咨询与建议

限定检索结果

文献类型

  • 2,590 篇 会议
  • 929 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 3,555 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,979 篇 工学
    • 1,506 篇 计算机科学与技术...
    • 1,239 篇 软件工程
    • 553 篇 信息与通信工程
    • 392 篇 控制科学与工程
    • 259 篇 电气工程
    • 209 篇 生物工程
    • 202 篇 电子科学与技术(可...
    • 196 篇 网络空间安全
    • 181 篇 生物医学工程(可授...
    • 151 篇 光学工程
    • 149 篇 动力工程及工程热...
    • 144 篇 安全科学与工程
    • 125 篇 化学工程与技术
    • 122 篇 机械工程
    • 111 篇 交通运输工程
    • 94 篇 仪器科学与技术
  • 1,124 篇 理学
    • 581 篇 数学
    • 327 篇 物理学
    • 252 篇 生物学
    • 211 篇 统计学(可授理学、...
    • 141 篇 化学
    • 118 篇 系统科学
  • 604 篇 管理学
    • 367 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 191 篇 工商管理
  • 266 篇 医学
    • 192 篇 临床医学
    • 181 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
    • 103 篇 药学(可授医学、理...
  • 125 篇 法学
    • 103 篇 社会学
  • 67 篇 农学
  • 62 篇 经济学
  • 23 篇 教育学
  • 15 篇 文学
  • 8 篇 军事学
  • 5 篇 艺术学

主题

  • 225 篇 accuracy
  • 147 篇 deep learning
  • 130 篇 machine learning
  • 126 篇 real-time system...
  • 112 篇 computational mo...
  • 109 篇 internet of thin...
  • 109 篇 convolutional ne...
  • 107 篇 feature extracti...
  • 95 篇 predictive model...
  • 84 篇 support vector m...
  • 77 篇 training
  • 70 篇 optimization
  • 70 篇 technological in...
  • 66 篇 cloud computing
  • 66 篇 data models
  • 65 篇 artificial intel...
  • 60 篇 security
  • 56 篇 machine learning...
  • 53 篇 wireless sensor ...
  • 48 篇 reliability

机构

  • 115 篇 lovely professio...
  • 107 篇 department of co...
  • 90 篇 department of co...
  • 57 篇 department of co...
  • 52 篇 lloyd law colleg...
  • 49 篇 gla university d...
  • 47 篇 department of co...
  • 42 篇 school of comput...
  • 41 篇 lloyd institute ...
  • 39 篇 school of comput...
  • 39 篇 chitkara univers...
  • 39 篇 beijing engineer...
  • 35 篇 gla university d...
  • 35 篇 institute of aer...
  • 34 篇 department of co...
  • 34 篇 graphic era deem...
  • 33 篇 the islamic univ...
  • 31 篇 graphic era deem...
  • 30 篇 saveetha school ...
  • 30 篇 lloyd institute ...

作者

  • 47 篇 neeraj varshney
  • 37 篇 rakesh kumar
  • 37 篇 varshney neeraj
  • 34 篇 singh ashutosh k...
  • 29 篇 kumar rakesh
  • 28 篇 singh kamred udh...
  • 28 篇 saloni bansal
  • 28 篇 huang heyan
  • 27 篇 singh teekam
  • 25 篇 bibhuti bhusan d...
  • 25 篇 asha v.
  • 24 篇 kumar ankit
  • 24 篇 sudhansu shekhar...
  • 23 篇 saxena deepika
  • 22 篇 kumar gaurav
  • 22 篇 patra sudhansu s...
  • 20 篇 n. naga saranya
  • 19 篇 shrivastava anur...
  • 19 篇 bansal saloni
  • 19 篇 anurag shrivasta...

语言

  • 2,800 篇 英文
  • 731 篇 其他
  • 32 篇 中文
检索条件"机构=Institute For Computer Applications in Science and Engineering"
3555 条 记 录,以下是81-90 订阅
排序:
A robust method for malware analysis using stacking classifiers and dendrogram visualization
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-16页
作者: Naveen Kumar, N. Balamurugan, S. Maruthamuthu, R. Devi, P.P. Seshu Kumar, P. Department of Computer Applications Madanapalle Institute of Technology & amp Science Andhra Pradesh Madanapalle India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & amp D Institute of Science and Technology Avadi Tamil Nadu Chennai India
Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with the fast-paced evolution of malware variants. This underscores the ... 详细信息
来源: 评论
Assessing the Effectiveness of Predictive Maintenance for Internet of Things (IoT) Networks Using Reinforcement Learning  3
Assessing the Effectiveness of Predictive Maintenance for In...
收藏 引用
3rd International Conference on Technological Advancements in Computational sciences, ICTACS 2023
作者: Sharma, Aparna Rastogi, Divya Manwal, Manika Tyagi, Ayushi Sharma, Prashant Kumar Computer Science and Applications Sharda University UP Greater Noida India Computer Science & Engineering Graphic Era Hill University Uttarakhand Dehradun India Computer Science & Engineering Raj Kumar Goel Institute of Technology UP Ghaziabad India Computer Applications Hindustan Institute of Management & Computer Studies UP Mathura India
Reinforcement getting to know (RL) has emerged as a famous method to predict considerable occasions inside the Net of Things (IoT) networks. RL is a form of artificial intelligence that models conduct from praise and ... 详细信息
来源: 评论
Moving Target Defense - Challenges, Problems and Suitability for Internet of Things  4
Moving Target Defense - Challenges, Problems and Suitability...
收藏 引用
4th International Conference on Computing and Communication Systems, I3CS 2023
作者: Gurung, Dipendra Gurung, Sandeep Pradhan, Mohan Pratap Sikkim Manipal Institute of Technology Department of Computer Applications Majitar India Sikkim Manipal Institute of Technology Department of Computer Science and Engineering Majitar India Sikkim University Department of Computer Applications Gangtok India
Traditionally cyber attackers have always had an upper hand over defenders as the latter can only react in the event of an attack. Moving Target Defense (MTD) has emerged as a potential game changer by reversing the a... 详细信息
来源: 评论
Vulnerability Classification for Detecting Threats in Cloud Environments Against DDoS Attacks  13
Vulnerability Classification for Detecting Threats in Cloud ...
收藏 引用
13th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2024
作者: Jyothi, V. Esther Chowdary, N. Sampreeth Velagapudi Ramakrishna Siddhartha Engineering College Department of Computer Applications Vijayawada India P.V.P. Siddhartha Institute of Technology Department of Computer Science and Engineering Vijayawada India
In order to secure data, infrastructure, and services from potential attacks, cloud security is a wide issue that includes any combination of policies, technologies, and procedures. The cloud has substantially differe... 详细信息
来源: 评论
A metaheuristic virtual machine placement framework toward power efficiency of sustainable cloud environment
收藏 引用
Soft Computing 2023年 第7期27卷 3817-3828页
作者: Singh, Ashutosh Kumar Swain, Smruti Rekha Lee, Chung Nan Department of Computer Applications National Institute of Technology Haryana Kurukshetra136119 India Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung804201 Taiwan
The primary aim of Virtual Machine Placement (VMP) is the mapping of Virtual Machines (VMs) to Physical Machines (PMs), such that the PMs may be utilized to their maximum efficiency, where the already active VMs are n... 详细信息
来源: 评论
Detection of Leading CNN Models for AI Image Accuracy and Efficiency
Detection of Leading CNN Models for AI Image Accuracy and Ef...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems, IACIS 2024
作者: Nayim, Meshal Mohan, Vishnu Pandey, Trilok Nath Dash, Bibhuti Bhusan Dash, Bibek Bikram Patra, Sudhansu Shekhar Vellore Institute of Technology School of Computer Science and Engineering Chennai India Kiit Deemed to be University School of Computer Applications Bhubaneswar India HealthWorksAI Bangalore India
This research explores the challenge of distinguishing between authentic and AI-generated images using advanced convolutional neural network (CNN) architectures. Leveraging the CIFAKE dataset, which includes a diverse... 详细信息
来源: 评论
mHAR: a novel convolutional recurrent model for recognizing motion-based human activity  12
mHAR: a novel convolutional recurrent model for recognizing ...
收藏 引用
12th International Young Scientists Conference in Computational science, YSC 2023
作者: Kumar, Prabhat Suresh, S. Department of Computer Science Institute of Science Banaras Hindu University Varanasi221 005 India Department of Computer Engineering & Applications GLA University Mathura281406 India Department of Computer Applications National Institute of Technology Kurukshetra136119 India
With sensors built into smartphones and wearable devices, Human Activity Recognition (HAR) makes it possible to identify regular activities. One of the challenges is to access the motion information from activity data... 详细信息
来源: 评论
IoT-Aided Charity-Redistribution of Excess Food  2
IoT-Aided Charity-Redistribution of Excess Food
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Yogananth, V.S. Balasubramani, M. Vellore Institute of Technology Department of Computer Applications Tamil Nadu Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India
The utilization of the Internet of Things (IOT) has shown significant potential in various aspects of daily life, yet its application in addressing social issues remains underdeveloped. India, with a substantial numbe... 详细信息
来源: 评论
Fake News Detection Review: Concepts, Tools, Research gaps, and Possible solutions  7
Fake News Detection Review: Concepts, Tools, Research gaps, ...
收藏 引用
7th International Conference on Internet applications, Protocols, and Services, NETAPPS 2024
作者: Yakkundi, Sapana Patil, Rudragoud Goudar, Swetha Indudhar Department of Computer Science and Engineering KLS Gogte Institute of Technology Karnataka Belagavi India Department. of Master of Computer Applications KLS Gogte Institute of Technology Karnataka Belagavi India
The increasing number of social platforms means that there is a rapid expansion of online data. However, not all of this data can be trusted, as some users intentionally manipulate information to spread false news for... 详细信息
来源: 评论
Analysis of Various Hyperparameters for Predicting Hypertension using Machine Learning Algorithms  8
Analysis of Various Hyperparameters for Predicting Hypertens...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2024
作者: Duggal, Shallu Sood, Shivani Singh, Amanpreet Singh, Harjeet Malarvel, Muthukumaran Lovely Professional University School of Computer Applications Phagwara144411 India Chitkara Institute of Engineering and Technology Chitkara University Punjab 140401 India Department of Computer Science and Engineering India
Predicting hypertension, or high blood pressure, is crucial because it's a risky condition that frequently doesn't exhibit any obvious symptoms or indicators until major problems arise. By using predictive mod... 详细信息
来源: 评论