咨询与建议

限定检索结果

文献类型

  • 108 篇 会议
  • 72 篇 期刊文献

馆藏范围

  • 180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 119 篇 工学
    • 89 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 30 篇 信息与通信工程
    • 25 篇 电气工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 控制科学与工程
    • 12 篇 生物医学工程(可授...
    • 10 篇 生物工程
    • 9 篇 光学工程
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 6 篇 机械工程
    • 5 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 交通运输工程
  • 60 篇 理学
    • 35 篇 数学
    • 13 篇 生物学
    • 12 篇 化学
    • 11 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 6 篇 物理学
  • 40 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 13 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 教育学
    • 4 篇 教育学
  • 3 篇 法学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 17 篇 accuracy
  • 9 篇 deep learning
  • 9 篇 feature extracti...
  • 7 篇 computational mo...
  • 7 篇 real-time system...
  • 7 篇 machine learning
  • 6 篇 internet of thin...
  • 6 篇 magnetic resonan...
  • 6 篇 optimization
  • 6 篇 convolutional ne...
  • 5 篇 data models
  • 4 篇 support vector m...
  • 4 篇 libraries
  • 4 篇 brain modeling
  • 4 篇 predictive model...
  • 4 篇 decision making
  • 4 篇 security
  • 4 篇 machine learning...
  • 4 篇 numerical models
  • 4 篇 adaptation model...

机构

  • 8 篇 iconix software ...
  • 7 篇 department of co...
  • 5 篇 saint petersburg...
  • 3 篇 karpagam academy...
  • 3 篇 master of comput...
  • 3 篇 iconix software ...
  • 2 篇 department of so...
  • 2 篇 independent rese...
  • 2 篇 university of sh...
  • 2 篇 department of co...
  • 2 篇 sri krishna coll...
  • 2 篇 college of infor...
  • 2 篇 hindustan instit...
  • 2 篇 department of co...
  • 2 篇 department of ma...
  • 2 篇 school of optica...
  • 2 篇 department of co...
  • 2 篇 departamento de ...
  • 2 篇 school of softwa...
  • 2 篇 kongu engineerin...

作者

  • 7 篇 r. saravanakumar
  • 4 篇 k. nirmaladevi
  • 4 篇 krinkin kirill
  • 3 篇 nirmaladevi k.
  • 3 篇 saravanakumar r.
  • 3 篇 aljammal ashraf ...
  • 3 篇 s. jeya lakshmi
  • 3 篇 anton yu. filato...
  • 3 篇 p. ananthi
  • 3 篇 filatov anton yu...
  • 3 篇 shevskaya nataly...
  • 2 篇 carnero rosell a...
  • 2 篇 tharani as. krit...
  • 2 篇 amer ibrahim
  • 2 篇 manjunatha
  • 2 篇 wang ran
  • 2 篇 mahanta priyaksh...
  • 2 篇 shoeibi afshin
  • 2 篇 m. c. babu
  • 2 篇 prakash s.p. shi...

语言

  • 171 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Software Engineering and Computer Applications"
180 条 记 录,以下是101-110 订阅
排序:
Machine Learning Approaches for Efficient Traffic Flow in Smart Cities
Machine Learning Approaches for Efficient Traffic Flow in Sm...
收藏 引用
Electrical Power engineering, Communication and Computing Technology(ODICON), Odisha International Conference on
作者: Aniket Kulkarni P. Anitha John Yesudas Valluri M V Sunena Rose U Hemavathi Omar M. Hussein Software QA Manager Drata Inc San Diego CA USA Department of Computer Applications Kalasalingam Academy of Research and Education Srivilliputhur Tamil Nadu India Faculty of Management Studies CMS Business School Jain (Deemed-to-be University) Bengaluru India Department of Computer Science and Engineering Jain (Deemed-to-be University) Bengaluru India Department of CSE Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai India Medical Technical College Medical Instrumentation Engineering Al-Farahidi University Baghdad Iraq
These days, a lot of towns struggle with traffic jams during peak hours, which increment contamination, commotion, and feelings of anxiety for the general population. Because neural networks (NN) and machine learning ... 详细信息
来源: 评论
What if?.. Fabulating African HCI Futures within the Veil of HCI  23
What if?.. Fabulating African HCI Futures within the Veil of...
收藏 引用
Proceedings of the 4th African Human computer Interaction Conference
作者: Shaimaa Lazem Muhammad Sadi Adamu Yasmeen Abdrabou Chris Muashekele Sheena Erete Jakita Thomas Hafeni Mthoko Heike Winschiers-Teophilus Nicola Bidwell Aderonke Sakpere Anicia Peters City of Scientific Research and Technology Applications (SRTA-City) Egypt Imagination Lancaster Lancaster University United Kingdom School of Computing and Communications Lancaster University United Kingdom Aalborg University Denmark College of Information Studeies University of Maryland USA Department of Computer science and software Engineering (CSSE) Auburn University USA NurtureID8 Namibia Department of Software Engineering Namibia University of Science and Technology Namibia Intenational Uiversity of Management Namibia and University of Melbourne Australia University of Ibadan Nigeria National Commission of Research Sicence and Technology (NCRST) Namibia
This workshop aims to bring together researchers and practitioners (African and otherwise) engaging with diverse communities and industries to discuss the geopolitics of knowledge production in computing research and ... 详细信息
来源: 评论
A Maple Exploration of Problem 6 of the IMO 88  4th
A Maple Exploration of Problem 6 of the IMO 88
收藏 引用
4th Maple Conference, MC 2020
作者: Zeng, Zhenbing Sun, Xiang Huang, Yong Xu, Yaochen Chen, Xiaoru Yang, Lu Department of Mathematics Shanghai University Shanghai200444 China South China Institute of Software Engineering Guangzhou University Guangzhou510990 China Institute of Computing Sciences and Technology Guangzhou University Guangzhou510006 China Chengdu Institute of Computer Applications Chinese Academy of Sciences Chengdu610041 China
In this paper, we show that by using Maple software, some direct searching computation could derive a solution to Problem 6 of the 1988 International Mathematics Olympiad, which asks to prove that if a and b are integ... 详细信息
来源: 评论
Context-aware and class imbalance invariant threat severity assessment for heterogeneous IoT
TechRxiv
收藏 引用
TechRxiv 2021年
作者: Nitish, A. Hanumanthappa, J. Prakash, S.P. Shiva Krinkin, Kirill The Department of Studies in Computer Science University of Mysore India The Department of Information Science & Engineering JSS Science and Technology University Mysuru India The Department of Software Engineering and Computer Applications Saint Petersburg Electrotechnical University "LETI" Russia
Due to demand for information ubiquity and large-scale automation, proliferating Internet-connected heterogeneous devices exhibit significant variations in data processing capacities, purposes, operating principles, u... 详细信息
来源: 评论
WSN-IoT Clustering for Secure Data Transmission in E-Health Sector using Green Computing Strategy  9
WSN-IoT Clustering for Secure Data Transmission in E-Health ...
收藏 引用
9th International Conference on Cyber and IT Service Management, CITSM 2021
作者: Srivastava, Anurag Singh, Abhishek Joseph, Susheel George Rajkumar, M. Borole, Yogini Dilip Singh, Hari Kumar Lakshmi Narain College of Technology and Science Indore India Software Developer IT Researcher NorthboroughMA United States Kristu Jyoti College of Management and Technology Department of Computer Applications Kerala India Department of Information Technology Tamilnadu India G.H. Raisoni Institute of Engineering and Technology Department of Electronics and Telecommunications Engineering Pune India M.J.P Rohilkhand University Department of Electronics and Communication Uttar Pradesh Bareilly India
Energy was one of the 21st century's most critical components. Electronics and computer technologies have been widely used nowadays to simplify work every day. The crisis and the constant lack of power have popula... 详细信息
来源: 评论
Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
Electrical, Energy, and Artificial Intelligence (EICEEAI), International engineering Conference on
作者: Mohammad Aljaidi Ayoub Alsarhan Dimah Al-Fraihat Ahmed Al-Arjan Bashar Igried Subhieh M. El-Salhi Muhammad Khalid Qais Al-Na'amneh Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Department of Information Technology The Hashemite University Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman Jordan Department of Information Technology Faculty of Prince AL-Hussein bin Abdullah II of Information Technology The Hashemite University Jordan Department of Computer Science and Applications The Hashemite University Zarqa Jordan The Hashemite University Zarqa Jordan Department of Computer Sciences and Technology University of Hull Kingston upon Hull UK Dep. of Cyber Security Applied Science Private University Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
Dynamic Pricing based Near-Optimal Resource Allocation for Elastic Edge Offloading
arXiv
收藏 引用
arXiv 2024年
作者: Xia, Yun Xue, Hai Zhang, Di Mumtaz, Shahid Xu, Xiaolong Rodrigues, Joel J.P.C. School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200093 China School of Electrical and Information Engineering Zhengzhou University the Henan International Joint Laboratory of Intelligent Health Information System The National Telemedicine Center The National Engineering Laboratory for Internet Medical Systems and Applications Zhengzhou450001 China Department of Engineering Nottingham Trent University NottinghamNG1 4FQ United Kingdom The Department of Electronic Engineering Kyung Hee University Gyeonggi-do Yongin-si17104 Korea Republic of School of Software Nanjing University of Information Science and Technology Nanjing210044 China Amazonas State University AM Manaus Brazil
In mobile edge computing (MEC), task offloading can significantly reduce task execution latency and energy consumption of end user (EU). However, edge server (ES) resources are limited, necessitating efficient allocat... 详细信息
来源: 评论
InBiodiv-O: An ontology for indian biodiversity knowledge management
arXiv
收藏 引用
arXiv 2021年
作者: Patel, Archana Jain, Sarika Debnath, Narayan C. Lama, Vishal Department of Software Engineering School of Computing and Information Technology Eastern International University Viet Nam Department of Computer Applications National Institute of Technology Kurukshetra Haryana India Amdocs Development Centre LLP India
To present the biodiversity information, a semantic model is required that connects all kinds of data about living creatures and their habitats. The model must be able to encode human knowledge for machines to be unde... 详细信息
来源: 评论
SmartEdge: Smart Healthcare End-to-End Integrated Edge and Cloud Computing System for Diabetes Prediction Enabled by Ensemble Machine Learning
SmartEdge: Smart Healthcare End-to-End Integrated Edge and C...
收藏 引用
IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
作者: Alain Hennebelle Qifan Dieng Leila Ismail Rajkumar Buyya Independent Researcher in Information Technology Systems and Artificial Intelligence Applications Abu Dhabi United Arab Emirates Cloud Computing and Distributed Systems (CLOUDS) Lab School of Computing and Information Systems University of Melbourne Melbourne Australia Department of Computer Science and Software Engineering Intelligent Distributed Computing and Systems (INDUCE) Lab College of Information Technology Emirates Center for Mobility Research National Water and Energy Center UAE University Al-Ain Abu Dhabi United Arab Emirates
The Internet of Things (IoT) revolutionizes smart city domains such as healthcare, transportation, industry, and education. The Internet of Medical Things (IoMT) is gaining prominence, particularly in smart hospitals ... 详细信息
来源: 评论
Research of Dimension Reduction Algorithms of Feature Space in Data Analysis Task
Research of Dimension Reduction Algorithms of Feature Space ...
收藏 引用
IEEE NW Russia Young Researchers in Electrical and Electronic engineering Conference (EIConRusNW)
作者: Nikita V. Popov Dmitry M. Klionskiy Department of Software Engineering and Computer Applications Saint Petersburg Electrotechnical University “LETI” St. Petersburg Russia
Today data describing a particular subject area, often contain a large number of different features that determine the properties of any processes or objects. At the same time, these data sets can reach enormous sizes... 详细信息
来源: 评论