咨询与建议

限定检索结果

文献类型

  • 3,470 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,721 篇 工学
    • 2,109 篇 计算机科学与技术...
    • 1,731 篇 软件工程
    • 764 篇 信息与通信工程
    • 515 篇 控制科学与工程
    • 392 篇 电气工程
    • 329 篇 生物工程
    • 297 篇 生物医学工程(可授...
    • 286 篇 电子科学与技术(可...
    • 241 篇 网络空间安全
    • 197 篇 光学工程
    • 189 篇 动力工程及工程热...
    • 186 篇 安全科学与工程
    • 167 篇 机械工程
    • 154 篇 化学工程与技术
    • 139 篇 交通运输工程
    • 126 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 766 篇 数学
    • 404 篇 物理学
    • 384 篇 生物学
    • 265 篇 统计学(可授理学、...
    • 181 篇 化学
    • 170 篇 系统科学
  • 871 篇 管理学
    • 525 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 359 篇 医学
    • 281 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 175 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 287 篇 accuracy
  • 205 篇 deep learning
  • 172 篇 machine learning
  • 157 篇 real-time system...
  • 153 篇 internet of thin...
  • 144 篇 feature extracti...
  • 141 篇 computational mo...
  • 138 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 97 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 85 篇 artificial intel...
  • 80 篇 cloud computing
  • 80 篇 technological in...
  • 75 篇 machine learning...
  • 72 篇 data mining
  • 69 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 112 篇 department of co...
  • 99 篇 department of co...
  • 64 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,299 篇 英文
  • 462 篇 其他
  • 25 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4778 条 记 录,以下是491-500 订阅
排序:
Leveraging Machine Learning for Real-time Anomaly Detection and Self-Repair in IoT Devices  2
Leveraging Machine Learning for Real-time Anomaly Detection ...
收藏 引用
2nd IEEE International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023
作者: Ali, S. Ahamed Sujatha, D. Michael, Raj.T.F. Ramesh, G. Agoramoorthy, Moorthy Computer Science and Engineering Easwari Engineering College Ramapuram India St. Peters College of Engineering and Technology Department of Computer Science and Engineering Chennai India Simats Department of Computer Applications Sclas TN Chennai India K.L.N. College of Engineering Department of Information Technology Sivagangai Tamilnadu Pottapalayam India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India
The Internet of Things (IoT) gadgets have completely transformed a number of different businesses by producing enormous amounts of data. A machine learning framework for real-time Internet of Things anomaly detection ... 详细信息
来源: 评论
Control Plane TCP Attacks Detection and Prevention in SDN Networks using Deep Learning Model  10
Control Plane TCP Attacks Detection and Prevention in SDN Ne...
收藏 引用
17th INDIACom;2023 10th International Conference on Computing for Sustainable Global Development, INDIACom 2023
作者: Anand Kumar, M. Ghanshala, Anshul Purohit, Kamelsh Chandra Singh, Anuj Ezhilarasi, M. Department of Computer Applications Dehradun India The Chinese University of Hong Kong Department of Computer Science Hong Kong Dehradun India Sri Ramakrishna Engineering College Department of Eee Coimbatore India
The separation of the data and control planes and an integrated software-based administration strategy grounded on a central controller are two considerations put forth by the software-defined networking (SDN) paradig... 详细信息
来源: 评论
Word Embedding for Bengali Language using Domain-related Corpus  6
Word Embedding for Bengali Language using Domain-related Cor...
收藏 引用
6th International Conference on Inventive Computation Technologies, ICICT 2023
作者: Bandyopadhyay, Ashutosh Nair, Jayashree Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri Kollam India Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri Kollam India
Many natural language processing (NLP) tasks, including machine translation, document classification, information retrieval, news category classification, document clustering, news category clustering, and question-an... 详细信息
来源: 评论
Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2022年 第4期4卷 174-178页
作者: Gupta, Rishabh Saxena, Deepika Gupta, Ishu Makkar, Aaisha Singh, Ashutosh Kumar National Institute of Technology Department of Computer Applications Kurukshetra136119 India National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan University of Derby Department of Computer Science and Engineering DerbyDE22 1GB United Kingdom
This letter proposes a novel malicious user prediction model based on quantum machine learning that estimates the vicious entity present in the communication system precedently before allocating the data in the distri... 详细信息
来源: 评论
Robust Fingerprint Minutiae Extraction and Matching Using Fully Connected Deep Convolutional Neural Network and Improved SIFT  2
Robust Fingerprint Minutiae Extraction and Matching Using Fu...
收藏 引用
2nd IEEE International Conference on Data science and Network Security, ICDSNS 2024
作者: Husain, Saif O. Reddy, R.Archana Pareek, Piyush Kumar Jagannathan, Srinivasan Jyothi, M. College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Najaf Iraq School of Computer Science and Engineering Sr University Warangal India Nitte Meenakshi Institute of Technology Department of Aiml & Ipr Cell Bengaluru India Madanapalle Institute of Technology & Science Department of Computer Applications Madanapalle India G.Narayanamma Institute of Technology and Science Department of Information Technology Hyderabad India
Fingerprint is a most well-known biometric based authentication system that gives a unique identity for each person. In this paper, an authentication framework to enhance the Fingerprint Minutiae Extraction and Matchi... 详细信息
来源: 评论
Machine Learning based model to Detect Anomaly in the Water
Machine Learning based model to Detect Anomaly in the Water
收藏 引用
2023 International Conference on Computational Intelligence and Sustainable engineering Solution, CISES 2023
作者: Kumar, Gaurav Pandey, Saroj Kumar Yadav, Dhirendra Prasad Singh, Kamred Udham Singh, Teekam Kumar, Ankit Gla University Department of Computer Engineering & Applications UP Mathura India School of Computing Graphic Era Hill University Dehradun India Graphic Era University Department of Computer Science and Engineering Dehradun India
The environmental impact of technology is only one area where the field is expanding rapidly without necessarily good results. [1] Water contamination is one such critical problem. Because water is essential to human ... 详细信息
来源: 评论
Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique
收藏 引用
computer Systems science & engineering 2023年 第1期44卷 859-872页
作者: Fawaz Alassery Ahmed Alzahrani Asif Irshad Khan Kanika Sharma Masood Ahmad Raees Ahmad Khan Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Applications Mangalmay Institute of Engineering&TechnologyGreater Noida201310Uttar PradeshIndia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025Uttar PradeshIndia
In recent years,it has been observed that the disclosure of information increases the risk of *** restricting the accessibility of information,providing security is ***,there is a demand for time tofill the gap betwee... 详细信息
来源: 评论
Hybrid Fault Prediction and Recovery Framework for VANETs using AI and Federated IoT  7
Hybrid Fault Prediction and Recovery Framework for VANETs us...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Darney, P. Ebby Vallileka, N. Manoj, Sumitha Fernando, A. Vegi Krishnan, R. Santhana Prasath, S. Ram RajaRajeswari College of Engineering Department of Electrical And Electronics Engineering Bangalore India Psna College of Engineering And Technology Department of Computer Applications Dindigul India RajaRajeswari College of Engineering Department of Electronics And Communication Engineering Bangalore India Bangalore Harohalli India Scad College of Engineering And Technology Department of Electronics And Communication Engineering Cheranmahadevi India Scad College of Engineering And Technology Department of Computer Science And Engineering Cheranmahadevi India
In contemporary vehicular communication systems, Vehicular Ad Hoc Networks (VANETs) serve a crucial role in enabling seamless data exchange among vehicles and infrastructure components. However, the dynamic and unpred... 详细信息
来源: 评论
Generative Adversarial Networks (GANs) in the Wild: applications, Challenges, and Future Prospects  2
Generative Adversarial Networks (GANs) in the Wild: Applicat...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Kumar, Rakesh Chaudhary, Pooja Gupta, Shilpi Singhal, Manoj Gla University Department of Computer Engineering & Applications UP Mathura India UP Ghaziabad India Meerut Institute of Technology Department of Computer Science & Engineering UP Meerut India Gl Bajaj Institute of Technology & Management Department of Information Technology UP Greater Noida India
Generative adverse Networks (GANs) have become increasingly famous for a variety of tasks in picture and audio processing, especially unsupervised getting to know. GANs encompass components, a 'generator' and ... 详细信息
来源: 评论
Analysis of Various Image Segmentation Techniques on Retinal OCT Images  3
Analysis of Various Image Segmentation Techniques on Retinal...
收藏 引用
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023
作者: Sheeba, T.M. Albert Antony Raj, S. Anand, M. Srm Institute of Science and Technology College of Science and Humanities Department of Computer Applications Chennai India Srm Institute of Science and Technology College of Engineering and Technology Department of Networking and Communications Chennai India
Image segmentation is one of the most important processes involved in image processing. Segmenting an image is breaking it up into smaller pieces, or segments. These are the areas where it is most helpful because proc... 详细信息
来源: 评论