咨询与建议

限定检索结果

文献类型

  • 108 篇 会议
  • 72 篇 期刊文献

馆藏范围

  • 180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 119 篇 工学
    • 89 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 30 篇 信息与通信工程
    • 25 篇 电气工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 控制科学与工程
    • 12 篇 生物医学工程(可授...
    • 10 篇 生物工程
    • 9 篇 光学工程
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 6 篇 机械工程
    • 5 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 交通运输工程
  • 60 篇 理学
    • 35 篇 数学
    • 13 篇 生物学
    • 12 篇 化学
    • 11 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 6 篇 物理学
  • 40 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 13 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 教育学
    • 4 篇 教育学
  • 3 篇 法学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 17 篇 accuracy
  • 9 篇 deep learning
  • 9 篇 feature extracti...
  • 7 篇 computational mo...
  • 7 篇 real-time system...
  • 7 篇 machine learning
  • 6 篇 internet of thin...
  • 6 篇 magnetic resonan...
  • 6 篇 optimization
  • 6 篇 convolutional ne...
  • 5 篇 data models
  • 4 篇 support vector m...
  • 4 篇 libraries
  • 4 篇 brain modeling
  • 4 篇 predictive model...
  • 4 篇 decision making
  • 4 篇 security
  • 4 篇 machine learning...
  • 4 篇 numerical models
  • 4 篇 adaptation model...

机构

  • 8 篇 iconix software ...
  • 7 篇 department of co...
  • 5 篇 saint petersburg...
  • 3 篇 karpagam academy...
  • 3 篇 master of comput...
  • 3 篇 iconix software ...
  • 2 篇 department of so...
  • 2 篇 independent rese...
  • 2 篇 university of sh...
  • 2 篇 department of co...
  • 2 篇 sri krishna coll...
  • 2 篇 college of infor...
  • 2 篇 hindustan instit...
  • 2 篇 department of co...
  • 2 篇 department of ma...
  • 2 篇 school of optica...
  • 2 篇 department of co...
  • 2 篇 departamento de ...
  • 2 篇 school of softwa...
  • 2 篇 kongu engineerin...

作者

  • 7 篇 r. saravanakumar
  • 4 篇 k. nirmaladevi
  • 4 篇 krinkin kirill
  • 3 篇 nirmaladevi k.
  • 3 篇 saravanakumar r.
  • 3 篇 aljammal ashraf ...
  • 3 篇 s. jeya lakshmi
  • 3 篇 anton yu. filato...
  • 3 篇 p. ananthi
  • 3 篇 filatov anton yu...
  • 3 篇 shevskaya nataly...
  • 2 篇 carnero rosell a...
  • 2 篇 tharani as. krit...
  • 2 篇 amer ibrahim
  • 2 篇 manjunatha
  • 2 篇 wang ran
  • 2 篇 mahanta priyaksh...
  • 2 篇 shoeibi afshin
  • 2 篇 m. c. babu
  • 2 篇 prakash s.p. shi...

语言

  • 171 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=The Department of Software Engineering and Computer Applications"
180 条 记 录,以下是61-70 订阅
排序:
Bluetooth Vulnerabilities and Security
Bluetooth Vulnerabilities and Security
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Mareeswari V Vijayan R Ashish Shukla Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Master of Computer Applications School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp... 详细信息
来源: 评论
Cybersecurity Threat Detection using Machine Learning on Network Traffic
Cybersecurity Threat Detection using Machine Learning on Net...
收藏 引用
International Conference on ent Computing and Control Systems (ICICCS)
作者: R. Rithi N. Nithya A. Akila R. Saravanakumar M. Vargheese S. Jeya Lakshmi Master of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Artificial Intelligence and Data Science R.M.K College of Engineering and Technology Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India Department of Computer Science and Engineering PSN College of Engineering and Technology Tirunelveli Tamil Nadu India
Web phishing is a prevalent online attack in which victims are tricked into revealing their personal information by visiting fraudulent websites. Phishers often use URL shortening tools to disguise malicious links, ma... 详细信息
来源: 评论
The Impact of Transformer Models and Regression Algorithms on Automated Short Answer Grading
The Impact of Transformer Models and Regression Algorithms o...
收藏 引用
Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), International Conference on
作者: Abhijith. N. Nampoothiri M. G. Thushara Pradeesh. N Anand Krishna K. R Abhai Santhosh Abhijith Kumar S Suryan Kumar Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India Omnex Software Solutions Pvt. Ltd Chennai India
Grading short answer questions in higher education often poses significant challenges due to its subjective nature and time-consuming process. As educational institutions expand, the need for efficient and objective g... 详细信息
来源: 评论
A Hybrid LSTM-GAN Model for Predictive Cyber Threat Intelligence and Anomaly Detection
A Hybrid LSTM-GAN Model for Predictive Cyber Threat Intellig...
收藏 引用
Integrated Intelligence and Communication Systems (ICIICS), International Conference on
作者: Khadija Danladi Sankara G. Saritha S. Anitha Elavarasi S. Saradha D. Arul Kumar Masters of Software Engineering Skyline University Nigeria Kano State Nigeria Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai India Department of Computer Science and Engineering Sona College of Technology Salem India Department of Computer Applications Nandha Engineering College (Autonomous) Erode India Department of Electronics and Communication Engineering Panimalar Engineering College Chennai India
Cybersecurity is increasingly challenged by complex and evolving threats that require predictive intelligence and advanced anomaly detection. This paper presents a novel Hybrid LSTM-GAN (Long Short-Term Memory - Gener... 详细信息
来源: 评论
LECF: recommendation via learnable edge collaborative filtering
收藏 引用
Science China(Information Sciences) 2022年 第1期65卷 116-130页
作者: Shitao XIAO Yingxia SHAO Yawen LI Hongzhi YIN Yanyan SHEN Bin CUI School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing Key Lab of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications School of Information Technology and Electrical Engineering The University of Queensland Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Computer Science and Technology Peking University National Engineering Laboratory for Big Data Analysis and Applications Peking University
The core of recommendation models is estimating the probability that a user will like an item based on historical interactions. Existing collaborative filtering(CF) algorithms compute the likelihood by utilizing simpl... 详细信息
来源: 评论
Smart Investigations into the Development of an Effective computer-Assisted Diagnosis System for CT Scan Brain Depictions
收藏 引用
SN computer Science 2023年 第5期4卷 1-11页
作者: Attuluri, Sasidhar Bhupati, Ch Ramya, Lavu Tiwari, Amit Budaraju, Raja Rao Cotrina-Aliaga, Juan Carlos Software Developer Applications 671 E Royal Ln APT 1074 Irving 75039 TX United States Department of IoT K L Deemed to be University Vaddeswaram Guntur 522302 India Dr. Pinnamaneni Siddhartha Institute of Medical Sciences and Research Foundation Chinna Avutapalli Andhra Pradesh Vijayawada 521286 India Department of Computer Applications ABES Engineering College Ghaziabad India Oracle 3990 Scottfield Street Dublin 94568 CA United States Faculty of Human Medicine Universidad Privada San Juan Bautista Chincha Peru
Recent advances in medical image analysis on computers are anticipated to help radiologists and other healthcare workers with numerous diagnostic tasks including medical image interpretation. Accurate diagnosis and/or... 详细信息
来源: 评论
Machine Learning on Retail Stores for Customer Churn
Machine Learning on Retail Stores for Customer Churn
收藏 引用
Advanced Computing Technologies (ICoACT), International Conference on
作者: P. Brito Clinton P. Sathiya Priya S. Jagadeesan S. Nagarajan K. Mohanapriya S. Jeya Lakshmi Master of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Computer Science and Engineering Nandha Engineering College Erode Tamil Nadu India Department of Information Technology R.M.K. Engineering College Chennai Tamil Nadu India Department of Artificial Intelligence and Machine Learning Bannari Amman Institute of Technology Erode Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India
The pace at which customers discontinue engaging in commercial activity with a corporation is known as customer churn, and it frequently indicates discontent or competition. Machine learning analyzes customer data to ... 详细信息
来源: 评论
Neural Networks and Deep Learning: Innovations and applications in Soft Computing
Neural Networks and Deep Learning: Innovations and Applicati...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Jahagirdar Imran Abdulkadar Chinnem Rama Mohan P. Vijaya Bharati Shamik Palit Gunda Srinivasa Rao Pankaj Mudholkar Computer Application Savitribai Phule Pune University Department of Computer Science and Engineering Narayana Engineering College Nellore Andhra Pradesh India Department of CSE Vignans Institute of Engineering for Women Visakhapatnam Andhra Pradesh India Department of Computing Science and Software Engineering University of Stirling RAK Campus UAE School of Management and Commerce Mallareddy University Kompally Faculty of Computer Applications Marwadi University Rajkot Gujarat India
The Paper explores different aspects of deep learning techniques and neural networks in the fields of healthcare, time-series forecasting, agriculture, and other relevant sectors through soft computing. The objective ... 详细信息
来源: 评论
Knowledge Graph Completion Method Based on Using Multi-Hop Reasoning
Knowledge Graph Completion Method Based on Using Multi-Hop R...
收藏 引用
Information Technology and Nanotechnology (ITNT), International Conference on
作者: Aleksei Golovin Nataly Zhukova Igor Kulikov Department of Software Engineering and Computer Applications Saint Petersburg Electrotechnical University ‘LETI’ Saint-Petersburg Russia St. Petersburg Federal Research Centre of the Russian Academy of Sciences (SPCRAS) Saint-Petersburg Russia
In this paper, the method for knowledge graph completion based on using multi-hop reasoning is proposed. The relevance of the problem is due to the widespread use of large sparse knowledge graphs with incomplete data.... 详细信息
来源: 评论
Weapon Detection Identification and Classification for DCNN and YOLO-V5 Techniques
Weapon Detection Identification and Classification for DCNN ...
收藏 引用
IoT Based Control Networks and Intelligent Systems (ICICNIS), International Conference on
作者: J. Ashok Kumar G. Dhivya P. Selvaraj V. Ganesh Karthikeyan S. P. Ramesh S. Jeya Lakshmi R. Saravanakumar Department of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Computer Science and Engineering School of Computer Science and Engineering Galgotias University Greater Noida Uttar Pradesh India School of Computing SASTRA Deemed to be University Thirumalaisamudram Thanjavur Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India
Over 850,000 people die every year as a direct result of gun violence, yet civilians hold more than 85% of the world's weapons. Detecting weapons via manual surveillance has not been successful. It is critical to ... 详细信息
来源: 评论