咨询与建议

限定检索结果

文献类型

  • 424 篇 会议
  • 101 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 530 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 247 篇 工学
    • 183 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 66 篇 信息与通信工程
    • 54 篇 控制科学与工程
    • 43 篇 生物工程
    • 33 篇 电气工程
    • 31 篇 生物医学工程(可授...
    • 29 篇 网络空间安全
    • 22 篇 电子科学与技术(可...
    • 21 篇 安全科学与工程
    • 17 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
  • 137 篇 理学
    • 65 篇 数学
    • 46 篇 生物学
    • 32 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 17 篇 化学
    • 13 篇 系统科学
    • 12 篇 海洋科学
  • 85 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 42 篇 医学
    • 33 篇 基础医学(可授医学...
    • 32 篇 临床医学
    • 23 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 25 篇 法学
    • 23 篇 社会学
  • 15 篇 农学
    • 14 篇 作物学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 6 篇 教育学
  • 3 篇 文学

主题

  • 53 篇 accuracy
  • 32 篇 convolutional ne...
  • 27 篇 deep learning
  • 22 篇 real-time system...
  • 21 篇 computational mo...
  • 21 篇 feature extracti...
  • 17 篇 support vector m...
  • 17 篇 predictive model...
  • 17 篇 machine learning
  • 16 篇 data models
  • 16 篇 training
  • 14 篇 internet of thin...
  • 14 篇 artificial intel...
  • 13 篇 data mining
  • 13 篇 security
  • 13 篇 cloud computing
  • 12 篇 random forests
  • 12 篇 technological in...
  • 11 篇 medical services
  • 11 篇 optimization

机构

  • 16 篇 lovely professio...
  • 14 篇 maharishi school...
  • 12 篇 centre of interd...
  • 12 篇 department of ma...
  • 10 篇 department of ma...
  • 8 篇 program of maste...
  • 8 篇 master of comput...
  • 7 篇 master program o...
  • 7 篇 school of comput...
  • 7 篇 radiology techni...
  • 7 篇 prince shri venk...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 department of ma...
  • 6 篇 department of co...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 11 篇 bens pardamean
  • 9 篇 teddy suparyanto
  • 7 篇 pardamean bens
  • 7 篇 thotad puneeth n...
  • 7 篇 asha v.
  • 7 篇 jayadurga r.
  • 7 篇 hiroshi hashimot...
  • 6 篇 r. jayadurga
  • 6 篇 puneeth n. thota...
  • 6 篇 binju saju
  • 6 篇 ginni nijhawan
  • 6 篇 pundru chandra s...
  • 6 篇 manish kumar
  • 6 篇 v. asha
  • 5 篇 j. relin francis...
  • 5 篇 ali albawi
  • 5 篇 gaol ford lumban
  • 5 篇 yasuhiro ohyama
  • 5 篇 krisna adiyarta
  • 5 篇 shanta kallur

语言

  • 432 篇 英文
  • 96 篇 其他
  • 3 篇 日文
  • 3 篇 中文
  • 1 篇 德文
检索条件"机构=Master of Science in Computer Science DigiPen Institute of Technology"
530 条 记 录,以下是151-160 订阅
排序:
Comprehensive Analysis and Remediation of Insecure Direct Object References (IDOR) Vulnerabilities in Android APIs
Comprehensive Analysis and Remediation of Insecure Direct Ob...
收藏 引用
Cryptography, Informatics, and Cybersecurity (ICoCICs), IEEE International Conference on
作者: Semi Yulianto Roni Reza Abdullah Benfano Soewito Computer Science Department Binus Graduate Program Computer Science Bina Nusantara University Jakarta Indonesia Faculty of Informatics Engineering National Institute of Science and Technology Jakarta Indonesia Computer Science Department Binus Graduate Program. Master of Computer Science Bina Nusantara University Jakarta Indonesia
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
来源: 评论
LeafNet: Classification of Plant Leaf Diseases using IAO based Hybrid DL Framework
LeafNet: Classification of Plant Leaf Diseases using IAO bas...
收藏 引用
Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), International Conference on
作者: Binju Saju V Asha Jincy C Mathew Shreya N Sangeetha SanganagoudaDambala Shruti Department of Computer Science and Engineering(Artificial Intelligence) Adi Shankara Institute of Engineering and Technology Kalady India Department of Master of Computer Applications New Horiznon College of Engineering Bengaluru India
Plant diseases can be found using an analysis of these observable symptoms. The traditional approach to disease diagnosis entails professionals visually evaluating plants. The study proposes a hybrid model to classify...
来源: 评论
Performance Measurements of different Classification techniques for the Alzheimer's Disease Neuroimaging Initiative
Performance Measurements of different Classification techniq...
收藏 引用
2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2021
作者: Yashodhar, Archana Kini, Shashidhar Department Computer Science and Application Mangaluru India Srinivas Institute of Technology Department Head and Professor Master of Computer Application Mangaluru India
One of the neurogenerative disorders affected by many adults is Alzheimer's Disease (AD). Disease prediction is also a difficult task. Except in the healthcare domain, the principles of artificial learning and dat... 详细信息
来源: 评论
Cricket shot classification using Deep Learning
Cricket shot classification using Deep Learning
收藏 引用
Communications and Information Technologies (GCCIT), Global Conference on
作者: Shanta Kallur Puneeth N. Thotad Suman Yaligar Dept. of Computer Science & Engineering KLE Institute of Technology Affiliated With Visvesvaraya Technological University Hubballi India Dept. of Master of Computer Applications KLE Institute of Technology Affiliated With Visvesvaraya Technological University Hubballi India Dept. of Computer Science and Engineering K.L.E. Institute of Technology Hubballi India Visvesvaraya Technological University Belagavi
Cricket is a popular sport that involves various batting techniques and shot types. Accurate and real-time detection of cricket shots can provide priceless visual images for coaches, players, and analysts. This study ... 详细信息
来源: 评论
Deep Neural Networks for Brain Tumor Image Segmentation and Detection
Deep Neural Networks for Brain Tumor Image Segmentation and ...
收藏 引用
International Conference on Electrical Engineering, computer science and Informatics (EECSI)
作者: Ritesh Chandra Sadhana Tiwari Shashi Shekhar Kumar Sonali Agarwal M. Syafrullah Krisna Adiyarta Department of Information Technology Indian Institute of Information Technology Allahabad Prayagraj India Program of Master of Computer Science Universitas Budi Luhur Indonesia
Medical image analysis is a challenging and complex field these days. This discipline focuses especially on the processing of MRI (Magnetic Resonance Imaging) images. It offers multiple methods for locating brain tumo...
来源: 评论
Autism Spectrum Disorder Detection using Autistic Image Dataset
Autism Spectrum Disorder Detection using Autistic Image Data...
收藏 引用
International Conference on Electrical Engineering, computer science and Informatics (EECSI)
作者: Ritesh Chandra Sadhana Tiwari Ashutosh Kumar Sonali Agarwal M. Syafrullah Krisna Adiyarta Information Technology Department Indian Institute of Information Technology Allahabad Prayagraj India Program of Master of Computer Science Universitas Budi Luhur Indonesia
Autism spectrum disorders (ASD) are neurodevelopmental disorders that are marked by enduring difficulties with speech, nonverbal communication, and restricted or repetitive behaviors. Early detection and intervention ...
来源: 评论
Diabetic foot ulcer detection using deep learning approaches
收藏 引用
Sensors International 2023年 第1期4卷 100210-100210页
作者: Thotad, Puneeth N. Bharamagoudar, Geeta R. Anami, Basavaraj S. Department of Master of Computer Applications KLE Institute of Technology Hubballi 580027 India Visvesvaraya Technological University Jnana Sangama Belagavi590018 India Department of Computer Science & Engineering KLE Institute of Technology Hubballi 580027 India School of Computer Science and Engineering KLE Technological University Hubballi580031 India
The most recurrent side effect of diabetes is diabetic foot ulcers and if unattended cause imputations. Diabetic feet affect 15% to 25% of diabetic people globally. Diabetes complications are due to less or no awarene... 详细信息
来源: 评论
An Effective Analysis of Machine Learning Models for Prediction of Heart Disease
An Effective Analysis of Machine Learning Models for Predict...
收藏 引用
Network, Multimedia and Information technology (NMITCON) International Conference on
作者: Rudragoud Patil Shambahvi C. Kamkar Shwetha Indudhar Goudar Dept of Computer Science and Engineering K.L.S.Gogte Institute of Technology Belagavi Karnataka India Dept.of Master of Computer Applications K.L.S Gogte Institute of Technology Belagavi Karnataka India
Heart failure is a chronic illness that impacts millions of individuals worldwide. In order to forecast heart failure health status early and take the necessary activities to address this global issue an effective mac... 详细信息
来源: 评论
Spice Vision: Deep Learning Enhanced Spice Classification System
Spice Vision: Deep Learning Enhanced Spice Classification Sy...
收藏 引用
North Karnataka Subsection Flagship International Conference (NKCon), IEEE
作者: Laxmi Pujari Meenaz Belavatgi Mahantesh M. Sajjan Vishwanath Kamatar Pradeep Surasura Nausheen Ammanagi Dept. of Master of Computer Applications K.L.E. Institute of Technology Hubballi India Dept. of Computer Science and Engineering K.L.E Institute of Technolog Hubballi India
Spices are admired for their distinctive flavors, fragrances, and health advantages. They are an essential part of industrial uses, medical procedures, and culinary customs. The automatic classification of 15 differen... 详细信息
来源: 评论
Neural Network Framework based Malware Classification in Cybersecurity: A Hybrid Approach
Neural Network Framework based Malware Classification in Cyb...
收藏 引用
Interdisciplinary Approaches in technology and Management for Social Innovation (IATMSI), IEEE Conference on
作者: Mahmudur Rahman K. M. Sadman Sakib K B M Tahmiduzzaman Ravina Akter Youki Jerin Akther Munia Nikita Computer Science & Engineering Daffodil International University Dhaka Bangladesh Electrical & Electronic Engineering Ahsanullah University of Science & Technology Dhaka Bangladesh Information Technology University of Technology Sydney Sydney Australia Master in IT Cybersecurity King’s Own Institute Newcastle Sydney Australia
Malware significantly endangers internet security. Criminals may get illegal activities access, expropriate confidential information, extort, and engage in further illicit activities with malware. Several criminal org... 详细信息
来源: 评论