咨询与建议

限定检索结果

文献类型

  • 1,204 篇 期刊文献
  • 458 篇 会议
  • 36 册 图书

馆藏范围

  • 1,697 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 561 篇 工学
    • 191 篇 计算机科学与技术...
    • 139 篇 软件工程
    • 94 篇 电气工程
    • 67 篇 信息与通信工程
    • 58 篇 材料科学与工程(可...
    • 50 篇 土木工程
    • 47 篇 控制科学与工程
    • 46 篇 电子科学与技术(可...
    • 34 篇 冶金工程
    • 34 篇 动力工程及工程热...
    • 31 篇 水利工程
    • 31 篇 船舶与海洋工程
    • 31 篇 生物工程
    • 29 篇 生物医学工程(可授...
    • 27 篇 化学工程与技术
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 环境科学与工程(可...
  • 456 篇 理学
    • 272 篇 物理学
    • 77 篇 数学
    • 47 篇 生物学
    • 47 篇 统计学(可授理学、...
    • 30 篇 海洋科学
    • 25 篇 化学
  • 122 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 31 篇 工商管理
  • 69 篇 医学
    • 45 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
  • 50 篇 经济学
    • 48 篇 应用经济学
  • 23 篇 农学
  • 20 篇 教育学
  • 16 篇 法学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 machine learning
  • 29 篇 deep learning
  • 23 篇 artificial intel...
  • 22 篇 accuracy
  • 21 篇 feature extracti...
  • 20 篇 cloud computing
  • 18 篇 computer science
  • 18 篇 computational mo...
  • 17 篇 wireless sensor ...
  • 17 篇 training
  • 16 篇 real-time system...
  • 15 篇 security
  • 14 篇 routing
  • 14 篇 theory of comput...
  • 14 篇 data models
  • 13 篇 information syst...
  • 12 篇 scalability
  • 12 篇 computer archite...
  • 12 篇 data mining
  • 12 篇 testing

机构

  • 16 篇 associate profes...
  • 13 篇 school of comput...
  • 13 篇 department of ma...
  • 13 篇 department of ch...
  • 13 篇 william norris p...
  • 11 篇 department of co...
  • 11 篇 adjunct professo...
  • 9 篇 clayton school o...
  • 7 篇 department of co...
  • 6 篇 assistant profes...
  • 6 篇 assistant profes...
  • 6 篇 department of co...
  • 6 篇 member
  • 6 篇 optimanumerics l...
  • 6 篇 professor
  • 5 篇 centre of resear...
  • 5 篇 department of co...
  • 5 篇 warsaw universit...
  • 5 篇 department of co...
  • 5 篇 department of ph...

作者

  • 13 篇 youngsong mun
  • 13 篇 osvaldo gervasi
  • 13 篇 vipin kumar
  • 11 篇 marina l. gavril...
  • 10 篇 antonio laganá
  • 9 篇 c. j. kenneth ta...
  • 9 篇 david taniar
  • 7 篇 andreas pitsilli...
  • 6 篇 vikrant sharma
  • 6 篇 l m patnaik
  • 5 篇 grace khayat
  • 5 篇 vangipuram radha...
  • 5 篇 ankit kumar
  • 5 篇 c.v. guru rao
  • 5 篇 sharma s.c.
  • 5 篇 hyunseung choo
  • 5 篇 manjunatha k.
  • 5 篇 constandinos x m...
  • 5 篇 nagabhushana h.
  • 5 篇 ashish verma

语言

  • 1,578 篇 英文
  • 104 篇 其他
  • 15 篇 中文
  • 1 篇 德文
检索条件"机构=Associate Professor in Department of Computer Science Engineering"
1698 条 记 录,以下是141-150 订阅
排序:
Dimensional Reduction Method based on Big Data Techniques for Large Scale Data
Dimensional Reduction Method based on Big Data Techniques fo...
收藏 引用
2023 IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2023
作者: Kumbhkar, Makhan Shukla, Pranjal Singh, Yashwardhan Sangia, Rohib Adrianto Dhabliya, Dharmesh Christian Eminent College Department of Computer Science Indore India Accenture Solutions Pvt. Ltd. Data Engineering Associate Indore India Iain Ambon Vishwakarma Institute of Information Technology Pune India
In the age of big data, analysing complex and enormous amounts of data costs time and money and might result in mistakes and misunderstandings. Therefore, bad inference and decision-making, and occasionally irreversib... 详细信息
来源: 评论
Autonomous Vehicles for All?
收藏 引用
ACM Journal on Autonomous Transportation Systems 2024年 第1期1卷 1-8页
作者: Sakib Mahmud Khan M Sabbir Salek Vareva Harris Gurcan Comert Eric A. Morris Mashrur Chowdhury Intelligent Transportation Systems Lead MITRE Corporation McLean VA Ph.D. Candidate Glenn Department of Civil Engineering Clemson University Clemson SC Vice President for Corporate Engagement O Analytics Incorporated Fairmont WV Associate Professor Computer Science Physics and Engineering Department Benedict College Columbia SC USA Professor Nieri Department of Construction Development and Planning Clemson University Clemson SC USA Professor Glenn Department of Civil Engineering Clemson University Clemson SC USA
The traditional build-and-expand approach is not a viable solution to keep roadway traffic rolling safely, so technological solutions, such as autonomous vehicles (AVs), are favored. AVs have considerable potential to... 详细信息
来源: 评论
Innovations in Teaching Vibrations and Control - Reinforcing Learning by Combining Portable Lab Equipment and Virtual Labs
收藏 引用
IFAC-PapersOnLine 2024年 第28期58卷 66-71页
作者: Britt Walker Fahim Dorsey Vanessa Young Connor Talley Coskun Tekes Tris Utschig Ayse Tekes Undergraduate students (Walker Dorsey and Young) and Ph.D. student (Talley) Department of Mechanical Engineering Kennesaw State University Marietta GA USA Assistant Professor of Electrical and Computer Engineering (C. Tekes) Professor of Mechanical Engineering (Utschig) Kennesaw State University Marietta GA USA Associate Professor of Mechanical Engineering Kennesaw State University Marietta GA USA
Most educational laboratory equipment utilized in vibrations and control labs is heavy and bulky, limiting its use within lab spaces. Further, mechanical engineering students typically gain hands-on experience only in... 详细信息
来源: 评论
Enhancing IoT Network Security through AIDriven Intrusion Detection with Hybrid AutoencoderGAN Fusion  23
Enhancing IoT Network Security through AIDriven Intrusion De...
收藏 引用
Proceedings of the 5th International Conference on Information Management & Machine Intelligence
作者: Rupali A. Mahajan Sukhvinder Singh Dari Ritika Dhabliya Gabriela Michael Anil Kumar Nidhi Ranjan Computer Associate Professor COMP VIIT Pune Maharashtra India Computer Associate Professor Symbiosis Law School Nagpur Campus Symbiosis International (Deemed University) Pun India Computer Director Yashika Journal Publications Pvt. Limited Wardha Maharashtra India India Computer Symbiosis Law School Nagpur Campus Symbiosis International (Deemed University) Pune India India Department of Artificial Intelligence & Data Science Professor Poornima Institute Of Engineering &Technology Jaipur Rajasthan India India Computer Associate Professor Vasantdada Patil Pratishthan?s College of engineering and Visual Arts Mumbai Maharashtra India India
The rapid growth of Internet of Things (IoT)IoT devices has changed how we connect and interact with our environment. This advancement has also complicated network security. As IoT networks grow, data integrity and co... 详细信息
来源: 评论
Identification of Congenital Heart Defects in Ultrasound Images using U-Net Segmentation  1
Identification of Congenital Heart Defects in Ultrasound Ima...
收藏 引用
1st International Conference on Artificial Intelligence for Innovations in Healthcare Industries, ICAIIHI 2023
作者: Pandey, Saroj Kumar Diwan, Ritesh Rose, Anthony Singh, Kamred Udham Singh, Teekam Somasekar, J. Gla University Department of Computer Engineering & Apllications UP Mathura India Department of Ele. & Tele. Raipur Institute of Technology Raipur India Pune India School of Computing Graphic Era Hill University Dehradun India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India Professor of Cse Department Bangalore India
In this study, the use of a U-Net segmentation model is measured for the accurate detection of congenital heart abnormalities in newborn ultrasound pictures. The technique includes U-Net model training, sophisticated ... 详细信息
来源: 评论
Intrusion detection in big data using hybrid feature fusion and optimization enabled deep learning based on spark architecture
收藏 引用
computers and Security 2022年 116卷
作者: M .P . , Ramkumar Reddy, P.V. Bhaskar Thirukrishna, J.T. Vidyadhari, Ch. Assistant Professor Department of Computer Science and Engineering Thiagarajar College of Engineering Madurai625015 India Professor School of Computer Science and Engineering REVA University Karnataka Bengalore India Associate Professor Department of Information Science and Engineering Dayananda Sagar Academy of Technology and Management Karnataka Bangalore560082 India Assistant Professor Department of Information Technology Gokaraju Rangaraju Institute of Engineering and Technology Bachupally Hyderabad India
With the rapid expansion of Internet services and increasing intrusion issues, conventional intrusion detection techniques cannot work well with several difficult intrusions. Though several intrusion detection methods... 详细信息
来源: 评论
Numerical Simulation of Flow Field around NACA 0012 Airfoil at Low Reynold’s Number Assuming Mars Environment using OpenFoam
Numerical Simulation of Flow Field around NACA 0012 Airfoil ...
收藏 引用
AIAA science and Technology Forum and Exposition, AIAA SciTech Forum 2025
作者: Okamoto, Atsushi Yamada, Takafumi Advanced Mechanical and Control System Engineering Course National Institute of Technology Tsuyama College 624-1 Okayama Numa Tsuyama708-8509 Japan Associate Professor Department of Integrated Science and Technology National Institute of Technology Tsuyama College 624-1 Okayama Numa Tsuyama708-8509 Japan
In this study, incompressible flow fields around a NACA0012 airfoil were numerically simulated at low Reynolds number for a Mars environment. For mesh generation, the standard Open FOAM utilities block Mesh and snappy... 详细信息
来源: 评论
An Efficient Algorithm for Secure Key Management in Cloud Environment
An Efficient Algorithm for Secure Key Management in Cloud En...
收藏 引用
International Conference on science Technology engineering and Management (ICONSTEM)
作者: J. Jospin Jeya S. Raja Ratna G. Ganga Devi M. Priya C. Sivasankar Department of Computer Science and Engineering SRM Institute of Science and Technology Professor/CSE Saveetha School of Engineering SIMATS Chennai
Cloud infrastructure is efficient and scalable in all aspects; hence an enhanced method of safety measures is needed for secured data transfer. Security solution for cloud centric PC’s was reliable in providing the o...
来源: 评论
Intrusion Detection in Novel WSN-Leach Dos Attack Dataset using Machine Learning based Boosting Algorithms
收藏 引用
Procedia computer science 2023年 230卷 90-99页
作者: Dharini N Jeevaa Katiravan Sruthi Priya D M Sakthi Sneghaa V A Associate Professor Department of Computer Science Engineering(Cyber Security) R.M.K. College of Engineering and Technology Thiruvallur 601206 Professor Department of Information Technology Velammal Engineering College Surapet Chennai 600066 Software Engineer embedUR Chennai 600013 Jr. Customer Service Executive Tata Communications Transformation Services Chennai 600037
Security poses a substantial challenge in the context of wireless sensor networks (WSNs). WSNs, which are frequently employed for real-time monitoring in various Internet of Things (IoT)-based applications, are partic... 详细信息
来源: 评论
Collaborative Defense Strategies: AI, ML, and Cybersecurity: A Comprehensive Study  12th
Collaborative Defense Strategies: AI, ML, and Cybersecurity:...
收藏 引用
12th International Conference on Frontiers of Intelligent Computing: Theory and Applications, FICTA 2024
作者: Borah, Samarjeet Dhabliya, Dharmesh Dhage, Prashant Shukla, Jyoti Rai, Sumit Kumar Bhattacharya, Saurabh Department of Computer Applications Sikkim Manipal Institute of Technology Sikkim Manipal University Sikkim India Department of Information Technology Vishwakarma Institute of Information Technology Maharashtra Pune India Nagpur Campus Pune India Computer Science and Engineering Arya College of Engineering Jaipur India Department of Mechanical Engineering Dr. D. Y. Patil Institute of Technology Maharashtra Pimpri Pune India Assistant Professor SCSE Galgotias University Uttar Pradesh Greater Noida India
In the fast-changing field of cybersecurity, the rise of advanced threats requires new and creative defense strategies. This study thoroughly examines collaborative defense strategies, focusing on the utilization of a... 详细信息
来源: 评论