咨询与建议

限定检索结果

文献类型

  • 170 篇 会议
  • 62 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 233 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 106 篇 工学
    • 67 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 45 篇 信息与通信工程
    • 24 篇 生物工程
    • 19 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 13 篇 电子科学与技术(可...
    • 9 篇 控制科学与工程
    • 7 篇 化学工程与技术
    • 6 篇 仪器科学与技术
    • 5 篇 光学工程
    • 4 篇 机械工程
    • 4 篇 交通运输工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
  • 70 篇 理学
    • 34 篇 数学
    • 26 篇 生物学
    • 19 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 7 篇 化学
    • 6 篇 系统科学
  • 39 篇 管理学
    • 24 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 22 篇 医学
    • 18 篇 临床医学
    • 15 篇 基础医学(可授医学...
    • 11 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 7 篇 法学
    • 7 篇 社会学
  • 3 篇 农学
  • 2 篇 文学
  • 1 篇 教育学

主题

  • 20 篇 feature extracti...
  • 15 篇 support vector m...
  • 13 篇 deep learning
  • 9 篇 speech
  • 8 篇 education
  • 7 篇 programming prof...
  • 7 篇 neural networks
  • 7 篇 databases
  • 6 篇 intrusion detect...
  • 6 篇 gabor filters
  • 6 篇 long short-term ...
  • 6 篇 image segmentati...
  • 6 篇 electrocardiogra...
  • 6 篇 machine learning
  • 6 篇 estimation
  • 6 篇 training
  • 5 篇 noise reduction
  • 5 篇 task analysis
  • 5 篇 generative adver...
  • 5 篇 computer archite...

机构

  • 31 篇 center for compu...
  • 29 篇 center for compu...
  • 15 篇 center for compu...
  • 8 篇 lakhshya cyber s...
  • 7 篇 center for compu...
  • 6 篇 division of biom...
  • 6 篇 center for excel...
  • 6 篇 amrita vishwa vi...
  • 6 篇 department of el...
  • 5 篇 center for excel...
  • 5 篇 center for compu...
  • 5 篇 wyoming gis cent...
  • 5 篇 center for compu...
  • 4 篇 department of el...
  • 4 篇 center for compu...
  • 4 篇 center for compu...
  • 4 篇 amrita vishwa vi...
  • 4 篇 center for compu...
  • 3 篇 department of ph...
  • 3 篇 center for compu...

作者

  • 49 篇 soman k.p.
  • 30 篇 k.p. soman
  • 15 篇 sowmya v.
  • 13 篇 neethu mohan
  • 12 篇 d. govind
  • 11 篇 k p soman
  • 10 篇 vinayakumar r.
  • 9 篇 sachin kumar s.
  • 9 篇 v sowmya
  • 9 篇 sachin kumar s
  • 8 篇 r vinayakumar
  • 8 篇 prabaharan poorn...
  • 8 篇 pradeep menon
  • 8 篇 kp soman
  • 7 篇 r. ramanathan
  • 7 篇 simran k.
  • 7 篇 shanmugha sundar...
  • 7 篇 soman k p
  • 7 篇 anand kumar m.
  • 6 篇 k. p. soman

语言

  • 232 篇 英文
  • 1 篇 其他
检索条件"机构=Center for Computational Engineering and Networking"
233 条 记 录,以下是61-70 订阅
排序:
PokkahScan - An Intelligent Drone for detection of Pokkah Boeng Disease in Sugarcane Using Transfer Learning and eXplainable AI
PokkahScan - An Intelligent Drone for detection of Pokkah Bo...
收藏 引用
International Conference on Computing and networking Technology (ICCNT)
作者: Rahul Ravikumar M V Sujith Kumaar Shirish Krishna M Jayasurkanth Vr Yasshwanth Sanjay Kishore Saravanan Senthil Kumar Thangavel S Thangeswari K Somasundaram Selvanayaki Kolandapalayam Shanmugam Center for Computational Engineering &Networking Amrita Vishwa Vidyapeetham Amrita School of Artificial Intelligence Coimbatore India Department of Aerospace Engineering Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India Department of Plant Pathology Tamilnadu Agricultural University Coimbatore India Department of Mathematics Amrita School of Physical Sciences Coimbatore India Department of Mathematics and Computer Science Ashland University Ohio USA
Traditional systems for crop disease detection often rely on manual inspection methods, which are time-consuming, labor-intensive, and prone to human error. In this context, the necessity of using transfer learning be... 详细信息
来源: 评论
Detection of Hate Speech Text in Hindi-English Code-mixed Data
收藏 引用
Procedia Computer Science 2020年 171卷 737-744页
作者: K Sreelakshmi B Premjith K.P. Soman Center for Computational Engineering & Networking (CEN) Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India
Social media sites like Twitter, Facebook, being user-friendly and a free source, provide opportunities to people to air their voice. People, irrespective of the age group, use these sites to share every moment of the... 详细信息
来源: 评论
Emotion Detection in Hinglish(Hindi+English) Code-Mixed Social Media Text
收藏 引用
Procedia Computer Science 2020年 171卷 1346-1352页
作者: T Tulasi Sasidhar Premjith B Soman K P Center for Computational Engineering and Networking (CEN) Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India
Human communication is often embedded with emotion and it can be expressed via different mediums like vocal interaction, texts, non-verbal communication like facial expressions and gestures. Even though textual commun... 详细信息
来源: 评论
Towards identifying most important leads for ECG classification. A Data driven approach employing Deep Learning
收藏 引用
Procedia Computer Science 2020年 171卷 602-608页
作者: Sujadevi VG Soman K.P. Center for Computational Engineering & Networking (CEN) Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India
Electrocardiogram (ECG) is a vital tool to determine the structure and function of the heart. Automated classification of the ECG data helps in earlier diagnosis before the doctor could personally investigate. Most of... 详细信息
来源: 评论
Assessment of watershed areas of western and eastern ghats using geospatial techniques  8
Assessment of watershed areas of western and eastern ghats u...
收藏 引用
8th IEEE International Conference on Communication and Signal Processing, ICCSP 2019
作者: Sathish Kumar, B. Geetha, P. Soman, K.P. Center for Computational Engineering and Networking Amrita School of Engineering Coimbatore India
Water is more essential for all living organisms in this world. The amount of rainfall in the forest is reducing rapidly while the need has increased. During summer the water shortage rises acutely in the forest areas... 详细信息
来源: 评论
Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security  5th
Deep Learning Approach for Intelligent Named Entity Recognit...
收藏 引用
5th International Symposium on Signal Processing and Intelligent Recognition Systems, SIRS 2019
作者: Simran, K. Sriram, S. Vinayakumar, R. Soman, K.P. Center for Computational Engineering and Networking Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India Division of Biomedical Informatics Cincinnati Children’s Hospital Medical Centre CincinnatiOH United States
In recent years, the amount of Cyber Security data generated in the form of unstructured texts, for example, social media resources, blogs, articles, and so on has exceptionally increased. Named Entity Recognition (NE... 详细信息
来源: 评论
Effect of Annotation and Loss Function on Epiphyte Identification using Conditional Generative Adversarial Network
Effect of Annotation and Loss Function on Epiphyte Identific...
收藏 引用
Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), International Conference on
作者: S. Aswin V.V. Sajithvariyar Ramesh Sivanpillai V. Sowmya Gregory K Brown A. Shashank K. P. Soman Center for Computational Engineering and Networking Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India Wyoming GIS Center University of Wyoming Laramie WY USA University of Wyoming Laramie WY USA
The deep neural networks are capable of processing large amounts of data for image processing applications like classification, segmentation and identification etc. Conditional- Generative Adversarial Network (C-GAN) ... 详细信息
来源: 评论
DCNN-IDS: Deep Convolutional Neural Network Based Intrusion Detection System  4th
DCNN-IDS: Deep Convolutional Neural Network Based Intrusion ...
收藏 引用
4th International Conference on computational Intelligence, Cyber Security, and computational Models, ICC3 2019
作者: Sriram, S. Shashank, A. Vinayakumar, R. Soman, K.P. Center for Computational Engineering and Networking Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India Division of Biomedical Informatics Cincinnati Children’s Hospital Medical Centre CincinnatiOH United States
In the present era, cyberspace is growing tremendously and the intrusion detection system (IDS) plays a key role in it to ensure information security. The IDS, which works in network and host level, should be capable ... 详细信息
来源: 评论
Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment  1
收藏 引用
7th International Symposium on Security in Computing and Communications, SSCC 2019
作者: Sriram, S. Simran, K. Vinayakumar, R. Akarsh, S. Soman, K.P. Center for Computational Engineering and Networking Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India Division of Biomedical Informatics Cincinnati Children’s Hospital Medical Centre CincinnatiOH United States
Network Intrusion Detection System (NIDS) is a method that is utilized to categorize network traffic as malicious or normal. Anomaly-based method and signature-based method are the traditional approaches used for netw... 详细信息
来源: 评论
Addressing Sanitation and Health challenges in rural India through socio-technological interventions: A Case Study in Odisha  9
Addressing Sanitation and Health challenges in rural India t...
收藏 引用
9th Edition of IEEE Region 10 Humanitarian Technology Conference, R10-HTC 2021
作者: Rengaraj, Vineeth Simmon, Ajay Vikash, S. Zel, Rosy Adhikari, Hemantha Sherpa, Pemba Geetha, P. Cornet, Souresh Amrita Vishwa Vidyapeetham Department of Civil Engineering Coimbatore India Amrita Vishwa Vidyapeetham Department of Mechanical Engineering Coimbatore India Amrita Vishwa Vidyapeetham Department of Electronics and Communications Engineering Coimbatore India University At Buffalo Community For Global Health Equity BuffaloNY United States Center For Computational Engineering and Networking Amrita Vishwa Vidyapeetham Coimbatore India Amrita School For Sustainable Development Amrita Vishwa Vidyapeetham Amritapuri India
The Government of India's Swachh Bharat Mission has augmented access to sanitation in rural India. Despite notable progress, many communities still practice Open Defecation (OD). This paper reports on a 2-year stu... 详细信息
来源: 评论