咨询与建议

限定检索结果

文献类型

  • 3,578 篇 会议
  • 1,283 篇 期刊文献
  • 31 册 图书

馆藏范围

  • 4,892 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,787 篇 工学
    • 2,161 篇 计算机科学与技术...
    • 1,765 篇 软件工程
    • 803 篇 信息与通信工程
    • 554 篇 控制科学与工程
    • 400 篇 电气工程
    • 331 篇 生物工程
    • 307 篇 生物医学工程(可授...
    • 292 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 204 篇 安全科学与工程
    • 202 篇 光学工程
    • 193 篇 动力工程及工程热...
    • 175 篇 机械工程
    • 162 篇 化学工程与技术
    • 155 篇 交通运输工程
    • 130 篇 材料科学与工程(可...
  • 1,541 篇 理学
    • 774 篇 数学
    • 407 篇 物理学
    • 387 篇 生物学
    • 269 篇 统计学(可授理学、...
    • 184 篇 化学
    • 170 篇 系统科学
  • 900 篇 管理学
    • 550 篇 管理科学与工程(可...
    • 407 篇 图书情报与档案管...
    • 281 篇 工商管理
  • 370 篇 医学
    • 289 篇 临床医学
    • 275 篇 基础医学(可授医学...
    • 213 篇 公共卫生与预防医...
    • 159 篇 药学(可授医学、理...
  • 179 篇 法学
    • 147 篇 社会学
  • 103 篇 经济学
  • 91 篇 农学
  • 49 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 301 篇 accuracy
  • 219 篇 deep learning
  • 181 篇 machine learning
  • 165 篇 real-time system...
  • 158 篇 internet of thin...
  • 152 篇 feature extracti...
  • 147 篇 computational mo...
  • 145 篇 convolutional ne...
  • 124 篇 predictive model...
  • 116 篇 support vector m...
  • 114 篇 training
  • 101 篇 optimization
  • 94 篇 security
  • 87 篇 data models
  • 84 篇 artificial intel...
  • 84 篇 cloud computing
  • 81 篇 technological in...
  • 78 篇 machine learning...
  • 73 篇 data mining
  • 70 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 113 篇 department of co...
  • 102 篇 department of co...
  • 73 篇 gla university d...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 44 篇 the islamic univ...
  • 43 篇 lloyd law colleg...
  • 42 篇 graphic era deem...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 47 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 36 篇 kumar rakesh
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 29 篇 babu tina
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 26 篇 teekam singh
  • 26 篇 saloni bansal
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 24 篇 patra sudhansu s...
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 20 篇 bibhuti bhusan d...

语言

  • 3,514 篇 英文
  • 1,363 篇 其他
  • 29 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Applications in Science and Engineering"
4892 条 记 录,以下是4571-4580 订阅
排序:
Consolidate and Advance: An Efficient QoS Management Technique in Heterogeneous Wireless Sensor Networks
Consolidate and Advance: An Efficient QoS Management Techniq...
收藏 引用
International Conference on Signal Processing, Communication and Networking (ICSCN)
作者: Suraiya Tarannum Divya Prakash Sneha Susan George B V Tara S Ushe L Nalini K R Venugopal L M Patnaik Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bangalore India Department of Computer Science and Engineering Bangalore University Bangalore Microprocessor Applications Laboratory Indian Institute of Science Bangalore India
Research in wireless sensor networks has become an extensive explorative area during the last few years. In this paper we emphasize the need for repositioning of the consolidating and advancing node, (CAN : Principal ... 详细信息
来源: 评论
Routing in Large-Scale Buses Ad Hoc Networks
Routing in Large-Scale Buses Ad Hoc Networks
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Michel Sede Xu Li Da Li Min-You Wu Minglu Li Wei Shu Laboratory for Computer Communications and Applications EPF Lausanne Switzerland Department of Computer Science and Engineering Shanghai Jiaotong University China Department of Electrical and Computer Engineering University of New Mexico USA
A disruption-tolerant network (DTN) attempts to route packets between nodes that are temporarily connected. Difficulty in such networks is that nodes have no information about the network status and contact opportunit... 详细信息
来源: 评论
Robust image adaptive steganography using integer wavelets
Robust image adaptive steganography using integer wavelets
收藏 引用
International Conference on Communication Systems Software and Middleware (COMSWARE)
作者: K. B. Raja S. Sindhu T. D. Mahalakshmi S. Akshatha B. K. Nithin M. Sarvajith K. R. Venugopal L. M. Patnaik Department of Computer Science and Engineering Bangalore University Bangalore India Microprocessor Applications Laboratory Indian Institute of Science Bangalore India
Information-theoretic analysis for parallel Gaussian models of Images prescribe embedding the secret data in low and mid frequency regions of image which have large energies. In this paper, we propose a novel steganog... 详细信息
来源: 评论
Highly Conductive Films of Layered Ternary Transition‐Metal Nitrides†
收藏 引用
Angewandte Chemie 2009年 第8期121卷
作者: Hongmei Luo Haiyan Wang Zhengxing Bi Guifu Zou T. Mark McCleskey Anthony K. Burrell Eve Bauer Marilyn E. Hawley Yongqiang Wang Quanxi Jia Materials Physics and Applications Division Los Alamos National Laboratory Los Alamos NM 87545 (USA) Fax: (+1) 505‐665‐3164 Department of Chemical Engineering New Mexico State University Las Cruces NM 88003 (USA) Department of Electrical and Computer Engineering Texas A&M University College Station TX 77843 (USA) Materials Science and Technology Division Los Alamos National Laboratory Los Alamos NM 87545 (USA)
Epitaktische Filme aus BaZrN 2 (siehe TEM‐Bild) und BaHfN 2 wurden durch polymerunterstützte Abscheidung auf SrTiO 3 (STO)‐Substraten gezüchtet. Die Filme sind phasenrein, wodurch sich die intrinsischen ph... 详细信息
来源: 评论
An Efficient Probability-Based t out of n Secret Image Sharing Scheme
An Efficient Probability-Based t out of n Secret Image Shari...
收藏 引用
International Conference on Future Generation Communication and Networking Symposia, FGCNS
作者: Chi-Chen Chang Yu-Zheng Wang Chi-Shiang Chan Department of Information Engineering and Computer Science Feng Chia University FCU Taichung Taiwan Department of Computer Science and Information Engineering National Chung Cheng University Chiayi Taiwan Department of Information Science and Applications Asia University Wufeng Taiwan
Noar and Shamir presented the concept of visual cryptography. Many researches following it go down the same track: to expand the secret pixels to blocks. As a result, the size of the secret image becomes larger, and t... 详细信息
来源: 评论
Stability and L2-Gain Analysis for Switched Neutral Systems
Stability and L2-Gain Analysis for Switched Neutral Systems
收藏 引用
International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA
作者: Du-Yu Liu Shou-Ming Zhong Yuan-Qing Huang School of Applied Mathematics University of Electronic Science and Technology of China Chengdu China Department Computer Science and Applications Sichuan University of Science and Engineering Zigong China
This paper considers the stability and L 2 -gain for a class of switched neutral systems. Sufficient conditions for exponential stability criteria and L 2 -gain are developed for arbitrary switching signal with averag... 详细信息
来源: 评论
Research on Face Recognition Method based on Cognitive Mechanism
Research on Face Recognition Method based on Cognitive Mecha...
收藏 引用
International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA
作者: Jia Cui Jian-Ping Li Yu-Jie Hao Department of Computer Science and Engineering University of Electronic Science and Technology Chengdu China International Centre for Wavelet Analysis and Its Applications Logistical Engineering University Chongqing China
A face recognition method similar to human cognitive mechanism has been proposed. Motivated by the continuity rule of a same class samples, face recognition can be regarded as face pattern cognition. Compared with tra... 详细信息
来源: 评论
Study on Multi-Biometric Feature Fusion and Recognition Model
Study on Multi-Biometric Feature Fusion and Recognition Mode...
收藏 引用
International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA
作者: Jia Cui Jian-Ping Li Xiao-Jun Lu Department of Computer Science and Engineering University of Electronic Science and Technology Chengdu China Intemational Centre for Wavelet Analysis and Its Applications Logistical Engineering University Chongqing China
The single biometric identification technology has the inherent and difficult overcoming shortcomings, so multi-modal biometric fusion and identification techniques were proposed to improve the performance and accurat... 详细信息
来源: 评论
A Method of Security Evaluation based on Fuzzy Mathematics
A Method of Security Evaluation based on Fuzzy Mathematics
收藏 引用
International Conference on Apperceiving Computing and Intelligence Analysis, ICACIA
作者: Guo-Ming Lu Zhi-Hong Chen Xue-Zhi He Jian-Ping Li Department of computer science and engineering University of Electronic Science and Technology Chengdu China International Centre for Wavelet Analysis and Its Applications Logistical Engineering University Chongqing China
In order to effectively evaluate the system security, a quantitative information security evaluation method which combine analytic hierarchy process (AHP) and fuzzy comprehensive evaluation were proposed. Firstly, ref... 详细信息
来源: 评论
SVM ranking with backward search for feature selection in type II diabetes databases
SVM ranking with backward search for feature selection in ty...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Sarojini Balakrishnan Ramaraj Narayanaswamy Nickolas Savarimuthu Rita Samikannu Department of Computer Applications K.L.N. College of Information Technology Madurai India Department of Computer Science & Engineering GKM College of Engineering and Technology Chennai India Department of Computer Applications National Institute of Technology Tiruchirappalli India VIT Business School Vellore of Institute of Technology Vellore India
Clinical databases have accumulated large quantities of information about patients and their clinical history. Data mining is the search for relationships and patterns within this data that could provide useful knowle... 详细信息
来源: 评论