咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 11 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 2 篇 机械工程
    • 2 篇 动力工程及工程热...
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 土木工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
  • 3 篇 理学
    • 3 篇 数学
    • 2 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 2 篇 internet of thin...
  • 2 篇 nearest neighbor...
  • 2 篇 face recognition
  • 2 篇 adversarial mach...
  • 2 篇 random forests
  • 2 篇 federated learni...
  • 2 篇 data models
  • 1 篇 information hidi...
  • 1 篇 fake news
  • 1 篇 scalability
  • 1 篇 diabetes
  • 1 篇 data security
  • 1 篇 routing
  • 1 篇 support vector m...
  • 1 篇 quantum networks
  • 1 篇 simulation
  • 1 篇 proposals
  • 1 篇 quantum entangle...
  • 1 篇 throughput
  • 1 篇 voting

机构

  • 2 篇 dept. of compute...
  • 2 篇 dept.of computer...
  • 1 篇 kr pete krishna ...
  • 1 篇 dept of computer...
  • 1 篇 microprocessor a...
  • 1 篇 vidya vikas inst...
  • 1 篇 shri shankarlal ...
  • 1 篇 saveetha college...
  • 1 篇 research scholar...
  • 1 篇 k.l.s gogte inst...
  • 1 篇 computer applica...
  • 1 篇 dept. of cs & it...
  • 1 篇 sathyabama insti...
  • 1 篇 dept. of compute...
  • 1 篇 dept.of master o...
  • 1 篇 dept. of compute...
  • 1 篇 srm institute of...
  • 1 篇 vidya vikas inst...
  • 1 篇 electronics and ...
  • 1 篇 dept.of computer...

作者

  • 1 篇 shivashankara s.
  • 1 篇 s m soumyasri
  • 1 篇 nandi shovan
  • 1 篇 j.mohan kumar
  • 1 篇 dharamvir
  • 1 篇 kovalan a.
  • 1 篇 murali srividhya...
  • 1 篇 m k kavyashree
  • 1 篇 chaba yogesh
  • 1 篇 s shivashankara
  • 1 篇 m. harshitha
  • 1 篇 padmageetha b.g.
  • 1 篇 i. s. chakrapani
  • 1 篇 hegde ramakrishn...
  • 1 篇 raja s.r.
  • 1 篇 nisha a.g.
  • 1 篇 padmageetha b. g
  • 1 篇 ramakrishna hegd...
  • 1 篇 soumyasri s.m.
  • 1 篇 devi g. shree

语言

  • 17 篇 英文
  • 2 篇 其他
检索条件"机构=Dept.of Computer Science and Applications"
19 条 记 录,以下是1-10 订阅
排序:
Energy Efficient LEDCA Analysis for Improved Throughput in Wireless Sensor Networks  6
Energy Efficient LEDCA Analysis for Improved Throughput in W...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Padmageetha, B.G. Naik, Pramod Kumar Patil, Mallanagouda Dept.of Computer Applications Dayananda Sagar University Bengaluru India Dept. of Computer science and Engineering Dayananda Sagar University Bengaluru India Dept. of Computer science and Engineering RVITM Bengaluru India
Wireless Sensor Networks (WSNs) face significant challenges in terms of energy conservation, scalability, and data throughput owing to their limited node energy resources. This paper presents a low-energy data-centric... 详细信息
来源: 评论
Energy Efficient LEDCA Analysis for Improved Throughput in Wireless Sensor Networks
Energy Efficient LEDCA Analysis for Improved Throughput in W...
收藏 引用
Mobile Computing and Sustainable Informatics (ICMCSI), International Conference on
作者: Padmageetha B. G Pramod Kumar Naik Mallanagouda Patil Dept.of Computer Applications Dayananda Sagar University Bengaluru India Dept. of Computer science and Engineering Dayananda Sagar University Bangalore India Dept. of Computer science and Engineering RVITM Bengaluru India
Wireless Sensor Networks (WSNs) face significant challenges in terms of energy conservation, scalability, and data throughput owing to their limited node energy resources. This paper presents a low-energy data-centric... 详细信息
来源: 评论
Smart Irrigation System with Data Visualization
Smart Irrigation System with Data Visualization
收藏 引用
2019 International Conference on Emerging Trends in science and Engineering, ICESE 2019
作者: Bhowmick, Sudharshan Kumar Padhiari, Shraddha Apoorv, Shubhendu Annadevi, E. Sathyabama Institute of Science and Technology Dept.Of ECE Chennai India SRM Institute of Science and Technology Dept. of Computer Applications Chennai India
In India, agriculture continues to dominate all other sectors which provide the majority portion in India's marketplace. The proper circumstances are required for the production of crops. In earlier times, irrigat... 详细信息
来源: 评论
A Learning Performance Assessment Model Using Neural Network Classification Methods of e-Learning Activity Log Data  2
A Learning Performance Assessment Model Using Neural Network...
收藏 引用
2nd International Conference on Smart Systems and Inventive Technology, ICSSIT 2019
作者: Arumugam, S. Kovalan, A. Narayanan, A.E. Dept. of Computer Science and Applications Periyar Maniammai Institute of Science and Technology Thanjavur India Dept.of Computer Science VSB College of Arts and Science VSB Group of Institutions Karur India Department. of Computer Science Engineering Periyar Maniammai Institute of Science and Technology Thanjavur India
Interactive learning and computed aided learning methods increased a lot of developments in Learning Systems. It results a collection of log data of learning activities increased. Machine Learning(ML) based Data Minin... 详细信息
来源: 评论
LCS based Text Steganography through Indian Languages
LCS based Text Steganography through Indian Languages
收藏 引用
2010 3rd IEEE International Conference on computer science and Information Technology—ICCSIT 2010
作者: S.Changder D.Ghosh N.C.Debnath Dept.of Computer Applications Dept.of CSE National Institute of TechnologyDurgapur Dept.of Computer Science Winona State University
Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended *** the other steganography methods such as Im... 详细信息
来源: 评论
An Effective Analysis of Machine Learning Models for Prediction of Heart Disease  2
An Effective Analysis of Machine Learning Models for Predict...
收藏 引用
2nd IEEE International Conference on Networks, Multimedia and Information Technology, NMITCON 2024
作者: Patil, Rudragoud Kamkar, Shambahvi C. Goudar, Shwetha Indudhar K.L.S.Gogte Institute of Technology Dept of Computer Science and Engineering Karnataka Belagavi India K.L.S Gogte Institute of Technology Dept.of Master of Computer Applications Karnataka Belagavi India
Heart failure is a chronic illness that impacts millions of individuals worldwide. In order to forecast heart failure health status early and take the necessary activities to address this global issue an effective mac... 详细信息
来源: 评论
Continuous Tweet Stream Analysis using Apache Spark Streaming API & Kafka  15
Continuous Tweet Stream Analysis using Apache Spark Streamin...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Nisha, A.G. Shivaprasad, N. Nischitha, C.B. Shashikala, B.M. Sujithra, M. Chaba, Yogesh Electronics & Communications Engineering JSS Science & Technology University Mysuru India Dept.of Electronics & Communications Engineering Sri Jayachamarajendra College of Engineering JSS Science & Technology University Mysuru India Dept.of Computer Science St.Joseph's First Grade College Mysore India Dept.of Computer Applications Sri Jayachamarajendra College of Engineering JSS Science & Technology University Mysuru India Department of Computing-Data Science Coimbatore Institute of Technology Coimbatore India Department of Computer Science and Engineering Guru Jambeshwar University of Science and Technology Haryana Hisar India
Social media has become a trend nowadays people are spending more time in social media platform like Facebook, Twitter, Instagram to share their opinions, creating new interests, ideas and generate *** provide a major... 详细信息
来源: 评论
Intrusion Detection System Using Decision Tree Algorithm
Intrusion Detection System Using Decision Tree Algorithm
收藏 引用
2012 IEEE 14th International Conference on Communication Technology
作者: Manish Kumar M.Hanumanthappa T.V.Suresh Kumar Dept.of Master of Computer Applications M.S.Ramaiah Institute of Technology Research Scholar Department of Computers Science and ApplicationsBangalore University Dept.of Computer Science and Applications Jnana Bharathi CampusBangalore University
Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this ***’s are based on the beli... 详细信息
来源: 评论
New Method of POS based on Artificial Intelligence and Cloud Computing
New Method of POS based on Artificial Intelligence and Cloud...
收藏 引用
2019 International Conference on Recent Advances in Energy-efficient Computing and Communication, ICRAECC 2019
作者: Dey, Arnab Jain, Sudhanshu Nandi, Shovan Bengal Institute of Technology Dept. of Computer Science and Engineering Kolkata700150 India Chitkara Institute of Engineering and Technology Dept.of Master of Computer Applications Punjab140401 India Bengal Institute of Technology Dept. of Electronics and Communication Engineering Kolkata700150 India
Point of Sale systems have been rapidly getting advanced and powerful. In recent times, we can see credit and debit card based POS systems apart from traditional cash POS with manual entry. POS systems with Barcode re... 详细信息
来源: 评论
Cross-Layer Framework for IoT Data Protection Using Blockchain Based Federated Learning Model (BCFL)  4
Cross-Layer Framework for IoT Data Protection Using Blockcha...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Murali, Srividhya B Raja, S.R. Kanimozhi, E. Akila, D. Khan, Abdul Azeem Alajmani, Samah H. SRM Institute of Science and Technology Dept. of Computer Applications Kattankulatur Chennai India Saveetha College of Liberal Arts & Sciences SIMATS Deemed University Dept.of CS Chennai India Shri Shankarlal Sundarbai Shasun Jain College Dept. of Computer Applications Chennai India Saveetha College of Liberal Arts & Sciences SIMATS Deemed University Dept. of Computer Applications Chennai India Faculty of Islamic Technology Brunei College of IT Taif University Department of IT Saudi Arabia
In recent years, concerns about the security of data exchanged between the Internet of Things (IoT) devices have increased with respect to information security. Data security and the prevention of critical information... 详细信息
来源: 评论