咨询与建议

限定检索结果

文献类型

  • 390 篇 期刊文献
  • 134 篇 会议
  • 3 册 图书

馆藏范围

  • 527 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 理学
    • 109 篇 物理学
    • 18 篇 数学
    • 15 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 7 篇 海洋科学
    • 6 篇 系统科学
  • 129 篇 工学
    • 56 篇 计算机科学与技术...
    • 45 篇 软件工程
    • 27 篇 电气工程
    • 27 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 生物工程
    • 13 篇 生物医学工程(可授...
    • 12 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
    • 10 篇 控制科学与工程
    • 8 篇 机械工程
    • 8 篇 土木工程
    • 6 篇 仪器科学与技术
    • 6 篇 船舶与海洋工程
    • 5 篇 建筑学
  • 33 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 18 篇 医学
    • 15 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 农学
    • 5 篇 作物学
  • 4 篇 教育学
    • 4 篇 教育学
  • 3 篇 法学

主题

  • 16 篇 machine learning
  • 12 篇 cloud computing
  • 10 篇 deep learning
  • 8 篇 software
  • 7 篇 artificial intel...
  • 6 篇 wireless sensor ...
  • 6 篇 predictive model...
  • 6 篇 real-time system...
  • 6 篇 security
  • 6 篇 accuracy
  • 6 篇 training
  • 5 篇 internet of thin...
  • 5 篇 computer science
  • 5 篇 scalability
  • 5 篇 telecommunicatio...
  • 5 篇 optimization
  • 5 篇 monitoring
  • 5 篇 computational mo...
  • 4 篇 conferences
  • 4 篇 neural networks

机构

  • 6 篇 assistant profes...
  • 4 篇 assistant profes...
  • 4 篇 assistant profes...
  • 4 篇 assistant profes...
  • 3 篇 department of co...
  • 3 篇 assistant profes...
  • 3 篇 u.g student depa...
  • 3 篇 assistant profes...
  • 3 篇 assistant profes...
  • 3 篇 professor p.g de...
  • 3 篇 u.g students dep...
  • 3 篇 assistant profes...
  • 3 篇 assistant profes...
  • 3 篇 assistant profes...
  • 3 篇 professor & dean...
  • 3 篇 professor depart...
  • 3 篇 assistant profes...
  • 3 篇 assistant profes...
  • 3 篇 ug student depar...
  • 3 篇 ph.d -research s...

作者

  • 5 篇 ankit kumar
  • 5 篇 k. selvamani
  • 4 篇 j albert mayan
  • 4 篇 s deepa
  • 3 篇 ruchi garg
  • 3 篇 anirban das
  • 3 篇 tapas kumar
  • 3 篇 abhishek kumar
  • 3 篇 dvln somayajulu
  • 3 篇 a. jayanthiladev...
  • 3 篇 a. viji amutha m...
  • 3 篇 nema salem
  • 3 篇 kajla basu
  • 3 篇 d. kavitha
  • 3 篇 goutam panigrahi
  • 3 篇 poonam gupta
  • 3 篇 vani rajasekar
  • 3 篇 raju bhukya
  • 3 篇 pankaj dadheech
  • 3 篇 b muthukumar

语言

  • 500 篇 英文
  • 17 篇 其他
  • 10 篇 中文
检索条件"机构=Assistant Professor in Computer Engineering Department"
527 条 记 录,以下是361-370 订阅
排序:
An Invisible Logo Watermarking Using Arnold Transform
收藏 引用
Procedia computer Science 2016年 93卷 808-815页
作者: N. Saikrishna M.G. Resmipriya PG Scholar Department of Computer Science & EngineeringAmal Jyothi College of Engineering Kanjirapally Kottayam686518 Assistant Professor Department of Computer Science & EngineeringAmal Jyothi College of Engineering Kanjirapally Kottayam686518
Digital watermarking is the process of hiding information into the digital content. The method of embedding a smaller logo image into the host image is called logo watermarking. The system proposes an invisible and se... 详细信息
来源: 评论
A Survey on Opportunistic Routing Protocols for Wireless Sensor Networks
收藏 引用
Procedia computer Science 2016年 79卷 603-609页
作者: Payal Jadhav Rachna Satao Department Of Computer Engineering Smt.Kashibai Navale College of Engineering Pune411041 India Assistant Professor Department Of Computer Engineering Smt.Kashibai Navale College of EngineeringPune 411041 India
Opportunistic routing is a new paradigm in routing for wireless sensor network which chooses the node closest to the target node for forwarding the data. It uses the broadcasting nature of wireless sensor networks. Op... 详细信息
来源: 评论
A Peculiar Sentiment Analysis Advancement in Big Data
收藏 引用
Journal of Physics: Conference Series 2017年 第1期933卷
作者: Manisha Valera Yash Patel Assistant Professor Department of Computer Engineering Indus University Ahmedabad Gujarat India Student Department of Computer Engineering Indus University Ahmedabad Gujarat India
Every company wants to discover what its customers feel about it. But sentiment analysis can get coarser and turn inward to improve employee as well as customers' satisfaction. A term called sentiment analysis, or...
来源: 评论
User-perceptive image search using complex multiple word based query (An efficient image search process using complex multiple word based query)
User-perceptive image search using complex multiple word bas...
收藏 引用
International Conference on (ISCO) Intelligent Systems and Control
作者: Dipak R. Pardhi Lalitkumar B. Borase Assistant Professor and Head of Department of Computer Engineering Godavari College of Engineering Jalgaon MH) Department of Computer Engineering Godavari College of Engineering Jalgaon(MH)
Increasingly developed world internet and social multimedia services allow users to view, tag, and comments also upload large amount of data to search the content among this metadata through text based searching is wi... 详细信息
来源: 评论
Software Quality Prediction Model with the Aid of Advanced Neural Network with HCS
收藏 引用
Procedia computer Science 2016年 92卷 418-424页
作者: Kavita Sheoran Pradeep Tomar Rajesh Mishra Reader Department of Computer Science MSIT Delhi Assistant Professor in Department of Computer Science and Engineering School of Information and Communication Technology Gautam Bhudda University Greater Noida Assistant Professor School of ICT Gautam Buddha University Greater Noida Uttar Pardesh
Software quality is regarded as the highly important factors for assessing the global competitive position of any software product. To assure quality, and to assess the reliability of software products, many software ... 详细信息
来源: 评论
Review on Detection and Mitigation of Sybil Attack in the Network
收藏 引用
Procedia computer Science 2016年 78卷 395-401页
作者: Arpita M. Bhise Shailesh D. Kamble PG Student Department of Computer TechnologyYeshwantrao Chavan College of Engineering Nagpur 441110 India Assistant Professor Department of Computer Technology Yeshwantrao Chavan College of Engineering Nagpur 441110 India
Sybil attack is an attack in which the identities of the node are subverted and the large number of pseudonymous identities is produced to gain the access of the network. In this paper, we studied the detection mechan... 详细信息
来源: 评论
Middle East and North African Health Informatics Association (MENAHIA): Building Sustainable Collaboration
收藏 引用
Yearbook of Medical Informatics 2018年 第1期27卷 286-291页
作者: Najeeb Al-Shorbaji Mowafa Househ Adel Taweel Abdullah Alanizi Bennani Othmani Mohammed Haitham Abaza Hala Bawadi Hamayon Rasuly Khalid Alyafei Luis Fernandez-Luque Mohamed Shouman Osama El-Hassan Rada Hussein Riyad Alshammari Salah Mandil Sarah Shouman Shahrad Taheri Tamer Emara Wasmiya Dalhem Zaid Al-Hamdan Zineb Serhier eHealth and Knowledge Management Consultant Retired Director of Knowledge Ethics and Research Department WHO/HQ Amman Jordan Department of Health Informatics College of Public Health and Health Informatics King Saud Bin Abdulaziz University for Health Sciences Ministry of National Guard-Health Affairs Riyadh Saudi Arabia Department of Computer Science BirZeit University Ramallah Palestine Head of Medical Informatics Unit 20 August Hospital Ibn Rochd University Hospital Casablanca Head of Casablanca Medical Informatics Laboratory Medical Faculty of Casablanca Morocco Department of Biomedical Engineering Misr University for Science & Technology Cairo Egypt Associate Professor College of Nursing University of Jordan Amman Jordan eHealth Program Coordinator Bamyan Provincial Hospital Bamyan City Afghanistan Chief Medical Informatics Officer (CMIO) - SIDRA Assistant Professor Clinical Pediatrics at Weill Cornell Medicine Qatar Qatar Computing Research Institute Hamad Bin Khalifa University Doha Qatar Faculty of Medicine Ain Shams University Cairo Egypt Vice-Chair of Emirates Health Informatics Society Head of eHealth Section at Dubai Health Authority Dubai United Arab Emirates Founder and Former Director of the Biomedical Informatics Center of Excellence (BMICoE) Information Technology Institute (ITI) Ministry of Communications and Information Technology (MCIT) Egypt President of Saudi Association for Health Informatics Riyadh Saudi Arabia Senior Consultant on eStrategies and eHealth to WHO and ITU Geneva Switzerland Department of Medicine Weill Cornell Medical College in Qatar Qatar Foundation Doha Qatar Executive Director of Nursing Informatics Hamad Medical Corporation Qatar Associate Professor of Nursing Management Faculty of Nursing Jordan University of Science and Technology Irbid Jordan Professor at Medical Informatics Laboratory Faculty of Medicine and Pharmacy Hassan II University Casablanca Morocco
There has been a growing interest in Health Informatics applications, research, and education within the Middle East and North African Region over the past twenty years. People of this region share similar cultural an... 详细信息
来源: 评论
Hidden Biometric Security Implementation through Human Brain's Artificial Macro Structure
收藏 引用
Procedia computer Science 2016年 78卷 625-631页
作者: Saurabh Maheshwari Priyanka Choudhary Assistant Professor Department of Computer Sciecne & Engineering Govt. Women Engineering College Ajmer Rajasthan India Mtech Scholar Department of Computer Sciecne & Engineering Govt. Women Engineering College Ajmer Rajasthan India
Biometrics are means for security but on the other side they are prone to forgery. For this hidden biometrics like veins, retina, etc. came into the picture. We have chosen hidden biometrics because of their character... 详细信息
来源: 评论
Applying Separation of Concern for Developing Softwares Using Aspect Oriented Programming Concepts
收藏 引用
Procedia computer Science 2016年 85卷 906-914页
作者: Anil Kumar Arvind Kumar M. Iyyappan Department of Computer Science & Engineering Ph. D. Scholar SRM University Sonepat-131029 India Department of Computer Science & Engineering Assistant Professor SRM University Sonepat-131029 India
Aspects provide a means of separating cross-cutting concerns from our core implementation code into separate modules. Cross-cutting concerns are pieces of functionality that are used across multiple parts of a system.... 详细信息
来源: 评论
Secret Sharing Based Visual Cryptography Scheme Using CMY Color Space
收藏 引用
Procedia computer Science 2016年 78卷 563-570页
作者: Ankush V. Dahat Pallavi V. Chavan M-Tech Student (Computer Science & Engineering) Department of Computer Engineering BDCOE Sewagram-442102 WARDHA(M.S.) India Assistant Professor Department of Computer Engineering BDCOE Sewagram-442102 WARDHA(M.S.) India
In the era of internet, internet is widely used by the individual for the communication and the information give and take process. Protecting our data from the unconstitutional processes and keeping the secret informa... 详细信息
来源: 评论