咨询与建议

限定检索结果

文献类型

  • 68 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 78 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 25 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 9 篇 信息与通信工程
    • 5 篇 生物工程
    • 4 篇 机械工程
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
  • 12 篇 理学
    • 5 篇 生物学
    • 4 篇 数学
    • 4 篇 物理学
    • 2 篇 化学
    • 1 篇 统计学(可授理学、...
  • 10 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
    • 1 篇 法学
  • 3 篇 医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学

主题

  • 8 篇 computer science
  • 8 篇 accuracy
  • 7 篇 feature extracti...
  • 5 篇 scalability
  • 5 篇 software
  • 4 篇 computational mo...
  • 4 篇 humans
  • 3 篇 image edge detec...
  • 3 篇 spatial database...
  • 3 篇 medical services
  • 3 篇 wireless sensor ...
  • 3 篇 decoding
  • 3 篇 analytical model...
  • 3 篇 machine learning
  • 3 篇 security
  • 3 篇 information retr...
  • 2 篇 internet of thin...
  • 2 篇 covid-19
  • 2 篇 surveys
  • 2 篇 intrusion detect...

机构

  • 2 篇 dr. d. y. patil ...
  • 2 篇 sumathi reddy in...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 apex institute o...
  • 2 篇 department of co...
  • 2 篇 al-farahidi univ...
  • 2 篇 scset bennett un...
  • 2 篇 university of el...
  • 2 篇 computer science...
  • 1 篇 indian statistic...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 graphic era hill...
  • 1 篇 university schoo...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 department of ec...
  • 1 篇 prin ln welingka...
  • 1 篇 sardar beant sin...

作者

  • 2 篇 mohamed abd elaz...
  • 2 篇 songfeng lu
  • 2 篇 amit verma
  • 2 篇 arulmozhi
  • 2 篇 jian cao
  • 2 篇 sallauddin mohmm...
  • 1 篇 cheng-wei wu
  • 1 篇 p. seetharamaiah
  • 1 篇 kamalika datta
  • 1 篇 d.r. chowdhury
  • 1 篇 c prabhu
  • 1 篇 wei xiong
  • 1 篇 saibali saikia
  • 1 篇 k suresh kumar
  • 1 篇 wenjuan lian
  • 1 篇 b yamini
  • 1 篇 lakshmanarao a.
  • 1 篇 lina ge
  • 1 篇 p. venkata krish...
  • 1 篇 b.b. bhattachary...

语言

  • 75 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Department of computer Science& Engineering"
78 条 记 录,以下是1-10 订阅
排序:
Enhanced MADM Strategy with Heptapartitioned Neutrosophic Distance Metrics
收藏 引用
Neutrosophic Sets and Systems 2025年 78卷 74-96页
作者: Eassa, Mohamed Myvizhi, M. Elkholy, Mohamed Abdelhafeez, Ahmed Elbehiery, Hussam Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Mathematics KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Faculty of Computer Science& Engineering Alamein International University Egypt
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent... 详细信息
来源: 评论
A Comprehensive Study of Case-Based Reasoning in Information Retrieval: An Artificial Intelligence Approach
A Comprehensive Study of Case-Based Reasoning in Information...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Solanki, Surabhi Verma, Seema Biswas, Prolay Roy, Pulakesh Singh, Aparna Sharma, Surbhi Computer Science & Engineering Banasthali Vidyapith Rajasthan Tonk India Scset Bennett University Greater Noida India Education National Institute of Technical Teachers' Training and Research Department of Electrical & Electronics Engineering Bhopal India Computer Science & Engineering Dayananda Sagar University Ramanagara India Computer Science& Engg Brainware University Kolkata India
Information Retrieval (IR) systems which provide accurate and contextually relevant information to healthcare and law etc. where accuracy is very crucial. Traditional information retrieval methods fundamentally based ... 详细信息
来源: 评论
Comparative Analysis of an AI-enabled State-of-the-Art Models for the Detection of DDoS Attacks on IoT Devices
Comparative Analysis of an AI-enabled State-of-the-Art Model...
收藏 引用
Disruptive Technologies (ICDT), International Conference on
作者: Rajneesh Kumar Gaurav Gulati Bhupesh Gupta Mohit Chhabra Department of Computer Science & Engineering Maharishi Markandeshwar Engineering College MMDU Mullana Haryana India Department of Computer Science& Engineering IMS Engineering College Ghaziabad UP India
With technological advancement, Distributed Denial of Service (DDoS) attacks are gaining momentum in IoT networks. DDoS attacks are widely spreading on IoT devices since they have limited resources (memory) and no eff... 详细信息
来源: 评论
A Comprehensive Study of Case-Based Reasoning in Information Retrieval: An Artificial Intelligence Approach
A Comprehensive Study of Case-Based Reasoning in Information...
收藏 引用
Pervasive Computational Technologies (ICPCT), International Conference on
作者: Surabhi Solanki Seema Verma Prolay Biswas Pulakesh Roy Aparna Singh Surbhi Sharma Computer Science & Engineering Banasthali Vidyapith Tonk Rajasthan SCSET Bennett University Greater Noida India Department of Electrical & Electronics Engineering Education National Institute of Technical Teachers' Training and Research Bhopal India Computer Science & Engineering Dayananda Sagar University Ramanagara India Computer Science& Engg Brainware University Kolkata India
Information Retrieval (IR) systems which provide accurate and contextually relevant information to healthcare and law etc. where accuracy is very crucial. Traditional information retrieval methods fundamentally based ... 详细信息
来源: 评论
Multi-stage system for preprocessing mammograms
收藏 引用
IEIE Transactions on Smart Processing and Computing 2020年 第2期9卷 119-126页
作者: Shrivastava, Neeraj Bharti, Jyoti Department of Computer Science& Engineering Maulana Azad National Institute of Technology Bhopal M.P India Department of Computer Science & Engineering IPS IES Academy Indore MP India
Breast image analysis is important for the detection and diagnosis of various diseases, but more specifically, breast cancer. The most popular and widely used screening tool is mammography. It gives a better result th... 详细信息
来源: 评论
Mining of Frequent and High Utility Fuzzy Sequential Patterns  1
Mining of Frequent and High Utility Fuzzy Sequential Pattern...
收藏 引用
1st International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2022
作者: Ritika Gupta, Sunil Kumar I K Gujral Punjab Technical University Department of Computer Science& Engineering India Sardar Beant Singh State University Department of Computer Science& Engineering India
Sequential pattern mining is one of the very popular data mining techniques to find patterns from databases. The variation in technique is based on the threshold used for mining which can be frequency, utility, or bot... 详细信息
来源: 评论
Comparative Analysis of Machine Learning based Plant Leaf Disease Detection Systems  14
Comparative Analysis of Machine Learning based Plant Leaf Di...
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Jamadar, Riyazahemed A. Sharma, Anoop Wagh, Kishor Department of Computer Science& Engineering Singhania University Rajasthan India Department of Computer Engineering AISSMS IOIT Pune India
Recently the availability of Machine Learning(ML) algorithms through state of the art programming interfaces & tools has lead the research community to employ ML based object detection/classification algorithms &a... 详细信息
来源: 评论
Improving the performance of aspect based sentiment analysis using fine-tuned Bert Base Uncased model
收藏 引用
International Journal of Intelligent Networks 2021年 2卷 64-69页
作者: Geetha, M.P. Karthika Renuka, D. Department of Computer Science& Engineering Sri Ramakrishna Institute of Technology Tamil Nadu India Department of Information Technology PSG College of Technology Tamil Nadu India
Nowadays, digital reviews and ratings of E-commerce platforms provide a better way for consumers to buy the products. E-commerce giants like Amazon, Flipkart, etc provide customers with a forum to share their experien... 详细信息
来源: 评论
Wormhole attack in wireless sensor networks: A critical review  11th
Wormhole attack in wireless sensor networks: A critical revi...
收藏 引用
11th International Conference on Advanced Computing and Communication Technologies, ICACCT 2018
作者: Dutta, Nishigandha Singh, Moirangthem Marjit Department of Computer Science& Engineering North Eastern Regional Institute of Science & Technology Nirjuli791109 India
A Wireless sensor network (WSN) consisting of spatially distributed autonomous devices using sensors is prone to numerous kinds of threats and attacks due to various reasons such as unattended nature of deployment in ... 详细信息
来源: 评论
Optimization Technique to Reduce Resource Utilization of Software Key Loggers Using PSO  3
Optimization Technique to Reduce Resource Utilization of Sof...
收藏 引用
3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Sharma, Yashika Rana, Muskaan Apex Institute of Technology Chandigarh University Mohali India Chandigarh University Department of Computer Science& Engineering Mohali India
Software key loggers are the leading type of keylogging. Both cheap and consumer-specific and specially created keylogging programs are easily accessible online. These key loggers should be revised to each target oper... 详细信息
来源: 评论