咨询与建议

限定检索结果

文献类型

  • 107 篇 会议
  • 63 篇 期刊文献
  • 32 册 图书

馆藏范围

  • 202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 101 篇 工学
    • 77 篇 计算机科学与技术...
    • 41 篇 软件工程
    • 39 篇 信息与通信工程
    • 29 篇 电气工程
    • 24 篇 控制科学与工程
    • 15 篇 生物工程
    • 14 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 电子科学与技术(可...
    • 9 篇 动力工程及工程热...
    • 9 篇 交通运输工程
    • 9 篇 网络空间安全
    • 8 篇 化学工程与技术
    • 7 篇 光学工程
    • 6 篇 仪器科学与技术
    • 6 篇 环境科学与工程(可...
    • 5 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
  • 57 篇 理学
    • 24 篇 数学
    • 21 篇 物理学
    • 15 篇 生物学
    • 9 篇 化学
    • 7 篇 统计学(可授理学、...
  • 25 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 9 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 农学
  • 2 篇 经济学
  • 1 篇 军事学

主题

  • 26 篇 computational in...
  • 18 篇 artificial intel...
  • 9 篇 deep learning
  • 9 篇 communications e...
  • 7 篇 machine learning
  • 7 篇 accuracy
  • 7 篇 machine learning...
  • 6 篇 support vector m...
  • 6 篇 computational mo...
  • 6 篇 predictive model...
  • 5 篇 data mining and ...
  • 5 篇 feature extracti...
  • 5 篇 software
  • 5 篇 training
  • 5 篇 convolutional ne...
  • 4 篇 computer science
  • 4 篇 image segmentati...
  • 4 篇 power engineerin...
  • 4 篇 computer communi...
  • 4 篇 optimization

机构

  • 30 篇 department of co...
  • 12 篇 department of co...
  • 9 篇 department of co...
  • 6 篇 school of comput...
  • 6 篇 department of co...
  • 6 篇 department of ph...
  • 5 篇 department of co...
  • 5 篇 school of inform...
  • 5 篇 prof. c.n.r. rao...
  • 5 篇 honorary profess...
  • 5 篇 soa university b...
  • 4 篇 school of comput...
  • 4 篇 computer science...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 department of el...
  • 4 篇 department of co...
  • 4 篇 victoria busines...
  • 3 篇 mit haystack obs...
  • 3 篇 school of comput...

作者

  • 35 篇 patnaik srikanta
  • 30 篇 srikanta patnaik
  • 8 篇 patnaik s.
  • 7 篇 pattanayak binod...
  • 5 篇 sharma s.c.
  • 5 篇 manjunatha k.
  • 5 篇 madjid tavana
  • 5 篇 roumen kountchev
  • 5 篇 nagabhushana h.
  • 4 篇 qing-he zhang
  • 4 篇 bibhuti bhusan d...
  • 4 篇 shun-rong zhang
  • 4 篇 binod kumar patt...
  • 4 篇 pandey trilok na...
  • 4 篇 evan g.thomas
  • 4 篇 rui-yuan liu
  • 4 篇 zhengtao yu
  • 4 篇 trilok nath pand...
  • 4 篇 fatos xhafa
  • 4 篇 michael lockwood

语言

  • 175 篇 英文
  • 26 篇 其他
  • 1 篇 中文
检索条件"机构=Computer Science and Engineering SOA University"
202 条 记 录,以下是81-90 订阅
排序:
Hybridization of Sparrow Search Algorithm and Sine Cosine Algorithm for Epileptic Seizure Detection
Hybridization of Sparrow Search Algorithm and Sine Cosine Al...
收藏 引用
Electrical Power engineering, Communication and Computing Technology(ODICON), Odisha International Conference on
作者: Sumant Kumar Mohapatra Kaliprasanna Swain Puspanjali Mallik Sabita Mali Farida A. Ali Trident Academy of Technology Bhubaneswar Odisha Dept. of Computer Science Shailabala Women's Autonomous College Cuttack India Faculty of Engineering ITER SOA University Bhubaneswar India
An imbalance in electrical signal flow among neurons causes epilepsy, a complex brain disease that affects other parts of the body and results in seizures. Researchers and neurologists have put their efforts into devi... 详细信息
来源: 评论
Enhancing Security: Federated Learning against Man-In-The-Middle Threats with Gradient Boosting Machines and LSTM
Enhancing Security: Federated Learning against Man-In-The-Mi...
收藏 引用
IEEE Conference on Advanced Video and Signal Based Surveillance (AVSS)
作者: Suneeta Satpathy Pratik Kumar Swain Sachi Nandan Mohanty Santi Swarup Basa Centre for AI & ML SoA University Odisha India FET Sri Sri University Odisha India School of Computer Science and Engineering VIT-AP University Amaravati Andhra Pradesh India Dept. of Computer Science Maharaja Sriram Chandra Bhanjadeo University Baripada Odisha India
Federated Learning (FL) can be preferred more in the cyber security community because it can enable training without sharing the actual training data when combined with different learning algorithms. Though these type... 详细信息
来源: 评论
Principles and Potentials of F5G: The Fifth Generation Fixed Network
Principles and Potentials of F5G: The Fifth Generation Fixed...
收藏 引用
Circuits, Power and Intelligent Systems (CCPIS), International Conference on
作者: Sudhir K. Routray Abhishek Javali KP Sharmila M. Pappa Mahesh K. Jha Susanta K. Sarangi Department of Computer Science and Engineering CMR University Bangalore India Department of Electronics and Communication Engineering CMR Institute of Technology Bangalore India Department of Electronics and Communication Engineering SoA (Deemed-to-be) University Bhubaneswar India
In general, 5G is understood to be the fifth generation of mobile communications. However, there is also a fifth generation of wired communications which is led by the optical fiber technologies. This technology too h...
来源: 评论
Faster & Smoother Detection of Forest Fire Using YOLO v3
Faster & Smoother Detection of Forest Fire Using YOLO v3
收藏 引用
Machine Learning, computer Systems and Security (MLCSS), International Conference on
作者: Susmita Panda Adarsh Padhi Bhabani Shankar Rath Bishal Rout Kumar Supreet Mishra Department of Computer Science and Engineering Institute of Technical Education & Research SOA Deemed to be University Odisha India
The precise detection of fire in a virtual system, such as photos, movies, and live stream videos, is crucial for a variety of applications that use various methods. As the name suggests, fire detection can detect the... 详细信息
来源: 评论
Hybrid grasshopper optimization algorithm with simulated annealing for feature selection using high dimensional dataset
Hybrid grasshopper optimization algorithm with simulated ann...
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), International Conference on
作者: Bibhuprasad Sahu Jvr Ravindra Sachi Nandan Mohanty Amrutanshu Panigrahi Department of Artificial Intelligence and Data Science Vardhaman College of Engineering(Autonomous) Hyderabad India Department of Electronics & Communication Engineering Vardhaman College of Engineering(Autonomous) Hyderabad India School of Computer Science & Engineering(SCOPE) VIT-AP Amaravati Andhra Pradesh India Department of Computer Science & Engineering SOA (Deemed to be University) Bhubaneswar Odisha
In the era of machine learning, microarray data play a crucial role in identifying cancer diseases. The impact of redundant and noisy features degrades the learning model’s performance. It may also increase the compu... 详细信息
来源: 评论
Tomato Leaf Disease Detection using Neural Networks
Tomato Leaf Disease Detection using Neural Networks
收藏 引用
Machine Learning, computer Systems and Security (MLCSS), International Conference on
作者: Vemakoti Santosh Krishna Chaitanya Datti Rakesh Sachikanta Dash Bidush Kumar Sahoo Sasmita Padhy Mamata Nayak Computer Science and Engineering GIET University Gunupur Odisha Computer Science and Engineering GMR Institute Institute of Technology JNTU Kakinada Andhra Pradesh India Computer Science and Engineering GIET University Odisha India School of Computing Science and Engineering VIT Bhopal University Bhopal MP Computer Science and Engineering SOA University Bhubaneswar Odisha
Plants are a very important source of food worldwide. The diseases among them generate production and economic losses leading to a decrease in agricultural product quality and amount. Disease watching by hand is long ... 详细信息
来源: 评论
Sentiment analysis of reviews using Nature Inspired Algorithm
Sentiment analysis of reviews using Nature Inspired Algorith...
收藏 引用
Global Conference for Advancement in Technology (GCAT)
作者: Abinash Tripathy Utpal Chandra De Bibhuti Bhusan Dash Sudhansu Shekhar Patra Binod Kumar Pattanayak Trilok Nath Pandey School of Computer Applications KIIT Deemed to be University Bhubaneswar Odisha India Department of Computer Sc. & Engg ITER SOA Deemed to be University Bhubaneswar Odisha India School of Computer Science & Engineering Vellore Institute of Technology Chennai India
Social media now plays an important role is sharing the views or comments about a topic. These comments are available to the users for their processing and future decision making process. As the reviews contains mostl...
来源: 评论
Machine learning techniques used for the histopathological image analysis of oral cancer-a review
收藏 引用
Open Bioinformatics Journal 2020年 第1期13卷 106-118页
作者: Panigrahi, Santisudha Swarnkar, Tripti Department of Computer Science and Engineering SOA Deemed to be University Bhubaneswar 751030 Odisha India Department of Computer Application SOA Deemed to be University Bhubaneswar 751030 Odisha India
Oral diseases are the 6th most revealed malignancy happening in head and neck regions found mainly in south Asian countries. It is the most common cancer with fourteen deaths in an hour on a yearly basis, as per the W... 详细信息
来源: 评论
Generating Higher Order Mutants using PSO with Levy Flight(LFPSO) Algorithm
Generating Higher Order Mutants using PSO with Levy Flight(L...
收藏 引用
Machine Learning, computer Systems and Security (MLCSS), International Conference on
作者: Subhasish Mohanty Jyotirmaya Mishra Sudhir Kumar Mohapatra Sachikanta Dash Sasmita Padhy Sameer Kumar Das Computer Science and Engineering GIET University Gunupur Odisha Faculty of Emerging Technologies Sri Sri University Odisha India School of Computing Science and Engineering VIT Bhopal University Bhopal MP Computer Science and Engineering SOA University Bhubaneswar Odisha
Nowadays, test data generation via a search based become popular, and mutation testing plays a very essential role by improving the efficiency of test data creation. In this research, LFPSO with Mutation Testing, a hi... 详细信息
来源: 评论
Unmanned Integrated Autonomous Vehicle: Swayambhu
Unmanned Integrated Autonomous Vehicle: Swayambhu
收藏 引用
Electrical Power engineering, Communication and Computing Technology(ODICON), Odisha International Conference on
作者: Ankit Anand Murthy Cherukuri Indu Sekhar Samanta Kunjabihari Swain Dept. of Electrical and Electronics Engineering NIST Institute of Science and Technology Berhampur India dept. of Computer Science and Engineering ITER SOA University Bhubaneswar India
Every human life is valuable. Soldiers are in charge of security at the country's borders. Many soldiers were killed as a result of terror strikes on the frontiers. With advancements in science and technology, Sec... 详细信息
来源: 评论