咨询与建议

限定检索结果

文献类型

  • 2,653 篇 会议
  • 942 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 3,631 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,021 篇 工学
    • 1,550 篇 计算机科学与技术...
    • 1,265 篇 软件工程
    • 578 篇 信息与通信工程
    • 420 篇 控制科学与工程
    • 268 篇 电气工程
    • 211 篇 生物工程
    • 208 篇 电子科学与技术(可...
    • 204 篇 网络空间安全
    • 190 篇 生物医学工程(可授...
    • 156 篇 光学工程
    • 155 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 127 篇 化学工程与技术
    • 126 篇 机械工程
    • 121 篇 交通运输工程
    • 95 篇 仪器科学与技术
  • 1,130 篇 理学
    • 576 篇 数学
    • 326 篇 物理学
    • 254 篇 生物学
    • 203 篇 统计学(可授理学、...
    • 142 篇 化学
    • 118 篇 系统科学
  • 628 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 279 篇 图书情报与档案管...
    • 196 篇 工商管理
  • 275 篇 医学
    • 197 篇 临床医学
    • 187 篇 基础医学(可授医学...
    • 170 篇 公共卫生与预防医...
    • 103 篇 药学(可授医学、理...
  • 131 篇 法学
    • 107 篇 社会学
  • 68 篇 农学
  • 62 篇 经济学
  • 25 篇 教育学
  • 16 篇 文学
  • 8 篇 军事学
  • 5 篇 艺术学

主题

  • 231 篇 accuracy
  • 156 篇 deep learning
  • 134 篇 machine learning
  • 129 篇 real-time system...
  • 114 篇 computational mo...
  • 111 篇 internet of thin...
  • 111 篇 convolutional ne...
  • 110 篇 feature extracti...
  • 96 篇 predictive model...
  • 86 篇 support vector m...
  • 77 篇 training
  • 72 篇 optimization
  • 70 篇 technological in...
  • 67 篇 cloud computing
  • 67 篇 data models
  • 66 篇 artificial intel...
  • 63 篇 security
  • 57 篇 machine learning...
  • 53 篇 wireless sensor ...
  • 49 篇 scalability

机构

  • 115 篇 lovely professio...
  • 105 篇 department of co...
  • 92 篇 department of co...
  • 64 篇 gla university d...
  • 57 篇 department of co...
  • 53 篇 lloyd law colleg...
  • 46 篇 department of co...
  • 42 篇 lloyd institute ...
  • 42 篇 the islamic univ...
  • 41 篇 school of comput...
  • 39 篇 chitkara univers...
  • 39 篇 beijing engineer...
  • 38 篇 school of comput...
  • 36 篇 graphic era deem...
  • 35 篇 gla university d...
  • 35 篇 institute of aer...
  • 34 篇 department of co...
  • 32 篇 graphic era deem...
  • 30 篇 saveetha school ...
  • 30 篇 lloyd institute ...

作者

  • 47 篇 neeraj varshney
  • 41 篇 varshney neeraj
  • 37 篇 rakesh kumar
  • 34 篇 singh ashutosh k...
  • 33 篇 kumar rakesh
  • 31 篇 huang heyan
  • 28 篇 saloni bansal
  • 27 篇 singh kamred udh...
  • 26 篇 asha v.
  • 25 篇 bibhuti bhusan d...
  • 25 篇 singh teekam
  • 25 篇 sudhansu shekhar...
  • 24 篇 patra sudhansu s...
  • 24 篇 saxena deepika
  • 22 篇 kumar ankit
  • 20 篇 n. naga saranya
  • 20 篇 kumar gaurav
  • 20 篇 shrivastava anur...
  • 20 篇 anurag shrivasta...
  • 19 篇 bansal saloni

语言

  • 2,561 篇 英文
  • 1,047 篇 其他
  • 33 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Institute For Computer Applications in Science and Engineering"
3631 条 记 录,以下是3321-3330 订阅
排序:
Soft computing in concrete technology: A pragmatic appraisal
Soft computing in concrete technology: A pragmatic appraisal
收藏 引用
3rd Indian International Conference on Artificial Intelligence, IICAI 2007
作者: Jayaram, M.A. Nataraja, M.C. Ravikumar, C.N. Department of Master of Computer Applications Siddaganga Institute of Technology Tumkur-572103 India Department of Civil Engineering Sri Jayachamarajendra College of Engineering Mysore-570006 India Department of Computer Science and Engineering Sri Jayachamarajendra Coolege of Engineering Mysore-570006 India
There has been a growing interest among the researchers in the area of soft computing assisted material modeling in general and modeling of concrete in particular. Their results look very promising. Concrete is a hete... 详细信息
来源: 评论
Probability analysis on associations of adverse drug events with drug-drug interactions
Probability analysis on associations of adverse drug events ...
收藏 引用
7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE
作者: Huang, Yu-Ting Lin, Shih-Fang Chiu, Chung-Cheng Yeh, Hsiang-Yuan Soo, Von-Wun Department of Computer Science National Tsing Hua University HsinChu 300 Taiwan Institute of Information Systems and Applications National Tsing Hua University HsinChu 300 Taiwan Department of Computer Science and Information Engineering National University of Kaohsiung Kaohsiung 811 Taiwan
Adverse drug reaction (ADR) may cost a lot of unnecessary medical resources and leads to extra suffering on patients. To provide the prompt information about ADR and avoid the rate of occurrence of ADR is an important... 详细信息
来源: 评论
Comparing cancer and normal gene regulatory networks based on microarray data and transcription factor analysis
Comparing cancer and normal gene regulatory networks based o...
收藏 引用
7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE
作者: Lin, Yu-Chun Yeh, Hsiang-Yuan Cheng, Shih-Wu Soo, Von-Wun Department of Computer Science National Tsing Hua University HsinChu 300 Taiwan Institute of Information Systems and Applications National Tsing Hua University HsinChu 300 Taiwan Department of Computer Science and Information Engineering National University of Kaohsiung Kaohsiung 811 Taiwan
Microarray is widely used for the cancer research and identifies different expressions for specific genes. We present a computational method for constructing cancer and normal gene regulatory networks from micorarray ... 详细信息
来源: 评论
A study on controlling hospital acquired infections: A knowledge based system approach
收藏 引用
Information Technology Journal 2007年 第1期6卷 129-134页
作者: Uma Maheswaran, S.K. Meenakshi Sundaram, M. Rajasekaran, S. Sathyabama Institute of Science and Technology Chennai-600 119 India Department of Physiology and O and G with Pediatrics Sri Sai Ram Siddha Medical College Chennai-600 044 India Department of Mathematics Crescent Engineering College Chennai-600 048 India Department of Mathematics and Computer Applications Sri Sai Ram Engineering College Chennai-600 044 India
Nosocomial infections or hospital acquired infections are diseases that develop during an admission to hospital and are a consequence of treatment, procedures of treatment or work of hospital staff. These infections a... 详细信息
来源: 评论
Notice of Violation of IEEE Publication Principles: Sentence Similarity Computation Based on Wordnet and Corpus Statistics
Notice of Violation of IEEE Publication Principles: Sentence...
收藏 引用
International Conference on Computational Intelligence and Multimedia applications
作者: P. Selvi N.P. Gopalan Department of Computer Science and Engineering Tiruchirappalli India Department of Computer Applications National Institute of Technology Tiruchirappalli India
Notice of Violation of IEEE Publication Principles "Sentence Similarity Computation Based on WordNet and Corpus Statistics," by P. Selvi, and N.P. Gopalan, in the Proceedings of the International Conference ...
来源: 评论
Visual vehicle egomotion estimation using the Fourier-Mellin Transform
Visual vehicle egomotion estimation using the Fourier-Mellin...
收藏 引用
2007 IEEE Intelligent Vehicles Symposium, IV 2007
作者: Goecke, Roland Asthana, Akshay Pettersson, Niklas Petersson, Lars Vision Science Technology and Applications NICTA Canberra Research Laboratory Canberra ACT Australia Dept. of Information Engineering RSISE Australian National University Canberra ACT Australia Computer Science and Information Technology Dept. Jaypee Institute of Information Technology Noida India
This paper is concerned with the problem of estimating the motion of a single camera from a sequence of images, with an application scenario of vehicle egomotion estimation. Egomotion estimation has been an active are... 详细信息
来源: 评论
Self-healing antchain for increasing lifespan in Wireless Sensor Networks
Self-healing antchain for increasing lifespan in Wireless Se...
收藏 引用
2007 IET-UK International Conference on Information and Communication Technology in Electrical sciences (ICTES 2007)
作者: Suraiya Tarannum V. Anitha A. G. Priya Rajeshwari Adrakatti L. Nalini K. R. Venugopal L. M. Patnaik Department of Computer Science and Engineering University of Visvesvaraya College of Engineering Bangalore University India Microprocessor Applications Laboratory Indian Institute of Science Bangalore India
A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computa...
来源: 评论
A Study of Different Kinds of Degradation in Printed Gurmukhi Script
A Study of Different Kinds of Degradation in Printed Gurmukh...
收藏 引用
International Conference on Computing: Theory and applications, ICCTA
作者: M.K. Jindal R.K. Sharma G.S. Lehal Department of Computer Applications Panjab University Regional Centre Muktsar Punjab India School of Mathematics and Computer Applications Thapar Institute Engineering and Technology Patiala Punjab India Department of Computer Science and Engineering Punjabi University Patiala Punjab India
The performance of any OCR system heavily depends upon printing quality of the input document. Many OCRs have been designed which correctly identify fine printed documents both in Indian and foreign scripts. But littl... 详细信息
来源: 评论
Secure Steganography using Colour Palette Decomposition
Secure Steganography using Colour Palette Decomposition
收藏 引用
International Conference on Signal Processing, Communication and Networking (ICSCN)
作者: K.B. Raja S. Siddaraju K.R. Venugopal L.M. Patnaik Department of Computer Science Engineering University Visvesvaraya College of Engineering Bangalore University Bangalore India Microprocessor Applications Laboratory Indian Institute of Science Bangalore India
The steganography is the embedding of secret message in the cover image for covert communication. In this paper we present a high capacity data embedding using colour palette decomposition (CPD) in which the payload i... 详细信息
来源: 评论
Sink administered Load Balanced Dynamic Hierarchical Protocol in Wireless Sensor Networks
Sink administered Load Balanced Dynamic Hierarchical Protoco...
收藏 引用
2007 IET-UK International Conference on Information and Communication Technology in Electrical sciences (ICTES 2007)
作者: Suraiya Tarannum S. Srividya D. S. Asha R. Padmini L. Nalini K. R. Venugopal L. M. Patnaik Department of Computer Science and Engineering University of Visvesvaraya College of Engineering Bangalore University Bangalore India Microprocessor Applications Laboratory Indian Institute of Science Bangalore India
Effective utilization of limited power resources by the sensors is pre-eminent to the wireless sensor networks. Organizing the network into balanced clusters based on assigning equal number of sensors to each cluster ...
来源: 评论