咨询与建议

限定检索结果

文献类型

  • 469 篇 期刊文献
  • 195 篇 会议

馆藏范围

  • 664 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 理学
    • 402 篇 物理学
    • 27 篇 数学
    • 18 篇 生物学
    • 11 篇 化学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 265 篇 工学
    • 126 篇 核科学与技术
    • 102 篇 计算机科学与技术...
    • 90 篇 软件工程
    • 47 篇 信息与通信工程
    • 25 篇 电气工程
    • 25 篇 控制科学与工程
    • 18 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 15 篇 生物医学工程(可授...
    • 14 篇 生物工程
    • 11 篇 网络空间安全
    • 10 篇 动力工程及工程热...
    • 10 篇 化学工程与技术
    • 9 篇 安全科学与工程
    • 8 篇 材料科学与工程(可...
    • 7 篇 仪器科学与技术
    • 7 篇 交通运输工程
  • 38 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 16 篇 工商管理
    • 14 篇 图书情报与档案管...
  • 21 篇 医学
    • 21 篇 临床医学
    • 19 篇 基础医学(可授医学...
    • 10 篇 公共卫生与预防医...
    • 9 篇 药学(可授医学、理...
  • 8 篇 法学
  • 5 篇 经济学
  • 4 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 147 篇 hadron colliders
  • 68 篇 higgs bosons
  • 41 篇 w & z bosons
  • 33 篇 top quark
  • 28 篇 supersymmetric m...
  • 28 篇 relativistic hea...
  • 28 篇 quark & gluon je...
  • 20 篇 particle product...
  • 20 篇 extensions of hi...
  • 19 篇 hypothetical par...
  • 18 篇 particle data an...
  • 17 篇 bottom quark
  • 17 篇 proton-proton in...
  • 17 篇 hypothetical par...
  • 17 篇 accuracy
  • 16 篇 tau leptons
  • 16 篇 supersymmetry
  • 16 篇 particle decays
  • 16 篇 photons
  • 16 篇 cms

机构

  • 324 篇 yerevan physics ...
  • 225 篇 faculty of scien...
  • 225 篇 department for p...
  • 225 篇 department of ph...
  • 223 篇 kirchhoff-instit...
  • 221 篇 department of ph...
  • 219 篇 graduate school ...
  • 210 篇 departamento de ...
  • 210 篇 department of ph...
  • 206 篇 department of ph...
  • 206 篇 department of ph...
  • 205 篇 fakultät für phy...
  • 204 篇 institute of phy...
  • 199 篇 institut für ast...
  • 191 篇 centre de calcul...
  • 188 篇 institute of phy...
  • 187 篇 faculté des scie...
  • 185 篇 department of ph...
  • 182 篇 instituto de fís...
  • 178 篇 dipartimento di ...

作者

  • 205 篇 c. alexa
  • 204 篇 j. m. izen
  • 201 篇 g. bella
  • 198 篇 j. strandberg
  • 198 篇 d. calvet
  • 198 篇 c. amelung
  • 190 篇 n. orlando
  • 182 篇 h. a. gordon
  • 180 篇 y. tayalati
  • 178 篇 g. spigo
  • 178 篇 v. chiarella
  • 177 篇 s. veneziano
  • 171 篇 f. siegert
  • 169 篇 m. klein
  • 169 篇 r. ströhmer
  • 166 篇 m. rijssenbeek
  • 165 篇 f. deliot
  • 163 篇 y. abulaiti
  • 162 篇 d. guest
  • 162 篇 s. jin

语言

  • 641 篇 英文
  • 23 篇 其他
检索条件"机构=B.Tech Computer Science and Engineering"
664 条 记 录,以下是11-20 订阅
排序:
A Real-Time Approach to Classify the Water Quality of the River Ganga at Mehandi Ghat, Kannuaj  4
A Real-Time Approach to Classify the Water Quality of the Ri...
收藏 引用
4th IEEE International Conference on Artificial Intelligence in engineering and technology, IICAIET 2022
作者: bajpai, Abhishek Chaubey, Srishti Patro, bdk Verma, Abhineet Rajkiya Engineering College Department of Computer Science and Engineering UP Kannauj India B.Tech Computer Science and Engineering Rajkiya Engineering College UP Kannauj India
Only 0.3 percent of the total water on Earth is available in rivers and ponds, and the majority of it is polluted to the point where drinking it directly can cause disease. In this paper, we will identify the quality ... 详细信息
来源: 评论
Crime Against Women in India: Statistical Analysis Using Linear Regression  2
Crime Against Women in India: Statistical Analysis Using Lin...
收藏 引用
2nd International Conference on Advanced Computing and Communication technologies, ICACCtech 2024
作者: Mim, Zarin Tasnim Paul, Rittika Foysal, Mollah Md Tohfa, Fairuz Nowshin Mahi, Shah Abrar Bangalore India Bangalore India B-Tech of Computer Science and Engineering East Delta University Chattagram Bangladesh B-Tech of Computer Science and Engineering-Cyber Security Chandigarh University Delhi India
The crime reports of offenses occurring against women all over India are increasing day by day. It has become one of today's most concerning socio-economic and cultural issues. Crime against women hampers the over... 详细信息
来源: 评论
Federated Learning for Kidney Disease Prediction using Combined LSTM and MLP Models
Federated Learning for Kidney Disease Prediction using Combi...
收藏 引用
International Conference on Communication Systems and Network technologies (CSNT)
作者: Anurag Pathak Anshuman Pandey B.Tech in Computer Science (AI & ML) GLA University Mathura Uttar Pradesh India B.Tech in Computer Science GLA University Mathura Uttar Pradesh India
Kidney disease (KD) is a prevalent global health issue, and early prediction is critical for improving patient outcomes. In this study, we propose a federated learning approach that combines Long Short-Term Memory (LS... 详细信息
来源: 评论
An electronic warfare approach for deploying a software-based Wi-Fi jammer  5
An electronic warfare approach for deploying a software-base...
收藏 引用
5th International Conference on Contemporary Computing and Informatics, IC3I 2022
作者: Kaushik, Keshav Negi, Rahul Dev, Prabhav University of Petroleum and Energy Studies School of Computer Science Dehradun India University of Petroleum and Energy Studies B.Tech Computer Science and Engineering Dehradun India
Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to crea... 详细信息
来源: 评论
An approach for exploiting and mitigating Log4J using Log4Shell vulnerability  3
An approach for exploiting and mitigating Log4J using Log4Sh...
收藏 引用
3rd International Conference on Computation, Automation and Knowledge Management, ICCAKM 2022
作者: Kaushik, Keshav Dass, Alpana Dhankhar, Ayush University of Petroleum and Energy Studies School of Computer Science Dehradun India University of Petroleum and Energy Studies Student B.Tech Computer Science and Engineering Dehradun India
A new serious flaw has been discovered in log4j, a popular open-source tool used to produce logs within Java programs. The Log4Shell vulnerability, also referred as CVE-2021-44228, enables Remote Code Execution (RCE),... 详细信息
来源: 评论
Resonating Silence: Music Perception in the Deaf and Hard of Hearing
Resonating Silence: Music Perception in the Deaf and Hard of...
收藏 引用
IEEE UP Section Conference on Electrical computer and Electronics (UPCON)
作者: Mahak Garg Akanksha Yadav Kiran Singh B.Tech Computer Science and Engineering Galgotias University Greater Noida India School of Computer Science & Engineering Galgotias University Greater Noida India
Music is traditionally considered an auditory experience; however, the perception of music by Deaf and hard-of-hearing individuals challenges this assumption. This paper examines how people who are Deaf engage with mu... 详细信息
来源: 评论
Context-Aware Summarization for PDF Documents using Large Language Models  4
Context-Aware Summarization for PDF Documents using Large La...
收藏 引用
4th International Conference on Expert Clouds and Applications, ICOECA 2024
作者: Ramprasad, Akshara Sivakumar, P. School of Computer Science and Engineering Vellore Institute of Technology B. Tech Computer Science with specialization in AI & ML Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
In an era characterized by the overflow of textual information, the demand for effective text summarization techniques has become increasingly evident. This research study presents a novel solution to address this dem... 详细信息
来源: 评论
Anti-Remote Disk Imaging: A Comprehensive Approach to Prevent Unauthorized Data Access
Anti-Remote Disk Imaging: A Comprehensive Approach to Preven...
收藏 引用
Data science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: K. Venketesh M. Caleb Gunalan Manoj Hariharan R Rahul S Surender R Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Tamilnadu India B.Tech Computer Science and Engineering Kalasalingam Academy of Research and Education Tamilnadu India
Remote disk imaging is an emerging cybersecurity risk that compromises sensitive information integrity. Malicious actors exploit legitimate tools like dd and Clonezilla to clone and exfiltrate data remotely. This pape... 详细信息
来源: 评论
Customer Analytics using Surveillance Video
arXiv
收藏 引用
arXiv 2025年
作者: Ijjina, Earnest Paul Joshi, Aniruddha Srinivas Kanahasabai, Goutham Priyanka, P. Keerthi Department of Computer Science and Engineering National Institute of Technology Warangal506004 India B.Tech Department of Computer Science and Engineering National Institute of Technology Warangal506004 India
The analysis of sales information, is a vital step in designing an effective marketing strategy. This work proposes a novel approach to analyse the shopping behaviour of customers to identify their purchase patterns. ... 详细信息
来源: 评论
Dynamic Website Authentication Using Time-based One-Time Password (TOTP) for Enhanced Security
Dynamic Website Authentication Using Time-Based One-Time Pas...
收藏 引用
Data science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: M Caleb Gunalan bavani K Mathew Hayden Manoj Hariharan R Rahul S B.Tech Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil Tamilnadu India Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil Tamilnadu India
In today's digital landscape, the proliferation of fake websites poses significant threats to user security, trust, and data integrity. This paper presents a novel solution to address this issue through the implem... 详细信息
来源: 评论