咨询与建议

限定检索结果

文献类型

  • 77 篇 期刊文献
  • 56 篇 会议
  • 1 册 图书

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 85 篇 工学
    • 51 篇 计算机科学与技术...
    • 33 篇 软件工程
    • 17 篇 信息与通信工程
    • 16 篇 电气工程
    • 16 篇 生物工程
    • 15 篇 控制科学与工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 生物医学工程(可授...
    • 8 篇 机械工程
    • 8 篇 光学工程
    • 8 篇 交通运输工程
    • 6 篇 安全科学与工程
    • 5 篇 动力工程及工程热...
    • 5 篇 环境科学与工程(可...
  • 50 篇 理学
    • 20 篇 数学
    • 18 篇 生物学
    • 11 篇 物理学
    • 11 篇 统计学(可授理学、...
    • 4 篇 化学
    • 3 篇 系统科学
  • 27 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 24 篇 医学
    • 20 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 10 篇 公共卫生与预防医...
    • 7 篇 药学(可授医学、理...
  • 6 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 军事学

主题

  • 6 篇 deep learning
  • 6 篇 security
  • 5 篇 machine learning
  • 4 篇 feature extracti...
  • 4 篇 training
  • 3 篇 internet of thin...
  • 3 篇 anomaly detectio...
  • 3 篇 predictive model...
  • 2 篇 fuzzy logic
  • 2 篇 intrusion detect...
  • 2 篇 conferences
  • 2 篇 reliability
  • 2 篇 industry 4.0
  • 2 篇 safety
  • 2 篇 prototypes
  • 2 篇 authentication
  • 2 篇 servers
  • 2 篇 trajectory
  • 2 篇 decision making
  • 2 篇 codes

机构

  • 6 篇 vector institute...
  • 5 篇 leeds institute ...
  • 5 篇 center for psych...
  • 5 篇 department of in...
  • 5 篇 institute for pa...
  • 5 篇 department of st...
  • 5 篇 university of pi...
  • 5 篇 arnie charbonnea...
  • 5 篇 ilsbio llc bioba...
  • 5 篇 department of mo...
  • 5 篇 osaka internatio...
  • 5 篇 research departm...
  • 5 篇 department of ve...
  • 5 篇 royal stoke univ...
  • 5 篇 biomedical engin...
  • 5 篇 department of ex...
  • 5 篇 victorian instit...
  • 5 篇 research core ce...
  • 5 篇 department of bi...
  • 5 篇 institute of cli...

作者

  • 7 篇 emmert-streib fr...
  • 4 篇 khan muhammad im...
  • 4 篇 michel martial
  • 4 篇 huang yo-ping
  • 4 篇 joy david
  • 4 篇 singh pritpal
  • 4 篇 foley simon n.
  • 4 篇 awad george
  • 4 篇 kraaij wessel
  • 4 篇 quénot georges
  • 4 篇 smeaton alan f.
  • 3 篇 wiebe nathan
  • 3 篇 fagbamigbe adeni...
  • 3 篇 chu dinh-toi
  • 3 篇 abu-gharbieh ema...
  • 3 篇 chattu vijay kum...
  • 3 篇 abolhassani hass...
  • 3 篇 kieferová mária
  • 3 篇 marrero carlos o...
  • 3 篇 o’sullivan barry

语言

  • 124 篇 英文
  • 10 篇 其他
检索条件"机构=Data Analytics in Information and Communication Technology Division"
134 条 记 录,以下是11-20 订阅
排序:
Improving Security in Vehicle Cloud Technologies
Improving Security in Vehicle Cloud Technologies
收藏 引用
2023 International Conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Dey, Kunal Kumar, Ritesh Balaji, K.A. Department of Data Analytics and Mathematical Sciences Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Presidency University Department of Electronics and Communication Engineering Karnataka Bangalore India
Recently, the development of vehicle computer technology has changed the conventional idea of a car from a simple means of transportation to an intelligent, safe smart vehicle. Additionally, cloud computing has been e... 详细信息
来源: 评论
Membership Functions, Set-Theoretic Operations, Distance Measurement Methods Based on Ambiguous Set Theory: A Solution to a Decision-Making Problem in Selecting the Appropriate Colleges
收藏 引用
International Journal of Fuzzy Systems 2023年 第4期25卷 1311-1326页
作者: Singh, Pritpal Huang, Yo-Ping Deep Learning Lab Department of Data Science and Analytics Central University of Rajasthan Rajasthan Ajmer305817 India Department of Electrical Engineering National Penghu University of Science and Technology Penghu88046 Taiwan Department of Electrical Engineering National Taipei University of Technology Taipei10608 Taiwan Department of Information and Communication Engineering Chaoyang University of Technology Taichung41349 Taiwan
To deal with uncertainty in a very precise way, the ambiguous set theory has been proposed. This theory supports the representation of ambiguities in terms of four membership degrees, namely "true," "fa... 详细信息
来源: 评论
An Efficient On-Demand Virtual Machine Migration in Cloud Using Common Deployment Model
收藏 引用
Computer Systems Science & Engineering 2022年 第7期42卷 245-256页
作者: C.Saravanakumar R.Priscilla B.Prabha A.Kavitha M.Prakash C.Arun Department of Information Technology St.Joseph’s Institute of TechnologyChennai600119India Department of Information Technology Loyola-ICAM College of Engineering and TechnologyChennai600034India Department of Electronics and Communication Engineering M.Kumarasamy College of EngineeringKarur639113India Data Science and Analytics Center Karpagam College of EngineeringCoimbatore641032India Department of Electronics and Communication Engineering R.M.K College of Engineering and TechnologyChennai601206India
Cloud Computing provides various services to the customer in aflex-ible and reliable *** Machines(VM)are created from physical resources of the data center for handling huge number of requests as a *** tasks are execut... 详细信息
来源: 评论
A Four-Valued Ambiguous Logic: Application in Designing Ambiguous Inference System for Control Systems
收藏 引用
International Journal of Fuzzy Systems 2023年 第8期25卷 2921-2938页
作者: Singh, Pritpal Huang, Yo-Ping Quantum Optimization Research Lab Department of Data Science and Analytics Central University of Rajasthan Rajasthan Ajmer305817 India Department of Electrical Engineering National Penghu University of Science and Technology Penghu88046 Taiwan Department of Electrical Engineering National Taipei University of Technology Taipei10608 Taiwan Department of Information and Communication Engineering Chaoyang University of Technology Taichung41349 Taiwan
Ambiguous set has recently been introduced as a new branch of mathematics and computer science dealing with the nature of ambiguity of uncertain events. There is much scope for the development of new theories based on... 详细信息
来源: 评论
database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches  1
收藏 引用
2nd International Symposium on Emerging information Security and Applications, EISA 2021
作者: Khan, Muhammad Imran Foley, Simon N. O’Sullivan, Barry Insight Centre for Data Analytics School of Computer Science and Information Technology University College Cork Cork Ireland Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway
One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals or leak... 详细信息
来源: 评论
A Hybrid Marine Predator Algorithm for Thermal-aware Routing Scheme in Wireless Body Area Networks
收藏 引用
Journal of Bionic Engineering 2023年 第1期20卷 81-104页
作者: Tao Hai Jincheng Zhou Mohammad Masdari Haydar Abdulameer Marhoon School of Computer and Information Qiannan Normal University for NationalitiesDuyun558000GuizhouChina Key Laboratory of Complex Systems and Intelligent Optimization of Guizhou Duyun558000GuizhouChina Institute for Big Data Analytics and Artificial Intelligence(IBDAAI) Universiti Teknologi MARA40450Shah AlamSelangorMalaysia Department of Computer Engineering Islamic Azad UniversityUrmia BranchUrmiaIran Information and Communication Technology Research Group Scientific Research CenterAl-Ayen UniversityThi-QarIraq College of Computer Sciences and Information Technology University of KerbalaKarbalaIraq
Thermal-aware routing protocols in WBANs consider temperature factors in the routing process for preventing overheating of the tissues surrounding the sensor ***,providing an energy-efficient and thermal-aware routing... 详细信息
来源: 评论
Image Fusion Using Wavelet Transformation and XGboost Algorithm
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 801-817页
作者: Shahid Naseem Tariq Mahmood Amjad Rehman Khan Umer Farooq Samra Nawazish Faten S.Alamri Tanzila Saba Department of Information Sciences Division of S&TUniversity of EducationLahore54770Pakistan Artificial Intelligence and Data Analytics(AIDA)Lab CCIS Prince Sultan UniversityRiyadh11586Saudi Arabia Faculty of Information Sciences University of EducationVehari CampusVehari61100Pakistan Department of Computer Science University of Engineering and TechnologyTaxila47050Pakistan Department of Mathematical Sciences College of SciencePrincess Nourah Bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Recently,there have been several uses for digital image *** fusion has become a prominent application in the domain of imaging *** create one final image that provesmore informative and helpful compared to the origina... 详细信息
来源: 评论
Trends in null hypothesis significance testing: Still going strong
收藏 引用
Heliyon 2024年 第21期10卷 e40133页
作者: Emmert-Streib, Frank Predictive Society and Data Analytics Lab Faculty of Information Technology and Communication Sciences Tampere University Tampere Finland
Null hypothesis significance testing (NHST) is among the most prominent and widely used methods for analyzing data. At the same time, NHST has been criticized since many years because of misuses and misconceptions tha... 详细信息
来源: 评论
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems  1
Enhancing Cloud Security Implementing AI-Based Intrusion Det...
收藏 引用
1st International Conference on Advances in Computer Science, Electrical, Electronics, and communication Technologies, CE2CT 2025
作者: Santharam, Vinoth Thoguluva Yallamelli, Akhil Raj Gaius Altemimi, Mohammed Alaa H. Arunachalam, Mahesh Prabu Rudrank, Shukla Ghule, Gauri Data Analytics Organization-Comcast Chennai India Amazon Web Services Inc Seattle United States Al-Khwarizmi College of Engineering The University of Baghdad Department of Information and Communication Engineering Baghdad Iraq Department of Information Technology and Computer Science AustinTX United States Kalasalingam Academy of Research and Education Deemed to be University Tamilnadu India Department of E and TC Pune India
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthori... 详细信息
来源: 评论
Sensory Perception of Haptic Rendering in Surgical Simulation  14
Sensory Perception of Haptic Rendering in Surgical Simulatio...
收藏 引用
14th International Conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Kaushik, Rohit Sachdeva, Rachit Vashisht, Chirag Choudhary, Krishan Kant University of Illinois Data Analytics Program Cs and Mathematics Department Springfield United States Dr. Akhilesh das Gupta Institute of Technology and Management Electronics and Communication Engineering Department New Delhi India Dr. Akhilesh das Gupta Institute of Technology and Management Information Technology and Engineering Department New Delhi India
The essential ideas behind haptic technology, including haptic interface and haptic rendering methods, as well as its application to surgical simulation, medical education, and other diverse topics, are presented in t... 详细信息
来源: 评论