咨询与建议

限定检索结果

文献类型

  • 37 篇 会议
  • 14 篇 期刊文献

馆藏范围

  • 51 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23 篇 工学
    • 17 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 5 篇 信息与通信工程
    • 5 篇 生物工程
    • 3 篇 光学工程
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 冶金工程
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 水利工程
    • 1 篇 石油与天然气工程
    • 1 篇 纺织科学与工程
    • 1 篇 交通运输工程
  • 9 篇 理学
    • 5 篇 生物学
    • 4 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 8 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 5 篇 machine learning
  • 4 篇 real-time system...
  • 4 篇 sentiment analys...
  • 3 篇 deep learning
  • 3 篇 prevention and m...
  • 3 篇 monitoring
  • 3 篇 accuracy
  • 3 篇 training
  • 2 篇 support vector m...
  • 2 篇 deep neural netw...
  • 2 篇 magnetic resonan...
  • 2 篇 throughput
  • 2 篇 image segmentati...
  • 2 篇 crops
  • 2 篇 mobile applicati...
  • 2 篇 energy utilizati...
  • 2 篇 feature extracti...
  • 2 篇 security
  • 2 篇 blockchain
  • 2 篇 qr codes

机构

  • 4 篇 professor comput...
  • 4 篇 final year b.tec...
  • 2 篇 ty b.tech comput...
  • 2 篇 ly b.tech comput...
  • 2 篇 b.tech in comput...
  • 2 篇 department of en...
  • 2 篇 assistant profes...
  • 2 篇 b.tech in comput...
  • 2 篇 department of me...
  • 2 篇 university of pe...
  • 1 篇 department of co...
  • 1 篇 university of pe...
  • 1 篇 iv b.tech depart...
  • 1 篇 department of co...
  • 1 篇 [f]department of...
  • 1 篇 b.tech computer ...
  • 1 篇 school of comput...
  • 1 篇 b.e. computer sc...
  • 1 篇 b.tech student o...
  • 1 篇 b.tech computer ...

作者

  • 2 篇 broota sumir
  • 2 篇 joshi aniruddha ...
  • 2 篇 patel ankit kuma...
  • 2 篇 j. naren
  • 2 篇 dhaneshwar prana...
  • 2 篇 paul dewanshi
  • 2 篇 m. shyamala devi
  • 2 篇 kaushik keshav
  • 2 篇 a poornima
  • 2 篇 suryavanshi yash
  • 2 篇 rahul s
  • 2 篇 kurulekar maya
  • 2 篇 kanahasabai gout...
  • 2 篇 p. swathi
  • 2 篇 m sumithra
  • 2 篇 khandelwal niyat...
  • 2 篇 joshi atharva
  • 2 篇 manoj hariharan ...
  • 2 篇 m shyamala devi
  • 1 篇 ananya sharma

语言

  • 47 篇 英文
  • 4 篇 其他
检索条件"机构=B.Tech in Computer Science"
51 条 记 录,以下是11-20 订阅
排序:
An electronic warfare approach for deploying a software-based Wi-Fi jammer  5
An electronic warfare approach for deploying a software-base...
收藏 引用
5th International Conference on Contemporary Computing and Informatics, IC3I 2022
作者: Kaushik, Keshav Negi, Rahul Dev, Prabhav University of Petroleum and Energy Studies School of Computer Science Dehradun India University of Petroleum and Energy Studies B.Tech Computer Science and Engineering Dehradun India
Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to crea... 详细信息
来源: 评论
A Real-Time Approach to Classify the Water Quality of the River Ganga at Mehandi Ghat, Kannuaj  4
A Real-Time Approach to Classify the Water Quality of the Ri...
收藏 引用
4th IEEE International Conference on Artificial Intelligence in Engineering and technology, IICAIET 2022
作者: bajpai, Abhishek Chaubey, Srishti Patro, bdk Verma, Abhineet Rajkiya Engineering College Department of Computer Science and Engineering UP Kannauj India B.Tech Computer Science and Engineering Rajkiya Engineering College UP Kannauj India
Only 0.3 percent of the total water on Earth is available in rivers and ponds, and the majority of it is polluted to the point where drinking it directly can cause disease. In this paper, we will identify the quality ... 详细信息
来源: 评论
An approach for exploiting and mitigating Log4J using Log4Shell vulnerability  3
An approach for exploiting and mitigating Log4J using Log4Sh...
收藏 引用
3rd International Conference on Computation, Automation and Knowledge Management, ICCAKM 2022
作者: Kaushik, Keshav Dass, Alpana Dhankhar, Ayush University of Petroleum and Energy Studies School of Computer Science Dehradun India University of Petroleum and Energy Studies Student B.Tech Computer Science and Engineering Dehradun India
A new serious flaw has been discovered in log4j, a popular open-source tool used to produce logs within Java programs. The Log4Shell vulnerability, also referred as CVE-2021-44228, enables Remote Code Execution (RCE),... 详细信息
来源: 评论
Resonating Silence: Music Perception in the Deaf and Hard of Hearing
Resonating Silence: Music Perception in the Deaf and Hard of...
收藏 引用
IEEE UP Section Conference on Electrical computer and Electronics (UPCON)
作者: Mahak Garg Akanksha Yadav Kiran Singh B.Tech Computer Science and Engineering Galgotias University Greater Noida India School of Computer Science & Engineering Galgotias University Greater Noida India
Music is traditionally considered an auditory experience; however, the perception of music by Deaf and hard-of-hearing individuals challenges this assumption. This paper examines how people who are Deaf engage with mu... 详细信息
来源: 评论
Anti-Remote Disk Imaging: A Comprehensive Approach to Prevent Unauthorized Data Access
Anti-Remote Disk Imaging: A Comprehensive Approach to Preven...
收藏 引用
Data science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: K. Venketesh M. Caleb Gunalan Manoj Hariharan R Rahul S Surender R Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Tamilnadu India B.Tech Computer Science and Engineering Kalasalingam Academy of Research and Education Tamilnadu India
Remote disk imaging is an emerging cybersecurity risk that compromises sensitive information integrity. Malicious actors exploit legitimate tools like dd and Clonezilla to clone and exfiltrate data remotely. This pape... 详细信息
来源: 评论
Comparative Analysis of Vision Transformers and CNN-based Models for Enhanced brain Tumor Diagnosis
Comparative Analysis of Vision Transformers and CNN-based Mo...
收藏 引用
Automation, Computing and Renewable Systems (ICACRS), International Conference on
作者: Asmi Mangesh Kocharekar Satavisha Datta Padmanaban Rajakumar R. Final Year B.Tech Computer Science VIT Chennai Chennai India SCOPE VIT Chennai Chennai India
Patient care quality is directly linked to the accuracy and success of diagnostic radiography, notably in the diagnosis and treatment of brain tumors. Central to both medical treatments used for diagnosis and treatmen... 详细信息
来源: 评论
Customer Analytics using Surveillance Video
arXiv
收藏 引用
arXiv 2025年
作者: Ijjina, Earnest Paul Joshi, Aniruddha Srinivas Kanahasabai, Goutham Priyanka, P. Keerthi Department of Computer Science and Engineering National Institute of Technology Warangal506004 India B.Tech Department of Computer Science and Engineering National Institute of Technology Warangal506004 India
The analysis of sales information, is a vital step in designing an effective marketing strategy. This work proposes a novel approach to analyse the shopping behaviour of customers to identify their purchase patterns. ... 详细信息
来源: 评论
Dynamic Website Authentication Using Time-based One-Time Password (TOTP) for Enhanced Security
Dynamic Website Authentication Using Time-Based One-Time Pas...
收藏 引用
Data science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: M Caleb Gunalan bavani K Mathew Hayden Manoj Hariharan R Rahul S B.Tech Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil Tamilnadu India Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil Tamilnadu India
In today's digital landscape, the proliferation of fake websites poses significant threats to user security, trust, and data integrity. This paper presents a novel solution to address this issue through the implem... 详细信息
来源: 评论
Text recognition by air drawing  4
Text recognition by air drawing
收藏 引用
4th International Conference on Computational Intelligence and Communication technologies, CCICT 2021
作者: Patel, Jay Mehta, Umang Panchal, Kevin Tailor, Dev Zanzmera, Devam Pandit Deendayal Energy University B.Tech in Computer Science and Engineering Gandhinagar India
In this paper, the text drawn by the user in the air is captured by the computer's camera, followed by the identification of that text. So, the video camera will be turned on at the time of capturing the written t... 详细信息
来源: 评论
GraphQL—Time for Some Introspection
GraphQL—Time for Some Introspection
收藏 引用
International Conference on System Modeling & Advancement in Research Trends (SMART)
作者: Devam Shah Devansh Shah Pratidnya Hegdepatil Aaryen Toggi B.Tech Computer Science (Cybersecurity) Mukesh Patel School of Technology and Management Mumbai India Mukesh Patel School of Technology and Management Mumbai India
GraphQL has been here since 2015 (public), but only recently there has been a surge in its usage by developers. Although GraphQL security is becoming crucial given the increasing usage, there are only a few research p... 详细信息
来源: 评论