咨询与建议

限定检索结果

文献类型

  • 68 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 78 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 25 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 9 篇 信息与通信工程
    • 5 篇 生物工程
    • 4 篇 机械工程
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
  • 12 篇 理学
    • 5 篇 生物学
    • 4 篇 数学
    • 4 篇 物理学
    • 2 篇 化学
    • 1 篇 统计学(可授理学、...
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
    • 1 篇 法学
  • 3 篇 医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学

主题

  • 8 篇 computer science
  • 8 篇 accuracy
  • 7 篇 feature extracti...
  • 5 篇 scalability
  • 5 篇 software
  • 4 篇 computational mo...
  • 4 篇 humans
  • 3 篇 image edge detec...
  • 3 篇 spatial database...
  • 3 篇 medical services
  • 3 篇 wireless sensor ...
  • 3 篇 decoding
  • 3 篇 analytical model...
  • 3 篇 machine learning
  • 3 篇 security
  • 3 篇 information retr...
  • 2 篇 internet of thin...
  • 2 篇 covid-19
  • 2 篇 surveys
  • 2 篇 intrusion detect...

机构

  • 2 篇 dr. d. y. patil ...
  • 2 篇 sumathi reddy in...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 apex institute o...
  • 2 篇 department of co...
  • 2 篇 al-farahidi univ...
  • 2 篇 scset bennett un...
  • 2 篇 university of el...
  • 2 篇 computer science...
  • 1 篇 indian statistic...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 graphic era hill...
  • 1 篇 university schoo...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 department of ec...
  • 1 篇 prin ln welingka...
  • 1 篇 sardar beant sin...

作者

  • 2 篇 mohamed abd elaz...
  • 2 篇 songfeng lu
  • 2 篇 amit verma
  • 2 篇 arulmozhi
  • 2 篇 jian cao
  • 2 篇 sallauddin mohmm...
  • 1 篇 cheng-wei wu
  • 1 篇 p. seetharamaiah
  • 1 篇 kamalika datta
  • 1 篇 d.r. chowdhury
  • 1 篇 c prabhu
  • 1 篇 wei xiong
  • 1 篇 saibali saikia
  • 1 篇 k suresh kumar
  • 1 篇 wenjuan lian
  • 1 篇 b yamini
  • 1 篇 lakshmanarao a.
  • 1 篇 lina ge
  • 1 篇 p. venkata krish...
  • 1 篇 b.b. bhattachary...

语言

  • 75 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Department Computer Science& Engineering"
78 条 记 录,以下是1-10 订阅
排序:
Enhanced MADM Strategy with Heptapartitioned Neutrosophic Distance Metrics
收藏 引用
Neutrosophic Sets and Systems 2025年 78卷 74-96页
作者: Eassa, Mohamed Myvizhi, M. Elkholy, Mohamed Abdelhafeez, Ahmed Elbehiery, Hussam Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Mathematics KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Faculty of Computer Science& Engineering Alamein International University Egypt
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent... 详细信息
来源: 评论
Comparative Analysis of Machine Learning based Plant Leaf Disease Detection Systems  14
Comparative Analysis of Machine Learning based Plant Leaf Di...
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Jamadar, Riyazahemed A. Sharma, Anoop Wagh, Kishor Department of Computer Science& Engineering Singhania University Rajasthan India Department of Computer Engineering AISSMS IOIT Pune India
Recently the availability of Machine Learning(ML) algorithms through state of the art programming interfaces & tools has lead the research community to employ ML based object detection/classification algorithms &a... 详细信息
来源: 评论
Load Balancing in Cloud Computing: Techniques, Challenges and Future Prospects  1
Load Balancing in Cloud Computing: Techniques, Challenges an...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Agarwal, Srishti Singh, Jitendra Ansari, M.I.H. SRM Institute of Science& Technology Department of Computer Science& Engineering U.P. Ghaziabad201204 India SRM Institute of Science & Technology Delhi NCR Campus CSE department Modinagar U.P. Ghaziabad201204 India Meerut Institute of Technology Department of Computer Science & Engineering U.P. Meerut India
Load balancing is a critical aspect of optimizing resource utilization and performance in cloud computing environments. This paper begins by introducing the fundamental concepts of load balancing and underscoring its ... 详细信息
来源: 评论
Evaluation of Contingency-Based Learning Strategies for Precision Medicine  15
Evaluation of Contingency-Based Learning Strategies for Prec...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Kaushik, Harshita Rajendran, Naveen Kumar Kumar, Ashwini Vivekananda Global University Department of Computer Science& Application Jaipur India Department of Aerospace Engineering Karnataka Bangalore India Arka Jain University Department of Mechnical Engineering Jharkhand Jamshedpur India
Contingency-based learning strategies primarily based on synthetic intelligence (AI) are being hired within the area of precision remedy to enable greater powerful selection-making when treating patients. The overall ... 详细信息
来源: 评论
Mining of Frequent and High Utility Fuzzy Sequential Patterns  1
Mining of Frequent and High Utility Fuzzy Sequential Pattern...
收藏 引用
1st International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2022
作者: Ritika Gupta, Sunil Kumar I K Gujral Punjab Technical University Department of Computer Science& Engineering India Sardar Beant Singh State University Department of Computer Science& Engineering India
Sequential pattern mining is one of the very popular data mining techniques to find patterns from databases. The variation in technique is based on the threshold used for mining which can be frequency, utility, or bot... 详细信息
来源: 评论
Optimization Technique to Reduce Resource Utilization of Software Key Loggers Using PSO  3
Optimization Technique to Reduce Resource Utilization of Sof...
收藏 引用
3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Sharma, Yashika Rana, Muskaan Apex Institute of Technology Chandigarh University Mohali India Chandigarh University Department of Computer Science& Engineering Mohali India
Software key loggers are the leading type of keylogging. Both cheap and consumer-specific and specially created keylogging programs are easily accessible online. These key loggers should be revised to each target oper... 详细信息
来源: 评论
Enhancement of Level of Security using Wireshark Through Continuous Monitoring and Detection System  4
Enhancement of Level of Security using Wireshark Through Con...
收藏 引用
4th IEEE International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2024
作者: Bhat, C.Rohith Mane, Sulakshana Bhausaheb Bhatt, Chandradeep Verma, Garima Naser, Sarmad Jaafar Jweeg, Muhsin Department of Computer Science and Engineering India Bharati Vidyapeeth College of Engineering Department of Computer Engineering Navi Mumbai India Graphic Era Hill University Computer Science and Engineering Dehardun248002 India Graphic Era Deemed to Be University Computer Science& Engineering Uttarakhand Dehradun248002 India National University of Science and Technology Collage of Nursing Dhi Qar64001 Iraq Al-Farahidi University Baghdad Iraq
We suggest using edge computing to install an intrusion detection system (IDS) at the network edge in order to address the problem of intrusion detection in wireless sensor networks (WSNs). This IDS functions as a pro... 详细信息
来源: 评论
A Comprehensive Study of Case-Based Reasoning in Information Retrieval: An Artificial Intelligence Approach
A Comprehensive Study of Case-Based Reasoning in Information...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Solanki, Surabhi Verma, Seema Biswas, Prolay Roy, Pulakesh Singh, Aparna Sharma, Surbhi Computer Science & Engineering Banasthali Vidyapith Rajasthan Tonk India Scset Bennett University Greater Noida India Education National Institute of Technical Teachers' Training and Research Department of Electrical & Electronics Engineering Bhopal India Computer Science & Engineering Dayananda Sagar University Ramanagara India Computer Science& Engg Brainware University Kolkata India
Information Retrieval (IR) systems which provide accurate and contextually relevant information to healthcare and law etc. where accuracy is very crucial. Traditional information retrieval methods fundamentally based ... 详细信息
来源: 评论
Utilizing a Machine Learning Approach, Chronic Disease Identification and Prediction
Utilizing a Machine Learning Approach, Chronic Disease Ident...
收藏 引用
Communication, computer sciences and engineering (IC3SE), International Conference on
作者: Vandna Bansla Rita K Saini Department of Computer Science& Engineering Himalayiya University Dehradun Uttarakhand India
Nowadays, people suffer from many diseases due to lifestyle choices and environment. Recognition and predicting these diseases in their early stages is crucial to preventing their extremes. Mostly time, identifying di... 详细信息
来源: 评论
Comparative Analysis of an AI-enabled State-of-the-Art Models for the Detection of DDoS Attacks on IoT Devices
Comparative Analysis of an AI-enabled State-of-the-Art Model...
收藏 引用
Disruptive Technologies (ICDT), International Conference on
作者: Rajneesh Kumar Gaurav Gulati Bhupesh Gupta Mohit Chhabra Department of Computer Science & Engineering Maharishi Markandeshwar Engineering College MMDU Mullana Haryana India Department of Computer Science& Engineering IMS Engineering College Ghaziabad UP India
With technological advancement, Distributed Denial of Service (DDoS) attacks are gaining momentum in IoT networks. DDoS attacks are widely spreading on IoT devices since they have limited resources (memory) and no eff... 详细信息
来源: 评论