咨询与建议

限定检索结果

文献类型

  • 36 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 49 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 18 篇 计算机科学与技术...
    • 15 篇 软件工程
    • 7 篇 信息与通信工程
    • 5 篇 生物工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 光学工程
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 2 篇 机械工程
    • 2 篇 冶金工程
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 水利工程
  • 10 篇 理学
    • 5 篇 物理学
    • 5 篇 生物学
    • 3 篇 数学
    • 3 篇 系统科学
    • 2 篇 化学
    • 1 篇 统计学(可授理学、...
  • 9 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 4 篇 real-time system...
  • 3 篇 support vector m...
  • 3 篇 deep learning
  • 3 篇 monitoring
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 artificial intel...
  • 3 篇 training
  • 2 篇 deep neural netw...
  • 2 篇 prevention and m...
  • 2 篇 cameras
  • 2 篇 mobile applicati...
  • 2 篇 energy utilizati...
  • 2 篇 data mining
  • 2 篇 decision trees
  • 2 篇 blockchain
  • 2 篇 qr codes
  • 2 篇 sentiment analys...
  • 2 篇 software
  • 2 篇 wireless network...

机构

  • 4 篇 professor comput...
  • 4 篇 final year b.tec...
  • 2 篇 ty b.tech comput...
  • 2 篇 ly b.tech comput...
  • 2 篇 b.tech in comput...
  • 2 篇 department of en...
  • 2 篇 computer enginee...
  • 2 篇 assistant profes...
  • 2 篇 b.tech in comput...
  • 2 篇 b.tech computer ...
  • 2 篇 department of me...
  • 2 篇 university of pe...
  • 1 篇 department of co...
  • 1 篇 university of pe...
  • 1 篇 iv b.tech depart...
  • 1 篇 department of co...
  • 1 篇 computer enginee...
  • 1 篇 [f]department of...
  • 1 篇 b.tech computer ...
  • 1 篇 school of comput...

作者

  • 2 篇 broota sumir
  • 2 篇 joshi aniruddha ...
  • 2 篇 patel ankit kuma...
  • 2 篇 j. naren
  • 2 篇 dhaneshwar prana...
  • 2 篇 paul dewanshi
  • 2 篇 m. shyamala devi
  • 2 篇 kaushik keshav
  • 2 篇 a poornima
  • 2 篇 suryavanshi yash
  • 2 篇 rahul s
  • 2 篇 krishna samdani
  • 2 篇 kurulekar maya
  • 2 篇 kanahasabai gout...
  • 2 篇 p. swathi
  • 2 篇 m sumithra
  • 2 篇 khandelwal niyat...
  • 2 篇 joshi atharva
  • 2 篇 lavina nagpal
  • 2 篇 manoj hariharan ...

语言

  • 45 篇 英文
  • 4 篇 其他
检索条件"机构=B.Tech Computer Engineering MPSTME"
49 条 记 录,以下是11-20 订阅
排序:
An electronic warfare approach for deploying a software-based Wi-Fi jammer  5
An electronic warfare approach for deploying a software-base...
收藏 引用
5th International Conference on Contemporary Computing and Informatics, IC3I 2022
作者: Kaushik, Keshav Negi, Rahul Dev, Prabhav University of Petroleum and Energy Studies School of Computer Science Dehradun India University of Petroleum and Energy Studies B.Tech Computer Science and Engineering Dehradun India
Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to crea... 详细信息
来源: 评论
Resonating Silence: Music Perception in the Deaf and Hard of Hearing
Resonating Silence: Music Perception in the Deaf and Hard of...
收藏 引用
IEEE UP Section Conference on Electrical computer and Electronics (UPCON)
作者: Mahak Garg Akanksha Yadav Kiran Singh B.Tech Computer Science and Engineering Galgotias University Greater Noida India School of Computer Science & Engineering Galgotias University Greater Noida India
Music is traditionally considered an auditory experience; however, the perception of music by Deaf and hard-of-hearing individuals challenges this assumption. This paper examines how people who are Deaf engage with mu... 详细信息
来源: 评论
An approach for exploiting and mitigating Log4J using Log4Shell vulnerability  3
An approach for exploiting and mitigating Log4J using Log4Sh...
收藏 引用
3rd International Conference on Computation, Automation and Knowledge Management, ICCAKM 2022
作者: Kaushik, Keshav Dass, Alpana Dhankhar, Ayush University of Petroleum and Energy Studies School of Computer Science Dehradun India University of Petroleum and Energy Studies Student B.Tech Computer Science and Engineering Dehradun India
A new serious flaw has been discovered in log4j, a popular open-source tool used to produce logs within Java programs. The Log4Shell vulnerability, also referred as CVE-2021-44228, enables Remote Code Execution (RCE),... 详细信息
来源: 评论
Anti-Remote Disk Imaging: A Comprehensive Approach to Prevent Unauthorized Data Access
Anti-Remote Disk Imaging: A Comprehensive Approach to Preven...
收藏 引用
Data Science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: K. Venketesh M. Caleb Gunalan Manoj Hariharan R Rahul S Surender R Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Tamilnadu India B.Tech Computer Science and Engineering Kalasalingam Academy of Research and Education Tamilnadu India
Remote disk imaging is an emerging cybersecurity risk that compromises sensitive information integrity. Malicious actors exploit legitimate tools like dd and Clonezilla to clone and exfiltrate data remotely. This pape... 详细信息
来源: 评论
Customer Analytics using Surveillance Video
arXiv
收藏 引用
arXiv 2025年
作者: Ijjina, Earnest Paul Joshi, Aniruddha Srinivas Kanahasabai, Goutham Priyanka, P. Keerthi Department of Computer Science and Engineering National Institute of Technology Warangal506004 India B.Tech Department of Computer Science and Engineering National Institute of Technology Warangal506004 India
The analysis of sales information, is a vital step in designing an effective marketing strategy. This work proposes a novel approach to analyse the shopping behaviour of customers to identify their purchase patterns. ... 详细信息
来源: 评论
Dynamic Website Authentication Using Time-based One-Time Password (TOTP) for Enhanced Security
Dynamic Website Authentication Using Time-Based One-Time Pas...
收藏 引用
Data Science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: M Caleb Gunalan bavani K Mathew Hayden Manoj Hariharan R Rahul S B.Tech Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil Tamilnadu India Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil Tamilnadu India
In today's digital landscape, the proliferation of fake websites poses significant threats to user security, trust, and data integrity. This paper presents a novel solution to address this issue through the implem... 详细信息
来源: 评论
Text recognition by air drawing  4
Text recognition by air drawing
收藏 引用
4th International Conference on Computational Intelligence and Communication technologies, CCICT 2021
作者: Patel, Jay Mehta, Umang Panchal, Kevin Tailor, Dev Zanzmera, Devam Pandit Deendayal Energy University B.Tech in Computer Science and Engineering Gandhinagar India
In this paper, the text drawn by the user in the air is captured by the computer's camera, followed by the identification of that text. So, the video camera will be turned on at the time of capturing the written t... 详细信息
来源: 评论
A Novel Mobile Application to Empower Visually Impaired Individuals to Perform Independent Day-to-Day Activities
A Novel Mobile Application to Empower Visually Impaired Indi...
收藏 引用
International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
作者: Dewanshi Paul Ankit Kumar Patel Dhanush R Amutha S B.Tech Electronics and Computer Engineering School of Electronics Engineering Vellore Institute of Technology Chennai India School of Electronics Engineering Vellore Institute of Technology Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
People with visual impairments struggle or require assistance from others to perform day-to-day activities. Hence, people with visual impairments suffer from a lack of independence and quality of life. For this purpos... 详细信息
来源: 评论
Deep Learning for Glioblastoma Subtyping: Leveraging DenseNet-201 in brain Tumor Radiogenomic Classification
Deep Learning for Glioblastoma Subtyping: Leveraging DenseNe...
收藏 引用
Cognitive Robotics and Intelligent Systems (ICC - RObINS), International Conference on
作者: S. Alvin Jesuraj S. V. Evangelin Sonia C. P. Shirley B.Tech Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India
This research investigates the application of DenseNet-201, a deep convolutional neural network architecture, in the RSNA-MICCAI brain Tumor Radiogenomic Classification aimed at predicting the genetic subtype of gliob... 详细信息
来源: 评论
Implementing blockchain based Security in EHR Using Ganache
Implementing Blockchain Based Security in EHR Using Ganache
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Kumar Satyam Ayush Sharma Runumi Devi B.Tech in Computer Science and Engineering Galgotias University Greater Noida Uttar Pradesh India Department of Computer Science and Engineering Galgotias University Greater Noida Uttar Pradesh India
A blockchain-based electronic health record (EHR) system has been proposed to manage patient data and maintain computerized records across different healthcare institutions. The main objective of this system is to pro...
来源: 评论