咨询与建议

限定检索结果

文献类型

  • 1,195 篇 会议
  • 36 篇 期刊文献

馆藏范围

  • 1,231 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 551 篇 计算机科学与技术...
    • 456 篇 软件工程
    • 225 篇 信息与通信工程
    • 126 篇 控制科学与工程
    • 96 篇 电气工程
    • 94 篇 生物工程
    • 90 篇 生物医学工程(可授...
    • 73 篇 电子科学与技术(可...
    • 69 篇 网络空间安全
    • 53 篇 光学工程
    • 46 篇 安全科学与工程
    • 34 篇 仪器科学与技术
    • 32 篇 机械工程
    • 30 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 27 篇 交通运输工程
  • 368 篇 理学
    • 226 篇 数学
    • 114 篇 统计学(可授理学、...
    • 102 篇 生物学
    • 54 篇 物理学
    • 33 篇 化学
    • 29 篇 系统科学
  • 242 篇 管理学
    • 167 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 85 篇 医学
    • 80 篇 基础医学(可授医学...
    • 79 篇 临床医学
    • 43 篇 公共卫生与预防医...
    • 43 篇 药学(可授医学、理...
  • 39 篇 法学
    • 36 篇 社会学
  • 25 篇 经济学
  • 21 篇 农学
  • 7 篇 教育学
  • 3 篇 军事学

主题

  • 165 篇 feature extracti...
  • 157 篇 accuracy
  • 108 篇 convolutional ne...
  • 79 篇 deep learning
  • 54 篇 optimization
  • 51 篇 support vector m...
  • 50 篇 predictive model...
  • 49 篇 internet of thin...
  • 42 篇 computational mo...
  • 35 篇 training
  • 34 篇 long short term ...
  • 33 篇 real-time system...
  • 33 篇 machine learning
  • 33 篇 data models
  • 31 篇 classification a...
  • 25 篇 security
  • 25 篇 prediction algor...
  • 25 篇 measurement
  • 24 篇 visualization
  • 24 篇 network security

机构

  • 194 篇 department of co...
  • 135 篇 department of el...
  • 117 篇 the islamic univ...
  • 98 篇 nitte meenakshi ...
  • 87 篇 school of comput...
  • 82 篇 the islamic univ...
  • 58 篇 sr university sc...
  • 53 篇 college of techn...
  • 44 篇 school of comput...
  • 37 篇 department of co...
  • 36 篇 department of ec...
  • 33 篇 nitte meenakshi ...
  • 33 篇 nitte meenakshi ...
  • 31 篇 nitte meenakshi ...
  • 28 篇 department of ar...
  • 28 篇 school of comput...
  • 26 篇 east west instit...
  • 26 篇 department of co...
  • 26 篇 sr university sc...
  • 25 篇 department of co...

作者

  • 73 篇 pareek piyush ku...
  • 73 篇 piyush kumar par...
  • 24 篇 ramachandra a.c.
  • 23 篇 muntather almusa...
  • 23 篇 almusawi muntath...
  • 21 篇 ramachandra a c
  • 21 篇 parameshachari b...
  • 20 篇 myasar mundher a...
  • 20 篇 srinivas aluvala
  • 20 篇 aluvala srinivas
  • 19 篇 al-jawahry hassa...
  • 18 篇 alabdeli haider
  • 18 篇 hassan m. al-jaw...
  • 18 篇 adnan myasar mun...
  • 18 篇 haider alabdeli
  • 16 篇 mohammed al-faro...
  • 16 篇 nalini n.
  • 15 篇 sundaram s. meen...
  • 15 篇 alzubaidi laith ...
  • 15 篇 mohammed i. habe...

语言

  • 1,053 篇 英文
  • 177 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Science and Engineering Nitte Meenakshi Intitute of Technology"
1231 条 记 录,以下是631-640 订阅
排序:
IoT Security Detection and Evaluation for Smart Cyber Infrastructures Using LSTMs with Attention Mechanism  3
IoT Security Detection and Evaluation for Smart Cyber Infras...
收藏 引用
3rd IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Pillai, Sanjaikanth E Vadakkethil Somanathan Polimetla, Kiran Prakash, Chidurala Sai Pareek, Piyush Kumar Pawar, Priyanka Pramod School Of Electrical Engineering And Computer Science University Of North Dakota Grand Forks United States Adobe Inc. Dept. Of Information Technology AustinTX United States Sr University Department Of Electrical And Electronics Engineering Warangal India Nitte Meenakshi Institute Of Technology Department Of Aiml And Ipr Cell Bengaluru India University Of The Cumberlands Department Of Information Technology WilliamsburgKY United States
A computer network may be impacted by malware, computer viruses, and other hostile attacks. One of the most important elements of network security as an active defence technology is Intrusion Detection System (IDS). I... 详细信息
来源: 评论
Trust-aware Routing Protocol using Modified Sand Cat Swarm Optimization in Iot-Based WSN
Trust-aware Routing Protocol using Modified Sand Cat Swarm O...
收藏 引用
2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023
作者: Yamsani, Nagendar Anitha, D. Mahaboob John, Y.M. Jamuna Rani, M. Sowmya, M. Sr University School of Computer Science and Artificial Intelligence Warangal India Srm Institute of Science and Technology School of Computing Department of Computational Intelligence Kattankulathur India Mahendra College of Engineering Ece Department Salem India Sona College of Technology Department of Ece Salem India Nitte Meenakshi Institute of Technology Department of Ai and Ds Bengaluru India
The trust-aware secure route selection leverages trust-based metrics for evaluating the credibility of nodes and routes which enables the selection of the most reliable and secure paths for data transmission. Secure r... 详细信息
来源: 评论
Avoidance of Ship Collision Using Deep Reinforcement Learning with Bi-Directional Long Short-Term Memory in Continuous Action Spaces  2
Avoidance of Ship Collision Using Deep Reinforcement Learnin...
收藏 引用
2nd IEEE International Conference on Data science and Network Security, ICDSNS 2024
作者: Krishnamurthy, Revatthy Adnan, Myasar Mundher Sunil Kumar, V. Srinivas, T. Aditya Sai Aluvala, Srinivas Rajalakshmi Engineering College Artificial Intelligence & Machine Learning Department Chennai India College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute of Technology Department of Artificial Intelligence and Machine Learning Bengaluru India Artificial Intelligence and Machine Learning Jayaprakash Naryan College of Engineering Mahabubnagar India School of Computer Science and Engineering Sr University Warangal India
Recent days, with the globalization of the world economy the ships count are increasing for marine transportation and the Waterways are growing increasingly overcrowded than previous. This situation may leads to probl... 详细信息
来源: 评论
Mayfly Optimization Algorithm with Bidirectional Long-Short Term Memory for Intrusion Detection System in Internet of Things  3
Mayfly Optimization Algorithm with Bidirectional Long-Short ...
收藏 引用
3rd IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Pillai, Sanjaikanth E. Vadakkethil Somanathan Polimetla, Kiran Alsalami, Zaid Pareek, Piyush Kumar Kumar, Deepak School Of Electrical Engineering And Computer Science University Of North Dakota Grand Forks United States Adobe Inc. Dept. Of Information Technology AustinTX United States College Of Technical Engineering The Islamic University Department Of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute Of Technology Department Of Aiml And Ipr Cell Bengaluru India University Of The Cumberlands Department Of Information Technology WilliamsburgKY United States
The rapid development of number of connected devices exchange sensitive and personal significant data through Internet of Things (IoT)-assisted global network, attacks which are targeting security services are also en... 详细信息
来源: 评论
Adaptive Voting Mechanism with Artificial Butterfly Algorithm based Feature Selection for IDS in MANET
Adaptive Voting Mechanism with Artificial Butterfly Algorith...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Parameshachari B.D Achyutha Prasad N Dhanraj Manjunath T N Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering East West Institute of Technology Bengaluru India
Mobile ad hoc networks (MANETs) have gained more interest from consumers and academics than ever before thanks to the proliferation of wireless networks and the expansion of the benefits and uses of communication netw... 详细信息
来源: 评论
Enhanced Intrusion Detection System using Pearson Correlation based Long Short-Term Memory
Enhanced Intrusion Detection System using Pearson Correlatio...
收藏 引用
2023 International Conference on Integrated Intelligence and Communication Systems, ICIICS 2023
作者: Phadke, Rekha Kumar, K Sudheer Almusawi, Muntather Baskar, N. Almoussawi, Zainab Abed Nitte Meenakshi Institute of Technology Department of Electronics and Communication Engineering Bengaluru India SR University School of Computer Science & Artificial Intelligence Warangal India The Islamic University Najaf Iraq CSE Malla Reddy Engineering College for Women Hyderabad India Ahl Al Bayt University College of Islamic Science Karbala Iraq
The Intrusion Detection System (IDS) is one of the common deep learning (DL) use cases which is used to finding and identifying outliers to prevent adversarial attacks, fraud and network intrusions. These systems play... 详细信息
来源: 评论
Removing/Minimising Gaussian noise from real time CCTV footages using GAN
Removing/Minimising Gaussian noise from real time CCTV foota...
收藏 引用
Innovations in Communications, Electrical and computer engineering (ICICEC), International Conference on
作者: Prashanth B S Puneeth B H Manoj Kumar M V Sreenivasa B R Adyapadi Suraj Akshay Prashant Hegde Pranava Aithal K S Department of Information Science & Engineering Nitte Meenakshi Institute of Technology Bangalore Karnataka India Department of Computer Science and Business Systems Bapuji Institute of Engineering and Technology Davanagere Karnataka India Department of Computer Science and Design Bapuji Institute of Engineering and Technology Davanagere Karnataka India
This paper describes a system that uses generative adversarial networks (GANs) to eliminate gaussian noise from CCTV of footages. Unwanted noise like gaussian noise frequently degrades the quality of images and makes ... 详细信息
来源: 评论
Design and Development of a safety system for Motorbike incorporated with Artificial Intelligence using Image Processing  2
Design and Development of a safety system for Motorbike inco...
收藏 引用
2nd IEEE Mysore Sub Section International Conference, MysuruCon 2022
作者: Mohanapriya, A. Banu, D. Faridha Abiramasundari, S. Trisheela, S. Sri Eshwar College of Engineering Dept. of Ece India Sri Eshwar College of Engineering Coimbatore India Dr Mahalingam College of Engineering and Technology Dept. of Ece India Nitte Meenakshi Institute of Technology Department of Computer Science & Engineering Bengaluru India
Automobile collisions are consistently ranked among the leading causes of mortality worldwide. Accidents involving bicycles have been dramatically increasing in a wide variety of countries throughout the globe. As a r... 详细信息
来源: 评论
A Rapid Object Recognition Scenario Based on Improved YOLO-V3 Network
A Rapid Object Recognition Scenario Based on Improved YOLO-V...
收藏 引用
2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023
作者: Kumar, Suvarna Sunil Shreenath, K.N. Sunil, G. Vishwanath, P. Shankar, Smitha Sharath Malla Reddy Engineering College for Women It Department Hyderabad India Siddaganga Institute of Technology Department of Cse Tumakuru India School of Computer Science & Artificial Intelligence Sr University Warangal India Sir M. Visvesvaraya College of Engineering Electronics and Communication Engineering Raichur India Nitte Meenakshi Institute of Technology Department of Ece Bengaluru India
The object recognition is an essential field in computer vision which comprises locating and recognizing objects within a given input image. The basic principle of these techniques is utilized to recognize certain obj... 详细信息
来源: 评论
An Energy Efficient and Reliable Strategies for Intra-Cluster and Inter-Cluster Communications in Wireless Sensor Networks
An Energy Efficient and Reliable Strategies for Intra-Cluste...
收藏 引用
2023 IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2023
作者: Balmuri, Kavitha Rani Sujatha, J. Arvind, Sudha Lal, Bechoo Kumari C, Sapna Cmr Technical Campus Department of Information Technology Hyderabad India H. K. E. Society's S. L. N. College of Engineering Department of Computer Science & Engineering Raichur India Cmr Technical Campus Department of Electronics & Communication Engineering Kandlakoya India K L University Vadeeshwaram Department of Computer Science & Engineering Vijayawada India Nitte Meenakshi Institute of Technology Department of Electronics and Communication Engineering Bengaluru India
The development and widespread adoption of numerous wireless technologies are opening the door to novel forms of remote monitoring. Because of their adaptability, performance, low cost, and mobility, sensing devices a... 详细信息
来源: 评论