咨询与建议

限定检索结果

文献类型

  • 1,195 篇 会议
  • 37 篇 期刊文献

馆藏范围

  • 1,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 551 篇 计算机科学与技术...
    • 455 篇 软件工程
    • 225 篇 信息与通信工程
    • 125 篇 控制科学与工程
    • 96 篇 电气工程
    • 94 篇 生物工程
    • 91 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 69 篇 网络空间安全
    • 53 篇 光学工程
    • 46 篇 安全科学与工程
    • 34 篇 仪器科学与技术
    • 32 篇 机械工程
    • 30 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 27 篇 交通运输工程
  • 368 篇 理学
    • 226 篇 数学
    • 114 篇 统计学(可授理学、...
    • 102 篇 生物学
    • 54 篇 物理学
    • 33 篇 化学
    • 29 篇 系统科学
  • 241 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 85 篇 医学
    • 80 篇 基础医学(可授医学...
    • 79 篇 临床医学
    • 43 篇 公共卫生与预防医...
    • 43 篇 药学(可授医学、理...
  • 39 篇 法学
    • 36 篇 社会学
  • 25 篇 经济学
  • 21 篇 农学
  • 7 篇 教育学
  • 3 篇 军事学

主题

  • 165 篇 feature extracti...
  • 157 篇 accuracy
  • 108 篇 convolutional ne...
  • 80 篇 deep learning
  • 54 篇 optimization
  • 51 篇 support vector m...
  • 50 篇 predictive model...
  • 49 篇 internet of thin...
  • 42 篇 computational mo...
  • 35 篇 training
  • 34 篇 long short term ...
  • 33 篇 real-time system...
  • 33 篇 machine learning
  • 33 篇 data models
  • 31 篇 classification a...
  • 25 篇 security
  • 25 篇 prediction algor...
  • 25 篇 measurement
  • 24 篇 visualization
  • 24 篇 network security

机构

  • 194 篇 department of co...
  • 135 篇 department of el...
  • 117 篇 the islamic univ...
  • 98 篇 nitte meenakshi ...
  • 87 篇 school of comput...
  • 82 篇 the islamic univ...
  • 58 篇 sr university sc...
  • 53 篇 college of techn...
  • 44 篇 school of comput...
  • 37 篇 department of co...
  • 36 篇 department of ec...
  • 33 篇 nitte meenakshi ...
  • 33 篇 nitte meenakshi ...
  • 31 篇 nitte meenakshi ...
  • 28 篇 department of ar...
  • 28 篇 school of comput...
  • 26 篇 east west instit...
  • 26 篇 department of co...
  • 26 篇 sr university sc...
  • 25 篇 department of co...

作者

  • 74 篇 piyush kumar par...
  • 73 篇 pareek piyush ku...
  • 24 篇 ramachandra a.c.
  • 23 篇 muntather almusa...
  • 23 篇 almusawi muntath...
  • 21 篇 ramachandra a c
  • 21 篇 parameshachari b...
  • 20 篇 myasar mundher a...
  • 20 篇 srinivas aluvala
  • 20 篇 aluvala srinivas
  • 19 篇 al-jawahry hassa...
  • 18 篇 alabdeli haider
  • 18 篇 hassan m. al-jaw...
  • 18 篇 adnan myasar mun...
  • 18 篇 haider alabdeli
  • 16 篇 mohammed al-faro...
  • 16 篇 nalini n.
  • 15 篇 sundaram s. meen...
  • 15 篇 alzubaidi laith ...
  • 15 篇 mohammed i. habe...

语言

  • 1,055 篇 英文
  • 177 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Science and Engineering Nitte Meenakshi Intitute of Technology"
1232 条 记 录,以下是1131-1140 订阅
排序:
Empirical Analysis of Energy Harvesting and Clustering Methods for D2D Communication Systems
Empirical Analysis of Energy Harvesting and Clustering Metho...
收藏 引用
Evolutionary Algorithms and Soft Computing Techniques (EASCT), International Conference on
作者: Bura Vijay Kumar R. Vijayarangan V. Thirumurugan S. Sugumaran Raghunathareddy M V School of Computer Science and Artificial Intelligence SR University Warangal India CSE RVT Research Associates Chennai India CSE VISTAS Chennai India ECE Department Vishnu Institute of Technology Bhimavaram India Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India
Unmanned Aerial vehicle (UAV)-based post-disaster communications face significant problems due to their energy consumption and operational range. Energy harvesting is used to overcome these problems by providing power...
来源: 评论
Circle Search Algorithm with Convolutional Neural Network for Distributed Denial-of-Service Attack Detection in Software-Defined Networks
Circle Search Algorithm with Convolutional Neural Network fo...
收藏 引用
Distributed Systems, computer Networks and Cybersecurity (ICDSCNC), International Conference on
作者: S. Padmakala Hassan M. Al-Jawahry R. Palanivel Y.M. Mahaboob John Arelli Madhavi Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of AI & DS Nitte Meenakshi Institute of Technology Bengaluru India Department of ECE Mahendra College of Engineering Salem India Department of AI&ML Gokaraju Rangaraju Institute of Engineering and Technology Hyderabad India
The Distributed Denial-of-Service (DDoS) attack is a crucial cybersecurity threat for Software-Defined Network (SDN). However, DDoS in SDN severely affect network availability which reduces the classifier performance.... 详细信息
来源: 评论
Selective Kernel Spatial Feature Extraction based Deep Learning Approach for Identification and Classification of Archaeological Sites
Selective Kernel Spatial Feature Extraction based Deep Learn...
收藏 引用
Intelligent Algorithms for Computational Intelligence Systems (IACIS), International Conference on
作者: Sri Lavanya Sajja Zaid Alsalami G Sunil Sunil Kumar V Ghazi Mohamad Ramadan Malla Reddy Engineering College for Women Secunderabad India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq School of Computer Science & Artificial Intelligence SR University Warangal India Dept. of AI and ML Nitte Meenakshi Institute of Technology Bengaluru India College of MLT Ahl Al Bayt University Karbala Iraq
Deep Learning (DL) based identification and classification of archaeological sites are being used progressively from satellite images obtained from Geographic Information System (GIS). Even though, there were promisin... 详细信息
来源: 评论
Signal Quality Evaluation and Processing for QRS Detection in ECG based Smart Healthcare Systems
Signal Quality Evaluation and Processing for QRS Detection i...
收藏 引用
Knowledge engineering and Communication Systems (ICKECS), International Conference on
作者: Devendra Singh ShaikVaseem Akram T Sivakumar U. Prakash J Loyola Jasmine Chaithra K N Uttaranchal University Dehradun India Department of Computer Science and Engineering KPR Institute of Engineering and Technology Coimbatore India Department of Information Technology Sri Eshwar College of Engineering Coimbatore India Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil India Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India
The next-generation wearable electrocardiogram (ECG) equipment requires signal processing with low battery usage in order to transmit signals when harmful rhythms are recognized and to capture signals when anomalous r... 详细信息
来源: 评论
Predicting and Managing Medication Adherence Using Random Forest with Light Gradient Boosting Method and Mobile Health Data
Predicting and Managing Medication Adherence Using Random Fo...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE International Conference on
作者: Rana Veer Samara Sihman Bharattej R Haider Alabdeli Shashidhara K S M. Mumjitha Hirald Dwaraka Praveena Department of Computer Science Saint Leo University FL USA Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India Department of Chemistry New Prince Shri Bhavani College of Engineering and Technology Chennai India Department of Electronics and Communication Engineering School of Engineering Mohan Babu University (Erstwhile Sree Vidya nikethan Engineering College) Tirupati India
In recent years, the importance of medication adherence is increased healthcare industry as prevalence of chronic diseases, like diabetes, hypertension, and asthma has improved. The traditional models failed in provid... 详细信息
来源: 评论
Ant Colony Optimization in MANET for Decreasing Energy Consumption with ML Approaches
Ant Colony Optimization in MANET for Decreasing Energy Consu...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Suresha P Gayatri Math Siddapuram Arvind M Bhaskar Naveen I G Department of Mechanical Engineering S.E.A College of Engineering and Technology Bengaluru India Department of Electronics & Communication Engg HKE society's B.V. Bhoomaraddi college of Arts science and commerce Degree college Bidar India Department of Computer Science & Engineering Hyderabad Institute of Technology and Management Telangana India Department of Computer Science & Engineering K L University Vadeeshwaram Vijayawada India Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India
To coordinate access from the active nodes, MAC protocols are used in ad hoc networks. Many media access control (MAC) protocols have been suggested for use in ad hoc networks, each with its own unique set of goals. T... 详细信息
来源: 评论
Levy Flight Strategy with Chicken Swarm Optimization Algorithm for Real-Time Anomaly Detection in Cybersecurity
Levy Flight Strategy with Chicken Swarm Optimization Algorit...
收藏 引用
Distributed Systems, computer Networks and Cybersecurity (ICDSCNC), International Conference on
作者: Mallubhotla Syamala SaiSree Subramanya S G Sripelli Jagadish S. Sureshkumar Mohammed Al-Farouni Mallareddy Engineering College for Women (UGC-Autonoumous) Hyderabad India Department of CSE Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science & Artificial Intelligence SR University Warangal India Department of CSE Kalasalingam Academy of Research and Education Krishnankoil India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq
The cybersecurity field has witnessed several Intrusion Detection System (IDS) and Anomaly Detection, which are essential for identifying malicious activities in network traffic. However, growing volume and diversity ... 详细信息
来源: 评论
Image Manipulation Detection and Classification Using SIFT and SURF with Support Vector Machine Classifier
Image Manipulation Detection and Classification Using SIFT a...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE International Conference on
作者: Ghazi Mohamad Ramadan Zamen Latef Naser Sripelli Jagadish Rekha Phadke Muntather Almusawi College of MLT Ahl Al Bayt University Karbala Iraq National University of Science and Technology Dhi Qar Iraq School of Computer Science & Artificial Intelligence SR University Warangal Telangana India Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India The Islamic University Najaf Iraq
Enhance digital trust and integrity by mastering image forgery detection in machine learning. Uncover the hidden truth behind visuals, ensuring authenticity in a world inundated with digital content. Various image man...
来源: 评论
A Reinforcement Learning Method in Cooperative Multi-Agent System for Production Control System
A Reinforcement Learning Method in Cooperative Multi-Agent S...
收藏 引用
Data science and Network Security (ICDSNS), International Conference on
作者: V. Malathy Hassan M. Al-Jawahry Madhura G K G. Suganya Rashmi P Department of ECE SR University Waranga India Department of Computers Techniques Engineering College of Technical Engineering The Islamic university Najaf Iraq Department of Artificial intelligence and Machine learning Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science Dr. SNS Rajalakshmi College of Arts and Science Coimbatore India Inventuriz Labs Private Ltd Bengaluru India
Nowadays, in various domains including distributed control, telecommunication, robotics and economics to address the problems, Multi-Agent Systems (MAS) is used. To solve with preprogrammed agent behavior complexity o... 详细信息
来源: 评论
Intrusion Detection in IoT Environment Using Stochastic Gradient Descent with Warm Restarts and Gated Recurrent Unit
Intrusion Detection in IoT Environment Using Stochastic Grad...
收藏 引用
Data science and Network Security (ICDSNS), International Conference on
作者: Revatthy Krishnamurthy Haider Alabdeli Rajani N Vankudoth Ramesh Bura Vijay Kumar Department of Artificial Intelligence & Machine Learning Rajalakshmi Engineering College Chennai India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Dept. of ECE Nitte Meenakshi Institute of Technology Bengaluru India Department of CSE-DS CVR College of Engineering Mangalpalle India School of Computer Science and Artificial Intelligence SR University Warangal India
The rapid growth of Internet of Things (IoT) has attracted the cybercriminals which resulted in increase of cyber-attacks on IoT devices. If the cyber-attacks are undetected for a longer time, it causes serious servic... 详细信息
来源: 评论