咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 22 篇 计算机科学与技术...
    • 18 篇 软件工程
    • 10 篇 生物工程
    • 9 篇 信息与通信工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 交通运输工程
    • 2 篇 农业工程
    • 2 篇 安全科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 19 篇 理学
    • 10 篇 生物学
    • 7 篇 数学
    • 7 篇 物理学
    • 4 篇 统计学(可授理学、...
    • 3 篇 化学
    • 2 篇 系统科学
  • 8 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
    • 6 篇 药学(可授医学、理...
    • 2 篇 公共卫生与预防医...
  • 3 篇 农学
    • 3 篇 作物学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 9 篇 accuracy
  • 9 篇 training
  • 7 篇 deep learning
  • 6 篇 convolutional ne...
  • 5 篇 computational mo...
  • 4 篇 internet of thin...
  • 3 篇 task analysis
  • 3 篇 transfer learnin...
  • 3 篇 real-time system...
  • 3 篇 emotion recognit...
  • 3 篇 plants (biology)
  • 3 篇 technological in...
  • 3 篇 measurement
  • 2 篇 smart homes
  • 2 篇 magnetic resonan...
  • 2 篇 automation
  • 2 篇 transformers
  • 2 篇 anomaly detectio...
  • 2 篇 crops
  • 2 篇 neural networks

机构

  • 16 篇 division of data...
  • 11 篇 division of comp...
  • 9 篇 karunya institut...
  • 9 篇 division of arti...
  • 9 篇 karunya institut...
  • 3 篇 university of bu...
  • 2 篇 karunya institut...
  • 2 篇 department of me...
  • 2 篇 lovely professio...
  • 2 篇 yeshwantrao chav...
  • 2 篇 division of rese...
  • 2 篇 karunya institut...
  • 2 篇 division of data...
  • 2 篇 karunya institut...
  • 2 篇 karunya school o...
  • 1 篇 department of da...
  • 1 篇 department of cy...
  • 1 篇 department of ee...
  • 1 篇 division of data...
  • 1 篇 addis ababa univ...

作者

  • 5 篇 ebenezer v.
  • 4 篇 babu nirmal varg...
  • 3 篇 emmanuel joy
  • 3 篇 isravel deva pri...
  • 3 篇 julia punitha ma...
  • 3 篇 v. ebenezer
  • 3 篇 deva priya israv...
  • 3 篇 joy emmanuel
  • 2 篇 santhiya p
  • 2 篇 nirmal varghese ...
  • 2 篇 leka shree j
  • 2 篇 sri ram m s
  • 2 篇 sri ram m.s.
  • 2 篇 m. dinesh
  • 2 篇 dinesh m.
  • 2 篇 ebenezer v
  • 2 篇 stewart kirubaka...
  • 2 篇 santhiya p.
  • 2 篇 stewart kirubaka...
  • 2 篇 giri jayant

语言

  • 47 篇 英文
  • 7 篇 其他
检索条件"机构=Division of Data Science and Cyber Security"
54 条 记 录,以下是1-10 订阅
排序:
Ensemble of deep learning models with Walrus Optimization Algorithm for accurate botnet recognition and classification
收藏 引用
Iran Journal of Computer science 2025年 1-18页
作者: Chacko, Ashwathy Anda Edwin, E. Bijolin Thanka, M. Roshni Ebenezer, V. Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
The rapid growth of Internet of Things (IoT) networks has introduced significant security challenges, with botnet attacks being one of the most prevalent threats. These attacks exploit vulnerabilities in IoT devices, ... 详细信息
来源: 评论
Dynamic Load Balancing in Cloud Computing Using a Hybrid Bidirectional LSTM-RNN with Deep Learning VM Snapshot Protocols
Dynamic Load Balancing in Cloud Computing Using a Hybrid Bid...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Thumma Sumanth Babu E. Bijolin Edwin V. Ebenezer Division of Computer Science & Engineering Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India Division of CSE Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India
Dynamic load balancing is the ability in cloud computing to distribute workload across multiple virtual machine (VM), such that the performance of overall performance and resource utilization can be optimized. The pro... 详细信息
来源: 评论
Automated Subjective Answer Evaluation using GenAI and NLP by Enhancing Accuracy, Fairness, and Feedback in Education
Automated Subjective Answer Evaluation using GenAI and NLP b...
收藏 引用
International Conference on ent Computing and Control Systems (ICICCS)
作者: Yuvasri J Senbagavalli M Rahul R R Venkatesan G Naveen Sundar Saravana Kumar C S Division of CSE Karunya University Coimbatore India Department of CSE & IT Alliance University Bangalore Data Science and Cyber Security Karunya University Coimbatore Global Tech Park Bosch Global Software Technologies Coimbatore
The problem in subjective evaluation of answer is that the traditional evaluation is not consistent, not fair, and not time efficient. Utilizing Generative AI (GenAI) and Natural Language Processing (NLP), this projec... 详细信息
来源: 评论
A Failure-Free and Efficient Discrete Laplace Distribution for Differential Privacy in MPC
arXiv
收藏 引用
arXiv 2025年
作者: Tjuawinata, Ivan Wang, Jiabo Yang, Mengmeng Lyu, Shanxiang Wang, Huaxiong Lam, Kwok-Yan Strategic Centre for Research in Privacy-Preserving Technologies & Systems Nanyang Technological University Singapore Information Security and Privacy Group Data61 CSIRO Australia College of Cyber Security Jinan University Guangzhou China Division of Mathematical Sciences Nanyang Technological University Singapore College of Computing and Data Science Nanyang Technological University Singapore
In an MPC-protected distributed computation, although the use of MPC assures data privacy during computation, sensitive information may still be inferred by curious MPC participants from the computation output. This c... 详细信息
来源: 评论
An Intelligent security-Enabled Home Automation System using Internet of Things Environment  3
An Intelligent Security-Enabled Home Automation System using...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Karthikeyan, P. Dinesh, M. Akila, A. Veeramuthu, A. Giri, Jayant Al Sherideh, Ala'a Prathyusha Engineering College Department of Eee Tiruvallur Chennai India Saveetha School of Engineering Department of Vlsi Microelectronics Chennai India R.M.K. College of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Puduvoyal India Sathyabama Institute of Science and Technology Department of Information Technology Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Zarqa University College of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
IoT technologies to bolster residential security, safety, and sustainability. By leveraging facial recognition for door access, enhancing fire safety monitoring, and integrating energy harvesting, it aims to create mo... 详细信息
来源: 评论
An Intelligent security-Enabled Home Automation System using Internet of Things Environment
An Intelligent Security-Enabled Home Automation System using...
收藏 引用
Electronics and Renewable Systems (ICEARS), International Conference on
作者: P.Karthikeyan M. Dinesh A.Akila A. Veeramuthu Jayant Giri Ala'a Al Sherideh Department of EEE Prathyusha Engineering College Chennai Department of VLSI Microelectronics Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences (SIMATS) Chennai Department of Artificial Intelligence and Data Science R.M.K. College of Engineering and Technology Tamil Nadu Department of Information Technology Sathyabama Institute of Science and Technology Chennai Department of Mechanical Engineering Yeshwantrao Chavan College of Engineering Nagpur Division of Research and Development Lovely Professional University Phagwara India Department of Cyber Security College of Information Technology Zarqa University Zarqa Jordan University of Business and Technology Jeddah Saudi Arabia
IoT technologies to bolster residential security, safety, and sustainability. By leveraging facial recognition for door access, enhancing fire safety monitoring, and integrating energy harvesting, it aims to create mo... 详细信息
来源: 评论
Effectiveness of a touch-based hand therapeutic application for hand dexterity in children with handwriting difficulties-a pilot study
收藏 引用
Multimedia Tools and Applications 2024年 1-35页
作者: Smitha, John Renumol, V.G. School of Computer Science and Technology Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India School of Engineering Cochin University of Science and Technology Kochi India
Handwriting is an important skill for children during their academic years. It is the coordination of perceptual-motor and cognitive abilities. Some children have difficulties in handwriting, which is an indication of... 详细信息
来源: 评论
A Comparative Study of Metric-based Meta-Learning Methods for Improving Few-Shot Learning in Drug Discovery with Limited data  1
A Comparative Study of Metric-based Meta-Learning Methods fo...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: George, Gilda Juliet, Sujitha Karunya Institute of Technology and Sciences Division of Data Science Amd Cyber Security Tamil Nadu Coimbatore641114 India
Drug discovery is a complex and costly process, often requiring extensive testing and significant financial investment. However, the acquisition of sufficient data for effective machine learning models presents a sign... 详细信息
来源: 评论
Cooperative Hypothesis Building for Computer security Incident Response  5th
Cooperative Hypothesis Building for Computer Security Incid...
收藏 引用
5th International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2021
作者: Motoura, Shota Hoshino, Ayako Hosomi, Itaru Data Science Research Laboratories NEC Corporation Kawasaki Japan Cyber Security Strategy Division NEC Corporation Kawasaki Japan
We have been developing an AI-based system that automatically collects evidence from logs on computers within an intranet and infers the most plausible hypothesis of a cyber-attack. In this paper, we propose a user-in... 详细信息
来源: 评论
Customer Churn Prediction Using Machine Learning: Commercial Bank of Ethiopia
Customer Churn Prediction Using Machine Learning: Commercial...
收藏 引用
2022 International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2022
作者: Seid, Muhamed Hassen Woldeyohannis, Michael Melese Cyber Security Research Division Data Science Addis Ababa Ethiopia Addis Ababa University School of Information Science Addis Ababa Ethiopia
Identification of churned customers is critical to the operation and growth of any business. Identification of churned customers can assist businesses in understanding the reasons for churn and planning market strateg... 详细信息
来源: 评论