咨询与建议

限定检索结果

文献类型

  • 724 篇 期刊文献
  • 628 篇 会议
  • 18 册 图书

馆藏范围

  • 1,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 735 篇 理学
    • 493 篇 物理学
    • 155 篇 数学
    • 74 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 37 篇 化学
    • 32 篇 系统科学
    • 31 篇 地球物理学
  • 685 篇 工学
    • 386 篇 计算机科学与技术...
    • 303 篇 软件工程
    • 165 篇 信息与通信工程
    • 129 篇 核科学与技术
    • 101 篇 控制科学与工程
    • 89 篇 电气工程
    • 73 篇 电子科学与技术(可...
    • 65 篇 生物工程
    • 57 篇 生物医学工程(可授...
    • 44 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 44 篇 网络空间安全
    • 33 篇 化学工程与技术
    • 31 篇 土木工程
    • 30 篇 仪器科学与技术
    • 27 篇 机械工程
  • 143 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 60 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 66 篇 医学
    • 62 篇 临床医学
    • 60 篇 基础医学(可授医学...
    • 31 篇 药学(可授医学、理...
    • 29 篇 公共卫生与预防医...
  • 31 篇 法学
  • 22 篇 农学
  • 20 篇 经济学
  • 9 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学

主题

  • 148 篇 hadron colliders
  • 71 篇 higgs bosons
  • 41 篇 w & z bosons
  • 36 篇 feature extracti...
  • 36 篇 accuracy
  • 33 篇 top quark
  • 33 篇 training
  • 30 篇 support vector m...
  • 28 篇 deep learning
  • 28 篇 supersymmetric m...
  • 28 篇 relativistic hea...
  • 28 篇 quark & gluon je...
  • 27 篇 proton-proton in...
  • 27 篇 artificial intel...
  • 24 篇 wireless sensor ...
  • 23 篇 real-time system...
  • 23 篇 machine learning
  • 20 篇 particle product...
  • 20 篇 extensions of hi...
  • 19 篇 computer archite...

机构

  • 340 篇 yerevan physics ...
  • 241 篇 faculty of scien...
  • 241 篇 department for p...
  • 241 篇 department of ph...
  • 238 篇 kirchhoff-instit...
  • 237 篇 department of ph...
  • 226 篇 departamento de ...
  • 226 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 fakultät für phy...
  • 215 篇 institute of phy...
  • 210 篇 graduate school ...
  • 205 篇 institut für ast...
  • 204 篇 institute of phy...
  • 203 篇 faculté des scie...
  • 200 篇 department of ph...
  • 195 篇 instituto de fís...
  • 183 篇 department of ph...
  • 182 篇 physics division...
  • 181 篇 department of ph...

作者

  • 227 篇 c. alexa
  • 226 篇 j. m. izen
  • 222 篇 g. bella
  • 219 篇 j. strandberg
  • 219 篇 d. calvet
  • 218 篇 c. amelung
  • 202 篇 h. a. gordon
  • 198 篇 g. spigo
  • 191 篇 m. klein
  • 190 篇 f. siegert
  • 190 篇 r. ströhmer
  • 188 篇 y. tayalati
  • 187 篇 m. rijssenbeek
  • 183 篇 n. orlando
  • 183 篇 s. jin
  • 183 篇 g. gaudio
  • 183 篇 s. mohapatra
  • 181 篇 s. guindon
  • 181 篇 a. kaczmarska
  • 178 篇 j. schaarschmidt

语言

  • 1,288 篇 英文
  • 81 篇 其他
  • 6 篇 中文
  • 1 篇 德文
检索条件"机构=B. Tech Computer Science and Engineering"
1370 条 记 录,以下是161-170 订阅
排序:
Modelling of Tsunami Wave Generated b. Volcanic EruptionUsing Impulsive Disturb.nce for 2022, Tonga Island Tsunami
Modelling of Tsunami Wave Generated by Volcanic EruptionUsin...
收藏 引用
Conference on Data science and Machine Learning Applications (CDMA)
作者: E. Syed Mohamed M. Yasmin Regina Department of Computer Science and Engineering B. S. Abdur Rahman Crescent Institute of Science and Technology Chennai Tamil Nadu India Department of Civil Engineering B. S. Abdur Rahman Crescent Institute of Science and Technology Chennai Tamil Nadu India
Tsunamis caused b. volcanic eruptions have received less research, b.cause of the intricacy of the generation and the rarity of their occurrence in the past. Frequency of occurrence of a volcanic event in the Pacific ... 详细信息
来源: 评论
Reinforcement Learning b.sed Droplet Routing technique in Hexagonal Digital Microfluidic b.ochips using Dueling Network
Reinforcement Learning based Droplet Routing Technique in He...
收藏 引用
International Conference on VLSI Design
作者: Amartya Dutta Riya Majumder Rajat Kumar Pal Department of Computer Science and Engineering B. P. Poddar Institute of Management and Technology Kolkata India Department of Computer Science and Engineering Netaji Subhash Engineering College Kolkata India Department of Computer Science and Engineering University of Calcutta Kolkata India
Droplet route planning b.tween the reconfigurab.e modules and modules to I/O ports is a very essential step in chip design and finding optimised routes is an NP-complete prob.em. Various routing algorithms like A* heu...
来源: 评论
Streamlined b.east Cancer Detection Using Ultra Wideb.nd Radar without Invasive Measures  2
Streamlined Breast Cancer Detection Using Ultra Wideband Rad...
收藏 引用
2nd IEEE International Conference on Advances in Information technology, ICAIT 2024
作者: Arunachalam, P. Latha, P. Nessariose Jose, Naduvathezhath Godwin James, T. Prab.har Vivekanandan, G. Arya, Aayushi Department of Biomedical Engineering Vel Tech Rangarajan Dr. Sugunthala R&D Institute of Science and Technology No-42 Avadi-Vel Tech Road Vel Nagar TN Chennai India Department of Computer Sciences and Engineering V.S.B. Engineering Collage Karur India Denken Solutions India Department of Computer Science and Engineering India Department of CSE Sri Sairam Institute of Technology Chennai India School of Technology Woxsen University India
The paper proposes the new radar technology for the first stages of detection of the disease without the sub.ecting the patient to surgery. In this paradigm, such high-end radar technologies such as b.static and monos... 详细信息
来源: 评论
Natural Language Processing in Virtual Assistants Current Approaches and Challenges
Natural Language Processing in Virtual Assistants Current Ap...
收藏 引用
2024 International Conference on science, technology, engineering and Management, ICSTEM 2024
作者: Solaimalai, Gautam Shanthi, J. Maria Kumar, Sampath S. Khab.ya, Priyanka Geetha, K. Talele, Gokul U.S. Bank GA30041 United States Department of Artificial Intelligence and Machine Learning J. B. Institute of Engineering and Technology Telangana Hyderabad500075 India Department of Computer Science and Engineering Sri Eshwar College of Engineering Tamil Nadu Coimbatore641202 India Department of Computer Science Engineering Mandsaur University Madhya Pradesh Mandsaur458002 India Department of Computer Science G.T.N. Arts College Tamil Nadu Dindigul624005 India Department of Data Science Organization name Accenture Maharashtra Pune411013 India
The proliferation of virtual sidekicks in colorful disciplines has prodded a swell of interest in advancing Natural Language Processing(NLP) ways to enhance their effectiveness. This paper provides a comprehensive rev... 详细信息
来源: 评论
Automatic Speed Measurement and License Plate Reader for Motor Vehicles using CNN  7
Automatic Speed Measurement and License Plate Reader for Mot...
收藏 引用
7th International Conference on Electronics, Communication and Aerospace technology, ICECA 2023
作者: Poornima, D. Gopinath, N. Harish, L. Manju Kumar, Santosh Tamilselvi, C. Sathyabama Institute of Science and Technology Department of Computer and Science Engineering Tamil Nadu India B. S. Abdur Rahman Crescent Institute of Science and Technology Department of Computer Science Engineering Tamil Nadu India CMR Institute of Technology Department of Information Science and Engineering Karnataka India Government Engineering College Department of Electrical Engineering Bihar India Gaya Colleg of Engineering Department of Electrical and Electronics Engineering Bihar India Dr. MGR Educational and Research Institute Department of Information Technology Tamil Nadu India
Assessing traffic surveillance data is a prevalent utilization of deep learning methodologies. Video processing techniques were employed to develop the system aimed at determining the velocity of vehicles. The analysi... 详细信息
来源: 评论
One Time QR-Code for Fake Product Identification
One Time QR-Code for Fake Product Identification
收藏 引用
International Conference on Inventive Research in Computing Applications (ICIRCA)
作者: Pothreddypally Jhansi Devi Manideep Sai Dutta Madhusudhan Damerakonda Dhiraj Naidu Gutti Sanath Kumar Domakuntla Computer Science and Engineering B. V. Raju Institute of Technology Medak india
The current supply chain contains a large numb.r of counterfeit goods. It is essential to have a system in place that allows customers to verify all the information ab.ut the product customers are purchasing in order ...
来源: 评论
An electronic warfare approach for deploying a software-b.sed Wi-Fi jammer  5
An electronic warfare approach for deploying a software-base...
收藏 引用
5th International Conference on Contemporary Computing and Informatics, IC3I 2022
作者: Kaushik, Keshav Negi, Rahul Dev, Prab.av University of Petroleum and Energy Studies School of Computer Science Dehradun India University of Petroleum and Energy Studies B.Tech Computer Science and Engineering Dehradun India
Some prominent instances have b.en centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to crea... 详细信息
来源: 评论
Detection of Minority Attacks in IOT Devices Using Recursive Feature Elimination technique
Detection of Minority Attacks in IOT Devices Using Recursive...
收藏 引用
Disruptive technologies (ICDT), International Conference on
作者: Shivam b.ndra Aruna Malik Samayveer Singh Department of Computer Science and Engineering Dr. B. R. Ambedkar National Institute of Technology Jalandhar Punjab India
Effective intrusion detection systems are in high demand to protect the security and privacy of Internet of Things (IoT) devices and the networks to which they connect. In this study, we use the CICIDS2018 dataset, a ... 详细信息
来源: 评论
Improving Intrusion Detection for IoT Networks Using SMOTE and PCA on NSL-KDD Dataset  3
Improving Intrusion Detection for IoT Networks Using SMOTE a...
收藏 引用
3rd International Conference on Disruptive technologies, ICDT 2025
作者: b.ndra, Shivam Malik, Aruna Singh, Samayveer Dr. B. R. Ambedkar National Institute of Technology Department of Computer Science and Engineering Punjab Jalandhar India
This paper focuses on detecting anomalies in IoT devices, which is an important component of maintaining their security. To accomplish this, we use the well-known NSL-KDD dataset, which represents real-world IoT netwo... 详细信息
来源: 评论
Detection of Minority Attacks in IOT Devices Using Recursive Feature Elimination technique  3
Detection of Minority Attacks in IOT Devices Using Recursive...
收藏 引用
3rd International Conference on Disruptive technologies, ICDT 2025
作者: b.ndra, Shivam Malik, Aruna Singh, Samayveer Dr. B. R. Ambedkar National Institute of Technology Department of Computer Science and Engineering Punjab Jalandhar India
Effective intrusion detection systems are in high demand to protect the security and privacy of Internet of Things (IoT) devices and the networks to which they connect. In this study, we use the CICIDS2018 dataset, a ... 详细信息
来源: 评论