咨询与建议

限定检索结果

文献类型

  • 3,492 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,717 篇 工学
    • 2,100 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 761 篇 信息与通信工程
    • 513 篇 控制科学与工程
    • 390 篇 电气工程
    • 329 篇 生物工程
    • 295 篇 生物医学工程(可授...
    • 289 篇 电子科学与技术(可...
    • 240 篇 网络空间安全
    • 193 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 185 篇 安全科学与工程
    • 167 篇 机械工程
    • 159 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 133 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 768 篇 数学
    • 406 篇 物理学
    • 384 篇 生物学
    • 268 篇 统计学(可授理学、...
    • 182 篇 化学
    • 170 篇 系统科学
  • 869 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 357 篇 医学
    • 280 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 201 篇 公共卫生与预防医...
    • 159 篇 药学(可授医学、理...
  • 174 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 296 篇 accuracy
  • 208 篇 deep learning
  • 175 篇 machine learning
  • 162 篇 real-time system...
  • 156 篇 internet of thin...
  • 150 篇 feature extracti...
  • 146 篇 computational mo...
  • 142 篇 convolutional ne...
  • 123 篇 predictive model...
  • 113 篇 support vector m...
  • 113 篇 training
  • 98 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 83 篇 artificial intel...
  • 83 篇 cloud computing
  • 81 篇 technological in...
  • 78 篇 machine learning...
  • 73 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 111 篇 department of co...
  • 103 篇 department of co...
  • 63 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 3,837 篇 英文
  • 946 篇 其他
  • 27 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Applications in Science and Engineering"
4800 条 记 录,以下是631-640 订阅
排序:
Leveraging Internet of Things (IoT) Sensors and Deep Learning Techniques for Precision Agriculture  1
Leveraging Internet of Things (IoT) Sensors and Deep Learnin...
收藏 引用
1st International Conference on Innovative engineering sciences and Technological Research, ICIESTR 2024
作者: Wilfred Blessing, N.R. Pyingkodi, M. Wasim Haidar, S.K. Palarimath, Suresh Paravathavarthini, S. Balakumar, C. Sheeja Kumari, V. Sutherlin Subitha, G. Seldev Christopher, S. University of Technology and Applied Sciences-Ibri College of Computing and Information Sciences Ibri Oman Kongu Engineering College Department of Computer Applications Erode India University of Technology and Applied Sciences-Salalah College of Computing and Information Sciences Salalah Oman Kongu Engineering College Department of Computer Technology Erode India Karpagam Academy of Higher Education Department of Computer Science Coimbatore India Saveetha Institute of Medical and Technical Sciences Department of Computational Intelligence Chennai India Stella Mary's College of Engineering Department of Computer Science and Engineering Aruthenganvilai India St. Xavier's Catholic College of Engineering Department of Computer Science and Engineering Nagercoil India
Precision agriculture, driven by advancements in technology, aims to optimize farming practices by utilizing data and technology to enhance efficiency, productivity, and sustainability This research introduces an inno... 详细信息
来源: 评论
Segmentation of Retinal Pigment Epithelium Layer in Retinal OCT Images  5
Segmentation of Retinal Pigment Epithelium Layer in Retinal ...
收藏 引用
5th IEEE International Conference on Advances in Electronics, computers and Communications, ICAECC 2023
作者: Sheeba, T.M. Antony Raj, S. Albert Anand, M. SRM Institute of Science and Technology Kattankulathur Faculty of Science and Humanities Department of Computer Applications Chennai India SRM Institute of Science and Technology Kattankulathur Faculty of Engineering and Technology Department of Networking and Communications Chennai India
Optical Coherence Tomography (OCT) is a relatively recent procedure for studying eyes that has proven to be quite beneficial. We propose automatic detection of the RPE (Retinal Pigment Epithelium) layer in Retinal OCT... 详细信息
来源: 评论
AI Based Security for Internet of Transportation Systems  4
AI Based Security for Internet of Transportation Systems
收藏 引用
4th International Conference on Smart Electronics and Communication, ICOSEC 2023
作者: Kousar, Heena Fatima, Shaista Ahmed, Syed Imran Sajithra, S. Kushwaha, Sumit Balaji, N. Alangudi East Point College of Engineering and Technology Department of Computer Science and Engineering Karnataka Bengaluru560049 India Mj College Department of Electronics and Communication Engineering Telangana Hyderabad500053 India R.M.K. Engineering College Department of Computer Science Engineering Tamilnadu Kavaraipettai601206 India University Institute of Computing Chandigarh University Department of Computer Applications Punjab 140413 India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh Vaddeswaram522302 India
The intelligent transportation systems (ITS) use a combination of sensors, cameras, and communication technologies to provide real-time data on traffic conditions. This data can be used to adjust traffic lights, but i... 详细信息
来源: 评论
Digital Forensics and the Law: A computer engineering Perspective  15
Digital Forensics and the Law: A Computer Engineering Perspe...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Agarwal, Gaurav Bhatt, Rahul Pathak, Paresh Kumar, Ashwani Kumar, Anup Pandey, Sakshi Invertis University Department of Computer Science & Engineering Uttar Pradesh Bareilly243123 India Dev Bhoomi Uttarakhand University School of Engineering and Computer Uttarakhand 248007 India IIMT University School of COMPUTER Science and Applications Meerut India K. R. Mangalam University School of Engineering & Technology Department of Computer Science & Engineering Haryana Gurugram122103 India ARKA JAIN University Department of Engineering & IT Jharkhand Jamshedpur India Chitkara University Institute of Engineering and Technology Chitkara University Centre for Interdisciplinary Research in Business and Technology Punjab India
Digital Forensics and the law is an interdisciplinary subject that studies the legal implications of digital evidence in the context of legal guidelines, rules governing investigations, and data-driven tactics for pre... 详细信息
来源: 评论
Security of Cloud Computing Using Quantum Zero-Knowledge Proof System  1st
Security of Cloud Computing Using Quantum Zero-Knowledge Pro...
收藏 引用
1st International Conference of IoT and its applications, ICIA2020
作者: Kumar, Surya Bhushan Mandal, Ranjan Kumar Mukherjee, Kuntal Dwivedi, Rajiv Kumar Department of Computer Applications VBU University Jharkhand Hazaribag India Department of Computer Science and Engineering Ranchi University Jharkhand Ranchi India Department of Computer Science and Engineering BIT Mesra Jharkhand Ranchi India
Security and privacy play a significant role while using cloud computing. Users can use cloud services, if and only if they find it trust worthy. Users can outsource their sensitive data to cloud environment provided ... 详细信息
来源: 评论
Evaluation of Subjective Answers Using Machine Learning  3
Evaluation of Subjective Answers Using Machine Learning
收藏 引用
3rd International Conference on Issues and Challenges in Intelligent Computing Techniques, ICICT 2022
作者: Sneha, G. Shreya Shree, G. Babu, Tina Nair, Rekha R. School of Engineering Dayananda Sagar University Department of Computer Science and Engineering Bengaluru India School of Engineering Dayananda Sagar University Department of Computer Applications Bengaluru India
Negative methods are currently used to evaluate subjective writing. The evaluation of the subjective responses is an essential responsibility. When a human analyses anything, the evaluation's quality can change de... 详细信息
来源: 评论
Client Segmentation and Customization in E-Commerce: applications of Machine Learning from a Management Perspective
Client Segmentation and Customization in E-Commerce: Applica...
收藏 引用
2024 International Conference on Communication, computer sciences and engineering, IC3SE 2024
作者: Sriprasadh, K. Palit, Shamik Pravallika, B. Manjunatha Lenka, Reena Singla, Atul Srm Institute Of Science And Technology Faculty Of Science And Humanities Department Of Computer Science And Applications Chennai Vadapalani India University Of Stirling Rak Campus Department Of Computing Science And Software Engineering United Arab Emirates Institute Of Aeronautical Engineering Dundigal Hyderabad India New Horizon College Of Engineering Department Of Mechanical Engineering Bangalore India University Pune India Lovely Professional University Phagwara India
A machine learning-based e-commerce personalised recommendation system helps address the issue of information overload that inevitably arises when consumers have more and more options in e-commerce, leading to an incr... 详细信息
来源: 评论
Joint aspect-opinion extraction and sentiment orientation detection in university reviews
收藏 引用
International Journal of Information Technology (Singapore) 2022年 第6期14卷 3213-3225页
作者: M, Devi Sri Nandhini Gurunathan, Pradeep Department of Computer Science and Engineering A.V.C. College of Engineering Mannampandal Tamilnadu Mayiladuthurai India Department of Computer Applications A.V.C. College of Engineering Mannampandal Tamilnadu Mayiladuthurai India
With the exponential growth of the Internet and the various forms of social media, the number of people using such platforms to share their views and experiences is also greatly increased. The reviews posted by people... 详细信息
来源: 评论
Enhanced Image Concealment: Leveraging LSB and Brotli Compression  3
Enhanced Image Concealment: Leveraging LSB and Brotli Compre...
收藏 引用
3rd International Conference for Advancement in Technology, ICONAT 2024
作者: Yacoob, Shaik Sabnis, Vikrant Jain, Jay Kumar Mansarovar Global University MP Bhopal India Mansarovar Global University Faculty of Engineering and Technology Department of Computer Science MP Bhopal India Maulana Azad National Institute of Technology Department of Mathematics Bioinformatics and Computer Applications MP Bhopal India
Steganography a cryptographic technique enables the concealment of confidential data within multimedia files like images and videos. This method facilitates the exchange of encrypted information through unconventional... 详细信息
来源: 评论
Privacy-Preserving Human Activity Recognition in Smart Homes using Deep Learning and Edge Computing for Real-Time Processing  5
Privacy-Preserving Human Activity Recognition in Smart Homes...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Mariappan, K. Gopal, Baskar Parthasarathy, J. Sreekanth, G.R. Nanmaran, R. Jegajothi, B. SRM Institute of Science and Technology Department of Computer Science and Applications Chennai India College of Engineering University of Technology & Applied Science Nizwa Oman Computer Science & Engineering Jayalakshmi Institute Of Technology Dharmapuri India Information Technology Nandha Engineering College Erode52 India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India SRS Tech Solutions Chennai India
The rapid advancement of smart home technologies necessitates efficient human activity recognition (HAR) systems while ensuring user privacy. This research presents a novel architecture that integrates deep learning a... 详细信息
来源: 评论