咨询与建议

限定检索结果

文献类型

  • 5,121 篇 会议
  • 1,749 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,904 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,906 篇 工学
    • 2,951 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 1,079 篇 信息与通信工程
    • 680 篇 控制科学与工程
    • 568 篇 电气工程
    • 505 篇 生物工程
    • 459 篇 电子科学与技术(可...
    • 428 篇 生物医学工程(可授...
    • 305 篇 网络空间安全
    • 288 篇 光学工程
    • 268 篇 安全科学与工程
    • 264 篇 动力工程及工程热...
    • 238 篇 机械工程
    • 226 篇 化学工程与技术
    • 192 篇 材料科学与工程(可...
    • 189 篇 交通运输工程
  • 2,220 篇 理学
    • 1,100 篇 数学
    • 618 篇 物理学
    • 585 篇 生物学
    • 396 篇 统计学(可授理学、...
    • 260 篇 系统科学
    • 241 篇 化学
  • 1,259 篇 管理学
    • 794 篇 管理科学与工程(可...
    • 538 篇 图书情报与档案管...
    • 404 篇 工商管理
  • 473 篇 医学
    • 386 篇 临床医学
    • 367 篇 基础医学(可授医学...
    • 247 篇 公共卫生与预防医...
    • 231 篇 药学(可授医学、理...
  • 233 篇 法学
    • 189 篇 社会学
  • 158 篇 经济学
  • 146 篇 农学
  • 51 篇 教育学
  • 32 篇 文学
  • 21 篇 军事学
  • 4 篇 艺术学

主题

  • 352 篇 accuracy
  • 257 篇 deep learning
  • 232 篇 machine learning
  • 201 篇 feature extracti...
  • 195 篇 internet of thin...
  • 193 篇 computational mo...
  • 193 篇 real-time system...
  • 169 篇 support vector m...
  • 163 篇 predictive model...
  • 151 篇 convolutional ne...
  • 149 篇 training
  • 119 篇 security
  • 111 篇 cloud computing
  • 108 篇 optimization
  • 103 篇 machine learning...
  • 101 篇 data models
  • 98 篇 neural networks
  • 98 篇 data mining
  • 92 篇 artificial intel...
  • 85 篇 technological in...

机构

  • 233 篇 department of co...
  • 146 篇 gla university d...
  • 129 篇 department of co...
  • 123 篇 lovely professio...
  • 122 篇 department of co...
  • 71 篇 gla university d...
  • 68 篇 school of comput...
  • 63 篇 department of co...
  • 62 篇 centre of resear...
  • 51 篇 maharishi school...
  • 49 篇 chitkara univers...
  • 49 篇 the islamic univ...
  • 48 篇 school of comput...
  • 47 篇 lloyd law colleg...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 43 篇 lloyd institute ...
  • 42 篇 lloyd institute ...
  • 42 篇 department of co...
  • 38 篇 the islamic univ...

作者

  • 69 篇 neeraj varshney
  • 68 篇 varshney neeraj
  • 57 篇 rakesh kumar
  • 54 篇 kumar rakesh
  • 47 篇 singh kamred udh...
  • 41 篇 singh ashutosh k...
  • 41 篇 singh teekam
  • 41 篇 kumar ankit
  • 40 篇 sharma ashish
  • 37 篇 asha v.
  • 36 篇 sharma himanshu
  • 32 篇 ankit kumar
  • 32 篇 kumar gaurav
  • 31 篇 kamred udham sin...
  • 29 篇 ashish sharma
  • 28 篇 himanshu sharma
  • 26 篇 teekam singh
  • 25 篇 tina babu
  • 23 篇 saloni bansal
  • 22 篇 babu tina

语言

  • 6,568 篇 英文
  • 312 篇 其他
  • 34 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 俄文
检索条件"机构=Department of Computer Engineering and Applications"
6904 条 记 录,以下是71-80 订阅
排序:
Intrusion Detection at the Edge Computing: A Deep Learning Approach Using the UNSW-NB15 Dataset
Intrusion Detection at the Edge Computing: A Deep Learning A...
收藏 引用
International Conference on Communication Systems and Network Technologies (CSNT)
作者: Vipin Kumar Vivek Kumar Abhay Pratap Singh Bhadauria Jay Dixit Amit Kumar Department of Computer Science Gurukula Kangri (Deemed to be University) Haridwar India Department of Computer Engineering & Applications GLA University Mathura Department of Computer Engineering & Applications GLA University Mathura UP
Edge computing has transformed technology by enabling seamless connections between IoT devices, but it also introduces significant security challenges. EC is crucial for providing minimal latency processing and reduci... 详细信息
来源: 评论
Hybrid Optimization Algorithms for Accurate Prediction and Classification of Cardiovascular Diseases
Hybrid Optimization Algorithms for Accurate Prediction and C...
收藏 引用
3rd IEEE International Conference on Automation and Computation, AUTOCOM 2025
作者: Kumar, Gaurav Varshney, Neeraj Gla University Department of Computer Engineering & Applications Mathura India
A collection of precise prediction models is necessary to lessen the burden of cardiovascular disease (CVD), which continues to be a leading cause of death worldwide. This work presents a unique hybrid optimization ap... 详细信息
来源: 评论
Cybersecurity Threat Detection in Smart Cities using Box Plot Sampling Isolation Forest  1
Cybersecurity Threat Detection in Smart Cities using Box Plo...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Shankari, S. Uma Mohameed, Haeedir Kulkarni, Megha Aravindh, S. Purushotham, N. Srm Institute of Science and Technology Department of Computer Science and Applications Ramapuram India The Islamic University of Al Diwaniyah College of Technical Engineering Department of Computers Techniques Engineering Al Diwaniyah Iraq Nitte Meenakshi Institute of Technology Department of Civil Engineering Bengaluru India New Prince Shri Bhavani College of Engineering and Technology Department of Mechanical Engineering Chennai India Mohan Babu University Department of Computer Science and Engineering Tirupati India
Now a days, the standard of living in urban areas is advanced by leveraging technologies such as Cyber-Physical Systems (CPS) and Internet of Things (IoT) with physical infrastructures. However, smart cities highly re... 详细信息
来源: 评论
Intelligent Email Spam Detection: A Machine Learning-Based Approach
Intelligent Email Spam Detection: A Machine Learning-Based A...
收藏 引用
Trends in Material Science and Inventive Materials (ICTMIM), International Conference on
作者: Vinod Jain Department of Computer Engineering and Applications GLA University Mathura India
Email spam emails frequently contain dangerous material like viruses, phishing attempts, and fraudulent schemes. Email spam detection is an essential component of cybersecurity. Machine learning models are required to... 详细信息
来源: 评论
DNN-STACK: a stacking technique based on deep neural network for detecting copy-move forgery
收藏 引用
Neural Computing and applications 2025年 第6期37卷 4989-5004页
作者: Krishnalal, G. Jagathy Raj, V.P. Madhu, G. Arun, K.S. School of Engineering Cochin University of Science and Technology Kerala Cochin682022 India School of Management Studies Cochin University of Science and Technology Kerala Cochin682022 India Department of Computer Applications Cochin University of Science and Technology Kerala Cochin682022 India
In recent years, detecting image forgery has become an important topic because of the availability of efficient and sophisticated image-editing software. Copy-move forgery, which involves copying a section of an image... 详细信息
来源: 评论
Hybrid Optimization Algorithms for Accurate Prediction and Classification of Cardiovascular Diseases
Hybrid Optimization Algorithms for Accurate Prediction and C...
收藏 引用
Automation and Computation (AUTOCOM), International Conference on
作者: Gaurav Kumar Neeraj Varshney Department of Computer Engineering & Applications GLA University Mathura India
A collection of precise prediction models is necessary to lessen the burden of cardiovascular disease (CVD), which continues to be a leading cause of death worldwide. This work presents a unique hybrid optimization ap... 详细信息
来源: 评论
Deep Learning Technique for computer Vision-Based Pose Estimation for Augmented Reality  3rd
Deep Learning Technique for Computer Vision-Based Pose Estim...
收藏 引用
3rd International Conference on Intelligent Computing Techniques for Smart Energy Systems, ICTSES 2023
作者: Palanimeera, J. Ponmozhi, K. Jyothi, Kanagaraj Dargar, Shashi Kant Birla, Shilpi Department of Computer Applications Sathyabama Institute of Science and Technology Chennai India Department of Computer Applications Kalasalingam Academy of Research and Education Krishnan Kovil Tamil Nadu Virudhunagar India Department of Biotechnology Kalasalingam Academy of Research and Education Krishnan Kovil Tamil Nadu Virudhunagar India Department of Electronics and Communication Engineering Kalasalingam Academy of Research and Education Krishnan Kovil Tamil Nadu Virudhunagar India Department of Electronics and Communication Engineering Manipal University Jaipur Rajasthan Jaipur India
Pose estimation approaches of open pose were suggested. Pose estimation in real-time is a difficult research subject with many computer vision applications. Pose estimation applications are Human Activity Estimation, ... 详细信息
来源: 评论
Harnessing Deep Learning and Time Series Models for Accurate Global Solar Radiation Prediction
收藏 引用
Procedia computer Science 2025年 259卷 98-107页
作者: K. Meena A. Vadivel Tanvir Habib Sardar Arnav Kotiyal Guru Prasad M S Utsav Kumar Department of Computer Science and Engineering School of Engineering Dayananda Sagar University Bengaluru - 562112 India Department of Computer Applications Graphic Era (Deemed to be University) Dehradun India
For applications such as weather forecasting, power grid management, and solar energy integration, accurate solar radiation prediction is essential. Using real-time data from the EU Science Hub’s Climate Monitoring S... 详细信息
来源: 评论
Enhanced Monitoring and Security Measures with Video Analysis
Enhanced Monitoring and Security Measures with Video Analysi...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Jyothi, V. Esther Rakesh, G. Aruna, Vipparla Gorintla, Shobana Ayyappa, Yalanati Naidu, U. Ganesh Velagapudi Ramakrishna Siddhartha Engineering College Deemed to be University Department of Computer Applications A.P. Vijayawada India Department of Computer Science and Engineering Pothavarapadu A.P India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Avadi India B V Raju Institute of Technology Telangana Narsapur India
In modern surveillance, activities have increasingly become dependent on the continuous observation offered by CCTV systems. Still, with massive amounts of video data generated in a minute, sifting through this inform... 详细信息
来源: 评论
Biometric Authentication with Blockchain: A Secure and User-Friendly Approach  3rd
Biometric Authentication with Blockchain: A Secure and User-...
收藏 引用
3rd International Conference on Intelligent Systems and Sustainable Computing, ICISSC 2023
作者: Subburaj, T. Raju, K. Srujan Suthendran, K. Kumar, Kovuri Praveen Rekha, Ch. Sultana, Saba Deeraj, C. Department of Master of Computer Applications Rajarajeswari College of Engineering Bengaluru India Department of CSE CMR Technical Campus Telangana Hyderabad India Department of Information Technology Kalasalingam Academy of Research and Education Tamilnadu Krishnankoli India
"Biometric Authentication with Blockchain: A Secure and User-Friendly Approach" proposes a novel system, a Blockchain-based Distributed biometric Authentication System (BDAS), to address vulnerabilities in e... 详细信息
来源: 评论