咨询与建议

限定检索结果

文献类型

  • 1,218 篇 会议
  • 37 篇 期刊文献

馆藏范围

  • 1,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 551 篇 计算机科学与技术...
    • 456 篇 软件工程
    • 225 篇 信息与通信工程
    • 126 篇 控制科学与工程
    • 96 篇 电气工程
    • 94 篇 生物工程
    • 90 篇 生物医学工程(可授...
    • 73 篇 电子科学与技术(可...
    • 69 篇 网络空间安全
    • 53 篇 光学工程
    • 46 篇 安全科学与工程
    • 34 篇 仪器科学与技术
    • 32 篇 机械工程
    • 30 篇 动力工程及工程热...
    • 29 篇 化学工程与技术
    • 27 篇 交通运输工程
  • 368 篇 理学
    • 226 篇 数学
    • 114 篇 统计学(可授理学、...
    • 102 篇 生物学
    • 54 篇 物理学
    • 33 篇 化学
    • 29 篇 系统科学
  • 242 篇 管理学
    • 167 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 85 篇 医学
    • 80 篇 基础医学(可授医学...
    • 79 篇 临床医学
    • 43 篇 公共卫生与预防医...
    • 43 篇 药学(可授医学、理...
  • 39 篇 法学
    • 36 篇 社会学
  • 25 篇 经济学
  • 21 篇 农学
  • 7 篇 教育学
  • 3 篇 军事学

主题

  • 177 篇 feature extracti...
  • 165 篇 accuracy
  • 113 篇 convolutional ne...
  • 79 篇 deep learning
  • 60 篇 optimization
  • 55 篇 support vector m...
  • 54 篇 computational mo...
  • 51 篇 internet of thin...
  • 51 篇 predictive model...
  • 38 篇 real-time system...
  • 38 篇 data models
  • 36 篇 long short term ...
  • 35 篇 training
  • 33 篇 machine learning
  • 31 篇 classification a...
  • 26 篇 visualization
  • 26 篇 security
  • 25 篇 prediction algor...
  • 25 篇 measurement
  • 25 篇 adaptation model...

机构

  • 211 篇 department of co...
  • 139 篇 department of el...
  • 117 篇 the islamic univ...
  • 98 篇 nitte meenakshi ...
  • 87 篇 school of comput...
  • 82 篇 the islamic univ...
  • 58 篇 sr university sc...
  • 53 篇 college of techn...
  • 44 篇 school of comput...
  • 40 篇 department of co...
  • 36 篇 department of ec...
  • 33 篇 nitte meenakshi ...
  • 33 篇 nitte meenakshi ...
  • 31 篇 nitte meenakshi ...
  • 29 篇 department of ar...
  • 28 篇 school of comput...
  • 26 篇 east west instit...
  • 26 篇 department of co...
  • 26 篇 sr university sc...
  • 25 篇 department of co...

作者

  • 74 篇 piyush kumar par...
  • 73 篇 pareek piyush ku...
  • 24 篇 ramachandra a.c.
  • 23 篇 muntather almusa...
  • 23 篇 almusawi muntath...
  • 22 篇 ramachandra a c
  • 21 篇 parameshachari b...
  • 20 篇 myasar mundher a...
  • 20 篇 srinivas aluvala
  • 20 篇 aluvala srinivas
  • 19 篇 al-jawahry hassa...
  • 18 篇 alabdeli haider
  • 18 篇 hassan m. al-jaw...
  • 18 篇 adnan myasar mun...
  • 18 篇 haider alabdeli
  • 17 篇 mohammed i. habe...
  • 16 篇 mohammed al-faro...
  • 16 篇 nalini n.
  • 15 篇 sundaram s. meen...
  • 15 篇 alzubaidi laith ...

语言

  • 902 篇 英文
  • 352 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Science and Engineering Nitte Meenakshi Intitute of Technology"
1255 条 记 录,以下是781-790 订阅
排序:
Cost Sensitive based Support Vector Machine for Energy Efficient Clustering and Routing
Cost Sensitive based Support Vector Machine for Energy Effic...
收藏 引用
Distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE International Conference on
作者: Vijaya Bhaskar Reddy Muvva Mohammed I. Habelalmateen V Shridhar Pradeep V Manohar M Department of Information Technology College of Computing and Information Sciences University of Technology and Applied Sciences Shinas Sultanate of Oman Department of Computer Technical Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India Department of Information Science and Engineering Alva's Institute of Engineering and Technology Mangalore India Department of Computer Science and Engineering CHRIST (Deemed to be University) Bangalore India
Wireless Sensor Networks (WSNs) are ideal for applications requiring rapid deployment, as they operate without the need for a pre-existing network infrastructure. WSNs have constrained capacity to manage large volumes... 详细信息
来源: 评论
The People Moods Analysing Using Tweets Data on Primary Things with the Help of Advanced Techniques
The People Moods Analysing Using Tweets Data on Primary Thin...
收藏 引用
Distributed Computing and Optimization Techniques (ICDCOT), International Conference on
作者: Sanjaikanth E Vadakkethil Somanathan Pillai Rohith Vallabhaneni Piyush Kumar Pareek Sravanthi Dontu School of Electrical Engineering and Computer Science University of North Dakota Grand Forks North Dakota USA University of the Cumberlands USA Department of AIML Nitte Meenakshi Institute of Technology Bengaluru India Department of Information Technology University of the Cumberlands USA
Researchers studying sentiment analysis are interested in Twitter, a major social media platform. Text mining research on Twitter Sentiment Analysis (TSA) is growing. Using computers, “TSA” processes subjective Twit...
来源: 评论
Cybersecurity Threat Detection in Smart Cities using Box Plot Sampling Isolation Forest
Cybersecurity Threat Detection in Smart Cities using Box Plo...
收藏 引用
Intelligent Systems and Computational Networks (ICISCN), International Conference on
作者: S. Uma Shankari Haeedir Mohameed Megha Kulkarni S. Aravindh N. Purushotham Department of Computer Science and Applications SRM Institute of Science and Technology Ramapuram India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University of Al Diwaniyah Al Diwaniyah Iraq Department of Civil Engineering Nitte Meenakshi Institute of Technology Bengaluru India Department of Mechanical Engineering New Prince Shri Bhavani College of Engineering and Technology Chennai India Department of Computer Science and Engineering Mohan Babu University Tirupati India
Now a days, the standard of living in urban areas is advanced by leveraging technologies such as Cyber-Physical Systems (CPS) and Internet of Things (IoT) with physical infrastructures. However, smart cities highly re... 详细信息
来源: 评论
Strengthening Cybersecurity using a Hybrid Classification Model with SCO Optimization for Enhanced Network Intrusion Detection System
Strengthening Cybersecurity using a Hybrid Classification Mo...
收藏 引用
Distributed Computing and Optimization Techniques (ICDCOT), International Conference on
作者: Sanjaikanth E Vadakkethil Somanathan Pillai Rohith Vallabhaneni Piyush Kumar Pareek Sravanthi Dontu School of Electrical Engineering and Computer Science University of North Dakota Grand Forks North Dakota USA University of the Cumberlands USA Department of AIML Nitte Meenakshi Institute of Technology Bengaluru India Department of Information Technology University of the Cumberlands USA
Polymorphic malware and encrypted traffic hinder Network Intrusion Detection Systems (NIDS) from detecting complex attacks. Cybercriminals exploit NIDS algorithm vulnerabilities, showing how attack tactics and cyberse...
来源: 评论
Financial Fraudulent Detection using Vortex Search Algorithm based Efficient 1DCNN Classification
Financial Fraudulent Detection using Vortex Search Algorithm...
收藏 引用
Distributed Computing and Optimization Techniques (ICDCOT), International Conference on
作者: Sanjaikanth E Vadakkethil Somanathan Pillai Rohith Vallabhaneni Piyush Kumar Pareek Sravanthi Dontu School of Electrical Engineering and Computer Science University Of North Dakota Grand Forks North Dakota USA University of the Cumberlands USA Department of AIML Nitte Meenakshi Institute of Technology Bengaluru India Department of Information Technology University of the Cumberlands USA
Repeated loan fraud threatens financial stability and drives away clients. Financial and banking institutions must immediately recognize network fraud. The banking sector in India and other countries is using AI-drive...
来源: 评论
Gaussian Bare-Bones Butterfly Optimization Algorithm (GBBOA) based Support Vector Machine (SVM) for Cyberattack Detection in Healthcare
Gaussian Bare-Bones Butterfly Optimization Algorithm (GBBOA)...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Laith H. Alzubaidi Nijaguna G S Syed Nawaz Pasha Veeranna Kotagi K. Kalaiselvi The Islamic University Najaf Iraq Department of Information Science and Engineering S.E.A. College of Engineering and Technology Bangalore India School of Computer Science and Artificial Intelligence SR University Warangal India Department of ISE Nitte Meenakshi Institute of Technology Bengaluru India Department of Electronics and Communication Engineering Hindusthan College of Engineering and Technology Coimbatore India
Usage of Internet of Things (IoT) in medical area is defined as IoMT that plays a signif-icant part in exchanging of sensitive information between medical systems. Though, that comes with privacy securities which comp...
来源: 评论
Histopathology Image Analysis Utilizes Homology-Based Feature Extraction for Accurate Diagnosis of Various Lung Diseases
Histopathology Image Analysis Utilizes Homology-Based Featur...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Haider Alabdeli N Subhash Chandra Sowmya M R. Bhavani Bura Vijay Kumar The Islamic University Najaf Iraq CVR College of Engineering Telangana India Department of AI and DS Nitte Meenakshi Institute of Technology Bengaluru India Sathyabama Institute of Science and Technology Chennai India School of Computer Science and Artificial Intelligence SR University Warangal India
Histopathology image analysis is pivotal for diagnosing lung diseases, providing critical insights into tissue abnormalities for accurate medical assessments. Despite its significance, challenges arise from interpreta...
来源: 评论
An Optimized Elliptical Curve Cryptography based Crypto-Watermarking Model in Smart Healthcare Application
An Optimized Elliptical Curve Cryptography based Crypto-Wate...
收藏 引用
Data science and Information System (ICDSIS), IEEE International Conference on
作者: G N Keshava Murthy Manjula G Harshitha P Achyutha Prasad N Department of Electronics and Instrumentation Engineering Siddaganga Institute of Technology Tumakuru Karnataka India Department of CSE BGS College of Engineering and Technology Bangalore India Artificial Intelligence and Machine Learning Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering East West Institute of Technology Bengaluru India
Telemedicine uses current communication and information technology to provide clinical treatment remotely. Given the ubiquitous usage of DWT and DCT are used for watermarking, ECC-FFA is used for encryption. The only ... 详细信息
来源: 评论
Optimized Convolution Neural Network Based Fake News Detection Using Sentiment Analysis
Optimized Convolution Neural Network Based Fake News Detecti...
收藏 引用
Distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE International Conference on
作者: Sanjaikanth E Vadakkethil Somanathan Pillai Karthik Rajashekaran R. Archana Reddy Piyush Kumar Pareek Dipti Sontakke School of Electrical Engineering and Computer Science University of North Dakota Grand Forks USA Department of Computer Science New York University New York NY USA School of Computer Science and Engineering SR University Warangal Telangana India Department of AIML and IPR Cell Nitte Meenakshi Institute of Technology Bengaluru India Capgemini Inc USA
In the era of social media, the social media and smartphone popularity has enhanced exponentially. By the electronic media, fake news has rising quick with new information which are hugely untrustworthy. The search en... 详细信息
来源: 评论
Predictive Analysis Using Modified Inception Net and Support Vector Machine for Forecasting Copra Yield in Agriculture
Predictive Analysis Using Modified Inception Net and Support...
收藏 引用
Distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE International Conference on
作者: Kavitha M G Raviprakash M L Kassem Al-Attabi B. Sathyavani S meenakshi Sundaram Department of Computer science and engineering Kalpataru Institute of Technology Tiptur India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Electrical and Electronics Engineering SR University Warangal India Department of AI & DS Nitte Meenakshi Institute of Technology Bengaluru India
One of the major economic sectors in various states is copra agriculture, with a significant portion of its global production coming from countries such as India, Indonesia, and Sri Lanka. However, the severity of cop... 详细信息
来源: 评论