咨询与建议

限定检索结果

文献类型

  • 1,195 篇 会议
  • 37 篇 期刊文献

馆藏范围

  • 1,232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 551 篇 计算机科学与技术...
    • 455 篇 软件工程
    • 225 篇 信息与通信工程
    • 125 篇 控制科学与工程
    • 96 篇 电气工程
    • 94 篇 生物工程
    • 91 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 69 篇 网络空间安全
    • 53 篇 光学工程
    • 46 篇 安全科学与工程
    • 34 篇 仪器科学与技术
    • 32 篇 机械工程
    • 30 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 27 篇 交通运输工程
  • 368 篇 理学
    • 226 篇 数学
    • 114 篇 统计学(可授理学、...
    • 102 篇 生物学
    • 54 篇 物理学
    • 33 篇 化学
    • 29 篇 系统科学
  • 241 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 85 篇 医学
    • 80 篇 基础医学(可授医学...
    • 79 篇 临床医学
    • 43 篇 公共卫生与预防医...
    • 43 篇 药学(可授医学、理...
  • 39 篇 法学
    • 36 篇 社会学
  • 25 篇 经济学
  • 21 篇 农学
  • 7 篇 教育学
  • 3 篇 军事学

主题

  • 165 篇 feature extracti...
  • 157 篇 accuracy
  • 108 篇 convolutional ne...
  • 80 篇 deep learning
  • 54 篇 optimization
  • 51 篇 support vector m...
  • 50 篇 predictive model...
  • 49 篇 internet of thin...
  • 42 篇 computational mo...
  • 35 篇 training
  • 34 篇 long short term ...
  • 33 篇 real-time system...
  • 33 篇 machine learning
  • 33 篇 data models
  • 31 篇 classification a...
  • 25 篇 security
  • 25 篇 prediction algor...
  • 25 篇 measurement
  • 24 篇 visualization
  • 24 篇 network security

机构

  • 194 篇 department of co...
  • 135 篇 department of el...
  • 117 篇 the islamic univ...
  • 98 篇 nitte meenakshi ...
  • 87 篇 school of comput...
  • 82 篇 the islamic univ...
  • 58 篇 sr university sc...
  • 53 篇 college of techn...
  • 44 篇 school of comput...
  • 37 篇 department of co...
  • 36 篇 department of ec...
  • 33 篇 nitte meenakshi ...
  • 33 篇 nitte meenakshi ...
  • 31 篇 nitte meenakshi ...
  • 28 篇 department of ar...
  • 28 篇 school of comput...
  • 26 篇 east west instit...
  • 26 篇 department of co...
  • 26 篇 sr university sc...
  • 25 篇 department of co...

作者

  • 74 篇 piyush kumar par...
  • 73 篇 pareek piyush ku...
  • 24 篇 ramachandra a.c.
  • 23 篇 muntather almusa...
  • 23 篇 almusawi muntath...
  • 21 篇 ramachandra a c
  • 21 篇 parameshachari b...
  • 20 篇 myasar mundher a...
  • 20 篇 srinivas aluvala
  • 20 篇 aluvala srinivas
  • 19 篇 al-jawahry hassa...
  • 18 篇 alabdeli haider
  • 18 篇 hassan m. al-jaw...
  • 18 篇 adnan myasar mun...
  • 18 篇 haider alabdeli
  • 16 篇 mohammed al-faro...
  • 16 篇 nalini n.
  • 15 篇 sundaram s. meen...
  • 15 篇 alzubaidi laith ...
  • 15 篇 mohammed i. habe...

语言

  • 1,055 篇 英文
  • 177 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Science and Engineering Nitte Meenakshi Intitute of Technology"
1232 条 记 录,以下是301-310 订阅
排序:
Decentralized Intrusion Detection in Peer-to-Peer Networks using Stacking Ensemble Model  1
Decentralized Intrusion Detection in Peer-to-Peer Networks u...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Devi, R. Renuga Riadhusin, Rame Anu, D. Swarnateja, R. Revathi, R. Srm Institute of Science and Technology Department of Computer Science and Applications Ramapuram India The Islamic University of Al Diwaniyah College of Technical Engineering Department of Computers Techniques Engineering Al Diwaniyah Iraq Nitte Meenakshi Institute of Technology Department of Artificial Intelligence and Data Science Bengaluru India Dhanalakshmi Srinivasan College of Engineering and Technology Department of Information Technology Mamallapuram India New Prince Shri Bhavani College of Engineering and Technology Department of Electrical and Electronics Engineering Chennai India
In recent years, due to the rise in Peer to Peer (P2P) networks has brought a significant way in which the data is shared and services are offered over the internet. These P2P networks make use of decentralized archit... 详细信息
来源: 评论
Prediction of Employee Attrition Classification and Retention Strategies using Gradient Boosting with Binary Logistic Regression  2
Prediction of Employee Attrition Classification and Retentio...
收藏 引用
2nd IEEE International Conference on Integrated Intelligence and Communication Systems, ICIICS 2024
作者: Mamatha Bai, B.G. Hassan, Muntather Muhsin Sri, B. Aruna Latha, P. Vinola, F. Anitha Florence Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bengaluru India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Maisammaguda Hyderabad India Department of Information Technology SSM College of Engineering Namakkal India Department of Mathematics New Prince Shri Bhavani College of Engineering and Technology Chennai India
A voluntary or involuntary parting of an employee from an organization is known as and the strategies to maintain an employee are known as Employee attrition (turnover) and retention. Employee attrition and retention ... 详细信息
来源: 评论
Convolutional Neural Network Based Glaucoma Detection and Classification using Optic Disc Localization  2
Convolutional Neural Network Based Glaucoma Detection and Cl...
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2024
作者: Neelagar, Mahesh B Manjunath, T.C. Patra, Raj Kumar Jagadish, Sripelli Mazumder, Debarshi Visvesvaraya Technological University Dayanand College of Engineering Bengaluru Department of ECE Karnataka Belgavi India CMR Technical Campus Department of Computer Science and Engineering Hyderabad India SR University School of Computer Science and Artificial Intelligence Warangal India Nitte Meenakshi Institute of Technology Department of AI and DS Bengaluru India
Glaucoma in the retina is considered a significant cause of irreparable vision loss, and automated glaucoma detection on fundus images has seen the development of several approaches recently. Although early diagnosis ... 详细信息
来源: 评论
Jotter: An Approach to Summarize the Formal Online Meeting
Jotter: An Approach to Summarize the Formal Online Meeting
收藏 引用
Ambient Intelligence, Knowledge Informatics and Industrial Electronics (AIKIIE), International Conference on
作者: Sumedh S Bhat Uzair Ahmed Nawaz Sujay M Nameesha Tantri Vani Vasudevan Computer Science Engineering Nitte Meenakshi Institute of Technology Bengaluru Karnataka India
This paper examines various meeting summarising techniques. It also presents a hybridised technique for meeting summarization that combines abstractive and extractive techniques. Text extraction from meetings is accom...
来源: 评论
Decision Support Method and Risk Analysis Based on Merged-Cyber Security Risk Management  2
Decision Support Method and Risk Analysis Based on Merged-Cy...
收藏 引用
2nd International Conference on Data science and Information System, ICDSIS 2024
作者: Devarajan, Mohanarangan Veerappermal Al-Farouni, Mohammed Srikanteswara, Ramya Rana Veer Samara Sihman Bharattej, R. Kumar, Priyan Malarvizhi Sacramento United States College Of Technical Engineering The Islamic University Department Of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute Of Technology Department Of Computer Science And Engineering Bengaluru India Saint Leo University Department Of Computer Science FL United States University Of North Texas College Of Information Department Of Information Science TX United States
The Cyber Security Risk Management is the essential part in today's business because of quickly changing landscape of threat and presence of developing the cyber-attacks. Developed numerous researches which aim to... 详细信息
来源: 评论
Classifying Network Abnormalities Into Faults and Attacks in Iot-Based Cyber-Physical Systems using Machine Learning  2
Classifying Network Abnormalities Into Faults and Attacks in...
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2024
作者: Kumar, P. Jagdish Alzubaidi, Laith H. Jasim Nagarjuna, N. Deshmukh, Ram Madhura, G.K. AVN Institute of Engineering and Technology Department of Computer Science and Engineering Telangana India The Islamic University Najaf Iraq CVR College of Engineering Department of CSIT Telangana India SR University Department of Electrical and Electronics Engineering Telangana Warangal India Nitte Meenakshi Institute of Technology Department of AI and ML Bengaluru India
Amidst the proliferation of Industry 4.0, the integration of artificial intelligence and smart techniques has emerged as a focal point in discussions surrounding industrial cyber-physical systems (CPS). It is still ve... 详细信息
来源: 评论
Deep Learning and MRI Improve Carotid Arterial Tree Reconstruction
Deep Learning and MRI Improve Carotid Arterial Tree Reconstr...
收藏 引用
2023 International Conference on Data science and Network Security, ICDSNS 2023
作者: Murthy M S, Narasimha Spandan, Gunti Aswani, Inakollu Nayak Bhukya, Shankar Ramachandra, A.C. Bms Institute of Technology and Management Department of Information Science and Engineering Bengaluru India Gst Gitam University Department of Computer Science Bengaluru India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh India Hyderabad India Nitte Meenakshi Institute of Technology Department of Electronics and Communication Engineering Bengaluru India
This study suggests using magnetic resonance imaging (MRI) scan data to segment and rebuild the carotid artery tree using a deep learning-based method. In the proposed method, the UNET architecture is used to divide a... 详细信息
来源: 评论
The Application of Machine Learning Algorithms to the Classification of EEG Signals
The Application of Machine Learning Algorithms to the Classi...
收藏 引用
2023 IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2023
作者: Gurumoorthy, Sasikumar Avikkal, Saritha Rani, M. Radha, K. Rajesh, N. J.J.College of Engineering and Technology Department of Computer Science and Engineering Trichy India Gitam School of Technology Gitam University Department of Computer Science & Engineering India Hyderabad Institute of Technology and Management Department of Electronics and Communication Engineering Telangana India K L University Vadeeshwaram Department of Computer Science & Engineering Vijayawada India Nitte Meenakshi Institute of Technology Department of Electronics and Communication Engineering Bengaluru India
In order to study cognitive states and detect deficiencies in thinking, planning, and judgement, automated cognitive assessment systems have been developed. Having access to the opportunity to collaborate with experts... 详细信息
来源: 评论
Performance Analysis of CPU Utilization in Cloud Environments using Machine Learning Models
Performance Analysis of CPU Utilization in Cloud Environment...
收藏 引用
Distributed Systems, computer Networks and Cybersecurity (ICDSCNC), International Conference on
作者: Archana Naik Kavitha Sooda Karunakara Rai B Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bangalore India Department of Computer Science and Engineering B. M. S. College of Engineering Bangalore India Department of Electronics and Communications Nitte Meenakshi Institute of Technology Bangalore India
Cloud environments offer extensive services, making them a preferred choice for businesses and startups to host and maintain databases. Efficient resource management, including automatic scaling, is crucial for sustai... 详细信息
来源: 评论
Adaptive Weight-based Dollmaker Optimization Algorithm for Energy Efficient clustering and routing in Wireless Sensor Network
Adaptive Weight-based Dollmaker Optimization Algorithm for E...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems, IACIS 2024
作者: Narasimhulu, N. Almusawi, Muntather Kumar, Gotte Ranjith Roy, Upendra B.P. Rajesh, N. Gooty India The Islamic University Najaf Iraq Sr University School of Computer Science & Artificial Intelligence Warangal India Channabasaveshwara Institute of Technology Department of Electronics and Communication Engineering Tumkur Gubbi India Nitte Meenakshi Institute of Technology Department of Electronics and Communication Engineering Bengaluru India
Wireless sensor network (WSN) is a self-optimizing network composed of many small sensor nodes used to monitor a wide range of applications. The main objective of this clustering and routing is to obtain high network ... 详细信息
来源: 评论