咨询与建议

限定检索结果

文献类型

  • 214 篇 会议
  • 37 篇 期刊文献

馆藏范围

  • 251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 145 篇 工学
    • 97 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 40 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 18 篇 化学工程与技术
    • 16 篇 电气工程
    • 16 篇 生物工程
    • 14 篇 安全科学与工程
    • 11 篇 力学(可授工学、理...
    • 11 篇 光学工程
    • 11 篇 材料科学与工程(可...
    • 10 篇 机械工程
    • 9 篇 交通运输工程
    • 8 篇 动力工程及工程热...
    • 8 篇 生物医学工程(可授...
    • 8 篇 网络空间安全
    • 7 篇 建筑学
  • 94 篇 理学
    • 39 篇 数学
    • 35 篇 物理学
    • 18 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
    • 11 篇 统计学(可授理学、...
  • 43 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 12 篇 医学
    • 11 篇 公共卫生与预防医...
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 9 篇 法学
  • 4 篇 农学
  • 3 篇 文学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 经济学

主题

  • 16 篇 accuracy
  • 9 篇 support vector m...
  • 9 篇 deep learning
  • 9 篇 real-time system...
  • 9 篇 feature extracti...
  • 8 篇 random forests
  • 8 篇 technological in...
  • 7 篇 computational mo...
  • 7 篇 machine learning...
  • 6 篇 internet of thin...
  • 6 篇 image segmentati...
  • 6 篇 machine learning
  • 6 篇 data models
  • 6 篇 convolutional ne...
  • 5 篇 recommender syst...
  • 5 篇 medical services
  • 5 篇 wireless sensor ...
  • 5 篇 visualization
  • 4 篇 scalability
  • 4 篇 nearest neighbor...

机构

  • 8 篇 dept. of compute...
  • 7 篇 trento institute...
  • 7 篇 i-50019
  • 6 篇 dept. of compute...
  • 6 篇 institute of mat...
  • 5 篇 dept. of microel...
  • 5 篇 r and d center f...
  • 5 篇 dept. of mechani...
  • 5 篇 dipartimento di ...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of mech. a...
  • 4 篇 school of comput...
  • 4 篇 dept. of compute...
  • 4 篇 school of comput...
  • 4 篇 dept. of cse it ...
  • 4 篇 dept. of compute...
  • 3 篇 department of ph...
  • 3 篇 infn e laborator...
  • 3 篇 infn sezione di ...
  • 3 篇 department of ph...

作者

  • 7 篇 marin f.
  • 7 篇 serra e.
  • 7 篇 peng hsin-shu
  • 7 篇 marino f.
  • 7 篇 borrielli a.
  • 7 篇 bonaldi m.
  • 6 篇 priyanka das
  • 6 篇 prodi g.a.
  • 6 篇 vezio p.
  • 6 篇 chen shia-chung
  • 6 篇 sarro p.m.
  • 6 篇 das priyanka
  • 6 篇 morana b.
  • 5 篇 kwon ki-ryong
  • 5 篇 guru prasad m s
  • 5 篇 chowdhury a.
  • 4 篇 lee suk-hwan
  • 4 篇 su pao-lin
  • 4 篇 ki-ryong kwon
  • 4 篇 cho hwan-gue

语言

  • 233 篇 英文
  • 16 篇 其他
  • 1 篇 日文
  • 1 篇 中文
检索条件"机构=Dept. of Computer Engineering and Application"
251 条 记 录,以下是11-20 订阅
排序:
360° Security in Cameras Using Linear Binary Pattern Histogram  5
360° Security in Cameras Using Linear Binary Pattern Histog...
收藏 引用
5th International Conference on Inventive Research in Computing applications, ICIRCA 2023
作者: Faujdar, Neetu Chaudhary, Ankur Gla University Dept. of Computer Engineering and Application Mathura India
This research study proposes a novel approach for enhancing the security of surveillance cameras by using a combination of panoramic cameras and linear binary pattern (LBP) histograms. The proposed method can detect a... 详细信息
来源: 评论
Re-Cognition I: An Inspection of Learner's Cognitive Well-Being, Pursuant to Contemporary Period, Facilitates the Academic Life Cycle  6
Re-Cognition I: An Inspection of Learner's Cognitive Well-Be...
收藏 引用
6th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2024
作者: Ganguly, Souvik Pati Mandal, Kailash Guha, Debasis Dr. B.C. Roy Engineering College Dept. of Computer Application Durgapur India National Institute of Technology Dept. of Computer Science and Engineering Durgapur India
Recommender systems enhance the user experience by integrating factual and behavioral practices, enhancing learning strategies, and granting academic opportunities based on learners subjective interests. Cognitive int... 详细信息
来源: 评论
ResNet-50: The Deep Networks for Automated Breast Cancer Classification using MR Images  2
ResNet-50: The Deep Networks for Automated Breast Cancer Cla...
收藏 引用
2nd International Conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
作者: Das, Tejaswini Nayak, Debasish Swapnesh Kumar Kar, Anindita Jena, Lambodar Swarnkar, Tripti University Dept. of Computer Application FET-ITER Bhubaneswar India University FET-ITER Dept. of Computer Science and Engineering Bhubaneswar India Bhubaneswar India
One in every four cancer cases in women is breast cancer, which is the most prevalent malignancy in this group globally. In 2020, breast cancer will account for one in every eight new instances of cancer, according to... 详细信息
来源: 评论
LSB based Image Steganography with Password-Protected SMTP Transmission  2
LSB based Image Steganography with Password-Protected SMTP T...
收藏 引用
2nd IEEE Global Conference on Communications and Information Technologies, GCCIT 2024
作者: Prakash, Mangali Bhanu Kumar, E. Ravi Anitha, Banavath Bansilal, Boda Mukkamall, Babu Reddy Sanjana, Gudipati Pranaya Vardhaman College Of Engineering Dept. of Information Technology Hyderabad India Krishna University Machilipatnam Dept. of Computer Application Machilipatnam India
Picture steganography plays a crucial role in secure communication by discreetly altering images for various purposes such as data authentication, privacy protection, and watermarking. However, traditional methods oft... 详细信息
来源: 评论
Smart Navigation: Enhancing Vehicle Trajectory Forecasting with Deep Learning  1
Smart Navigation: Enhancing Vehicle Trajectory Forecasting w...
收藏 引用
1st International Conference on Innovations in Communications, Electrical and computer engineering, ICICEC 2024
作者: Hashim, Muneera Nadera Beevi, S. Apj Abdul Kalam Technological University Tkm College of Engineering Dept. of Computer Application Kollam India
Methods for accurately predicting the trajectories of vehicles have always been sought after by Intelligent Transportation Systems (ITS) to improve travel efficiency and traffic management. Advances in deep learning a... 详细信息
来源: 评论
IoT based dual health monitoring device for liquid infusion and urine level measurement of urine bag  3
IoT based dual health monitoring device for liquid infusion ...
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Kumar, Amit Pathak, Pooja Dwivedi, Vijay Kumar Sharma, Dilip Kumar Gla University Upcst Mathura India Gla University Dept. of Computer Engineering and Application Mathura India Gla University Dept. of Mechanical Engineering Mathura India
Advanced healthcare monitoring devices that improve patient care through real-time data collecting, remote monitoring, and individualized therapy have been developed as a result of the integration of IoT technology in... 详细信息
来源: 评论
Advancing Phishing Detection with Random Forest: A Machine Learning Approach for Enhanced Cybersecurity  3
Advancing Phishing Detection with Random Forest: A Machine L...
收藏 引用
3rd International Conference on Intelligent Systems, Advanced Computing, and Communication, ISACC 2025
作者: Chandra, Sucheta Das, Priyanka Mandal, Ankita Chakroborty, Sriparno Chowdhury, Ishika Ghosh, Kathamrita University of Engineering & Management Institute of Engineering & Management Dept. of Computer Application and Science Kolkata India
Phishing attacks remain a critical threat to cybersecurity, leveraging deception to steal sensitive information from individuals and organizations. Traditional detection methods often fail to keep up with evolving phi... 详细信息
来源: 评论
An Optimized Grid Computing based Feature Selection approaches from Brain Image dataset using Pretrained models  1
An Optimized Grid Computing based Feature Selection approach...
收藏 引用
1st IEEE International Conference on Advances in Signal Processing, Power, Communication, and Computing, ASPCC 2024
作者: Nayak, Sradhanjali Biswal, Pradyut Kumar Mishra, Pravakar Pradhan, Sateesh Kumar Niis Institute of Business Administration Dept. of Computer Science Bhubaneswar India Iiit Bhubaneswar Dept. of Etc Bhubaneswar India Niis Institute of Business Administration Dept. of Computer Science and Engineering Bhubaneswar India Utkal University Dept. of Computer Science and Application Bhubaneswar India
The outcome of simulated experiments expressed the efficiency of grid-based algorithm in the domain of image processing in the context of Brain MRI Images for Tumor Detection. It provides a faster approach in detectin... 详细信息
来源: 评论
Hindi News Article's Headline Generation based on Abstractive Text Summarization
Hindi News Article's Headline Generation based on Abstractiv...
收藏 引用
2023 IEEE International Conference on Network, Multimedia and Information Technology, NMITCON 2023
作者: Kumar, Jeetendra Shekhar, Shashi Gupta, Rashmi Atal Bihari Vajpayee University Dept. of Computer Science and Application Bilaspur India Gla University Dept. of Computer Engineering and Applications Mathura India
Text summarization is a technique that converts large text into shorter ones by keeping its important information. Most of the available summarizers, summarize English language text. The availability of summarizers in... 详细信息
来源: 评论
Examining driver sleepiness based on his visual actions with ML Techniques
Examining driver sleepiness based on his visual actions with...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Rawat, Vandana Patwa, Kaushal Negi, Harendra Singh Sharma Ghai, Anupriya Graphic Era Deemed to be University Dept. Of Computer Scienceand Engineering Dehradun India Graphic Era Deemed to be University Dept. Of Computer Application Dehradun India Graphic Era Hill University Dept. Of School of Computing Dehradun India
Driver drowsiness is a significant risk factor for road accidents. It is essential for road safety to develop efficient sleepiness detection systems. This work concentrate around analyzing driver sluggishness in view ... 详细信息
来源: 评论