咨询与建议

限定检索结果

文献类型

  • 692 篇 会议
  • 438 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 1,138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 680 篇 工学
    • 444 篇 计算机科学与技术...
    • 361 篇 软件工程
    • 187 篇 信息与通信工程
    • 121 篇 控制科学与工程
    • 100 篇 电气工程
    • 85 篇 电子科学与技术(可...
    • 72 篇 生物工程
    • 64 篇 生物医学工程(可授...
    • 62 篇 动力工程及工程热...
    • 52 篇 光学工程
    • 51 篇 网络空间安全
    • 48 篇 土木工程
    • 47 篇 机械工程
    • 43 篇 安全科学与工程
    • 41 篇 材料科学与工程(可...
    • 34 篇 环境科学与工程(可...
    • 32 篇 化学工程与技术
    • 31 篇 交通运输工程
  • 346 篇 理学
    • 139 篇 数学
    • 95 篇 生物学
    • 94 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 39 篇 化学
    • 33 篇 系统科学
  • 171 篇 管理学
    • 132 篇 管理科学与工程(可...
    • 56 篇 工商管理
    • 52 篇 图书情报与档案管...
  • 94 篇 医学
    • 78 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 42 篇 公共卫生与预防医...
  • 33 篇 法学
  • 22 篇 农学
  • 21 篇 经济学
  • 20 篇 教育学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 71 篇 accuracy
  • 47 篇 deep learning
  • 37 篇 real-time system...
  • 37 篇 convolutional ne...
  • 32 篇 support vector m...
  • 30 篇 internet of thin...
  • 28 篇 machine learning
  • 26 篇 predictive model...
  • 25 篇 training
  • 24 篇 feature extracti...
  • 23 篇 security
  • 22 篇 scalability
  • 22 篇 artificial intel...
  • 19 篇 computational mo...
  • 16 篇 reliability
  • 16 篇 data models
  • 15 篇 monitoring
  • 14 篇 cloud computing
  • 14 篇 technological in...
  • 13 篇 generative adver...

机构

  • 31 篇 department of co...
  • 18 篇 singapore univer...
  • 14 篇 college of compu...
  • 13 篇 department of co...
  • 12 篇 department of co...
  • 10 篇 school of comput...
  • 10 篇 the pillar of in...
  • 9 篇 college of infor...
  • 9 篇 department of sy...
  • 8 篇 alliance univers...
  • 8 篇 pillar of inform...
  • 8 篇 pune
  • 8 篇 chitkara univers...
  • 8 篇 the school of au...
  • 8 篇 college of engin...
  • 7 篇 department of el...
  • 7 篇 department of co...
  • 6 篇 the department o...
  • 6 篇 department of el...
  • 6 篇 the school of co...

作者

  • 36 篇 niyato dusit
  • 27 篇 xiong zehui
  • 26 篇 rajesh sharma r
  • 23 篇 rajesh sharma r.
  • 20 篇 akey sungheetha
  • 20 篇 g s pradeep ghan...
  • 17 篇 kang jiawen
  • 16 篇 sungheetha akey
  • 16 篇 han zhu
  • 14 篇 yuen chau
  • 14 篇 du hongyang
  • 11 篇 pellakuri vidyul...
  • 10 篇 lenin j.
  • 10 篇 huang chongwen
  • 9 篇 amar choudhary
  • 9 篇 eitaku nobuyama
  • 9 篇 ghantasala g. s....
  • 9 篇 yasushi kami
  • 9 篇 sengottaiyan n.
  • 9 篇 zhang ruichen

语言

  • 994 篇 英文
  • 127 篇 其他
  • 11 篇 中文
  • 7 篇 日文
检索条件"机构=Department of Computer Technology Alliance College of Engineering and Design"
1138 条 记 录,以下是231-240 订阅
排序:
Digit Recognition and Separation of Overlapped Digits using Deep CapsNet
Digit Recognition and Separation of Overlapped Digits using ...
收藏 引用
International Conference on Computational and Characterization Techniques in engineering & Sciences (CCTES)
作者: Aditi Moudgil Bhavna Sareen G S Pradeep Ghantasala Rajesh Sharma R Akey Sungheetha I.D. Soubache Pellakuri Vidyullatha Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Alliance University Bengaluru India Department of Computer Science and Engineering Alliance College of Engineering and Design Alliance University Bengaluru India Department of EEE Pondicherry University Pondicherry India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Guntur Andhra Pradesh India
Separation of overlapping digits is observed as a very difficult task when done with human eye, but subsequently it becomes easy when computer vision is used for the same task. The authors have constructed a capsule n... 详细信息
来源: 评论
Defending Against Vishing Attacks: A Comprehensive Review for Prevention and Mitigation Techniques
Defending Against Vishing Attacks: A Comprehensive Review fo...
收藏 引用
International Conference on Recent Developments in Cyber Security, ReDCySec 2023
作者: Ashfaq, Shaikh Chandre, Pankaj Pathan, Shafi Mande, Uday Nimbalkar, Madhukar Mahalle, Parikshit Information Technology Department M H Saboo Siddik College of Engineering Mumbai India Computer Science and Engineering Department MIT School of Computing MIT Art Design and Technology University Loni Kalbhor Pune India Artificial Intelligence and Data Science Department Vishwakarma Institute of Information Technology Kondhwa Pune India
Vishing attacks, or voice phishing attacks, are a type of social engineering attack in which attackers use voice communication channels, such as phone calls, to trick victims into divulging sensitive information or pe... 详细信息
来源: 评论
Internet of Things Assisted Remote Health and Safety Monitoring Scheme Using Intelligent Sensors  2
Internet of Things Assisted Remote Health and Safety Monitor...
收藏 引用
2nd IEEE International Conference on Advances in Computing, Communication and Applied Informatics, ACCAI 2023
作者: Ramkumar, V. Shanthi, S. Kumar, K. Suresh Kanageswari, S. Mahalakshmi, S. Anusuya, R. R.M.K. Engineering College Department of ECE Chennai India Care College of Engineering Department of ECE Tiruchirappalli India Panimalar Engineering College Department of Mba Chennai India Loyola College Department of Computer Science Chennai India R.M.K Engineering College Department of Computer Science and Design Chennai India Modern Institute of Technology and Research Centre Department of Cse Rajasthan Alwar India
The Internet of Things (IoT) in telemedicine creates an enormous data volume that must be processed, analyzed, and stored. Risk to one's health is no longer mitigated by one's chronological age, thanks to toda... 详细信息
来源: 评论
Detection and Classification of Diabetic Foot Ulcers via Cloud-Based Deep Learning Approach
Detection and Classification of Diabetic Foot Ulcers via Clo...
收藏 引用
Delhi Section Conference (DELCON), IEEE
作者: N. Sengottaiyan Malathi Eswaran Akey Sungheetha R. Rajesh Sharma A. L. Pravin G. S. Pradeep Ghantasala Department of Computer Sciences and Engineering Alliance University Bangalore India Department of Computer Sciences and Engineering Kongu Engineering College Erode India Department of Computer Technology - PG Kongu Engineering College Erode India
The study “Mobile and Cloud-Based Detection of Diabetic Foot Ulcers and Their Classification Using Deep Learning Frameworks” addresses the demanding situations of Diabetic Foot Ulcers (DFUs), which could result in e... 详细信息
来源: 评论
Smart Measuring Device for Power with Digital Debiting System Using Mobile Application Tool
Smart Measuring Device for Power with Digital Debiting Syste...
收藏 引用
Innovative Practices in technology and Management (ICIPTM), International Conference on
作者: Rajesh Sharma R Rajiv Gandhi Akey Sungheetha Chinnaiyan R Deepaletchumi N Department of CSE Alliance College of Engineering and Design Alliance University Bangalore India Model Constituent College Alagappa University India Department of Computer Science Alagappa University Karaikudi India
Recently, it has been discovered that the electricity department’s significant income loss is a result of the metering and billing system. At every level of the billing process, errors can occur due to malfunctioning... 详细信息
来源: 评论
Building the metaverse using digital twins at all scales,states,and relations
收藏 引用
Virtual Reality & Intelligent Hardware 2022年 第6期4卷 459-470页
作者: Zhihan LV Shuxuan XIE Yuxi LI M.Shamim HOSSAIN Abdulmotaleb El SADDIK Department of Game Design Faculty of ArtsUppsala UniversitySweden College of Computer Science and Technology Qingdao UniversityQingdaoChina Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia School of Electrical Engineering and Computer Science(EECS) University of OttawaOttawaOntarioCanada
Developments in new-generation information technology have enabled Digital Twins to reshape the physical world into a virtual digital space and provide technical support for constructing the *** objects can be at the ... 详细信息
来源: 评论
Cryptographic Protocols for Securing Internet of Things (IoT)  15
Cryptographic Protocols for Securing Internet of Things (IoT...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Manimekala, B. Aravind, T. Sounderrajan, T. Rajakumareswaran, V. Kondreddi, Krishnaveni Mohanambal, K. Christ University Department of Computer Science Yeshwanthpur Bengaluru India Vel TecRangarajanDr.Sagunthala R&d Institute of Science and Technology Department of Cse School of Computing India Erode Sengunthar Engineering College Department of Ai and Data Science Tamil Nadu Thuduppathi India Erode Sengunthar Engineering College Department of Computer Science and Design Tamil Nadu Thuduppathi India Chaitanya Bharathi Institute of Technology Electrical and Electronics Engineering Ranga Reddy Telangana Gandipet500075 India Bannariamman Institute of Technology Department of Computer Science and Engineering Sathyamangalam India
Cryptographic protocols are used to relax the ever-developing quantity of linked gadgets that make up the net of things (IoT). Those cryptographic protocols have been designed to make certain that IoT tool traffic sta... 详细信息
来源: 评论
An Overview of Information Hiding Techniques Challenges and Applications  7
An Overview of Information Hiding Techniques Challenges and ...
收藏 引用
7th International Conference on Future Networks and Distributed Systems, ICFNDS 2023
作者: Kareem, Ali Noori Deheyab, Omar Adil Sameen, Aws Zuhair Alwan, Mohammed Hasan Hammadi, Yousif I Kadhum, Mayssam Saad Aziz, Ahmed Ali, Muthana Ali Salem Bilad Alrafidain University College Diyala32001 Iraq Department Of Medical Instrumentation Engineering Techniques College Of Medical Techniques Al-Farahidi University Baghdad10015 Iraq Department Of Communications Engineering College Of Engineering University Of Diyala Baqubah32001 Iraq Department Of Computer Science Faculty Of Computer And Artificial Intelligence Benha University Egypt Department Of International Business Management Tashkent State University Of Economics Tashkent Uzbekistan Department Of Computer-Aided Design And Engineering Design National University Of Science And Technology 'Misis' Russia
The internet became a common communication platform for many people. However, information transmission is not secure, and there is a high probability of copying and altering the information easily. In the public netwo... 详细信息
来源: 评论
Study and Investigation of Tribological Functions of Nano Additive with SAE 40/W20 Oil on EN 19  1
收藏 引用
1st International Conference on Advances in Mechanical engineering and Material Science, ICAMEMS 2022
作者: Vinothkumar, A. Ruban, R. Mohit, H. Arpitha, G.R. Department of Mechanical Engineering National Institute of Technology Tamilnadu Tiruchirappalli620015 India Department of Mechanical Engineering Alliance College of Engineering and Design Alliance University Karnataka Bengaluru562106 India Department of Mechanical Engineering Presidency University Karnataka Bengaluru560064 India
High operating conditions of moving machine components leads various wearing and failure mainly due to friction. Lubricants are widely used to overcome the friction of the components. Poor performance of lubricant pla... 详细信息
来源: 评论
EEG-Based Emotion Recognition with EERN Model  9
EEG-Based Emotion Recognition with EERN Model
收藏 引用
9th International Conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Hou, Zhiping Lin, Zitong Zheng, Qinyuan Jiang, Minyao Lin, Zhenduo Zhang, Yanlu Bao, Jianing Beijing Institute of Fashion Technology Beijing Chaoyang China Beijing Institute of Fashion Technology College of materials design & engineering Beijing Chaoyang China Beijing Jiaotong University Department of Computer and Information Technology Beijing Haidian China Beijing Institute of Fashion Technology College of Bushiness Beijing Chaoyang China
Emotion classification is a key technology in neuroscience and BCI, helping computers to describe and understand emotions. Compared to non-physiological signals such as physical behavior and voice, EEG is a more scien... 详细信息
来源: 评论