咨询与建议

限定检索结果

文献类型

  • 983 篇 会议
  • 136 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,121 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 614 篇 工学
    • 518 篇 计算机科学与技术...
    • 454 篇 软件工程
    • 198 篇 信息与通信工程
    • 117 篇 控制科学与工程
    • 95 篇 生物工程
    • 78 篇 网络空间安全
    • 73 篇 电气工程
    • 73 篇 生物医学工程(可授...
    • 64 篇 安全科学与工程
    • 46 篇 电子科学与技术(可...
    • 45 篇 交通运输工程
    • 43 篇 机械工程
    • 43 篇 光学工程
    • 35 篇 动力工程及工程热...
    • 27 篇 化学工程与技术
  • 318 篇 理学
    • 158 篇 数学
    • 109 篇 生物学
    • 65 篇 物理学
    • 57 篇 统计学(可授理学、...
    • 53 篇 系统科学
  • 239 篇 管理学
    • 155 篇 管理科学与工程(可...
    • 92 篇 工商管理
    • 85 篇 图书情报与档案管...
    • 24 篇 公共管理
  • 86 篇 医学
    • 62 篇 基础医学(可授医学...
    • 62 篇 临床医学
    • 50 篇 公共卫生与预防医...
    • 44 篇 药学(可授医学、理...
  • 50 篇 法学
    • 39 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 20 篇 农学
  • 8 篇 教育学
  • 1 篇 文学

主题

  • 71 篇 accuracy
  • 52 篇 machine learning
  • 45 篇 real-time system...
  • 44 篇 deep learning
  • 43 篇 computational mo...
  • 42 篇 support vector m...
  • 36 篇 predictive model...
  • 34 篇 internet of thin...
  • 32 篇 scalability
  • 30 篇 convolutional ne...
  • 29 篇 feature extracti...
  • 29 篇 training
  • 27 篇 data models
  • 26 篇 security
  • 26 篇 technological in...
  • 26 篇 machine learning...
  • 25 篇 telecommunicatio...
  • 22 篇 cloud computing
  • 21 篇 decision trees
  • 19 篇 reviews

机构

  • 241 篇 department of co...
  • 148 篇 gla university d...
  • 147 篇 department of co...
  • 82 篇 department of co...
  • 76 篇 lloyd law colleg...
  • 75 篇 gla university d...
  • 63 篇 school of comput...
  • 60 篇 lovely professio...
  • 53 篇 department of co...
  • 48 篇 lloyd institute ...
  • 46 篇 department of co...
  • 40 篇 lloyd institute ...
  • 39 篇 department of co...
  • 37 篇 gla university d...
  • 34 篇 graphic era deem...
  • 34 篇 the islamic univ...
  • 33 篇 saveetha school ...
  • 33 篇 the islamic univ...
  • 31 篇 gla university d...
  • 29 篇 institute of aer...

作者

  • 76 篇 varshney neeraj
  • 71 篇 neeraj varshney
  • 58 篇 kumar rakesh
  • 54 篇 rakesh kumar
  • 48 篇 singh kamred udh...
  • 45 篇 kumar ankit
  • 43 篇 singh teekam
  • 39 篇 sharma ashish
  • 37 篇 sharma dilip kum...
  • 37 篇 ashish sharma
  • 36 篇 kumar gaurav
  • 36 篇 saloni bansal
  • 33 篇 sharma himanshu
  • 31 篇 kamred udham sin...
  • 30 篇 bansal saloni
  • 28 篇 ankit kumar
  • 28 篇 shrivastava anur...
  • 28 篇 anurag shrivasta...
  • 26 篇 himanshu sharma
  • 25 篇 teekam singh

语言

  • 1,018 篇 英文
  • 102 篇 其他
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=Computer Engineering and Applications GLA University"
1121 条 记 录,以下是201-210 订阅
排序:
Safeguarding Information in QR Codes Through Steganographic Technique
Safeguarding Information in QR Codes Through Steganographic ...
收藏 引用
Communication, Control and Intelligent Systems (CCIS)
作者: Jyotsana Bhardwaj Ruby Panwar Department of Computer Engineering and Applications GLA University Mathura India
The act of concealing data within a different message or object in order to avoid detection is referred to as steganography. Steganography can hide various types of digital content such as text, images, audio, and vid... 详细信息
来源: 评论
Improved Resource Allocation in 6G Networks Through Artificial Intelligence  2
Improved Resource Allocation in 6G Networks Through Artifici...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Gupta, Rolly Kumar Sagar, Pramod Malhotra, Sonal Kulshreshtha, Kushagra Srm Institute of Science and Technology Computer Science & Engineering UP Modinagar India Raj Kumar Goel Institute of Technology Computer Science & Engineering UP Ghaziabad India Graphic Era Hill University Computer Science & Engineering Uttarakhand Dehradun India Gla University Department of Computer Engineering & Applications Up Mathura India
This paper proposes a unique resource allocation technique for 6G networks the use of synthetic intelligence (AI). To assist the evolution of cellular networks, aid allocation mechanisms must be designed to successful... 详细信息
来源: 评论
Machine Learning based model to Detect Anomaly in the Water
Machine Learning based model to Detect Anomaly in the Water
收藏 引用
2023 International Conference on Computational Intelligence and Sustainable engineering Solution, CISES 2023
作者: Kumar, Gaurav Pandey, Saroj Kumar Yadav, Dhirendra Prasad Singh, Kamred Udham Singh, Teekam Kumar, Ankit Gla University Department of Computer Engineering & Applications UP Mathura India School of Computing Graphic Era Hill University Dehradun India Graphic Era University Department of Computer Science and Engineering Dehradun India
The environmental impact of technology is only one area where the field is expanding rapidly without necessarily good results. [1] Water contamination is one such critical problem. Because water is essential to human ... 详细信息
来源: 评论
Instantaneous Interpretation into Sign Language for the Hearing Impaired  1
收藏 引用
3rd International Conference on Universal Threats in Expert applications and Solutions, UNI-TEAS 2024
作者: Singh, Kamred Udham Kumar, Ankit Kumar, Gaurav Singh, Teekam Kothari, Paras Sheikh, Anisha School of Computing Graphic Era Hill University Dehradun India Department of Information Technology Guru Ghasidas Vishwavidyalaya Bilaspur India Department of Computer Engineering and Applications GLA University UP Mathura India Department of Computer Science and Engineering Graphic Era Deemed to Be University Dehradun India Department of Computer Applications Geetanjali Institute of Technical Studies Rajasthan Udaipur India
Because they are unable to convey their thoughts to others who can hear, deaf persons may have a difficult time controlling their emotions and may find that their routines are often interrupted. This is the primary im... 详细信息
来源: 评论
A Novel Object Detection and Tracking Approach Using LSTM Networks and DSOD for UAV
A Novel Object Detection and Tracking Approach Using LSTM Ne...
收藏 引用
Advancement in Electronics & Communication engineering (AECE), International Conference on
作者: Ankit Kumar Kumar Sankar Ray Department of Computer Engineering & Applications GLA University Mathura UP India
Unmanned Aerial Vehicles (UAVs) are being used in traffic control, disaster response, and logistics. UAVs provide very detailed monitoring and object tracking, surpassing traditional surveillance systems in high-resol... 详细信息
来源: 评论
Local and Global Features Based on Ear Recognition System
Local and Global Features Based on Ear Recognition System
收藏 引用
International Conference on Artificial Intelligence and Sustainable engineering, AISE 2020
作者: Agarwal, Rohit Department of Computer Engineering and Applications GLA University U.P. Mathura281406 India
Ear images is a promising physical quality that has been lately advanced as a biometric resource, inferable from its age-autonomous structure, its invariance to outward appearance, and its reasonable and notable struc... 详细信息
来源: 评论
Potato Leaf Disease Detection Method is Based on the Support Vector Machines  2
Potato Leaf Disease Detection Method is Based on the Support...
收藏 引用
2nd International Conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Srivastava, Animesh Singh Rawat, Bhupender Sawan, Vikash Vishal Dhondiyal, Shiv Ashish Graphic Era Hill University Department of Computer Science & Engineering Dehradun India College of Smart Computing COER University Roorkee India GLA University Department of Computer Engineering & Applications Uttar Pradesh Mathura India School of Computer Application Lovely Professional University Punjab Jalandhar India Department of Computer Science & Engineering Dehradun India
Potato production is challenged by plant diseases whose adverse effects are a reduction in the yield of the crops, and which have undesirable economic implications. Recognizing these diseases is of utmost importance s... 详细信息
来源: 评论
Facial Features based Recognition System using LBPH and AdaBoost
Facial Features based Recognition System using LBPH and AdaB...
收藏 引用
Smart Electronics and Communication (ICOSEC), International Conference on
作者: Mayank Srivastava Kalash Khatiyan Pratibha Dixit Department of Computer Engineering & Applications GLA University Mathura UP India
Face recognition stands as a pivotal domain within computer vision, boasting myriad applications in security, identification, and biometrics. This research study proposes a face recognition system using image processi... 详细信息
来源: 评论
Data Science - A Compendious Study on Statistical Methods and Visualization Techniques
Data Science - A Compendious Study on Statistical Methods an...
收藏 引用
2023 International Conference on Computational Intelligence and Sustainable engineering Solution, CISES 2023
作者: Singh, Kamred Udham Pandey, Saroj Kumar Yadav, Dhirendra Prasad Singh, Teekam Kumar, Gaurav Kumar, Ankit School of Computing Graphic Era Hill University Dehradun India Gla University Department of Computer Engineering & Applications UP Mathura India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India
Knowledge and insights may be gleaned from both organized and unstructured data through the use of Data Science, which is itself a multidisciplinary discipline. Finding patterns and trends in data requires a wide rang... 详细信息
来源: 评论
Increasing Productivity in Software Development Through the Use of Docker Technology  1
收藏 引用
3rd International Conference on Universal Threats in Expert applications and Solutions, UNI-TEAS 2024
作者: Singh, Kamred Udham Kumar, Ankit Kumar, Gaurav Singh, Teekam Kothari, Paras Sheikh, Anisha School of Computing Graphic Era Hill University Dehradun India Department of Computer Engineering and Applications GLA University UP Mathura India Department of Information Technology Guru Ghashi Das University Bilaspur Bilaspur India Department of Computer Science and Engineering Graphic Era Deemed to Be University Dehradun India Department of Computer Applications Geetanjali Institute of Technical Studies Rajasthan Udaipur India
The Docker technology makes the process of developing software substantially more effective by resolving issues related to deployment and hosting. Through the use of virtualization, it is able to function independentl... 详细信息
来源: 评论