咨询与建议

限定检索结果

文献类型

  • 1,218 篇 会议
  • 37 篇 期刊文献

馆藏范围

  • 1,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 551 篇 计算机科学与技术...
    • 456 篇 软件工程
    • 225 篇 信息与通信工程
    • 126 篇 控制科学与工程
    • 96 篇 电气工程
    • 94 篇 生物工程
    • 90 篇 生物医学工程(可授...
    • 73 篇 电子科学与技术(可...
    • 69 篇 网络空间安全
    • 53 篇 光学工程
    • 46 篇 安全科学与工程
    • 34 篇 仪器科学与技术
    • 32 篇 机械工程
    • 30 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 27 篇 交通运输工程
  • 368 篇 理学
    • 226 篇 数学
    • 114 篇 统计学(可授理学、...
    • 102 篇 生物学
    • 54 篇 物理学
    • 33 篇 化学
    • 29 篇 系统科学
  • 242 篇 管理学
    • 167 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 85 篇 医学
    • 80 篇 基础医学(可授医学...
    • 79 篇 临床医学
    • 43 篇 公共卫生与预防医...
    • 43 篇 药学(可授医学、理...
  • 39 篇 法学
    • 36 篇 社会学
  • 25 篇 经济学
  • 21 篇 农学
  • 7 篇 教育学
  • 3 篇 军事学

主题

  • 177 篇 feature extracti...
  • 165 篇 accuracy
  • 113 篇 convolutional ne...
  • 79 篇 deep learning
  • 60 篇 optimization
  • 55 篇 support vector m...
  • 54 篇 computational mo...
  • 51 篇 internet of thin...
  • 51 篇 predictive model...
  • 38 篇 real-time system...
  • 38 篇 data models
  • 36 篇 long short term ...
  • 35 篇 training
  • 33 篇 machine learning
  • 31 篇 classification a...
  • 26 篇 visualization
  • 26 篇 security
  • 25 篇 prediction algor...
  • 25 篇 measurement
  • 25 篇 adaptation model...

机构

  • 211 篇 department of co...
  • 139 篇 department of el...
  • 117 篇 the islamic univ...
  • 98 篇 nitte meenakshi ...
  • 87 篇 school of comput...
  • 82 篇 the islamic univ...
  • 58 篇 sr university sc...
  • 53 篇 college of techn...
  • 44 篇 school of comput...
  • 40 篇 department of co...
  • 36 篇 department of ec...
  • 33 篇 nitte meenakshi ...
  • 33 篇 nitte meenakshi ...
  • 31 篇 nitte meenakshi ...
  • 29 篇 department of ar...
  • 28 篇 school of comput...
  • 26 篇 east west instit...
  • 26 篇 department of co...
  • 26 篇 sr university sc...
  • 25 篇 department of co...

作者

  • 74 篇 piyush kumar par...
  • 73 篇 pareek piyush ku...
  • 24 篇 ramachandra a.c.
  • 23 篇 muntather almusa...
  • 23 篇 almusawi muntath...
  • 22 篇 ramachandra a c
  • 21 篇 parameshachari b...
  • 20 篇 myasar mundher a...
  • 20 篇 srinivas aluvala
  • 20 篇 aluvala srinivas
  • 19 篇 al-jawahry hassa...
  • 18 篇 alabdeli haider
  • 18 篇 hassan m. al-jaw...
  • 18 篇 adnan myasar mun...
  • 18 篇 haider alabdeli
  • 17 篇 mohammed i. habe...
  • 16 篇 mohammed al-faro...
  • 16 篇 nalini n.
  • 15 篇 sundaram s. meen...
  • 15 篇 alzubaidi laith ...

语言

  • 902 篇 英文
  • 352 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Science and Engineering Nitte Meenakshi Intitute of Technology"
1255 条 记 录,以下是701-710 订阅
排序:
A Novel Image Encryption Optimization Technique
A Novel Image Encryption Optimization Technique
收藏 引用
2021 International Conference on Forensics, Analytics, Big Data, Security, FABS 2021
作者: Gollagi, Shantappa G Srividya, R Santhosh Kumar, G Pareek, Piyush Kumar Hirasugar Institute of Technology Computer Science and Engineering Nidasoshi India Cmr Institute of Technology Information Science and Engineering Bengaluru India East West College of Engineering Bengaluru India Nitte Meenakshi Institute of Technology Computer Science and Engineering Bengaluru India
Image file confidentiality is a difficult issue these days for a variety of reasons in a range of industries, including medical, defence, academia, and many more. A range of practical ways have been studied in recent ... 详细信息
来源: 评论
A New Method of Secure Image Encryption by Using Enhanced RSA Algorithm
A New Method of Secure Image Encryption by Using Enhanced RS...
收藏 引用
2021 International Conference on Forensics, Analytics, Big Data, Security, FABS 2021
作者: Gollagi, Shantappa G Srividya, R Santhosh Kumar, G Pareek, Piyush Kumar Hirasugar Institute of Technology Computer Science and Engineering Nidasoshi India Cmr Institute of Technology Information Science and Engineering Bengaluru India East West College of Engineering Bengaluru India Nitte Meenakshi Institute of Technology Computer Science and Engineering Bengaluru India
The images are playing a key role in diverse areas worldwide as these images contains vast amount of essential data. The secrecy as well as privacy of the images has become an immeasurable challenge that demands more ... 详细信息
来源: 评论
Improved Gated Recurrent Unit Based Network Traffic Anomaly Detection
Improved Gated Recurrent Unit Based Network Traffic Anomaly ...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Layth Hussein Jasim P Nagarathna Yada Sunitha V Lekha R. Padmavathy Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Computer Science Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering CVR College of Engineering Hyderabad India Department of Computer Science and Engineering Dhanalakshmi Srinivasan College of Engineering Technology Mamallapuram India Department of Electronics and Communication Engineering New Prince Shri Bhavani College of Engineering and Technology Chennai India
The detection of unpredicted events or rare patterns in traffic data plays an important role in intelligence traffic management, that offers alerts of incidents. To address the problem of less accuracy in industrial n... 详细信息
来源: 评论
Design of Software engineering Approach’s for web learning applications using Cloud Computing
Design of Software Engineering Approach’s for web learning ...
收藏 引用
North Karnataka Subsection Flagship International Conference (NKCon), IEEE
作者: N. Sreenivasa P. Ramesh Naidu Naresh E Chandrakala B M Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bengaluru Karnataka India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India Department of Information Science and Engineering Dayanandasagar College of Engineering Kumaraswamy Layout Bengaluru
Over the years, Cloud computing has significantly influenced various sectors, including Web learning, as education is considered crucial for individual and national growth. The primary objective is to develop an Appli... 详细信息
来源: 评论
Clustering Based Segmentation with 1D-CNN Model for Grape Fruit Disease Detection
Clustering Based Segmentation with 1D-CNN Model for Grape Fr...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Piyush Kumar Pareek Ramya I M Jagadeesh B N LeenaShruthi H M Department of Artificial Intelligence and Machine Learning Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering East West Institute of Technology Bengaluru India
There has been a lot of focus on agricultural image dispensation research in the previous years. computers employ image processing procedures to do picture analysis. Recent technological advances in the fields of pict... 详细信息
来源: 评论
Ensuring Dataset Accountability in Machine Learning: Insights from Software engineering
Ensuring Dataset Accountability in Machine Learning: Insight...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Veeranna Kotagi Vinay Kumar Nassa Dipti Patil Rajashree Gadhave Sri Bhargav Krishna Adusumilli Pitcheri Praveen Kumar Information Science and Engineering NITTE Meenakshi Institute Of Technology Bangalore Computer Science Engineering Bharat institute of Engg. & Technology Hyderabad Telangana Computer Engineering Pillai HOC College of Engineering and Technology Rasayani Maharashtra Computer Engineering Pillai HOC college of Engineering and Technology University of Mumbai Mumbai Maharashtra Computer Science Engineering San Francisco Bay University Fremont CA USA Electronic and Communication Engineering Anurag University Hyderabad Telangana
Machine learning is facing a crisis of accountability. On some tasks, deep learning can match or surpass human performance. It is extensive This work may be reproduced in whole or in part, for educational or personal ... 详细信息
来源: 评论
An Innovative Method for Snatch Theft Detection Using Convolutional LSTM-Auto Encoder Approach
An Innovative Method for Snatch Theft Detection Using Convol...
收藏 引用
2023 International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2023
作者: Konda Reddy, Gondi Reddy Esanakula, Jayakiran Prajna, K.B. Chandra Purohit, Kamlesh Kaliappan, S. Maranan, Ramya Sreenidhi Institute of Science and Technology Department of Mechanical Engineering Telangana Hyderabad India Nitte Meenakshi Institute of Technology Department of Electronics and Communication Karnataka Bengaluru India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India Lovely Professional University Division of Research and Development Punjab Phagwara144411 India Saveetha School of Engineering Simats Department of Research and Innovation Tamil Nadu Chennai India
Urban areas frequently experience snatch stealing, a severe threat to public safety. It entails forcibly seizing a victim's personal items, including purses or cell phones, before scurrying away from the scene. Du... 详细信息
来源: 评论
Implementation Of The NIST Algorithm For IPsec
Implementation Of The NIST Algorithm For IPsec
收藏 引用
North Karnataka Subsection Flagship International Conference (NKCon), IEEE
作者: Devesh Mirani Harsh Kumar Harshil Dhingra Harshitha SA Vijaya Shetty S SarojaDevi H Amitabh Srivastav Deepak Honahalli Computer Science and Engineering Department Nitte Meenakshi Institute of Technology Bengaluru India Unisys Bengaluru India
From ancient times cryptography has been used for encoding and delivering messages safely with advancements in technologies cryptography is used now all over the internet and over all types of files for encryption. Wi... 详细信息
来源: 评论
Sliced Bidirectional Gated Recurrent Unit with Sparrow Search Optimizer for Detecting the Attacks in IoT Environment
Sliced Bidirectional Gated Recurrent Unit with Sparrow Searc...
收藏 引用
Distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE International Conference on
作者: Sureka R. Gondkar Siva Balan R V Kavitha S Raju Ramakrishna Gondkar Department of Electronic and Communication Engineering BMS Institute of Technology and Management Bangalore India Department of Computer Science CHRIST (Deemed-to-be-University) Bangalore India Department of MCA Nitte Meenakshi Institute of Technology Bangalore India
In an era characterized by pervasive interconnectivity facilitated by the widespread adoption of Internet of Things (IoT) devices across diverse domains, novel cybersecurity challenges have emerged, underscoring the i... 详细信息
来源: 评论
Smart Agriculture in the Era of Big Data: IoT-Assisted Pest Forecasting and Resource Optimization for Sustainable Farming
Smart Agriculture in the Era of Big Data: IoT-Assisted Pest ...
收藏 引用
Integrated Intelligence and Communication Systems (ICIICS), International Conference on
作者: Deepak Kumar Priyanka Pramod Pawar Mohan Kumar Meesala Piyush Kumar Pareek Santosh Reddy Addula Shwetha K S Department of Information Technology University of the Cumberlands Williamsburg USA Department of Artificial Intelligence & Machine Learning Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering Dayananda Sagar College of Engineering Bangalore India
The goal was to facilitate quick development and revitalisation of rural areas by utilising IoT knowledge to accomplish smart agriculture against the backdrop of big data. Depleted soil fertility, increased pest attac... 详细信息
来源: 评论