咨询与建议

限定检索结果

文献类型

  • 108 篇 会议
  • 72 篇 期刊文献

馆藏范围

  • 180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 119 篇 工学
    • 89 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 30 篇 信息与通信工程
    • 25 篇 电气工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 控制科学与工程
    • 12 篇 生物医学工程(可授...
    • 10 篇 生物工程
    • 9 篇 光学工程
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 6 篇 机械工程
    • 5 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 交通运输工程
  • 60 篇 理学
    • 35 篇 数学
    • 13 篇 生物学
    • 12 篇 化学
    • 11 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 6 篇 物理学
  • 40 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 13 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 教育学
    • 4 篇 教育学
  • 3 篇 法学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 17 篇 accuracy
  • 9 篇 deep learning
  • 9 篇 feature extracti...
  • 7 篇 computational mo...
  • 7 篇 real-time system...
  • 7 篇 machine learning
  • 6 篇 internet of thin...
  • 6 篇 magnetic resonan...
  • 6 篇 optimization
  • 6 篇 convolutional ne...
  • 5 篇 data models
  • 4 篇 support vector m...
  • 4 篇 libraries
  • 4 篇 brain modeling
  • 4 篇 predictive model...
  • 4 篇 decision making
  • 4 篇 security
  • 4 篇 machine learning...
  • 4 篇 numerical models
  • 4 篇 adaptation model...

机构

  • 8 篇 iconix software ...
  • 7 篇 department of co...
  • 5 篇 saint petersburg...
  • 3 篇 karpagam academy...
  • 3 篇 master of comput...
  • 3 篇 iconix software ...
  • 2 篇 department of so...
  • 2 篇 independent rese...
  • 2 篇 university of sh...
  • 2 篇 department of co...
  • 2 篇 sri krishna coll...
  • 2 篇 college of infor...
  • 2 篇 hindustan instit...
  • 2 篇 department of co...
  • 2 篇 department of ma...
  • 2 篇 school of optica...
  • 2 篇 department of co...
  • 2 篇 departamento de ...
  • 2 篇 school of softwa...
  • 2 篇 kongu engineerin...

作者

  • 7 篇 r. saravanakumar
  • 4 篇 k. nirmaladevi
  • 4 篇 krinkin kirill
  • 3 篇 nirmaladevi k.
  • 3 篇 saravanakumar r.
  • 3 篇 aljammal ashraf ...
  • 3 篇 s. jeya lakshmi
  • 3 篇 anton yu. filato...
  • 3 篇 p. ananthi
  • 3 篇 filatov anton yu...
  • 3 篇 shevskaya nataly...
  • 2 篇 carnero rosell a...
  • 2 篇 tharani as. krit...
  • 2 篇 amer ibrahim
  • 2 篇 manjunatha
  • 2 篇 wang ran
  • 2 篇 mahanta priyaksh...
  • 2 篇 shoeibi afshin
  • 2 篇 m. c. babu
  • 2 篇 prakash s.p. shi...

语言

  • 171 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Software Engineering and Computer Applications"
180 条 记 录,以下是41-50 订阅
排序:
Investigation of trees algorithms for improving quality of client's data in data mining tasks
Investigation of trees algorithms for improving quality of c...
收藏 引用
2020 IEEE International Conference "Quality Management, Transport and Information Security, Information Technologies", IT and QM and IS 2020
作者: Razmochaeva, Natalya V. Klionskiy, Dmitry M. Saint-Petersburg Electrotechnical University 'Leti' Department of Software Engineering and Computer Applications St. Petersburg Russia Saint-Petersburg Electrotechnical University 'Leti' Department of Computer Science and Engineering St. Petersburg Russia
Machine learning methods, which are tree-based algorithms, have found their application in the task of improving the quality of client data. Among such methods are distinguished: decision trees and decision forests, r... 详细信息
来源: 评论
Enhancing Security in the Internet of Things: A Trust-Based Protocol for Resilient Communication
收藏 引用
SN computer Science 2024年 第1期5卷 4页
作者: Althaf Ali, A. Hussain, Mohammed Muzaffar Subramaneswara Rao, A. Lavanya, S. Feroz Khan, A.B. Department of Computer Applications Madanapalle Institute of Technology & Science (MITS) Andhra Pradesh Madanapalle India Department of Computer Science and Engineering C. Abdul Hakeem College of Engineering and Technology Tamil Nadu Melvisharam India Department of Software Applications Thiruthangal Nadar College Tamil Nadu Chennai India Department of Computer Science Syed Hameedha Arts and Science College Tamil Nadu Kilakarai India
The quick increasing in the Internet of Things (IoT) devices has raised significant security concerns, particularly in the face of reactive jamming attacks. This paper proposes a trust-based protocol named Trust-Based... 详细信息
来源: 评论
A performance analysis method for service-oriented cloud applications (SOCAs)
A performance analysis method for service-oriented cloud app...
收藏 引用
2012 International Conference on computer Communication and Informatics, ICCCI 2012
作者: RajaRaajeswari, S. Selvarani, R. Raj, Pethuru Department of Computer Applications RajaRajeswari College of Engineering Bangalore India Department of Computer Science and Engineering M.S. Ramaiah Institute of Technology Bangalore India Sify Software Ltd. Tidel Park Chennai India
With the memorable start and massive adoption of cloud concepts, infrastructures and platforms, there is a paradigm shift in the IT landscape. That is, IT solutions and services are being developed, debugged, deployed... 详细信息
来源: 评论
Intrusion Detection Mechanism Using Deep Learning  5
Intrusion Detection Mechanism Using Deep Learning
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Ananthi, P. Nirmaladevi, K. Naveen Kumar, S. Kongu Engineering College Department of Computer Technology-PG Tamilnadu Erode638060 India Madanapalle Institute of Technology & Science Department of Computer Applications India M.Sc Software Systems Kongu Engineering College Erode India
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection Systems (IDS) in recognizing and impeding... 详细信息
来源: 评论
Double Encryption Technique for Sharing and Storing the Images in the Cloud Environment  4
Double Encryption Technique for Sharing and Storing the Imag...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Anusha, P. Maruthi, R. Kumar, D. Maghesh Begum, H. Parveen Periyar Maniammai Institute of Science and Technology Department of Software Engineering Tamil Nadu Thanjavur India Hindustan Institute of Technology and Science Department of Computer Applications Tamil Nadu Chennai India
Cryptography is used by all organizations to protect the data files and ensures confidentiality mainly at the time of sharing and storing in the cloud data storage. The cloud service providers use a wide range of tool... 详细信息
来源: 评论
Location-based collaborative filtering for web service recommendation
收藏 引用
Recent Patents on computer Science 2019年 第1期12卷 34-40页
作者: Venkatachalaappaswamy, Mareeswari Ramaraj, Vijayan Ravichandran, Saranya Department of Computer Applications and Creative Media School of Information Technology and Engineering Vellore Institute of Technology-VIT VelloreTamil Nadu India Department of Information Technology School of Information Technology and Engineering Vellore Institute of Technology-VIT VelloreTamil Nadu India Department of Software and Systems Engineering School of Information Technology and Engineering Vellore Institute of Technology-VIT VelloreTamil Nadu India
Background: In many modern applications, information filtering is now used that exposes users to a collection of data. In such systems, the users are provided with recommended items’ list they might prefer or predict... 详细信息
来源: 评论
A Comparative Analysis and Prediction of Diabetes Using Machine Learning Approaches  5th
A Comparative Analysis and Prediction of Diabetes Using Mach...
收藏 引用
5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
作者: Ansari, Gufran Ahmad Bhat, Salliah Shafi Bhoite, Sachin Department of Computer Science and Engineering and Software Engineering University of Hail Hail Saudi Arabia Computer Applications B.S. Abdur Rahman Crescent Institute of Science and Technology Chennai600048 India Pune411 038 India
Diabetes is a leading cause of death. People with type 1 diabetes (T1D) can face a number of consequences from their illness. Hyperglycemia is a symptom of T1D disease. Hyperglycemia can be symptoms that can be u... 详细信息
来源: 评论
Detection of Different Stages of Alzheimer’s Disease Using CNN Classifier
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3933-3948页
作者: S M Hasan Mahmud Md Mamun Ali Mohammad Fahim Shahriar Fahad Ahmed Al-Zahrani Kawsar Ahmed Dip Nandi Francis M.Bui Department of Computer Science American International University-Bangladesh(AIUB)Dhaka1229Bangladesh Centre for Advanced Machine Learning and Applications(CAMLAs) DhakaBangladesh Department of Software Engineering Daffodil International UniversityDhakaBangladesh Department of Computer Engineering Umm Al-Qura UniversityMecca24381Saudi Arabia Department of ECE University of SaskatchewanSaskatoonSK S7N5A9Canada Group of Biophotomatiχ Department of ICTMBSTUSantoshTangail1902Bangladesh
Alzheimer’s disease(AD)is a neurodevelopmental impairment that results in a person’s behavior,thinking,and memory *** common symptoms ofADare losingmemory and early *** addition to these,there are several serious im... 详细信息
来源: 评论
Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems
收藏 引用
IEEE Internet of Things Journal 2017年 第6期4卷 1798-1800页
作者: Yu, Wei Fu, Xinwen Song, Houbing Economides, Anastasios A. Jo, Minho Zhao, Wei Department of Computer and Information Sciences Towson University TowsonMD21252 United States Department of Computer Science University of Central Florida OrlandoFL32816 United States Department of Electrical Computer Software and Systems Engineering Embry-Riddle Aeronautical University Daytona BeachFL32114 United States Computer Networks and Telematic Applications Laboratory University of Macedonia Thessaloniki546 36 Greece Department of Computer Convergence Software Korea University Seoul Korea Republic of University of Macau China
A typical cyber-physical system (CPS) refers to a system that features a tight integration of computation, networking, and physical elements for interactions between cyber and physical spaces. The Internet of Things (... 详细信息
来源: 评论
Animation Qr-Codes for Facial Biometry Tasks and Its applications  10
Animation Qr-Codes for Facial Biometry Tasks and Its Applica...
收藏 引用
10th Mediterranean Conference on Embedded Computing, MECO 2021
作者: Kukharev, Georgy Kazieva, Nazym Shchegoleva, Nadezhda Saint Petersburg Electrotechnical University 'Leti' Department of Software Engineering and Computer Applications Saint Petersburg Russia L.N. Gumilyov Eurasian National University Department of Radio Engineering Electronics and Telecommunications Nur-Sultan Kazakhstan
The article shows the history of the development of badges as an image accessory designed to represent and/or identify people at a service checkpoint, in a conference or other mass event related to a meeting and conta... 详细信息
来源: 评论