咨询与建议

限定检索结果

文献类型

  • 3,492 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,717 篇 工学
    • 2,100 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 761 篇 信息与通信工程
    • 513 篇 控制科学与工程
    • 390 篇 电气工程
    • 329 篇 生物工程
    • 295 篇 生物医学工程(可授...
    • 289 篇 电子科学与技术(可...
    • 240 篇 网络空间安全
    • 193 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 185 篇 安全科学与工程
    • 167 篇 机械工程
    • 159 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 133 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 768 篇 数学
    • 406 篇 物理学
    • 384 篇 生物学
    • 268 篇 统计学(可授理学、...
    • 182 篇 化学
    • 170 篇 系统科学
  • 869 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 357 篇 医学
    • 280 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 201 篇 公共卫生与预防医...
    • 159 篇 药学(可授医学、理...
  • 174 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 296 篇 accuracy
  • 208 篇 deep learning
  • 175 篇 machine learning
  • 162 篇 real-time system...
  • 156 篇 internet of thin...
  • 150 篇 feature extracti...
  • 146 篇 computational mo...
  • 142 篇 convolutional ne...
  • 123 篇 predictive model...
  • 113 篇 support vector m...
  • 113 篇 training
  • 98 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 83 篇 artificial intel...
  • 83 篇 cloud computing
  • 81 篇 technological in...
  • 78 篇 machine learning...
  • 73 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 111 篇 department of co...
  • 103 篇 department of co...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 3,837 篇 英文
  • 946 篇 其他
  • 27 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Applications in Science and Engineering"
4800 条 记 录,以下是501-510 订阅
排序:
Hybrid Fault Prediction and Recovery Framework for VANETs using AI and Federated IoT  7
Hybrid Fault Prediction and Recovery Framework for VANETs us...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Darney, P. Ebby Vallileka, N. Manoj, Sumitha Fernando, A. Vegi Krishnan, R. Santhana Prasath, S. Ram RajaRajeswari College of Engineering Department of Electrical And Electronics Engineering Bangalore India Psna College of Engineering And Technology Department of Computer Applications Dindigul India RajaRajeswari College of Engineering Department of Electronics And Communication Engineering Bangalore India Bangalore Harohalli India Scad College of Engineering And Technology Department of Electronics And Communication Engineering Cheranmahadevi India Scad College of Engineering And Technology Department of Computer Science And Engineering Cheranmahadevi India
In contemporary vehicular communication systems, Vehicular Ad Hoc Networks (VANETs) serve a crucial role in enabling seamless data exchange among vehicles and infrastructure components. However, the dynamic and unpred... 详细信息
来源: 评论
Generative Adversarial Networks (GANs) in the Wild: applications, Challenges, and Future Prospects  2
Generative Adversarial Networks (GANs) in the Wild: Applicat...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Kumar, Rakesh Chaudhary, Pooja Gupta, Shilpi Singhal, Manoj Gla University Department of Computer Engineering & Applications UP Mathura India UP Ghaziabad India Meerut Institute of Technology Department of Computer Science & Engineering UP Meerut India Gl Bajaj Institute of Technology & Management Department of Information Technology UP Greater Noida India
Generative adverse Networks (GANs) have become increasingly famous for a variety of tasks in picture and audio processing, especially unsupervised getting to know. GANs encompass components, a 'generator' and ... 详细信息
来源: 评论
Analysis of Various Image Segmentation Techniques on Retinal OCT Images  3
Analysis of Various Image Segmentation Techniques on Retinal...
收藏 引用
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023
作者: Sheeba, T.M. Albert Antony Raj, S. Anand, M. Srm Institute of Science and Technology College of Science and Humanities Department of Computer Applications Chennai India Srm Institute of Science and Technology College of Engineering and Technology Department of Networking and Communications Chennai India
Image segmentation is one of the most important processes involved in image processing. Segmenting an image is breaking it up into smaller pieces, or segments. These are the areas where it is most helpful because proc... 详细信息
来源: 评论
Protecting machine learning systems using blockchain: solutions, challenges and future prospects
收藏 引用
Multimedia Tools and applications 2024年 1-28页
作者: Hajlaoui, Rejab Dhahri, Salah Mahfoudhi, Sami Moulahi, Tarek Alotibi, Gaseb Department of Computer and Informtion Sciences College of Computer Science and Engineering University of Hail Hail City Saudi Arabia Laboratory of Advanced Multifunctional Materials and Technological Applications Faculty of Science and Technology of Sidi Bouzid University of Kairouan Sidi Bouzid Tunisia Department of Information and Technology Management Mediterranean School of Business South Mediterranean University Tunis Tunisia Department of Information Technology College of Computer Qassim University Buraidah Saudi Arabia Department of Computers and Information Technology Alwajah College University of Tabuk Tabuk Saudi Arabia
Machine learning-based systems have emerged as the primary means for achieving the highest levels of productivity and efficiency. They have become the most influential competitive factor for many technologies and busi... 详细信息
来源: 评论
GPU Side-Channel Attack Classification for Targeted Secure Shader Mitigation
收藏 引用
SN computer science 2024年 第8期5卷 1-23页
作者: Lungu, Nelson Patra, Sudhansu Shekhar Mishra, Manoj Ranjan Dash, Bibhuti Bhusan Sasmal, Gopal Charan Pattnayak, Parthasarathi Singh, Satyendr Gourisaria, Mahendra Kumar Department of Electrical and Electronics Engineering University of Zambia Lusaka Zambia School of Computer Applications Kalinga Institute of Industrial Technology (KIIT) Deemed to be University Bhubaneswar India MCA Department Trident Academy of Creative Technology Bhubaneswar India Computer Science and Engineering Department BML Munjal University Gurugram India School of Computer Engineering Kalinga Institute of Industrial Technology (KIIT) Deemed to be University Bhubaneswar India
Graphics processing units (GPUs) provide massively parallel processing capabilities, enabling accelerated computation across diverse applications. However, their parallel architecture and shared resources also introdu... 详细信息
来源: 评论
A novel three-phase hybrid cryptographic algorithm for data security
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第5期17卷 3025-3033页
作者: Pooja Shalu Shyla Sangwan, Yogita Shivahare, Basu Dev School of Computer Science Engineering and Technology Bennett University Greater Noida Uttar Pradesh Noida India Manav Rachna University Haryana Faridabad India Bharati Vidyapeeth’s College of Engineering Delhi India Department of Computer Science and Applications Kurukshetra University Haryana Kurukshetra India School of Computing Science and Engineering Galgotias University Greater Noida Uttar Pradesh Noida India
Cryptography is crucial for ensuring the data security in wireless sensor networks. The real data is altered or concealed using several hashing techniques before transmission across the network. But, these traditional... 详细信息
来源: 评论
Self-moving Window with Long-Short Term Memory based Anomaly Detection in Edge-Assisted IoT Environments
Self-moving Window with Long-Short Term Memory based Anomaly...
收藏 引用
2024 International Conference on Distributed Systems, computer Networks and Cybersecurity, ICDSCNC 2024
作者: Chanti, Yerrolla Adnan, Myasar Mundher Devi, R. Renuga Lakshmanan, M. Madhavi, Arelli Sr University School of Computer Science & Artificial Intelligence Warangal India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Srm Institute of Science and Technology Department of Computer Science and Applications Ramapuram India Nitte Meenakshi Institute of Technology Department of Eee Bengaluru India Gokaraju Rangaraju Institute of Engineering and Technology Department of Ai&ml Bachupally India
Internet of Things (IoT) systems is widely used in many applications which generate huge amounts of sensory signals that involves to signify the state of systems. However, due to changes in IoT environment impact the ... 详细信息
来源: 评论
A Comprehensive Analysis of Cloud Computing in Wireless Communications  2
A Comprehensive Analysis of Cloud Computing in Wireless Comm...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Bansal, Anurag Sharma, Surbhi Shukla, Ajay Narayan Badhoutiya, Arti Research and Technology 13D Research & Strategy India Abes Engineering College Department of Computer Applications UP Ghaziabad India Computer Science & Engineering Graphic Era Hill University Uttarakhand Dehradun India Gla University Department of Electrical Engineering UP Mathura India
In the present-day digital landscape, cloud computing has grown to be a ubiquitous generation that offers numerous advantages to numerous businesses. Its software in wi-fi communications has had a mainly revolutionary... 详细信息
来源: 评论
Performance Enhancement of a Vertical Axis Wind Turbine (NACA 25112) Using Deflector Plates as an Augmenter  2nd
Performance Enhancement of a Vertical Axis Wind Turbine (NAC...
收藏 引用
2nd International Conference on Advances in Mechanical engineering and Material science, ICAMEMS 2023
作者: Kumar, Karthik Selva Jaseel, Mohammed Brintha, R. Devi, Aruna Jaiswal, Krishna Kumar Sangmesh, B.M. Suresh, A. Balaji, P.S. Department of Green Energy Technology Pondicherry University Puducherry India Department of Computer Applications Saradha Gangadharan College Puducherry India Department of Computer Science and MIS OCMT Barka Oman Department of Mechanical Engineering NIT Warangal Hanamkonda India Department of Mechanical Engineering NIT Rourkela Rourkela India
In order to overcome the self-starting issues in vertical axis wind turbines (VAWT), it is proposed to introduce the deflector plates as a power augmenter. In this study, a computational analysis on a wind turbine rot... 详细信息
来源: 评论
Cloud Top Management Role in Reducing Mobile Broadband Transmission Hazards and Offering Safety  3
Cloud Top Management Role in Reducing Mobile Broadband Trans...
收藏 引用
3rd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2023
作者: Manjunath, C.R. Sharma, Sachin Sharma, Aditi Sunil Kumar, M. Kelkar, Sandeep Vishal Deshmukh, Sheetal Department of Computer Science and Engineering Bangalore India Dev Bhoomi Uttarakhand University Department of Computer Science and Engineering Uttarakhand Dehradun India Parul University PIT Department of Computer Science and Engineering Gujarat Vadodara India Mohan Babu University Erstwhile SreeVidyanikethan Engineering College Department of Computer Science and Engineering AP Tirupathi India Prin L.N. Welingkar Institute of Management Development and Research India Yashwantrao Mohite Institute of Management Department of Computer Applications Karad India
In both the academic and industrial worlds, cloud technology is becoming a widely used research area. Both providers of cloud services and consumers profit from cloud computation. The literature has mostly focused on ... 详细信息
来源: 评论