咨询与建议

限定检索结果

文献类型

  • 1,218 篇 会议
  • 36 篇 期刊文献

馆藏范围

  • 1,254 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 551 篇 计算机科学与技术...
    • 456 篇 软件工程
    • 225 篇 信息与通信工程
    • 126 篇 控制科学与工程
    • 96 篇 电气工程
    • 94 篇 生物工程
    • 90 篇 生物医学工程(可授...
    • 73 篇 电子科学与技术(可...
    • 69 篇 网络空间安全
    • 53 篇 光学工程
    • 46 篇 安全科学与工程
    • 34 篇 仪器科学与技术
    • 32 篇 机械工程
    • 30 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 27 篇 交通运输工程
  • 368 篇 理学
    • 226 篇 数学
    • 114 篇 统计学(可授理学、...
    • 102 篇 生物学
    • 54 篇 物理学
    • 33 篇 化学
    • 29 篇 系统科学
  • 242 篇 管理学
    • 167 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 85 篇 医学
    • 80 篇 基础医学(可授医学...
    • 79 篇 临床医学
    • 43 篇 公共卫生与预防医...
    • 43 篇 药学(可授医学、理...
  • 39 篇 法学
    • 36 篇 社会学
  • 25 篇 经济学
  • 21 篇 农学
  • 7 篇 教育学
  • 3 篇 军事学

主题

  • 177 篇 feature extracti...
  • 165 篇 accuracy
  • 113 篇 convolutional ne...
  • 79 篇 deep learning
  • 60 篇 optimization
  • 55 篇 support vector m...
  • 54 篇 computational mo...
  • 51 篇 internet of thin...
  • 51 篇 predictive model...
  • 38 篇 real-time system...
  • 38 篇 data models
  • 36 篇 long short term ...
  • 35 篇 training
  • 33 篇 machine learning
  • 31 篇 classification a...
  • 26 篇 visualization
  • 26 篇 security
  • 25 篇 prediction algor...
  • 25 篇 measurement
  • 25 篇 adaptation model...

机构

  • 211 篇 department of co...
  • 139 篇 department of el...
  • 117 篇 the islamic univ...
  • 98 篇 nitte meenakshi ...
  • 87 篇 school of comput...
  • 82 篇 the islamic univ...
  • 58 篇 sr university sc...
  • 53 篇 college of techn...
  • 44 篇 school of comput...
  • 40 篇 department of co...
  • 36 篇 department of ec...
  • 33 篇 nitte meenakshi ...
  • 33 篇 nitte meenakshi ...
  • 31 篇 nitte meenakshi ...
  • 29 篇 department of ar...
  • 28 篇 school of comput...
  • 26 篇 east west instit...
  • 26 篇 department of co...
  • 26 篇 sr university sc...
  • 25 篇 department of co...

作者

  • 74 篇 piyush kumar par...
  • 73 篇 pareek piyush ku...
  • 24 篇 ramachandra a.c.
  • 23 篇 muntather almusa...
  • 23 篇 almusawi muntath...
  • 22 篇 ramachandra a c
  • 21 篇 parameshachari b...
  • 20 篇 myasar mundher a...
  • 20 篇 srinivas aluvala
  • 20 篇 aluvala srinivas
  • 19 篇 al-jawahry hassa...
  • 18 篇 alabdeli haider
  • 18 篇 hassan m. al-jaw...
  • 18 篇 adnan myasar mun...
  • 18 篇 haider alabdeli
  • 17 篇 mohammed i. habe...
  • 16 篇 mohammed al-faro...
  • 16 篇 nalini n.
  • 15 篇 sundaram s. meen...
  • 15 篇 alzubaidi laith ...

语言

  • 901 篇 英文
  • 352 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Science and Engineering Nitte Meenakshi Intitute of Technology"
1254 条 记 录,以下是741-750 订阅
排序:
Vortex Search Optimizer based Hybrid Watermarking Scheme for Securing the Medical Images
Vortex Search Optimizer based Hybrid Watermarking Scheme for...
收藏 引用
Mysore Sub Section International Conference (MysuruCon), IEEE
作者: G N Keshava Murthy Nalini B M Madhura G K Nayana S Department of Electronics and Instrumentation Engineering Siddaganga Institute of Technology Tumakuru Karnataka Department of Computer Science and Engineering East West Institute of Technology Bengaluru Artificial Intelligence and Machine Learning Nitte Meenakshi Institute of Technology Bengaluru
Preventing the duplication, modification, and claim of unauthorised ownership of digital content is one of the major issues caused by the growing use of computer capabilities. Watermarking is one way to put a visible ...
来源: 评论
Scheduling the Tasks in Cloud Computing using Adaptive Adjustment in Whale Optimization Algorithm
Scheduling the Tasks in Cloud Computing using Adaptive Adjus...
收藏 引用
Data science and Information System (ICDSIS), IEEE International Conference on
作者: Piyush Kumar Pareek G D Nithyashree S A Rajashekhar Pankaj Zanke K S Navyashree Artificial Intelligence and Machine Learning Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering East West Institute of Technology Bengaluru India Senior Technical Business Analyst Sapiens International Corporation USA
One of the most popular infrastructures for employing virtual machines, also known as processing units, is cloud computing. Task scheduling is fundamental problems of cloud computing. A number of methods to handle the... 详细信息
来源: 评论
SAHARA: A Cloud - based Remote Health - Vitals Monitoring System
SAHARA: A Cloud - based Remote Health - Vitals Monitoring Sy...
收藏 引用
International Conference on Networking, Embedded and Wireless Systems (ICNEWS)
作者: Arbind Kumar Gupta J. Nagaraja Chennagiri Rajarao Padma Mahesh Kumar N Roopa M. S Department of Computer Science and Engineering Dayananda Sagar College of Engineering Bengaluru India Department of Medical Electronics Engineering Dayananda Sagar College of Engineering Bengaluru India Department of Electronics and Communication and Engineering Dayananda Sagar College of Engineering Bengaluru India Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bengaluru India
The healthcare landscape in India, like in many countries, faces disparities between urban and rural areas. While major cities boast advanced medical infrastructure, rural regions struggle with limited healthcare acce... 详细信息
来源: 评论
Anomaly Detection in Network Traffic for Proactive Security Threat Identification Using Improved Gated Recurrent Unit  3
Anomaly Detection in Network Traffic for Proactive Security ...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Yarram, Srimaan Musnmusawi, Muntather Deepika, J. Nagarathna, P. Anandan College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Al Diwaniyah Iraq Sona College of Technology Department of Information Technology Salem India Nitte Meenakshi Institute of Technology Department of Computer Science Bengaluru India Dhanalakshmi Srinivasan College of Engineering Technology Department of Electronics and Communication Engineering Mamallapuram India
Anomaly detection in network traffic determines the unusual patterns which diverge from normal behavior by representing potential system faults and security threats. It assists in identifying cyberattacks, performance... 详细信息
来源: 评论
A Wavelet Transform Algorithm based Detection and Classification of Sleep Apnea for Monitoring of Health
A Wavelet Transform Algorithm based Detection and Classifica...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Beena G Pillai Madhurya J A V Jeevan Babu A Siva Kumar Reddy Ayesha Siddiqua Department of Computer Science & Engineering GITAM School of Technology GITAM University India Department of Computer Science and Engineering Hyderabad Institute of Technology and Management Telangana India Department of Computer Science & Engineering K L University Vadeeshwaram Vijayawada India Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India
One-third of a person's life is spent sleeping, and this physiological phenomenon serves several purposes, such as restoring and maintaining normal brain metabolism, allowing the cardiovascular system to recharge,... 详细信息
来源: 评论
Flexible Hybrid Electronics for Printing of Nano and Chip Scale Structures
Flexible Hybrid Electronics for Printing of Nano and Chip Sc...
收藏 引用
Advances in computer science, Electrical, Electronics, and Communication Technologies (CE2CT), International Conference on
作者: Neelima Singh Radha Gupta Rakesh Kumar Singh Shruthi T S Parbhat Gupta Abhinav Singhal Department of Computer Science and Engineering Uttaranchal University Dehradun India Department of Mathematics Dayananda Sagar College of Engineering Bangalore Computer Science & Engineering IIMT College of Engineering Greater Noida U.P. India Department of Mathematics Nitte Meenakshi Institute of Technology Bangalore Karnataka India SRM Institute of Science and Technology Delhi NCR Campus Modinagar Ghaziabad India Department of Computer Science and Engineering Tula's Institute Dehradun India
Adaptable sensors, circuits, and substrates are joined with unbending electronic parts to make adaptable flexible hybrid electronics (FHE). The printing of nanomaterials has benefits over the costly, multi-step, and b... 详细信息
来源: 评论
An Effective Trusted and Secure based Clustering and Routing using Improved Bat Optimization Algorithm
An Effective Trusted and Secure based Clustering and Routing...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Kassem Al-Attabi Srinivas Aluvala Sarangam Kodati Anu. D Swapna P The Islamic University Najaf Iraq School of Computer Science & Artificial Intelligence SR University Warangal India CVR College of Engineering Hyderabad TS India Department of AI & DS Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering Sree Dattha Institute of Engineering and Science Hyderabad India
Security measures contribute to the overall longevity of the Wireless Sensor Network (WSN) by preventing attacks that could lead to node compromise or depletion of energy resources. WSNs operate in dynamic environment...
来源: 评论
Classification of Network Traffic by using Random Forest based Grid Search for Side-Channel Attacks Detection
Classification of Network Traffic by using Random Forest bas...
收藏 引用
Distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE International Conference on
作者: S Aruna Zayd Ajzan Salami Sasikumar Gurumoorthy Yogesh Ramaswamy Debarshi Mazumder Department of Computational Intelligence School of Computing SRM Institute of Science and Technology Kattankulathur India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Computer Science and Engineering School of Engineering and Technology Dhanalakshmi Srinivasan University Tiruchirappalli India Department of AI & DS Nitte Meenakshi Institute of Technology Bengaluru India
In recent years, the smartphone-based Side-Channel Attacks (SCA) are common in this developing technological world. It exploits unintended information leakage such as extract sensitive information like PINs, passwords... 详细信息
来源: 评论
Anomaly Detection in Industrial Inspection Visual Systems using Swin Transformer with Bayesian Optimization
Anomaly Detection in Industrial Inspection Visual Systems us...
收藏 引用
Distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE International Conference on
作者: Layth Hussein Ramesh Babu N Bhanu Sekhar Guttikonda K. Valarmathi Devara Vasavi Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Mechanical Engineering Nitte Meenakshi Institute of Technology Bangalore India Department of Information Technology S.A. Engineering College Chennai India Department of Computer Science and Engineering SRKR Engineering College Bhimavaram India
In recent years, industrial visual inspection systems have become increasingly essential that recognize defects from normal patterns in images to ensure product quality and identify defective items in manufacturing sy... 详细信息
来源: 评论
Autoencoder-based Temporal Convolutional Network for Real-Time Anomaly Detection in Large-Scale Network Traffic
Autoencoder-based Temporal Convolutional Network for Real-Ti...
收藏 引用
Distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE International Conference on
作者: Rana Veer Samara Sihman Bharattej R Raed Hamyd Mamatha Bai B G Sandeep Reddy Sasikumar Gurumoorthy Doctorate of Business Administration National Louis University FL USA Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bengaluru India School of Computer Science and Engineering Malla Reddy Engineering College for Women (UGC-Autonomous) Hyderabad India Department of Computer Science and Engineering School of Engineering and Technology Dhanalakshmi Srinivasan University Tiruchirappalli India
Nowadays, the rapid growth of network traffic has needed the development of efficient anomaly detection systems to ensure network security and reliability. However, the existing One-Class Support Vector Machine (One-c... 详细信息
来源: 评论