咨询与建议

限定检索结果

文献类型

  • 424 篇 会议
  • 101 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 530 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 247 篇 工学
    • 183 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 66 篇 信息与通信工程
    • 54 篇 控制科学与工程
    • 43 篇 生物工程
    • 33 篇 电气工程
    • 31 篇 生物医学工程(可授...
    • 29 篇 网络空间安全
    • 22 篇 电子科学与技术(可...
    • 21 篇 安全科学与工程
    • 17 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
  • 137 篇 理学
    • 65 篇 数学
    • 46 篇 生物学
    • 32 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 17 篇 化学
    • 13 篇 系统科学
    • 12 篇 海洋科学
  • 85 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 42 篇 医学
    • 33 篇 基础医学(可授医学...
    • 32 篇 临床医学
    • 23 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 25 篇 法学
    • 23 篇 社会学
  • 15 篇 农学
    • 14 篇 作物学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 6 篇 教育学
  • 3 篇 文学

主题

  • 53 篇 accuracy
  • 32 篇 convolutional ne...
  • 27 篇 deep learning
  • 22 篇 real-time system...
  • 21 篇 computational mo...
  • 21 篇 feature extracti...
  • 17 篇 support vector m...
  • 17 篇 predictive model...
  • 17 篇 machine learning
  • 16 篇 data models
  • 16 篇 training
  • 14 篇 internet of thin...
  • 14 篇 artificial intel...
  • 13 篇 data mining
  • 13 篇 security
  • 13 篇 cloud computing
  • 12 篇 random forests
  • 12 篇 technological in...
  • 11 篇 medical services
  • 11 篇 optimization

机构

  • 16 篇 lovely professio...
  • 14 篇 maharishi school...
  • 12 篇 centre of interd...
  • 12 篇 department of ma...
  • 10 篇 department of ma...
  • 8 篇 program of maste...
  • 8 篇 master of comput...
  • 7 篇 master program o...
  • 7 篇 school of comput...
  • 7 篇 radiology techni...
  • 7 篇 prince shri venk...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 department of ma...
  • 6 篇 department of co...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 11 篇 bens pardamean
  • 9 篇 teddy suparyanto
  • 7 篇 pardamean bens
  • 7 篇 thotad puneeth n...
  • 7 篇 asha v.
  • 7 篇 jayadurga r.
  • 7 篇 hiroshi hashimot...
  • 6 篇 r. jayadurga
  • 6 篇 puneeth n. thota...
  • 6 篇 binju saju
  • 6 篇 ginni nijhawan
  • 6 篇 pundru chandra s...
  • 6 篇 manish kumar
  • 6 篇 v. asha
  • 5 篇 j. relin francis...
  • 5 篇 ali albawi
  • 5 篇 gaol ford lumban
  • 5 篇 yasuhiro ohyama
  • 5 篇 krisna adiyarta
  • 5 篇 shanta kallur

语言

  • 432 篇 英文
  • 96 篇 其他
  • 3 篇 日文
  • 3 篇 中文
  • 1 篇 德文
检索条件"机构=Master of Science in Computer Science DigiPen Institute of Technology"
530 条 记 录,以下是141-150 订阅
排序:
Covid19 Disease Assessment Using CNN Architecture
Covid19 Disease Assessment Using CNN Architecture
收藏 引用
Innovative Practices in technology and Management (ICIPTM), International Conference on
作者: Mary Shiba C Sumit Kumar Mishra S Sandhya K. Vidhya Jaichandran R G. Manjula Department of Computer science R.M.K Engineering College Chennai India Department of Computer Science Chandigarh University Punjab India Department of Master of Business Administration Acharya Institute of Technology Karnataka India Department of Computer Science KPR Institute of Engineering and Technology Chennai India Department of Computer Science Aarupadai Veedu Institute of Technology Chennai India Department of Computer science RMK College of Engineering and Technology Chennai India
Recently, the COVID-19 pandemic has emerged as one of the world's most critical public health concerns. One of the biggest problems in the present COVID-19 outbreak is the difficulty of accurately separating COVID... 详细信息
来源: 评论
Role of Data Mining in Detecting Theft and Making Effective Impact on Performance Management  2nd
Role of Data Mining in Detecting Theft and Making Effective ...
收藏 引用
2nd International Conference on Mechanical and Energy Technologies , ICMET 2021
作者: Jain, Vipin Al Ayub Ahmed, Alim Chaudhary, Vijesh Saxena, Divya Subramanian, Muthukumar Mohiddin, Md. Khaja Teerthanker Mahaveer University Uttar Pradesh Moradabad India School of Accounting Jiujiang University 551 Qianjindonglu Jiangxi Jiujiang China Central University of Himachal Pradesh Shahpur India Master of Science in Computer Science University of Texas at Arlington AlingtonTX76019 United States Nagarjuna College of Engineering & Technology Bangalore India Bhilai Institute of Technology Chhattisgarh Raipur India
This paper analyses the effectiveness of DM (Data Mining) classification techniques for company detection. Different approaches of data mining are accessible for the process of data mining. In many applications, data ... 详细信息
来源: 评论
Preliminary Staff Collaboration and Artificial Intelligence  3
Preliminary Staff Collaboration and Artificial Intelligence
收藏 引用
3rd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Pandey, Arvind Kumar Mahesh, T.R. Christy, Veena Shaikh, Mohsin Yadav, Preksha Das, Saptorshi Arka Jain University Department of Computer Science Jharkhand Jamshedpur India Department of Computer Science and Engineering Bangalore India Bharat Institute of Higher Education and Research Department of Business Administration India Dr. Vishwanath Karad Mit World Peace University Department of School of Management Pune India Cmr Institute of Technology Master of Business Administration Bangalore India Kiit Deemed to Be University Kiit School of Management India
Artificial Intelligence is viewed as by a few contemporary associations all over the planet to foster able labor forces, where the ways of behaving and abilities of the workers are assisting those associations with ac... 详细信息
来源: 评论
Boosting-Based Machine Learning Approaches for Diabetes Prediction using Indian Demographic and Health Survey Data
Boosting-Based Machine Learning Approaches for Diabetes Pred...
收藏 引用
North Karnataka Subsection Flagship International Conference (NKCon), IEEE
作者: Shanta Kallur Suman Yaligar Puneeth N. Thotad Dept. of Computer Science & Engineering KLE Institute of Technology Affiliated to Visvesvaraya Technological University Hubballi India Dept. of Master of Computer Applications KLE Institute of Technology Affiliated to Visvesvaraya Technological University Hubballi India
Traditional diagnostic techniques are time-consuming and prone to error. Performance is added however time and cost are reduced by using computer-aided diagnostic methods. This study aims to calculate how healthy boos... 详细信息
来源: 评论
Advancing breast ultrasound diagnostics through hybrid deep learning models
收藏 引用
computers in Biology and Medicine 2024年 180卷 108962-108962页
作者: Kiran, Ajmeera Ramesh, Janjhyam Venkata Naga Rahat, Irfan Sadiq Khan, Mohammad Aman Ullah Hossain, Anwar Uddin, Roise Department of Computer Science and Engineering MLR Institute of Technology Dundigal Telangana Hyderabad500043 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh 522302 India Department of Computer Science and Engineering Graphic Era Hill University Dehradun248002 India VIT-AP University Andhra Pradesh Amaravati India Department of Computer Science and Engineering BRAC University Bangladesh Master Of Information Science and TechnologyCalifornia State University United States
Today, doctors rely heavily on medical imaging to identify abnormalities. Proper classification of these abnormalities enables them to take informed actions, leading to early diagnosis and treatment. This paper introd... 详细信息
来源: 评论
OHMBC: Optimized Hybrid deep learning Model for Classification of Breast Cancer
OHMBC: Optimized Hybrid deep learning Model for Classificati...
收藏 引用
Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), International Conference on
作者: Binju Saju V Asha Neethu Tressa Pooja B Kondikoppa Pooja Pavan Kumar V J Department of Computer Science and Engineering (Artificial Intelligence) Adi Shankara Institute of Engineering and Technology Kalady India Department of Master of Computer Applications New Horiznon College of Engineering Bengaluru India
Men are much less likely than women to develop breast cancer. Breast lumps, bloody nipple discharge, and changes in the nipple's or breast's shape or texture are all indications of breast cancer. The study pro...
来源: 评论
An Outline of Data Encryption Standard (DES) Tools and Its Facets within the Realm of Cloud Computing
An Outline of Data Encryption Standard (DES) Tools and Its F...
收藏 引用
Advances in Computation, Communication and Information technology (ICAICCIT), International Conference on
作者: Riya Kukreti Kavitha R Apoorva Joshi Department of Computer Science and Engineering Tula’s Institute Dehradun India Department of Computer Science and Information Technology Jain (Deemed to be University) Bangalore India Master of Computer Applications Noida Institute of Engineering and Technology Greater Noida Uttar Pradesh India
The development of Discrete Event Simulation (DES) systems for enhancing decision-making and research in cloud computing has experienced a substantial growth. The growing diversity of cloud systems makes it extremely ...
来源: 评论
A Robust MAES Encryption And Decryption Algorithm using Ankaru Model Through Fog Computing
A Robust MAES Encryption And Decryption Algorithm using Anka...
收藏 引用
Intelligent Algorithms for Computational Intelligence Systems (IACIS), International Conference on
作者: Karunya S Belina V.J. Sara Angayarkkani K Sowmiya J Sonia A Jeganraj P Department of Information Technology & BCA Dwaraka Doss Goverdhan Doss Vaishnav College Chennai India Department of Computer Applications SRM Institute of Science & Technology Chennai India Department of CSE Aalim Muhammed Salegh College of Engineering Chennai India Master of Computer Applications SRM Institute of Science & Technology Chennai India Department of BCA-DS SRM Institute of Science & Technology Chennai India
The world as a whole now depends on the data that people have stored online and how these developments are tracked in the future. To satisfy the requirements of safeguarding the information of an individual, a company... 详细信息
来源: 评论
Security Challenges and Elucidations in Cloud Storage and File Systems: An Advanced Investigation Review
Security Challenges and Elucidations in Cloud Storage and Fi...
收藏 引用
Ubiquitous Computing and Intelligent Information Systems (ICUIS), International Conference on
作者: S. P. Santhoshkumar S. Hariharasudhan S. Poorna Prakash Jim Mathew Philip S. Haritha T. Nalini Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai India Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Avadi Chennai India Artificial Intelligence & Data Science Akshaya College of Engineering and Technology Coimbatore India Department of Computer Science and Engineering Sri Ramakrishna Institute of Technology Coimbatore Tamil Nadu India Master of Computer Application Rathinam Technical Campus. Coimbatore India Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai
With the widespread adoption of cloud storage and file systems, security concerns have become paramount. This paper presents an advanced investigation into the security challenges encountered in cloud storage and file... 详细信息
来源: 评论
Block Chain technology for Securing IoT Devices and Data  9
Block Chain Technology for Securing IoT Devices and Data
收藏 引用
9th International Conference on science, technology, Engineering and Mathematics, ICONSTEM 2024
作者: Aancy, H. Mickle Kodgire, Shilpa Prashant Mohitha, MaddulaRatna Manimegalai, V. Vijay, G. Dhotre, Sunita Panimalar Engineering College Department of Master of Business Administration Tamil Nadu Chennai600123 India Maharashtra Institute of Technology Aurangabad Department of Electronics And Telecommunication Engineering Maharashtra India Aditya Institute of Technology And Management Department of Computer Science And Engineering Andhra Pradesh Tekkali India Sri Krishna College of Technology Department of Electrical And Electronics Engineering Tamil Nadu Coimbatore641042 India Department of English Tamil Nadu Dindigul624622 India College of Engineering Department of Computer Engineering Maharashtra Pune India
IoT detector data can be covered and authenticated using blockchain armature to avoid data duplication. It also enables secure device data transfer. IoT can handle scalability and trust challenges with blockchain, kee... 详细信息
来源: 评论