咨询与建议

限定检索结果

文献类型

  • 3,470 篇 会议
  • 1,278 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,721 篇 工学
    • 2,109 篇 计算机科学与技术...
    • 1,731 篇 软件工程
    • 764 篇 信息与通信工程
    • 515 篇 控制科学与工程
    • 392 篇 电气工程
    • 329 篇 生物工程
    • 297 篇 生物医学工程(可授...
    • 286 篇 电子科学与技术(可...
    • 241 篇 网络空间安全
    • 197 篇 光学工程
    • 189 篇 动力工程及工程热...
    • 186 篇 安全科学与工程
    • 167 篇 机械工程
    • 154 篇 化学工程与技术
    • 139 篇 交通运输工程
    • 126 篇 材料科学与工程(可...
  • 1,526 篇 理学
    • 766 篇 数学
    • 404 篇 物理学
    • 384 篇 生物学
    • 265 篇 统计学(可授理学、...
    • 181 篇 化学
    • 170 篇 系统科学
  • 871 篇 管理学
    • 525 篇 管理科学与工程(可...
    • 389 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 359 篇 医学
    • 281 篇 临床医学
    • 267 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 175 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 287 篇 accuracy
  • 205 篇 deep learning
  • 172 篇 machine learning
  • 157 篇 real-time system...
  • 153 篇 internet of thin...
  • 144 篇 feature extracti...
  • 141 篇 computational mo...
  • 138 篇 convolutional ne...
  • 120 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 training
  • 97 篇 optimization
  • 91 篇 security
  • 87 篇 data models
  • 85 篇 artificial intel...
  • 80 篇 cloud computing
  • 80 篇 technological in...
  • 75 篇 machine learning...
  • 72 篇 data mining
  • 69 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 112 篇 department of co...
  • 99 篇 department of co...
  • 64 篇 department of co...
  • 61 篇 school of comput...
  • 55 篇 gla university d...
  • 51 篇 maharishi school...
  • 49 篇 department of co...
  • 47 篇 centre of resear...
  • 46 篇 department of co...
  • 45 篇 chitkara centre ...
  • 45 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 40 篇 gla university d...
  • 38 篇 chitkara univers...
  • 37 篇 graphic era deem...
  • 37 篇 the islamic univ...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...

作者

  • 52 篇 neeraj varshney
  • 44 篇 varshney neeraj
  • 42 篇 singh kamred udh...
  • 40 篇 singh teekam
  • 39 篇 rakesh kumar
  • 35 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 28 篇 tina babu
  • 28 篇 kumar gaurav
  • 27 篇 asha v.
  • 27 篇 saloni bansal
  • 26 篇 teekam singh
  • 25 篇 kamred udham sin...
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 23 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 4,299 篇 英文
  • 462 篇 其他
  • 25 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science Engineering and Applications"
4778 条 记 录,以下是181-190 订阅
排序:
A Data Privacy-Preserving Model driven on Differential Approach in Cloud Environment
A Data Privacy-Preserving Model driven on Differential Appro...
收藏 引用
2023 International Conference on Green Energy, Computing and Intelligent Technology, GEn-CITy 2023
作者: Gupta, Rishabh Saxena, Deepika Singh, Ashutosh Kumar Department of Computer Science and Engineering The University of Aizu Aizuwakamatsu Japan Department of Computer Applications National Institute of Technology Kurukshetra India
With the wide range of cloud services, including flexibility, high scalability, and the least upfront capital investment, it also offers machine learning services that are utilized in various applications, such as med... 详细信息
来源: 评论
An Efficient DDoS Attack Detection in SDN using Multi-Feature Selection and Ensemble Learning  4
An Efficient DDoS Attack Detection in SDN using Multi-Featur...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Kachavimath, Amit V. Narayan, D.G. Department of Master of Computer Applications KLE Technological University Hubballi580031 India School of Computer Science and Engineering KLE Technological University Hubballi580031 India
Software-defined networking (SDN) has significantly enhanced network agility by decoupling network control from hardware devices. This architectural shift exposes SDN infrastructures to increased risks from Distribute... 详细信息
来源: 评论
Novel Anchor Generation Based Residual Network for Object Tracking in Video-Surveillance applications
收藏 引用
SN computer science 2025年 第2期6卷 1-12页
作者: Mohanapriya, D. Rajalakshmi, K. Helen Josephine, V.L. Panneerselvam, Karthick Department of Computer Science (SF) Sourasthra College Tamil Nadu Madurai India Department of Computer Applications CMR Institute of Technology Karnataka Bangalore India Business Analytics School of Business and Management Christ University Karnataka Bangalore India Department of Computer Science and Engineering KPR Institute of Engineering and Technology Tamilnadu Uthupalayam 641407 India
The activity of the object in question is alerted directly upon completion of an effective object tracking. Dependent on hardware support or not, a strong object tracking protocol is required for a precise object trac... 详细信息
来源: 评论
Performance Analysis of the Machine Learning Algorithms for the Early Detection of Breast Carcinoma  2
Performance Analysis of the Machine Learning Algorithms for ...
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Vanitha, K. Karpagavalli, S.M. Mahesh, T.R. Ali, A. Althaf Sridhar, T. Anitha, K. Faculty of Engineering Department of Computer Science and Engineering Coimbatore India Al Ameen Engineering College Department of Computer Science and Engg Tamilnadu Erode India Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India Madanapalle Institute of Technology & Science Department of Computer Applications Andhra Pradesh India Alliance University Alliance College of Engineering and Design Bangalore India Csi College of Engineering Department of Information Technology Tamilnadu Ooty India
Breast Carcinoma, generally known as breast cancer, primarily affects women, though men can develop it as well. Because of the existence of breast tissue and exposure to female hormones, notably oestrogen, women are a... 详细信息
来源: 评论
An Efficient Approach for Semantic Segmentation of Salt Domes in Seismic Images Using Improved UNET Architecture
收藏 引用
Journal of The Institution of Engineers (India): Series B 2023年 第3期104卷 569-578页
作者: Bodapati, Jyostna Devi Sajja, RamaKrishna Naralasetti, Veeranjaneyulu Department of Advanced Computer Science and Engineering Vignan’s Foundation for Science Technology and Research Vadlamudi India IAENG Life Member Andhra Pradesh Guntur India Department of Information Technology and Computer Applications Vignan’s Foundation for Science Technology and Research Vadlamudi India
Many areas of Earth’s surface with large accumulations of gas and oil even have huge deposits of salt under the surface. Exploring such deposits helps many countries to increase the storage capacity of their Petroleu... 详细信息
来源: 评论
Multi-agent QoS-aware autonomic resource provisioning framework for elastic BPM in containerized multi-cloud environment
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12895-12920页
作者: Saif, Mufeed Ahmed Naji Niranjan, S.K. Murshed, Belal Abdullah Hezam Al-ariki, Hasib Daowd Esmail Abdulwahab, Hudhaifa Mohammed Department of Computer Applications Sri Jayachamarajendra College of Engineering VTU Mysore India Department of Studies in Computer Science University of Mysore Karnataka Mysore India Department of Computer Science College of Eng. &IT University of Amran Amran Yemen Department of Information Technology Faculty of Engineering and Information Technology Al-ata’a University for Science and Technology Taiz Yemen Department of Computer Networks Engineering and Technologies Sana’a Community College Sana’a Yemen Department of Computer Application Ramaiah Institute of Technology VTU Bangalore India
Cloud computing enables businesses to improve their market competitiveness, enabling instant and easy access to a pool of virtualized and distributed resources such as virtual machines (VM) and containers for executin... 详细信息
来源: 评论
NLP Based Sentiment Analysis Using Particle Swarm Optimization with Logistic Regression for Digital Education  6
NLP Based Sentiment Analysis Using Particle Swarm Optimizati...
收藏 引用
6th International Conference on Cybernetics, Cognition and Machine Learning applications, ICCCMLA 2024
作者: Priyadharshini, G. Clara Barathi Balaji, Prasanalakshmi Chaurasia, Mousmi Ajay Das, Subhranginee Dutta, Sushama Rani Karpagam Academy of Higher Education Department of Computer Applications Coimbatore India King Khalid University Department of Computer Science Abha Saudi Arabia Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Hyderabad India
Identification and categorization of user sentiments from a text passage is known as sentiment analysis into several sentiments. For example, using feelings like happiness, sadness, anger, or positive, negative, or ne... 详细信息
来源: 评论
Designing an Intelligent Model that Employs Advanced Machine Learning Techniques to Optimize Disease Prediction and Classification in Humans  1
Designing an Intelligent Model that Employs Advanced Machine...
收藏 引用
1st International Conference on Trends in engineering Systems and Technologies, ICTEST 2024
作者: Kumari, Sudesh Lekshmi, V. Arathi Chandran, R.I. Shankar, Jaya Vishnu Priya, P.M. Bps Women University Department of Electronics and Communication Engineering Sonipat India Christ Nagar College Department of Computer Science and Applications Kerala Maranalloor India Sree Narayana Institute of Technology Department of Computer Science and Engineering Kerala Adoor India Department of Computer Science Karnataka Bengaluru India
Machine learning (ML) has emerged as a powerful tool with applications across diverse fields, including clinical diagnostics. With the growing prevalence of heart and liver diseases worldwide, early detection is param... 详细信息
来源: 评论
BiT5: A Bidirectional NLP Approach for Advanced Vulnerability Detection in Codebase  5
BiT5: A Bidirectional NLP Approach for Advanced Vulnerabilit...
收藏 引用
5th International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2024
作者: Prabith, G.S. Rohit Narayanan, M. Arya, A. Aneesh Nadh, R. Binu, P.K. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
In this research paper, a detailed investigation presents the utilization of the BiT5 Bidirectional NLP model for detecting vulnerabilities within codebases. The study addresses the pressing need for techniques enhanc... 详细信息
来源: 评论
Computing for Mobile Ad Hoc Network in IoT Fuelled Smart Environments: computer Integration in Smart Environment  2
Computing for Mobile Ad Hoc Network in IoT Fuelled Smart Env...
收藏 引用
2nd IEEE International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023
作者: Taneja, Dev Gupta, Pooja Taneja, Kavita Manipal University Jaipur Department of Computer and Communication Engineering India Panjab University Chandigarh Department of Computer Science and Applications India
Present Information Technology scenario is engulfed with exponential rise in mobile computing devices mostly embedded in diverse equipments of our daily life. This has led to evolutionary demand of new solutions to mo... 详细信息
来源: 评论