咨询与建议

限定检索结果

文献类型

  • 178 篇 会议
  • 37 篇 期刊文献

馆藏范围

  • 215 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 92 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 40 篇 信息与通信工程
    • 14 篇 化学工程与技术
    • 13 篇 控制科学与工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 10 篇 力学(可授工学、理...
    • 10 篇 机械工程
    • 10 篇 生物工程
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 8 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 7 篇 动力工程及工程热...
    • 7 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
  • 74 篇 理学
    • 30 篇 数学
    • 25 篇 物理学
    • 11 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
    • 10 篇 统计学(可授理学、...
  • 42 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 16 篇 工商管理
    • 15 篇 图书情报与档案管...
  • 12 篇 医学
    • 10 篇 公共卫生与预防医...
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 7 篇 法学
  • 4 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 9 篇 real-time system...
  • 9 篇 machine learning
  • 9 篇 accuracy
  • 8 篇 support vector m...
  • 7 篇 deep learning
  • 6 篇 internet of thin...
  • 6 篇 image segmentati...
  • 6 篇 medical services
  • 6 篇 computational mo...
  • 6 篇 random forests
  • 5 篇 smart contract
  • 5 篇 security
  • 5 篇 protocols
  • 5 篇 machine learning...
  • 5 篇 training
  • 4 篇 neural networks
  • 4 篇 visualization
  • 4 篇 blockchain
  • 4 篇 image color anal...
  • 4 篇 encryption

机构

  • 10 篇 madan mohan mala...
  • 9 篇 dept. of informa...
  • 7 篇 trento institute...
  • 7 篇 dept. of compute...
  • 7 篇 i-50019
  • 6 篇 institute of mat...
  • 5 篇 dept. of microel...
  • 5 篇 r and d center f...
  • 5 篇 dept. of mechani...
  • 5 篇 dipartimento di ...
  • 4 篇 dept. of mech. a...
  • 4 篇 dept. of compute...
  • 4 篇 school of comput...
  • 4 篇 dept. of cse it ...
  • 4 篇 dept. of compute...
  • 3 篇 department of ph...
  • 3 篇 infn e laborator...
  • 3 篇 infn sezione di ...
  • 3 篇 department of ph...
  • 3 篇 department of co...

作者

  • 9 篇 rajendra kumar d...
  • 8 篇 dwivedi rajendra...
  • 7 篇 marin f.
  • 7 篇 serra e.
  • 7 篇 marino f.
  • 7 篇 borrielli a.
  • 7 篇 bonaldi m.
  • 6 篇 peng hsin-shu
  • 6 篇 prodi g.a.
  • 6 篇 vezio p.
  • 6 篇 sarro p.m.
  • 6 篇 morana b.
  • 5 篇 mishra sujogya
  • 5 篇 chen shia-chung
  • 5 篇 guru prasad m s
  • 5 篇 chowdhury a.
  • 4 篇 soumen santra
  • 4 篇 su pao-lin
  • 4 篇 arpan deyasi
  • 4 篇 pradhan sateesh ...

语言

  • 197 篇 英文
  • 16 篇 其他
  • 1 篇 日文
  • 1 篇 中文
检索条件"机构=Dept. of Computer Technology and Application"
215 条 记 录,以下是71-80 订阅
排序:
A Machine Learning Approach to Compare Causal Inference Modelling Strategies in the Digital Advertising Industry
A Machine Learning Approach to Compare Causal Inference Mode...
收藏 引用
Ambient Intelligence in Health Care (ICAIHC), International Conference on
作者: Sanskriti Sanjay Kumar Singh Apoorv Kumar Sinha Trilok Nath Pandey Biswa Mohan Acharya School of Computer Science and Engineering Vellore Institute of Technology Chennai India Dept. of Computer Application ITER SOA University Bhubaneswar India
Cause and effect relationships are not extensively explored in machine learning but prior to creating a system that understands causal relationships, there needs to be a general ability to grasp and inculcate cause-an...
来源: 评论
Detection of Brain Tumor using Convolution Neural Network through Detection of Metastasis
Detection of Brain Tumor using Convolution Neural Network th...
收藏 引用
Devices for Integrated Circuit (DevIC)
作者: Soumen Santra Suman Sardar Swarnadeep Sil Rudra Sarkar Arpan Deyasi Dept. of Computer Application Techno International New Town Kolkata India Dept. of Electronic Science Acharya Prafulla Chandra College New Barrackpore India Dept. of Electronics and Communication Engineering RCC Institute of Information Technology Kolkata India
A novel model using convolution neural network has been developed for near accurate detection of brain tumor by carefully preprocessing the data and addressing class imbalance. Dataset was gathered between December 20... 详细信息
来源: 评论
A Comprehensive Framework for Unmanned Aerial Vehicle (UAV)-Enabled Real-Time Human Detection System for Disaster Management
A Comprehensive Framework for Unmanned Aerial Vehicle (UAV)-...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Upadhyay, Govind Murari Joshi, Mukesh Rathi, Preeti Vats, Prashant Narula, Meenakshi Gupta, Shashi Kant Manipal University Jaipur Dept. of Computer Application Rajasthan Jaipur India Graphic Era Hill University School of Computing Uttarakhand India K.R. Mangalam University Dept. of CSE School of Engg.and Techn. Haryana Gurugram India Manipal University Jaipur School of CSE Dept. of CSE Rajasthan Jaipur India Jagannath International Management School Department of Information Technology New Delhi India ITM University Gwalior Department of CSE Madhya Pradesh India
Disasters pose significant challenges to emergency response efforts, often hindering timely and effective interventions. In recent years, integrating Unmanned Aerial Vehicles (UAVs) has emerged as a promising approach... 详细信息
来源: 评论
Analysis and Research on Students' Learning Behavior Based on Lag Sequence Analysis  4
Analysis and Research on Students' Learning Behavior Based o...
收藏 引用
4th International Conference on computer Information Science and Artificial Intelligence, CISAI 2021
作者: Han, Jiazheng Wei, Zhengang Ocean University of China Dept. of Computer Application Technology Qingdao China Ocean University of China Dept. of Software Engineering Qingdao China
with the effective practical application of data mining technology in other fields, many researchers have used data mining technology to analyze the learning process data in the field of education and teaching, and ex... 详细信息
来源: 评论
IoT based Truck Wheel Temperature Monitoring System
IoT based Truck Wheel Temperature Monitoring System
收藏 引用
Intelligent Technologies (ACOIT), Asian Conference on
作者: Mohd Zaid Nadeem Ahmad Mohammed Aljamal Sarosh Patel Asif Khan dept. of Computer Science and Engineering Integral University Lucknow India dept. of Electronics and communication Engg Goel Institute of Technology And Managment Lucknow India School of Engineering University of Bridgeport USA dept. of Computer Application Integral Robotics Lab Integral University Lucknow India
The main objective of this paper is to design an IoT based truck wheel temperature monitoring system using Arduino board with the aim to overcome endanger and raise the safety measures for truck and goods. By designin... 详细信息
来源: 评论
A New Quantum Inspired Algorithmic Approach to Finding Minimum Spanning Tree
A New Quantum Inspired Algorithmic Approach to Finding Minim...
收藏 引用
IEEE India Conference (INDICON)
作者: Amrit Kaur Sulabh Bansal Dept. of Computer Application Manipal University Jaipur Jaipur India Department of Information Technology Manipal University Jaipur Jaipur India
One of the most common and well-known problems in combinatorial optimization is the minimum spanning tree. With the emergence of complex data structures, new, more complex, but asymptotically efficient algorithms have...
来源: 评论
Classifying the DNA sequence using Optimized Naive Bayes Approach: A Comparative Analysis of Machine Learning Algorithms
Classifying the DNA sequence using Optimized Naive Bayes App...
收藏 引用
Computational Intelligence, Communication technology and Networking (CICTN), International Conference on
作者: Aditya Pai H Chandrappa S Guru Prasad M S Ganesh Pathak Atul Thakare Pratik Kumar MIT School of Computing MIT Art Design and Technology University Pune India Dept. of Computer Science and Engineering JAIN (Deemed-to-be University) Bengaluru India Dept. of Computer Science and Engineering Graphic Era (Deemed to be University) Dehradun India Department of Computer Application Graphic Era (Deemed-to-be University) Dehradun India
In bioinformatics, the exact classification of DNA sequences is essential to increasing comprehension of genetic structures and functionalities. This research introduces an enhanced Naive Bayes approach (ENB) specific... 详细信息
来源: 评论
Energy Efficient Location-Based XML Indexing in Real-Time Wireless Data Broadcasting for IoT Devices
Energy Efficient Location-Based XML Indexing in Real-Time Wi...
收藏 引用
Pervasive Computational Technologies (ICPCT), International Conference on
作者: Vikas Goel Ashutosh Sharma Mayank Singh Amit Kumar Goyal Vikas Jain Dept. of IT KIET Group of Institutions Ghaziabad UP India Dept. of IT IMS University Campus Ghaziabad UP India Dept. of CSE GL Bajaj Institute of Technology Gr. Noida India Dept. of CSE Chandigarh University Punjab India Dept. of Computer Application SCRIET C.C.S. University Campus Meerut India
The Internet of Things (IoT) is fast revolutionizing a number of sectors by performing real-time data collection and analysis. Effective data broadcasting protocols become increasingly important as IoT devices. Specif... 详细信息
来源: 评论
Development of Cloud Centric Healthcare Monitoring System For Cardiac Patients embedded in IoT Platform
Development of Cloud Centric Healthcare Monitoring System Fo...
收藏 引用
International Conference on Emerging Trends in Engineering and technology, ICETET
作者: Adarsh Ravi Mishra Ravi Mishra Ragini Shukla Dept. of Computer Application and Information Technology Dr. C.V. Raman University Bilaspur India Dept. of Electronics and Telecommunication G H Raisoni Institute of Engineering and Technology Nagpur India
In terms of profit and employment, the Indian economy’s healthcare sector has emerged as one of the most significant sectors. The Indian healthcare sector is experiencing rapid growth due to improved coverage, expand...
来源: 评论
Detect Phishing Website by Fuzzy Multi-Criteria Decision Making  1
Detect Phishing Website by Fuzzy Multi-Criteria Decision Mak...
收藏 引用
1st International Conference on AI in Cybersecurity, ICAIC 2022
作者: Shah, Rajeev Kumar Hasan, Mohammad Kamrul Islam, Shayla Khan, Asif Ghazal, Taher M. Khan, Ahmad Neyaz Kathmandu Nepal Center for Cyber Security Faculty of Information Science & Technology Selangor Malaysia Ucsi University Institue of Computer Science and Digitial Innovation Malaysia Integral University Dept. of Computer Application Lucknow India Sjyline Collge University United Arab Emirates
Phishing activity is undertaken by the hackers to compromise the computer networks and financial system. A compromised computer system or network provides data and or processing resources to the world of cybercrime. C... 详细信息
来源: 评论