咨询与建议

限定检索结果

文献类型

  • 2,654 篇 会议
  • 942 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,633 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,022 篇 工学
    • 1,551 篇 计算机科学与技术...
    • 1,266 篇 软件工程
    • 578 篇 信息与通信工程
    • 421 篇 控制科学与工程
    • 268 篇 电气工程
    • 211 篇 生物工程
    • 209 篇 电子科学与技术(可...
    • 204 篇 网络空间安全
    • 190 篇 生物医学工程(可授...
    • 156 篇 光学工程
    • 155 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 127 篇 化学工程与技术
    • 126 篇 机械工程
    • 121 篇 交通运输工程
    • 95 篇 仪器科学与技术
  • 1,130 篇 理学
    • 576 篇 数学
    • 326 篇 物理学
    • 254 篇 生物学
    • 203 篇 统计学(可授理学、...
    • 142 篇 化学
    • 118 篇 系统科学
  • 628 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 279 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 275 篇 医学
    • 197 篇 临床医学
    • 187 篇 基础医学(可授医学...
    • 170 篇 公共卫生与预防医...
    • 103 篇 药学(可授医学、理...
  • 131 篇 法学
    • 107 篇 社会学
  • 68 篇 农学
  • 62 篇 经济学
  • 25 篇 教育学
  • 16 篇 文学
  • 8 篇 军事学
  • 5 篇 艺术学

主题

  • 231 篇 accuracy
  • 156 篇 deep learning
  • 134 篇 machine learning
  • 129 篇 real-time system...
  • 114 篇 computational mo...
  • 111 篇 internet of thin...
  • 111 篇 convolutional ne...
  • 110 篇 feature extracti...
  • 96 篇 predictive model...
  • 86 篇 support vector m...
  • 77 篇 training
  • 72 篇 optimization
  • 70 篇 technological in...
  • 67 篇 cloud computing
  • 67 篇 data models
  • 66 篇 artificial intel...
  • 63 篇 security
  • 57 篇 machine learning...
  • 53 篇 wireless sensor ...
  • 49 篇 scalability

机构

  • 115 篇 lovely professio...
  • 105 篇 department of co...
  • 92 篇 department of co...
  • 64 篇 gla university d...
  • 57 篇 department of co...
  • 52 篇 lloyd law colleg...
  • 46 篇 department of co...
  • 42 篇 lloyd institute ...
  • 42 篇 the islamic univ...
  • 41 篇 school of comput...
  • 39 篇 chitkara univers...
  • 39 篇 beijing engineer...
  • 38 篇 school of comput...
  • 36 篇 graphic era deem...
  • 35 篇 gla university d...
  • 35 篇 institute of aer...
  • 34 篇 department of co...
  • 32 篇 graphic era deem...
  • 30 篇 saveetha school ...
  • 30 篇 lloyd institute ...

作者

  • 47 篇 neeraj varshney
  • 41 篇 varshney neeraj
  • 37 篇 rakesh kumar
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 31 篇 huang heyan
  • 28 篇 saloni bansal
  • 27 篇 singh kamred udh...
  • 26 篇 asha v.
  • 25 篇 bibhuti bhusan d...
  • 25 篇 singh teekam
  • 25 篇 sudhansu shekhar...
  • 24 篇 patra sudhansu s...
  • 24 篇 saxena deepika
  • 22 篇 kumar ankit
  • 20 篇 n. naga saranya
  • 20 篇 kumar gaurav
  • 20 篇 anurag shrivasta...
  • 19 篇 shrivastava anur...
  • 19 篇 bansal saloni

语言

  • 2,563 篇 英文
  • 1,047 篇 其他
  • 33 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=ICASE: Institute for Computer Applications in Science and Engineering"
3633 条 记 录,以下是81-90 订阅
排序:
Detection of Acute Lymphoblastic Leukemia Using a Novel Bone Marrow Image Segmentation
收藏 引用
Tsinghua science and Technology 2025年 第2期30卷 610-623页
作者: M.Anline Rejula Ben M Jebin Ravi Selvakumar S.Amutha Eberlein George Department of Computer Applications-PG Scott Christian College(Autonomous)Nagercoil 629003India Department of Computer Science Malankara Catholic CollegeMariagiri 629153India School of Computer Science and Engineering Vellore Institute of TechnologyChennai 600127India Department of Pediatrics Government Medical College and HospitalGovernment of Tamil NaduNamakkal 637001India
In our study,we present a novel method for automating the segmentation and classification of bone marrow images to distinguish between normal and Acute Lymphoblastic Leukaemia(ALL).Built upon existing segmentation tec... 详细信息
来源: 评论
An AI-Driven Intelligent Traffic Management Model for 6G Cloud Radio Access Networks
收藏 引用
IEEE Wireless Communications Letters 2023年 第6期12卷 1056-1060页
作者: Swain, Smruti Rekha Saxena, Deepika Kumar, Jatinder Singh, Ashutosh Kumar Lee, Chung-Nan National Institute of Technology Department of Computer Applications Kurukshetra136119 India Goethe University Frankfurt Department of Computer Science Frankfurt60323 Germany National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan
This letter proposes a novel Cloud Radio Access Network (C-RAN) traffic analysis and management model that estimates probable RAN traffic congestion and mitigate its effect by adopting a suitable handling mechanism. A... 详细信息
来源: 评论
Smart question answering system using vectorization approach and statistical scoring method
收藏 引用
Materials Today: Proceedings 2023年 80卷 3719-3725页
作者: Manjunath, T.N. Yogish, Deepa Mahalakshmi, S. Yogish, H.K. Information Science & Engineering B M S Institute of Technology &Management Karnataka Bangalore560064 India K S School of Engineering & Management Computer Science & Engineering Affiliated to Visvesvaraya Technological University Karnataka Belagavi India Department of Master of Computer Applications M S Ramaiah Institute of Technology Karnataka Bangalore560054 India
In this digital era, internet users are increasing day by day to extract information related to various fields such as health, economic, educational, politics and daily needs from Information Retrieval Systems (IRS) s... 详细信息
来源: 评论
A robust method for malware analysis using stacking classifiers and dendrogram visualization
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-16页
作者: Naveen Kumar, N. Balamurugan, S. Maruthamuthu, R. Devi, P.P. Seshu Kumar, P. Department of Computer Applications Madanapalle Institute of Technology & amp Science Andhra Pradesh Madanapalle India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & amp D Institute of Science and Technology Avadi Tamil Nadu Chennai India
Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with the fast-paced evolution of malware variants. This underscores the ... 详细信息
来源: 评论
Detection of Leading CNN Models for AI Image Accuracy and Efficiency
Detection of Leading CNN Models for AI Image Accuracy and Ef...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems, IACIS 2024
作者: Nayim, Meshal Mohan, Vishnu Pandey, Trilok Nath Dash, Bibhuti Bhusan Dash, Bibek Bikram Patra, Sudhansu Shekhar Vellore Institute of Technology School of Computer Science and Engineering Chennai India Kiit Deemed to be University School of Computer Applications Bhubaneswar India HealthWorksAI Bangalore India
This research explores the challenge of distinguishing between authentic and AI-generated images using advanced convolutional neural network (CNN) architectures. Leveraging the CIFAKE dataset, which includes a diverse... 详细信息
来源: 评论
Moving Target Defense - Challenges, Problems and Suitability for Internet of Things  4
Moving Target Defense - Challenges, Problems and Suitability...
收藏 引用
4th International Conference on Computing and Communication Systems, I3CS 2023
作者: Gurung, Dipendra Gurung, Sandeep Pradhan, Mohan Pratap Sikkim Manipal Institute of Technology Department of Computer Applications Majitar India Sikkim Manipal Institute of Technology Department of Computer Science and Engineering Majitar India Sikkim University Department of Computer Applications Gangtok India
Traditionally cyber attackers have always had an upper hand over defenders as the latter can only react in the event of an attack. Moving Target Defense (MTD) has emerged as a potential game changer by reversing the a... 详细信息
来源: 评论
Assessing the Effectiveness of Predictive Maintenance for Internet of Things (IoT) Networks Using Reinforcement Learning  3
Assessing the Effectiveness of Predictive Maintenance for In...
收藏 引用
3rd International Conference on Technological Advancements in Computational sciences, ICTACS 2023
作者: Sharma, Aparna Rastogi, Divya Manwal, Manika Tyagi, Ayushi Sharma, Prashant Kumar Computer Science and Applications Sharda University UP Greater Noida India Computer Science & Engineering Graphic Era Hill University Uttarakhand Dehradun India Computer Science & Engineering Raj Kumar Goel Institute of Technology UP Ghaziabad India Computer Applications Hindustan Institute of Management & Computer Studies UP Mathura India
Reinforcement getting to know (RL) has emerged as a famous method to predict considerable occasions inside the Net of Things (IoT) networks. RL is a form of artificial intelligence that models conduct from praise and ... 详细信息
来源: 评论
Vulnerability Classification for Detecting Threats in Cloud Environments Against DDoS Attacks  13
Vulnerability Classification for Detecting Threats in Cloud ...
收藏 引用
13th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2024
作者: Jyothi, V. Esther Chowdary, N. Sampreeth Velagapudi Ramakrishna Siddhartha Engineering College Department of Computer Applications Vijayawada India P.V.P. Siddhartha Institute of Technology Department of Computer Science and Engineering Vijayawada India
In order to secure data, infrastructure, and services from potential attacks, cloud security is a wide issue that includes any combination of policies, technologies, and procedures. The cloud has substantially differe... 详细信息
来源: 评论
Machine Learning Classifiers for Predicting the Risk of Cardiovascular Disease in Healthcare 4.0  3
Machine Learning Classifiers for Predicting the Risk of Card...
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Kumari, Palak Kumar, Ashish Chatterjee, Kakali Master of Computer Applications Patna Women's College Patna India National Institute of Technology Patna Dept. of Computer Science and Engineering Patna India
Cardiovascular disease (CVD) generic phrase used to describe heart or blood vessel illness. Conditions that impact the body's, brain's, or heart's blood flow. Reduced blood flow can result from factors suc... 详细信息
来源: 评论
A metaheuristic virtual machine placement framework toward power efficiency of sustainable cloud environment
收藏 引用
Soft Computing 2023年 第7期27卷 3817-3828页
作者: Singh, Ashutosh Kumar Swain, Smruti Rekha Lee, Chung Nan Department of Computer Applications National Institute of Technology Haryana Kurukshetra136119 India Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung804201 Taiwan
The primary aim of Virtual Machine Placement (VMP) is the mapping of Virtual Machines (VMs) to Physical Machines (PMs), such that the PMs may be utilized to their maximum efficiency, where the already active VMs are n... 详细信息
来源: 评论