咨询与建议

限定检索结果

文献类型

  • 3,492 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,717 篇 工学
    • 2,100 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 761 篇 信息与通信工程
    • 513 篇 控制科学与工程
    • 390 篇 电气工程
    • 329 篇 生物工程
    • 295 篇 生物医学工程(可授...
    • 289 篇 电子科学与技术(可...
    • 240 篇 网络空间安全
    • 193 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 185 篇 安全科学与工程
    • 167 篇 机械工程
    • 159 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 133 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 768 篇 数学
    • 406 篇 物理学
    • 384 篇 生物学
    • 268 篇 统计学(可授理学、...
    • 182 篇 化学
    • 170 篇 系统科学
  • 869 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 357 篇 医学
    • 280 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 201 篇 公共卫生与预防医...
    • 159 篇 药学(可授医学、理...
  • 174 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 296 篇 accuracy
  • 208 篇 deep learning
  • 175 篇 machine learning
  • 162 篇 real-time system...
  • 156 篇 internet of thin...
  • 150 篇 feature extracti...
  • 146 篇 computational mo...
  • 142 篇 convolutional ne...
  • 123 篇 predictive model...
  • 113 篇 support vector m...
  • 113 篇 training
  • 98 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 83 篇 artificial intel...
  • 83 篇 cloud computing
  • 81 篇 technological in...
  • 78 篇 machine learning...
  • 73 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 111 篇 department of co...
  • 103 篇 department of co...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 3,837 篇 英文
  • 946 篇 其他
  • 27 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Applications in Science and Engineering"
4800 条 记 录,以下是4581-4590 订阅
排序:
Multidimensional frequent pattern mining using association rule based constraints
收藏 引用
2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005
作者: Vijayalakshmi, S. Raja, S. Suresh Department of Computer Science and Engineering Thiagarajar College of Engineering Madurai-625015 Department of Computer Applications K.L.N.College of Engineering Madurai-625020
Knowledge about multi-dimensional frequent patterns is interesting and useful. The classic frequent pattern mining algorithms based on a uniform minimum support, such as Apriori and FP-growth, either miss interesting ... 详细信息
来源: 评论
An enhanced one way function tree rekey protocol based on Chinese remainder theorem
收藏 引用
20th International Symposium on computer and Information sciences, ISCIS 2005
作者: Parvatha Varthini, B. Valli, S. Department of Computer Applications St. Joseph's College of Engg Department of Computer Science College of Engineering Guindy Anna University Chennai - 25 India
Group communication is the basis for many recent multimedia and web applications. The group key management is one of the most critical problems in a large dynamic group. All group rekeying protocols add communication ... 详细信息
来源: 评论
An efficient fuzzy based neuro - Genetic algorithm for stock market prediction
An efficient fuzzy based neuro - Genetic algorithm for stock...
收藏 引用
2nd Indian International Conference on Artificial Intelligence, IICAI 2005
作者: Srinivasa, K.G. Venugopal, K.R. Patnaik, L.M. Department of Computer Science and Engineering College of Engineering University Visvesvaraya Bangalore - 560001 India Microprocessor Applications Laboratory Indian Institute of Science Bangalore - 560012 India
Stock market prediction is a complex and tedious task that involves the processing of large amounts of data, that are stored in ever growing databases. The vacillating nature of the stock market requires the use of da... 详细信息
来源: 评论
A self-adaptive migration model genetic algorithms for data mining applications
A self-adaptive migration model genetic algorithms for data ...
收藏 引用
2nd Indian International Conference on Artificial Intelligence, IICAI 2005
作者: Srinivasa, K.G. Venugopal, K.R. Patnaik, L.M. Department of Computer Science and Engineering College of Engineering University Visvesvaraya Bangalore - 560001 India Microprocessor Applications Laboratory Indian Institute of Science Bangalore - 560012 India
Data mining involves the process of extracting nontrivial knowledge or hidden patterns from large databases. Genetic Algorithms are efficient and robust searching and optimization methods that are used in data mining.... 详细信息
来源: 评论
GaXsearch: An XML information retrieval mechanism using genetic algorithms
收藏 引用
18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence
作者: Srinivasa, K.G. Sharath, S. Venugopal, K.R. Patnaik, Lalit M. Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore - 560001 India Infosys Technologies Bangalore India Microprocessor Applications Laboratory Indian Institute of Science India
The XML technology, with its self-describing and extensible tags, is significantly contributing to the next generation semantic web. The present search techniques used for HTML and text documents are not efficient to ... 详细信息
来源: 评论
A dynamic Migration Model for self-adaptive Genetic Algorithms
A dynamic Migration Model for self-adaptive Genetic Algorith...
收藏 引用
6th International Conference on Intelligent Data engineering and Automated Learning - IDEAL 2005
作者: Srinivasa, K.G. Sridharan, K. Shenoy, P. Deepa Venugopal, K.R. Patnaik, Lalit M. Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore 560001 India Department of CSE Sunny Buffalo United States Microprocessor Applications Laboratory Indian Institute of Science India
In this paper, we propose a self Adaptive Migration Model for Genetic Algorithms, where parameters of population size, the number of points of crossover and mutation rate for each population are fixed adaptively. Furt... 详细信息
来源: 评论
Selective dissemination of XML documents using GAs and SVM
收藏 引用
International Conference on Computational Intelligence and Security, CIS 2005
作者: Srinivasa, K.G. Sharath, S. Venugopal, K.R. Patnaik, Lalit M. Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore - 560001 India Infosys Technologies Bangalore India Microprocessor Applications Laboratory Indian Institute of Science India
XML has emerged as a medium for interoperability over the Internet. As the number of documents published in the form of XML is increasing there is a need for selective dissemination of XML documents based on user inte... 详细信息
来源: 评论
A hybrid parallel loop scheduling scheme on heterogeneous PC clusters
A hybrid parallel loop scheduling scheme on heterogeneous PC...
收藏 引用
6th International Conference on Parallel and Distributed Computing, applications and Technologies, PDCAT 2005
作者: Shih, Wen-Chung Yang, Chao-Tung Chen, Ping-I. Tseng, Shian-Shyong Department of Computer and Information Science National Chiao Tung University Hsinchu 30010 Taiwan Department of Computer Science and Information Engineering Tunghai University Taichung 40704 Taiwan Department of Information Science and Applications Asia University Taichung 41354 Taiwan
Traditional loop-scheduling schemes are designed for homogeneous computing environments, and are probably not suitable for emerging heterogeneous PC clusters. This paper applies a two-phased method, named HPLS (Hybrid... 详细信息
来源: 评论
IDEAS: Intrusion detection based on emotional ants for sensors
IDEAS: Intrusion detection based on emotional ants for senso...
收藏 引用
5th International Conference on Intelligent Systems Design and applications, ISDA '05
作者: Banerjee, Soumya Grosan, Crina Abraham, Ajith Dept. of Computer Applications Institute of Management Studies India Department of Computer Science Babeş-Bolyai University Cluj-Napoca 3400 Romania School of Computer Science and Engineering Chung-Ang University Korea Republic of
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including cryptographic techniques or by safeguarding ... 详细信息
来源: 评论
A secure image steganography using LSB, DCT and compression techniques on raw images  3
A secure image steganography using LSB, DCT and compression ...
收藏 引用
3rd International Conference on Intelligent Sensing and Information Processing, ICISIP 2005
作者: Raja, K.B. Chowdary, C.R. Venugopal, K.R. Patnaik, L.M. Department of Computer Science Engineering Bangalore University Bangalore560001 India Microprocessor Applications Laboratory Indian Institute OfScience Bangalore560012 India
Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing... 详细信息
来源: 评论