咨询与建议

限定检索结果

文献类型

  • 3,470 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,721 篇 工学
    • 2,109 篇 计算机科学与技术...
    • 1,731 篇 软件工程
    • 764 篇 信息与通信工程
    • 515 篇 控制科学与工程
    • 392 篇 电气工程
    • 329 篇 生物工程
    • 297 篇 生物医学工程(可授...
    • 286 篇 电子科学与技术(可...
    • 241 篇 网络空间安全
    • 197 篇 光学工程
    • 189 篇 动力工程及工程热...
    • 186 篇 安全科学与工程
    • 167 篇 机械工程
    • 154 篇 化学工程与技术
    • 139 篇 交通运输工程
    • 126 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 766 篇 数学
    • 404 篇 物理学
    • 384 篇 生物学
    • 265 篇 统计学(可授理学、...
    • 181 篇 化学
    • 170 篇 系统科学
  • 871 篇 管理学
    • 525 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 359 篇 医学
    • 281 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 175 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 287 篇 accuracy
  • 205 篇 deep learning
  • 172 篇 machine learning
  • 157 篇 real-time system...
  • 153 篇 internet of thin...
  • 144 篇 feature extracti...
  • 141 篇 computational mo...
  • 138 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 97 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 85 篇 artificial intel...
  • 80 篇 cloud computing
  • 80 篇 technological in...
  • 75 篇 machine learning...
  • 72 篇 data mining
  • 69 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 112 篇 department of co...
  • 99 篇 department of co...
  • 64 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,299 篇 英文
  • 462 篇 其他
  • 25 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4778 条 记 录,以下是4461-4470 订阅
排序:
An Efficient Probability-Based t out of n Secret Image Sharing Scheme
An Efficient Probability-Based t out of n Secret Image Shari...
收藏 引用
International Conference on Future Generation Communication and Networking Symposia, FGCNS
作者: Chi-Chen Chang Yu-Zheng Wang Chi-Shiang Chan Department of Information Engineering and Computer Science Feng Chia University FCU Taichung Taiwan Department of Computer Science and Information Engineering National Chung Cheng University Chiayi Taiwan Department of Information Science and Applications Asia University Wufeng Taiwan
Noar and Shamir presented the concept of visual cryptography. Many researches following it go down the same track: to expand the secret pixels to blocks. As a result, the size of the secret image becomes larger, and t... 详细信息
来源: 评论
Stability and L2-Gain Analysis for Switched Neutral Systems
Stability and L2-Gain Analysis for Switched Neutral Systems
收藏 引用
International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA
作者: Du-Yu Liu Shou-Ming Zhong Yuan-Qing Huang School of Applied Mathematics University of Electronic Science and Technology of China Chengdu China Department Computer Science and Applications Sichuan University of Science and Engineering Zigong China
This paper considers the stability and L 2 -gain for a class of switched neutral systems. Sufficient conditions for exponential stability criteria and L 2 -gain are developed for arbitrary switching signal with averag... 详细信息
来源: 评论
Research on Face Recognition Method based on Cognitive Mechanism
Research on Face Recognition Method based on Cognitive Mecha...
收藏 引用
International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA
作者: Jia Cui Jian-Ping Li Yu-Jie Hao Department of Computer Science and Engineering University of Electronic Science and Technology Chengdu China International Centre for Wavelet Analysis and Its Applications Logistical Engineering University Chongqing China
A face recognition method similar to human cognitive mechanism has been proposed. Motivated by the continuity rule of a same class samples, face recognition can be regarded as face pattern cognition. Compared with tra... 详细信息
来源: 评论
Study on Multi-Biometric Feature Fusion and Recognition Model
Study on Multi-Biometric Feature Fusion and Recognition Mode...
收藏 引用
International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA
作者: Jia Cui Jian-Ping Li Xiao-Jun Lu Department of Computer Science and Engineering University of Electronic Science and Technology Chengdu China Intemational Centre for Wavelet Analysis and Its Applications Logistical Engineering University Chongqing China
The single biometric identification technology has the inherent and difficult overcoming shortcomings, so multi-modal biometric fusion and identification techniques were proposed to improve the performance and accurat... 详细信息
来源: 评论
A Method of Security Evaluation based on Fuzzy Mathematics
A Method of Security Evaluation based on Fuzzy Mathematics
收藏 引用
International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA
作者: Guo-Ming Lu Zhi-Hong Chen Xue-Zhi He Jian-Ping Li Department of computer science and engineering University of Electronic Science and Technology Chengdu China International Centre for Wavelet Analysis and Its Applications Logistical Engineering University Chongqing China
In order to effectively evaluate the system security, a quantitative information security evaluation method which combine analytic hierarchy process (AHP) and fuzzy comprehensive evaluation were proposed. Firstly, ref... 详细信息
来源: 评论
SVM ranking with backward search for feature selection in type II diabetes databases
SVM ranking with backward search for feature selection in ty...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Sarojini Balakrishnan Ramaraj Narayanaswamy Nickolas Savarimuthu Rita Samikannu Department of Computer Applications K.L.N. College of Information Technology Madurai India Department of Computer Science & Engineering GKM College of Engineering and Technology Chennai India Department of Computer Applications National Institute of Technology Tiruchirappalli India VIT Business School Vellore of Institute of Technology Vellore India
Clinical databases have accumulated large quantities of information about patients and their clinical history. Data mining is the search for relationships and patterns within this data that could provide useful knowle... 详细信息
来源: 评论
Web service allocations based on combinatorial auctions and market-based mechanisms
Web service allocations based on combinatorial auctions and ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Szu-Yin Lin Bo-Yuan Chen Chun-Chieh Liu Von-Wun Soo Department of Computer Science National Tsing Hua University HsinChu Taiwan Institute of Computer Systems and Applications National Tsing Hua University HsinChu Taiwan Department of Computer Science and Information Engineering National University of Kaohsiung Kaohsiung Taiwan
The main idea in this paper is using combinatorial Web service market based mechanism (CWSMBM) to allow service demanders bid for more than one service at the same time. It takes quality of service into consideration ... 详细信息
来源: 评论
A soft computing approach for data mining based query processing using rough sets and genetic algorithms
收藏 引用
International Journal of Hybrid Intelligent Systems 2008年 第1期5卷 1-17页
作者: Srinivasa, K.G. Venugopal, K.R. Patnaik, L.M. Department of Computer Science and Engineering Data Mining Laboratory M S Ramaiah Institute of Technology Bangalore – 560054 India University Visvesvaraya College of Engineering Bangalore – 560001 India Microprocessor Applications Laboratory Indian Institute of Science Bangalore India
The optimization of queries is critical in database management systems and the complexity involved in finding optimal solutions has led to the development of heuristic approaches. Answering data mining query involves ... 详细信息
来源: 评论
Automatic simultaneous architecture and parameter search in fuzzy neural network learning using novel variable length crossover differential evolution
Automatic simultaneous architecture and parameter search in ...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
作者: Lotika Singh Satish Kumar Sandeep Paul Department of Physics and Computer Science Dayalbagh Educational Institute (Deemed University) Agra India Computer Science and Applications the Department of Physics and Computer Science Dayalbagh Educational Institute (Deemed University) Agra India Department of Electrical Engineering Dayalbagh Educational Institute (Deemed University) Agra India
The automatic simultaneous search of structure and parameters in fuzzy-neural networks is a pressing research problem. This paper introduces a novel and powerful variable-length-crossover differential evolution algori... 详细信息
来源: 评论
On the scalability of particle swarm optimisation
On the scalability of particle swarm optimisation
收藏 引用
Congress on Evolutionary Computation
作者: Sebastien Piccand Michael O'Neill Jacqueline Walker Department of Computer Science ' Information Systems University of Limerick Limerick Ireland Natural Computing Research ' Applications group School of Computer Science ' Informatics University College Dublin Dublin Ireland Department of Electronic and Computer Engineering University of Limerick Limerick Ireland
Particle swarm has proven to be competitive to other evolutionary algorithms in the field of optimization, and in many cases enables a faster convergence to the ideal solution. However, like any optimization algorithm... 详细信息
来源: 评论