咨询与建议

限定检索结果

文献类型

  • 2,590 篇 会议
  • 937 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 3,563 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,978 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,239 篇 软件工程
    • 554 篇 信息与通信工程
    • 393 篇 控制科学与工程
    • 260 篇 电气工程
    • 209 篇 生物工程
    • 203 篇 电子科学与技术(可...
    • 197 篇 网络空间安全
    • 181 篇 生物医学工程(可授...
    • 152 篇 光学工程
    • 149 篇 动力工程及工程热...
    • 144 篇 安全科学与工程
    • 125 篇 化学工程与技术
    • 122 篇 机械工程
    • 111 篇 交通运输工程
    • 94 篇 仪器科学与技术
  • 1,125 篇 理学
    • 578 篇 数学
    • 327 篇 物理学
    • 252 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 141 篇 化学
    • 118 篇 系统科学
  • 605 篇 管理学
    • 367 篇 管理科学与工程(可...
    • 267 篇 图书情报与档案管...
    • 191 篇 工商管理
  • 266 篇 医学
    • 192 篇 临床医学
    • 181 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
    • 103 篇 药学(可授医学、理...
  • 125 篇 法学
    • 103 篇 社会学
  • 67 篇 农学
  • 62 篇 经济学
  • 23 篇 教育学
  • 15 篇 文学
  • 8 篇 军事学
  • 5 篇 艺术学

主题

  • 225 篇 accuracy
  • 147 篇 deep learning
  • 130 篇 machine learning
  • 126 篇 real-time system...
  • 112 篇 computational mo...
  • 110 篇 convolutional ne...
  • 109 篇 internet of thin...
  • 107 篇 feature extracti...
  • 95 篇 predictive model...
  • 84 篇 support vector m...
  • 77 篇 training
  • 70 篇 optimization
  • 70 篇 technological in...
  • 66 篇 cloud computing
  • 66 篇 data models
  • 65 篇 artificial intel...
  • 60 篇 security
  • 56 篇 machine learning...
  • 53 篇 wireless sensor ...
  • 48 篇 reliability

机构

  • 115 篇 lovely professio...
  • 106 篇 department of co...
  • 90 篇 department of co...
  • 57 篇 department of co...
  • 53 篇 lloyd law colleg...
  • 50 篇 gla university d...
  • 47 篇 department of co...
  • 42 篇 lloyd institute ...
  • 41 篇 school of comput...
  • 39 篇 chitkara univers...
  • 39 篇 beijing engineer...
  • 38 篇 school of comput...
  • 36 篇 institute of aer...
  • 35 篇 gla university d...
  • 34 篇 department of co...
  • 34 篇 graphic era deem...
  • 34 篇 the islamic univ...
  • 32 篇 graphic era deem...
  • 30 篇 saveetha school ...
  • 30 篇 lloyd institute ...

作者

  • 47 篇 neeraj varshney
  • 38 篇 varshney neeraj
  • 37 篇 rakesh kumar
  • 34 篇 singh ashutosh k...
  • 31 篇 huang heyan
  • 30 篇 kumar rakesh
  • 28 篇 saloni bansal
  • 27 篇 singh kamred udh...
  • 26 篇 asha v.
  • 25 篇 bibhuti bhusan d...
  • 25 篇 singh teekam
  • 25 篇 sudhansu shekhar...
  • 24 篇 saxena deepika
  • 22 篇 kumar ankit
  • 22 篇 patra sudhansu s...
  • 20 篇 n. naga saranya
  • 20 篇 kumar gaurav
  • 20 篇 anurag shrivasta...
  • 19 篇 shrivastava anur...
  • 19 篇 bansal saloni

语言

  • 2,808 篇 英文
  • 731 篇 其他
  • 32 篇 中文
检索条件"机构=Institute for Computer Applications in Science and Engineering"
3563 条 记 录,以下是391-400 订阅
排序:
Electricity Demand Prediction through Artificial Intelligence Methods
Electricity Demand Prediction through Artificial Intelligenc...
收藏 引用
2024 International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI, ICSCAI 2024
作者: Kumar, Neeraj Mittal, Tanusha Al-Jawahry, Hassan M. Bansal, Saloni Deepak, A. Deepika, N.M. Kaushik, Rohit Department of Electrical Engineering Doon Institute of Engineering and Technology Uttarakhand Rishikesh India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Computer Engineering and Applications GLA University Mathura India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Tamilnadu Chennai India Institute of Aeronautical Engineering Dundigal Hyderabad India Faculty of Management SRM Institute of Science and Technology NCR Campus India
Recently accurate predictions of electricity demands have emerged from the Liberalization and commercialization of the energy area. The future energy or intelligent grid market. A better request-side management method... 详细信息
来源: 评论
Sleep Stage and Sleep Disorder Detection using Spatial and Temporal Attention based Capsule Network  1
Sleep Stage and Sleep Disorder Detection using Spatial and T...
收藏 引用
1st International Conference on Software, Systems and Information Technology, SSITCON 2024
作者: Devi, R. Renuga Elavarasi, S. Anitha Venkateswarlu, Chetti Anitha, R. Ali, Hassan Mohamed Srm Institute of Science and Technology Ramapuram Department of Computer Science and Applications Chennai India Sona College of Technology Department of Computer Science and Engineering Salem India Maisammaguda Department of Electronics and Communication Engineering Hyderabad India New Prince Shri Bhavani College of Engineering and Technology Department of Information Technology Chennai India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq
Sleep is referred as a cyclic process which is the most important part in human life. The sleep disorder and its stages are observed from time waveforms such as Electroencephalogram (EEG), Electrocardiograms (ECG), an... 详细信息
来源: 评论
SciMRC: Multi-perspective Scientific Machine Reading Comprehension  30
SciMRC: Multi-perspective Scientific Machine Reading Compreh...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhang, Xiao Zheng, Heqi Nie, Yuxiang Huang, Heyan Mao, Xian-Ling School of Computer Science and Technology Beijing Institute of Technology China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications China Southeast Academy of Information Technology Beijing Institute of Technology China State Grid Smart Grid Research Institute Co. Ltd. China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Scientific Machine Reading Comprehension (SMRC) aims to facilitate the understanding of scientific texts through human-machine interactions. While existing dataset has significantly contributed to this field, it predo... 详细信息
来源: 评论
Detection and Evaluation of Cybersecurity Threats in MANET Based on AI  4
Detection and Evaluation of Cybersecurity Threats in MANET B...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Mohandas, R. Vaigandla, Karthik Kumar Sivapriya, N. Kirubasankar, K. Chennai Institute of Technology Department of Electronics & Communication Engineering Tamil Nadu Chennai India Balaji Institute of Technology and Science Department of Electronics & Communication Engineering Telangana Warangal India Cauvery College for Women Department of Computer Applications Tamil Nadu Trichy India
This research focuses on the use of AI to enhance the security of Mobile Ad-hoc Networks (MANETs), which aredecentralized and mobile wireless networks characterized by their dynamic nature. The work aims to assess the... 详细信息
来源: 评论
Security Challenges in Multi-Cloud Environments: Solutions and Best Practices  7
Security Challenges in Multi-Cloud Environments: Solutions a...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Madanan, Mukesh Patel, Pratik Agrawal, Prateek Mudholkar, Pankaj Mudholkar, Megha Jaganraja, V. Dhofar University Department of Computer Science Oman National Forensic Sciences University India India Marwadi University Faculty of Computer Applications Gujarat Rajkot360003 India Marwadi University Department of Computer Engineering Gujarat Rajkot360003 India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Avadi Chennai600062 India
The aim of this research paper is to investigate how machine learning can be incorporated to improve security around multi-clouds, with specific reference to the challenges. Based on the datasets obtained from Kaggle,... 详细信息
来源: 评论
Real-Time Anomaly Detection in IoT Healthcare Devices With LSTM  1
Real-Time Anomaly Detection in IoT Healthcare Devices With L...
收藏 引用
1st International Conference on Artificial Intelligence for Innovations in Healthcare Industries, ICAIIHI 2023
作者: Varshney, Neeraj Madan, Parul Shrivastava, Anurag Srivastava, Arun Pratap Kumar, C Praveen Akhilesh Khan, Kumar Gla University Department of Computer Engineering and Applications Mathura India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamilnadu Chennai India Lloyd Institute of Engineering and Technology Greater Noida India Institute of Aeronautical Engineering Department of Computer Science and Engineering Telangana Hyderabad India Lloyd Law College Greater Noida India
In this study, LSTM-based models are used to investigate real-time anomaly detection in IoT healthcare equipment. The study demonstrates the way these models are incredibly successful in improving patient outcomes and... 详细信息
来源: 评论
Scalable Data Clustering For Health Behavior Analysis In Big Data Cloud Environments  1
Scalable Data Clustering For Health Behavior Analysis In Big...
收藏 引用
1st International Conference on Artificial Intelligence for Innovations in Healthcare Industries, ICAIIHI 2023
作者: Bhardwaj, Diwakar Bordoloi, Dibyhash Deepak, A. Mayuri, K. Yadav, Dinesh Kumar Kumar, Navneet Institute of Engineering and Technology Gla University Department of Computer Engineering and Applications Mathura India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Tamilnadu Chennai India Institute of Aeronautical Engineering Department of Computer Science and Engineering Telangana Hyderabad India Lloyd Institute of Engineering and Technology Greater Noida India Lloyd Law College Greater Noida India
This work addresses the requirement for scalable data organization methods in big data cloud systems for behavioral analysis. Researchers embrace an interpretive attitude and use a deductive strategy and descriptive m... 详细信息
来源: 评论
Federated Learning for Secure Healthcare Image Analysis in the Cloud  1
Federated Learning for Secure Healthcare Image Analysis in t...
收藏 引用
1st International Conference on Artificial Intelligence for Innovations in Healthcare Industries, ICAIIHI 2023
作者: Varshney, Neeraj Madan, Parul Shrivastava, Anurag Kumar, C Praveen Rao, A.L.N. Khan, Akhilesh Kumar Gla University Department of Computer Engineering and Applications Mathura India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamilnadu Chennai India Institute of Aeronautical Engineering Department of Computer Science and Engineering Telangana Hyderabad India Lloyd Institute of Engineering and Technology Greater Noida India Lloyd Law College Greater Noida India
This study investigates the use of federated learning in healthcare picture analysis with the goal of improving diagnostic precision while safeguarding patient data privacy. A specialized federated learning framework ... 详细信息
来源: 评论
A Hybrid Watermarking Scheme Using DWT and Haar Transform for Image Authentication  3rd
A Hybrid Watermarking Scheme Using DWT and Haar Transform fo...
收藏 引用
3rd International Conference on Advanced Computing and applications, ICACA 2024
作者: Jana, Sachchidananda Pal, Pabitra Mahadani, Asim Kumar Giri, Debasis Department of Computer Science & Applications Prabhat Kumar College Contai West Bengal Purba Medinipur721404 India Department of Computer Applications Maulana Abul Kalam Azad University of Technology West Bengal Nadia741249 India Department of Computer Science and Engineering Bankura Unnayani Institute of Engineering West Bengal Bankura India Department of Information Technology Maulana Abul Kalam Azad University of Technology West Bengal Nadia741249 India
The safe transfer and preservation of medical images is crucial in the age of digital healthcare. Watermarking medical images is an essential method of adding patient data, hospital logos, and other pertinent informat... 详细信息
来源: 评论
Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2022年 第4期4卷 174-178页
作者: Gupta, Rishabh Saxena, Deepika Gupta, Ishu Makkar, Aaisha Singh, Ashutosh Kumar National Institute of Technology Department of Computer Applications Kurukshetra136119 India National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan University of Derby Department of Computer Science and Engineering DerbyDE22 1GB United Kingdom
This letter proposes a novel malicious user prediction model based on quantum machine learning that estimates the vicious entity present in the communication system precedently before allocating the data in the distri... 详细信息
来源: 评论