervised hybrid PSO - Quick reduct approach for feature reduction
Unsupervised hybrid PSO - Quick reduct approach for feature ...
收藏 引用
International Conference on Recent Trends in Information Technology (ICRTIT)
作者: H. Hannah Inbarani P. K. Nizar Banu S. Andrews Department of Computer Science Periyar University Salem India Department of Computer Applications B.S. Abdur Rahman University Chennai India School of Computing Science and Engineering Vellore of Institute of Technology Chennai India
Feature reduction reduces the dimensionality of a database and selects more informative features by removing the irrelevant features. Selecting features in unsupervised learning scenarios is a harder problem than supe... 详细信息
来源: 评论
Using NEM Relay to Improve 3DIC Cost Efficiency
Using NEM Relay to Improve 3DIC Cost Efficiency
收藏 引用
IEEE International Conference on 3D System Integration
作者: Tao Zhang Guangyu Sun Department of Computer Science and Engineering Pennsylvania State University PA USA Center for Energy-efficient Computing and Applications Peking University Beijing China
This paper investigates the integration of Nanoelec-tromechanical (NEM) relays on top of TSVs, to reduce area overhead and also enable possible novel architecture design. NEM relay is used in this work to reduce the c... 详细信息
来源: 评论
Evaluation of branch predictors targeting easeful diagnosis of design inaccuracies
Evaluation of branch predictors targeting easeful diagnosis ...
收藏 引用
International Conference on Devices, Circuits and Systems (ICDCS)
作者: Baisakhi Das Mousumi Saha Gunjan Bhattacharya Biplab K Sikdar Department of Information Technology Gurunanak Institute of Technology Sodepur West Bengal India Department of Computer Applications NIT Durgapur West Bengal India Department of Computer Science and Technology Bengal Engineering and Science University Shibpur West Bengal India
The design inaccuracy (fault) in predictors can cause huge power loss in processor posing serious threat to the designers. The objective of the current analysis of fault impact on the processor power consumption is to... 详细信息
来源: 评论
Corrigendum to “An algorithm for training a large scale support vector machine for regression based on linear programming and decomposition methods” [Pattern Recognition Lett. 34(4) (2013) 439–451]
收藏 引用
Pattern Recognition Letters 2013年 第6期34卷 678-678页
作者: Pablo Rivas-Perea Juan Cota-Ruiz Jose-Gerardo Rosiles Department of Computer Science Baylor University One Bear Place 97356. Waco TX 76798-7356 United States Department of Electrical and Computer Engineering Autonomous University of Ciudad Juarez (UACJ) Ave. del Charro #450 Nte C.P. 32310 Ciudad Juarez Chihuahua Mexico Science Applications International Corp. 7400 Viscount Blvd El Paso TX 79925 United States
来源: 评论
Performance evaluation of secure routing in ad-hoc network environment
Performance evaluation of secure routing in ad-hoc network e...
收藏 引用
International Conference on Recent Advances in Information Technology (RAIT)
作者: Dalip Kamboj Pankaj Kumar Sehgal Rajender Nath Department of Information Technology Maharishi Markandeshwar Engineering College Maharishi Markandeshwar University Haryana India Department of Computer Science and Applications Kurukshetra University Kurukshetra Haryana India
We have considered the problem of incorporating security mechanisms in routing protocols for ad hoc networks. There have been various secure routing protocols proposed for the mobile ad hoc network. Secured Ad hoc On ... 详细信息
来源: 评论
Finding Time and Buffer Preserving Routes in Gaussian Intermittent Networks
Finding Time and Buffer Preserving Routes in Gaussian Interm...
收藏 引用
International Conference on Information Technology: New Generations (ITNG)
作者: Omar Y. Tahboub Javed I. Khan Software Engineering Applications PayPal San Jose California Media Communications and Networking Department of Math & Computer Science Kent State University Kent OH
Intermittent networks (IntNET) are networks where all the links in a path may not be available concurrently. Finding routes on such a network is hard. No trivial extension of classical routing protocols is known to pr... 详细信息
来源: 评论
Use of Participatory Design to Enhance Accessibility of Slate-Type Devices
收藏 引用
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 2012年 第1期56卷 1952 - 1956页
作者: Gurjot S. Dhillon Yasmine N. El-Glaly William H. Holbach Tonya L. Smith-Jackson Francis Quek Department of Industrial and Systems Engineering Virginia tech Blacksburg VA USA Department of Computer Science Virginia Tech Blacksburg VA USA Assistive Technologies and Research Applications Virginia Tech Blacksburg VA USA
Individuals with Blindness or Severe Visual Impairment (IBSVI) have not had equivalent access to reading materials, especially for slate-type devices. Features such as highlighting and note taking are essential for ac...
来源: 评论
Similarity measures for automatic defect detection on patterned textures
收藏 引用
International Journal of Information and Communication Technology 2012年 第2-4期4卷 118-131页
作者: Asha, V. Bhajantri, N.U. Nagabhushan, P. Department of Computer Applications New Horizon College of Engineering Outer Ring Road Bangalore - 560 103 Karnataka India JSS Research Foundation SJCE Campus University of Mysore Mysore - 570 006 Karnataka India Department of Computer Science Engineering Government Engineering College Chamarajanagar - 571 313 Mysore District Karnataka India Department of Studies in Computer Science University of Mysore Mysore - 570 006 Karnataka India
Similarity measures are widely used in various applications such as information retrieval, image and object recognition, text retrieval, and web data search. In this paper, we propose similarity-based methods for defe... 详细信息
来源: 评论