咨询与建议

限定检索结果

文献类型

  • 114 篇 会议
  • 57 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99 篇 工学
    • 71 篇 计算机科学与技术...
    • 54 篇 软件工程
    • 14 篇 控制科学与工程
    • 13 篇 信息与通信工程
    • 8 篇 电气工程
    • 8 篇 生物工程
    • 7 篇 土木工程
    • 7 篇 船舶与海洋工程
    • 6 篇 机械工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 动力工程及工程热...
    • 5 篇 安全科学与工程
    • 4 篇 电子科学与技术(可...
  • 48 篇 理学
    • 27 篇 数学
    • 10 篇 统计学(可授理学、...
    • 9 篇 生物学
    • 7 篇 物理学
    • 7 篇 海洋科学
    • 7 篇 系统科学
    • 4 篇 化学
  • 30 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 14 篇 工商管理
    • 11 篇 图书情报与档案管...
  • 12 篇 医学
    • 12 篇 临床医学
    • 10 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
    • 4 篇 药学(可授医学、理...
  • 5 篇 教育学
    • 5 篇 教育学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 农学
  • 1 篇 法学

主题

  • 10 篇 machine learning
  • 9 篇 accuracy
  • 7 篇 deep learning
  • 6 篇 feature extracti...
  • 5 篇 internet of thin...
  • 5 篇 information syst...
  • 5 篇 artificial intel...
  • 5 篇 cloud computing
  • 5 篇 convolutional ne...
  • 4 篇 computer communi...
  • 4 篇 computational mo...
  • 4 篇 software
  • 4 篇 training
  • 3 篇 sensor systems
  • 3 篇 intrusion detect...
  • 3 篇 computers and so...
  • 3 篇 software enginee...
  • 3 篇 education
  • 3 篇 optimization
  • 3 篇 visualization

机构

  • 7 篇 faculty of compu...
  • 7 篇 gik institute of...
  • 7 篇 university of eu...
  • 7 篇 faculty of elect...
  • 7 篇 dept. of technol...
  • 7 篇 university of re...
  • 5 篇 department of in...
  • 5 篇 saveetha institu...
  • 5 篇 vellore institut...
  • 5 篇 department of so...
  • 5 篇 r.m.k. engineeri...
  • 5 篇 bcmaterials basq...
  • 5 篇 bcmaterials basq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 r.m.k. engineeri...
  • 4 篇 department of co...
  • 4 篇 research group i...
  • 4 篇 bcmaterials basq...
  • 4 篇 max planck insti...

作者

  • 8 篇 zain ul abideen
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 worrell james
  • 8 篇 luca florian
  • 8 篇 ouaknine joël
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 usama arshad
  • 7 篇 arshad usama
  • 7 篇 ijaz ali zeeshan
  • 6 篇 ul abideen zain
  • 6 篇 talha ali khan
  • 5 篇 siddique abu bak...
  • 5 篇 pandiarajan rajk...
  • 5 篇 ponmalar a.
  • 5 篇 a. ponmalar
  • 5 篇 jagannathan j.
  • 5 篇 j. jagannathan

语言

  • 153 篇 英文
  • 26 篇 其他
  • 1 篇 德文
检索条件"机构=Institute for Software Systems in Technical Applications of Computer Science"
180 条 记 录,以下是1-10 订阅
排序:
Multi-Criteria Decision-Making Model to Achieve Sustainable Developmental Goals in Industry 4.0 for Smart City Infrastructure
HighTech and Innovation Journal
收藏 引用
HighTech and Innovation Journal 2024年 第4期5卷 1135-1153页
作者: Akila, D. Pal, Souvik Sarkar, Bikramjit Jayalaksshmi, S. Muthaiyah, Saravanan Anbananthen, Kalaiarasi Sonai Muthu Department of Computer Applications Saveetha College of Liberal Arts and Sciences Saveetha Institute of Medical and Technical Sciences India Department of Management Information Systems Saveethas College of Liberal Arts and Sciences Saveetha Institute of Medical and Technical Sciences India Department of Computer Science and Engineering JIS College of Engineering Kalyani India Department of Information Technology Vels Institute of Science Technology and Advanced Studies India School of Business and Technology International Medical University Kuala Lumpur57000 Malaysia Faculty of Information Science and Technology Multimedia University Melaka75450 Malaysia
Due to a shortage of funding and other market challenges, Small and Medium-sized Enterprises (SMEs) face difficulties in adopting new technologies. Numerous technological obstacles negatively impact the long-term comm... 详细信息
来源: 评论
Intrusion Detection Mechanism Using Deep Learning  5
Intrusion Detection Mechanism Using Deep Learning
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent systems, ICICNIS 2024
作者: Ananthi, P. Nirmaladevi, K. Naveen Kumar, S. Kongu Engineering College Department of Computer Technology-PG Tamilnadu Erode638060 India Madanapalle Institute of Technology & Science Department of Computer Applications India M.Sc Software Systems Kongu Engineering College Erode India
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection systems (IDS) in recognizing and impeding... 详细信息
来源: 评论
Product Recommendation System using Deep Learning based Recurrent Neural Network
Product Recommendation System using Deep Learning based Recu...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Shanthi, S. Nirmaladevi, K. Mathiarasi, N. Tharani, As. Krithika Monisha, A. Kuppuchamy, R. Krishnamoorthy, N. Kongu Engineering College Department of Computer Science & Engineering Perundurai India PSNA College of Engineering and Technology Department of Computer Applications Tamilnadu Dindigul India Vellore Institute of Technology Department of Software Systems and Engineering Vellore Campus India
Today's marketing strategies place a high priority on comprehending customer sentiments. It will not only give businesses a better understanding of how their clients view their goods and/or services, but it will a... 详细信息
来源: 评论
A Novel Method for Pneumothorax Diagnosis and Segmentation Using Deep Convolution Neural Network
A Novel Method for Pneumothorax Diagnosis and Segmentation U...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Shanthi, S. Nirmaladevi, K. Mathiarasi, N. Tharani, As. Krithika Monisha, A. Kuppuchamy, R. Krishnamoorthy, N. Kongu Engineering College Department of Computer Science & Engineering Perundurai India PSNA College of Engineering and Technology Department of Computer Applications Tamilnadu Dindigul India Vellore Institute of Technology Department of Software Systems and Engineering Vellore Campus India
A pneumothorax is the accumulation of air in the pleural space between the chest and lungs. Air that is in the lungs during breathing can leak out of the lungs and become trapped between the chest and lungs in the tho... 详细信息
来源: 评论
Forensic Investigation of Malicious Activities in Digital Environments  4
Forensic Investigation of Malicious Activities in Digital En...
收藏 引用
4th IEEE International Conference on Data Engineering and Communication systems, ICDECS 2024
作者: Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. Ravikumar, K. Abdul Kareem, D. Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India Rrase College of Engineering Padappai Department of Computer Science & Engineering Chennai India Grt Institute of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Tiruttani India
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha... 详细信息
来源: 评论
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors  4
Dynamic Multimedia Encryption Using a Parallel File System B...
收藏 引用
4th IEEE International Conference on Data Engineering and Communication systems, ICDECS 2024
作者: Simi Margarat, G. Malathi, S. Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. New Prince Shri Bhavani College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Grt Institute of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Tiruttani India Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India
A new parallel file system and multi-core processor-based dynamic multimedia encryption method is presented in this study. Multimedia encryption efficiency and security were the main goals, addressing massive data set... 详细信息
来源: 评论
Sports Event Detection Using a 3D Convolutional Neural Network with Equiangular Basis Vector in Video Processing  3
Sports Event Detection Using a 3D Convolutional Neural Netwo...
收藏 引用
3rd IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Kumar, M. Ashok Jasim, Laith H. Sudhakar, K. Reddy, R. Archana Saranya, N. Naga Skyline University Nigeria Department Of Computer Science Software Engineering And Cyber Security Kano State Nigeria College Of Technical Engineering The Islamic University Department Of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute Of Technology Dept. Of Ai & Ds Bengaluru India School Of Computer Science And Engineering Sr University Warangal India Saveetha College Of Liberal Arts & Science Simats Department Of Computer Applications Chennai India
As sports video collections continue to expand at a rapid pace, there is a need for advanced classification methods that can accurately and efficiently categorize and manage the massive amount of content available. Th... 详细信息
来源: 评论
Dynamic Topology Management In Ad-Hoc Networks For Improved Performance  2
Dynamic Topology Management In Ad-Hoc Networks For Improved ...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Anakath, A.S. Kannadasan, R. Margarat, G. Simi Pandian, A. Pasumpon Antony Sibiya Varghese, V. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology VIT University Tamil Nadu Vellore India Department of Computer Science and Engineering New Prince Shri Bhavani College of Engineering and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering CARE College of Engineering Trichy India Department of Artificial Intelligence and Data Science GRT Institute of Engineering and Technology Tamil Nadu Tiruttani India
Optimization in ad hoc networks is a highly specialized task because the structure of the network is loosely formed, and each node is independently responsible for its operation. In order to obtain a better result fro... 详细信息
来源: 评论
Intelligent Energy Management Energy Storage systems Using Machine Learning
Intelligent Energy Management Energy Storage Systems Using M...
收藏 引用
2024 International Conference on Intelligent systems for Cybersecurity, ISCS 2024
作者: Govindasamy, Chinnaraj Dayana, T.R Nisha Adkar, Siddhika Dilip Prakash, D. Shyam Gupta, A. Shilpa Trivedi, Sanjeev Kumar Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Tamilnadu Chennai602105 India Vels Institute of Science Technology and Advance Studies Department of Computer Science Chennai India School of Computer Science Engineering and Applications D y Patil International University Akurdi India Department of Computer Science and Business Systems Sri Eshwar College of Engineering Coimbatore India Department of Electrical and Electronics Engineering Aurora's Technological Research Institute Uppal Hyderabad India Khwaja Moinuddin Chishti Language University Faculty of Engineering and Technology Department of Electronics Lucknow India
A nevertheless-emerging generation called cloud computing permits customers to pay for services on a usage-based foundation. Internet-primarily based IT offerings are supplied through cloud computing, at the same time... 详细信息
来源: 评论
Bluetooth Vulnerabilities and Security
Bluetooth Vulnerabilities and Security
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Mareeswari V Vijayan R Ashish Shukla Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Master of Computer Applications School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp... 详细信息
来源: 评论