咨询与建议

限定检索结果

文献类型

  • 3,470 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,721 篇 工学
    • 2,109 篇 计算机科学与技术...
    • 1,731 篇 软件工程
    • 764 篇 信息与通信工程
    • 515 篇 控制科学与工程
    • 392 篇 电气工程
    • 329 篇 生物工程
    • 297 篇 生物医学工程(可授...
    • 286 篇 电子科学与技术(可...
    • 241 篇 网络空间安全
    • 197 篇 光学工程
    • 189 篇 动力工程及工程热...
    • 186 篇 安全科学与工程
    • 167 篇 机械工程
    • 154 篇 化学工程与技术
    • 139 篇 交通运输工程
    • 126 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 766 篇 数学
    • 404 篇 物理学
    • 384 篇 生物学
    • 265 篇 统计学(可授理学、...
    • 181 篇 化学
    • 170 篇 系统科学
  • 871 篇 管理学
    • 525 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 359 篇 医学
    • 281 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 175 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 287 篇 accuracy
  • 205 篇 deep learning
  • 172 篇 machine learning
  • 157 篇 real-time system...
  • 153 篇 internet of thin...
  • 144 篇 feature extracti...
  • 141 篇 computational mo...
  • 138 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 97 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 85 篇 artificial intel...
  • 80 篇 cloud computing
  • 80 篇 technological in...
  • 75 篇 machine learning...
  • 72 篇 data mining
  • 69 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 112 篇 department of co...
  • 99 篇 department of co...
  • 64 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,299 篇 英文
  • 462 篇 其他
  • 25 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering Department"
4778 条 记 录,以下是501-510 订阅
排序:
Protecting machine learning systems using blockchain: solutions, challenges and future prospects
收藏 引用
Multimedia Tools and applications 2024年 1-28页
作者: Hajlaoui, Rejab Dhahri, Salah Mahfoudhi, Sami Moulahi, Tarek Alotibi, Gaseb Department of Computer and Informtion Sciences College of Computer Science and Engineering University of Hail Hail City Saudi Arabia Laboratory of Advanced Multifunctional Materials and Technological Applications Faculty of Science and Technology of Sidi Bouzid University of Kairouan Sidi Bouzid Tunisia Department of Information and Technology Management Mediterranean School of Business South Mediterranean University Tunis Tunisia Department of Information Technology College of Computer Qassim University Buraidah Saudi Arabia Department of Computers and Information Technology Alwajah College University of Tabuk Tabuk Saudi Arabia
Machine learning-based systems have emerged as the primary means for achieving the highest levels of productivity and efficiency. They have become the most influential competitive factor for many technologies and busi... 详细信息
来源: 评论
GPU Side-Channel Attack Classification for Targeted Secure Shader Mitigation
收藏 引用
SN computer science 2024年 第8期5卷 1148页
作者: Lungu, Nelson Patra, Sudhansu Shekhar Mishra, Manoj Ranjan Dash, Bibhuti Bhusan Sasmal, Gopal Charan Pattnayak, Parthasarathi Singh, Satyendr Gourisaria, Mahendra Kumar Department of Electrical and Electronics Engineering University of Zambia Lusaka Zambia School of Computer Applications Kalinga Institute of Industrial Technology (KIIT) Deemed to be University Bhubaneswar India MCA Department Trident Academy of Creative Technology Bhubaneswar India Computer Science and Engineering Department BML Munjal University Gurugram India School of Computer Engineering Kalinga Institute of Industrial Technology (KIIT) Deemed to be University Bhubaneswar India
Graphics processing units (GPUs) provide massively parallel processing capabilities, enabling accelerated computation across diverse applications. However, their parallel architecture and shared resources also introdu... 详细信息
来源: 评论
Self-moving Window with Long-Short Term Memory based Anomaly Detection in Edge-Assisted IoT Environments
Self-moving Window with Long-Short Term Memory based Anomaly...
收藏 引用
2024 International Conference on Distributed Systems, computer Networks and Cybersecurity, ICDSCNC 2024
作者: Chanti, Yerrolla Adnan, Myasar Mundher Devi, R. Renuga Lakshmanan, M. Madhavi, Arelli Sr University School of Computer Science & Artificial Intelligence Warangal India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Srm Institute of Science and Technology Department of Computer Science and Applications Ramapuram India Nitte Meenakshi Institute of Technology Department of Eee Bengaluru India Gokaraju Rangaraju Institute of Engineering and Technology Department of Ai&ml Bachupally India
Internet of Things (IoT) systems is widely used in many applications which generate huge amounts of sensory signals that involves to signify the state of systems. However, due to changes in IoT environment impact the ... 详细信息
来源: 评论
A novel three-phase hybrid cryptographic algorithm for data security
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-9页
作者: Pooja Shalu Shyla Sangwan, Yogita Shivahare, Basu Dev School of Computer Science Engineering and Technology Bennett University Greater Noida Uttar Pradesh Noida India Manav Rachna University Haryana Faridabad India Bharati Vidyapeeth’s College of Engineering Delhi India Department of Computer Science and Applications Kurukshetra University Haryana Kurukshetra India School of Computing Science and Engineering Galgotias University Greater Noida Uttar Pradesh Noida India
Cryptography is crucial for ensuring the data security in wireless sensor networks. The real data is altered or concealed using several hashing techniques before transmission across the network. But, these traditional... 详细信息
来源: 评论
A Comprehensive Analysis of Cloud Computing in Wireless Communications  2
A Comprehensive Analysis of Cloud Computing in Wireless Comm...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Bansal, Anurag Sharma, Surbhi Shukla, Ajay Narayan Badhoutiya, Arti Research and Technology 13D Research & Strategy India Abes Engineering College Department of Computer Applications UP Ghaziabad India Computer Science & Engineering Graphic Era Hill University Uttarakhand Dehradun India Gla University Department of Electrical Engineering UP Mathura India
In the present-day digital landscape, cloud computing has grown to be a ubiquitous generation that offers numerous advantages to numerous businesses. Its software in wi-fi communications has had a mainly revolutionary... 详细信息
来源: 评论
A comparative analysis of using Deep Learning and Machine Learning technologies for intrusion detection for effective network traffic analysis
A comparative analysis of using Deep Learning and Machine Le...
收藏 引用
International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: Divya S B S. Prince Mary Department of Computer Science and Engineering Sathyabhama Institute of Science & Technology Chennai Department Of Computer Applications Mangalam College Of Engineering
The broad utilization of interconnectivity and interoperability of processing frameworks have turned into an irreplaceable need to improve our everyday activities. All the while, it opens a way to exploitable weakness... 详细信息
来源: 评论
Cloud Top Management Role in Reducing Mobile Broadband Transmission Hazards and Offering Safety  3
Cloud Top Management Role in Reducing Mobile Broadband Trans...
收藏 引用
3rd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2023
作者: Manjunath, C.R. Sharma, Sachin Sharma, Aditi Sunil Kumar, M. Kelkar, Sandeep Vishal Deshmukh, Sheetal Department of Computer Science and Engineering Bangalore India Dev Bhoomi Uttarakhand University Department of Computer Science and Engineering Uttarakhand Dehradun India Parul University PIT Department of Computer Science and Engineering Gujarat Vadodara India Mohan Babu University Erstwhile SreeVidyanikethan Engineering College Department of Computer Science and Engineering AP Tirupathi India Prin L.N. Welingkar Institute of Management Development and Research India Yashwantrao Mohite Institute of Management Department of Computer Applications Karad India
In both the academic and industrial worlds, cloud technology is becoming a widely used research area. Both providers of cloud services and consumers profit from cloud computation. The literature has mostly focused on ... 详细信息
来源: 评论
Performance Enhancement of a Vertical Axis Wind Turbine (NACA 25112) Using Deflector Plates as an Augmenter  2nd
Performance Enhancement of a Vertical Axis Wind Turbine (NAC...
收藏 引用
2nd International Conference on Advances in Mechanical engineering and Material science, ICAMEMS 2023
作者: Kumar, Karthik Selva Jaseel, Mohammed Brintha, R. Devi, Aruna Jaiswal, Krishna Kumar Sangmesh, B.M. Suresh, A. Balaji, P.S. Department of Green Energy Technology Pondicherry University Puducherry India Department of Computer Applications Saradha Gangadharan College Puducherry India Department of Computer Science and MIS OCMT Barka Oman Department of Mechanical Engineering NIT Warangal Hanamkonda India Department of Mechanical Engineering NIT Rourkela Rourkela India
In order to overcome the self-starting issues in vertical axis wind turbines (VAWT), it is proposed to introduce the deflector plates as a power augmenter. In this study, a computational analysis on a wind turbine rot... 详细信息
来源: 评论
GS-FFO Based Meta-Heuristic Clustering for Discovering Colossal Patterns in High-Dimensional Data  2nd
GS-FFO Based Meta-Heuristic Clustering for Discovering Colos...
收藏 引用
2nd Congress on Control, Robotics, and Mechatronics, CRM 2024
作者: Reddy, T. Sreenivasula Sathya, R. Nuka, Mallikharjuna Rao Research Scholar Department of Computer Science and Engineering Faculty of Engineering and Technology Annamalai University Annamalai Nagar Tamil Nadu Chidambaram608002 India Assistant Professor Department of Computer Science and Engineering Faculty of Engineering and Technology Annamalai University Annamalai Nagar Tamil Nadu Chidambaram608002 India Professor Department of Computer Applications Annamacharya Institute of Technology & Sciences YSR Kadapa Andhra Pradesh Rajampet516115 India
Colossal pattern mining, which involves deriving important relationships and insights from large and complex datasets, is an essential part of data analysis. Extracting association rules that satisfy preset minim... 详细信息
来源: 评论
Examining the Impact of Machine Learning on Streamlining Data Analysis in Real-Time  2
Examining the Impact of Machine Learning on Streamlining Dat...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Singh, Rashi Goel, Mukulit Bahuguna, Pankaj Kumar, Anuj Jain, Sachin Mvn University Department of Computer Science & Applications Haryana Palwal India Ajay Kumar Garg Engineering College Department of Mca UP Ghaziabad India Ajay Kumar Garg Engineering College Department of Cse UP Ghaziabad India
6G wireless conversation networks are anticipated to be one of the number one subsequent-era network answers to provide services and studies to users. So that you can fully understand the sizeable data throughput and ... 详细信息
来源: 评论