咨询与建议

限定检索结果

文献类型

  • 3,470 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,721 篇 工学
    • 2,109 篇 计算机科学与技术...
    • 1,731 篇 软件工程
    • 764 篇 信息与通信工程
    • 515 篇 控制科学与工程
    • 392 篇 电气工程
    • 329 篇 生物工程
    • 297 篇 生物医学工程(可授...
    • 286 篇 电子科学与技术(可...
    • 241 篇 网络空间安全
    • 197 篇 光学工程
    • 189 篇 动力工程及工程热...
    • 186 篇 安全科学与工程
    • 167 篇 机械工程
    • 154 篇 化学工程与技术
    • 139 篇 交通运输工程
    • 126 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 766 篇 数学
    • 404 篇 物理学
    • 384 篇 生物学
    • 265 篇 统计学(可授理学、...
    • 181 篇 化学
    • 170 篇 系统科学
  • 871 篇 管理学
    • 525 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 359 篇 医学
    • 281 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 175 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 287 篇 accuracy
  • 205 篇 deep learning
  • 172 篇 machine learning
  • 157 篇 real-time system...
  • 153 篇 internet of thin...
  • 144 篇 feature extracti...
  • 141 篇 computational mo...
  • 138 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 97 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 85 篇 artificial intel...
  • 80 篇 cloud computing
  • 80 篇 technological in...
  • 75 篇 machine learning...
  • 72 篇 data mining
  • 69 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 112 篇 department of co...
  • 99 篇 department of co...
  • 64 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,299 篇 英文
  • 462 篇 其他
  • 25 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4778 条 记 录,以下是4441-4450 订阅
排序:
Sentence similarity computation based on WordNet and corpus statistics
Sentence similarity computation based on WordNet and corpus ...
收藏 引用
International Conference on Computational Intelligence and Multimedia applications, ICCIMA 2007
作者: Selvi, P. Gopalan, N.P. Department of Computer Science and Engineering Tiruchirappalli-620015 India Department of Computer Applications National Institute of Technology Tiruchirappalli-620015 India
Measures of text similarity have been used for a long time in applications in natural language processing and related areas such as text mining, Web page retrieval, and dialogue systems. Existing methods for computing... 详细信息
来源: 评论
Integration of proposed software risk model in waterfall process
Integration of proposed software risk model in waterfall pro...
收藏 引用
2008 International Conference on Software engineering Research and Practice, SERP 2008
作者: Suri, P.K. Wadhwa, Manoj Department of Computer Science and Applications Kurukshetra University Kurukshetra Haryana India Department of Computer Science and Engineering Echelon Institute of Technology Faridabad Haryana India
Today software development projects fail to be delivered on time, within budget and with desired quality. Many software risk methodologies have been proposed for mitigation of risks but they do not fulfill the aim of ... 详细信息
来源: 评论
Routing in large-scale buses ad hoe networks
Routing in large-scale buses ad hoe networks
收藏 引用
IEEE Wireless Communications and Networking Conference, WCNC 2008
作者: Sede, Michel Li, Xu Li, Da Wu, Min-You Li, Minglu Shu, Wei Laboratory for Computer Communications and Applications EPFL Switzerland Department of Computer Science and Engineering Shanghai Jiao Tong University China Department of Electrical and Computer Engineering University of New Mexico United States
A Disruption-Tolerant Network (DTN) attempts to route packets between nodes that are temporarily connected. Difficulty in such networks is that nodes have no information about the network status and contact opportunit... 详细信息
来源: 评论
Invertibility issues of truncated polynomials in NTRU cryptosystems
Invertibility issues of truncated polynomials in NTRU crypto...
收藏 引用
2008 International Conference on Security and Management, SAM 2008
作者: Rao, P. Krishna Subba Jagadamba, P.V.S. Lakshmi Viswanadham, B. Department of Computer Science GVP College of Engineering Visakhapatnam Andhra Pradesh India Department of Computer Applications GVP College for Degree and PG Courses Visakhapatnam Andhra Pradesh India
NTRU (Number Theorists aRe Us)[2] is a public key cryptosystem proposed by J. Hoffstein, J. Pipher and ***. NTRU were first presented in 1996 at the Crypto '96 Conference. It is an ultimate fast new public key cry... 详细信息
来源: 评论
Authentication of secret information in image steganography
Authentication of secret information in image steganography
收藏 引用
2008 IEEE Region 10 Conference, TENCON 2008
作者: Babu, K. Suresh Raja, K.B. Kiran Kumar, K. Manjula Devi, T.H. Venugopal, K.R. Patnaik, L.M. Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bangalore 560 001 India Microprocessor Applications Laboratory Indian Institute of Science Bangalore India
In recent years, Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exch... 详细信息
来源: 评论
Unsupervised hyperspectral image analysis with projection pursuit and MRF segmentation approach
Unsupervised hyperspectral image analysis with projection pu...
收藏 引用
2008 International Conference on Artificial Intelligence and Pattern Recognition 2008, AIPR 2008
作者: Sarkar, A. Vulimiri, A. Bose, S. Paul, S. Ray, S.S. Department of Mathematics IIT Kharagpur India Department of Computer Science and Engineering IIT Kharagpur India Department of Electronics and Communication Engineering IIT Kharagpur India Space Applications Center Ahmedabad India
This work deals with hyperspectral image analysis in the absence of ground-truth. The method adopts a projection pursuit (PP) procedure with entropy index to reduce the dimensionality followed by Markov Random Field (... 详细信息
来源: 评论
Effective information retrieval using supervised learning approach
收藏 引用
Information Technology Journal 2008年 第1期7卷 231-233页
作者: Sundara Rajan, M. Rajagopalan, S.P. Department of Computer Science S.R.M. Arts and Science College 61-2nd Main Road Baby Nagar Velachery Chennai Pin-600042 TN India School of Computer Science Engineering and Applications M.G.R. University Maduravoil Chennai 600095 TN India
It has often been thought that word sense ambiguity is a cause of poor performance in Information Retrieval (IR) systems. The belief is that if ambiguous words can be correctly disambiguated, IR performance will incre... 详细信息
来源: 评论
The step similarity comparisons on method patents
The step similarity comparisons on method patents
收藏 引用
作者: Chen, G-Yen Soo, Von-Wun Institute of Information Systems and Applications National Tsing Hua University Taiwan Department of Computer Science and Information Engineering National University of Kaohsiung Taiwan
The objective of the study is to establish the technologies of automatic similarity analysis and comparison of two method patents in order to reduce the cost and human efforts. We propose a method to compare the simil... 详细信息
来源: 评论
A robust network alignment algorithm for detecting evolutionarily conserved networks and protein complexes across species
A robust network alignment algorithm for detecting evolution...
收藏 引用
2008 International Conference on Bioinformatics and Computational Biology, BIOCOMP 2008
作者: Lin, Yu-Chun Yeh, Hsiang-Yuan Yeh, Cheng-Yu Soo, Von-Wun Institute of Information Systems and Applications National Tsing Hua University HsinChu 300 Taiwan Department of Computer Science National Tsing Hua University HsinChu 300 Taiwan Department of Computer Science and Information Engineering National University of Kaohsiung Kaohsiung 811 Taiwan
Due to the complexity of the biological networks, it is difficult to extract the conserved modules across species with graphical representation. One of the arising challenges is to compare different networks in order ... 详细信息
来源: 评论
Taiwanese LOM (TW LOM) annotation: Automatic description generation for learning objects
Taiwanese LOM (TW LOM) annotation: Automatic description gen...
收藏 引用
16th International Conference on computers in Education, ICCE 2008
作者: Lee, Joe Chun-Te Haung, Sin-Jie Chiang, Yi-Wen Liu, Chun-Chieh Soo, Von-Wun Department of Computer Science National Tsing Hua University Hsinchu 30013 Taiwan Institute of Information Systems and Applications National Tsing Hua University Hsinchu 30013 Taiwan Department of Computer Science and Information Engineering National University of Kaohsiung Kaohsiung 800 Taiwan
Owning to the great growth of e-learning objects, authorities (e.g. ADL and IEEE) have developed some metadata standards to facilitate the keyword search for various e-learning applications. However, too much fields, ... 详细信息
来源: 评论