咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 2 篇 信息与通信工程
    • 2 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
    • 1 篇 纺织科学与工程
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...

主题

  • 1 篇 intrusion detect...
  • 1 篇 maintenance engi...
  • 1 篇 unbuffered multi...
  • 1 篇 data privacy
  • 1 篇 traffic manageme...
  • 1 篇 medical services
  • 1 篇 smart cities
  • 1 篇 noise
  • 1 篇 wireless sensor ...
  • 1 篇 computational mo...
  • 1 篇 internet
  • 1 篇 real-time system...
  • 1 篇 cell loss ratio
  • 1 篇 intelligent tran...
  • 1 篇 security
  • 1 篇 traffic lights
  • 1 篇 buffered multipl...
  • 1 篇 encryption
  • 1 篇 computer hacking
  • 1 篇 cloud computing

机构

  • 2 篇 b.tech. computer...
  • 2 篇 b.e. computer en...
  • 1 篇 iv b.tech. k.s.r...
  • 1 篇 b.tech. cse stud...
  • 1 篇 ho 3m-335 at&t b...
  • 1 篇 b.tech. informat...
  • 1 篇 b.tech. departme...
  • 1 篇 department of it...
  • 1 篇 department of co...
  • 1 篇 assistant profes...
  • 1 篇 department of co...

作者

  • 1 篇 girkar fazila
  • 1 篇 parekh soham
  • 1 篇 r. maneesh
  • 1 篇 doshi bt
  • 1 篇 joshi aniruddha ...
  • 1 篇 sawant mrunal
  • 1 篇 mody vidhi
  • 1 篇 mody vrushti
  • 1 篇 pranshu raj sinh...
  • 1 篇 r. arul murugan
  • 1 篇 s.p. shantharaja...
  • 1 篇 bhosale varshara...
  • 1 篇 e. balaji
  • 1 篇 kanahasabai gout...
  • 1 篇 s. anguraj
  • 1 篇 arti tiwari
  • 1 篇 ijjina earnest p...
  • 1 篇 vrushti mody
  • 1 篇 s. prasath
  • 1 篇 vidhi mody

语言

  • 6 篇 英文
  • 1 篇 其他
检索条件"机构=B.Tech. Computer Engineering"
7 条 记 录,以下是1-10 订阅
排序:
Detection of Customer Interested Garments in Surveillance Video using computer Vision
arXiv
收藏 引用
arXiv 2025年
作者: Ijjina, Earnest Paul Joshi, Aniruddha Srinivas Kanahasabai, Goutham Department of Computer Science and Engineering National Institute of Technology Telangana Warangal506004 India B.Tech. Department of Computer Science and Engineering National Institute of Technology Telangana Warangal506004 India
One of the basic requirements of humans is clothing and this approach aims to identify the garments selected by customer during shopping, from surveillance video. The existing approaches to detect garments were develo... 详细信息
来源: 评论
A study on Cloud enabled Applications and their Security Issues  11
A study on Cloud enabled Applications and their Security Iss...
收藏 引用
11th International Conference on Computing, Communication and Networking technologies, ICCCNT 2020
作者: Mody, Vidhi Mody, Vrushti Parekh, Soham B.Tech. Computer Engineering Mukesh Patel School of Technology Management and Engineering NMIMS India B.E. Computer Engineering Dwarkadas Jivanlal Sanghvi College of Engineering India
Cloud computing was first established to connect people and data at anytime from anywhere in the 1960s. Today cloud computing is one of the most widely used technologies. Its applications include Multi-cloud, healthca... 详细信息
来源: 评论
A study on Cloud enabled Applications and their Security Issues
A study on Cloud enabled Applications and their Security Iss...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Vidhi Mody Vrushti Mody Soham Parekh B.Tech. Computer Engineering Mukesh Patel School of Technology Management and Engineering NMIMS B.E. Computer Engineering Dwarkadas Jivanlal Sanghvi College of Engineering
Cloud computing was first established to connect people and data at anytime from anywhere in the 1960s. Today cloud computing is one of the most widely used technologies. Its applications include Multi-cloud, healthca... 详细信息
来源: 评论
Adaptive and Optimized Emergency Vehicle Dispatching Algorithm for Intelligent Traffic Management System
收藏 引用
Procedia computer Science 2015年 57卷 1384-1393页
作者: Partha Sarathi Chakraborty Arti Tiwari Pranshu Raj Sinha Assistant Professor Department of Computer Science and Engineering SRM University Chennai India B.Tech. CSE Student Department of Computer Science and Engineering SRM University Chennai India
Rapid development of metropolitan cities into smart cities and daily increased in number of vehicles on the roads causes increase in traffic maintenance challenges such as traffic congestion, accidents, dispatching of... 详细信息
来源: 评论
Survey on a co-operative multi-agent based wireless intrusion detection systems using MIbs
Survey on a co-operative multi-agent based wireless intrusio...
收藏 引用
2nd International Conference on computer Science, engineering and Applications, ICCSEA 2012
作者: Vyavhare, Ashvini bhosale, Varsharani Sawant, Mrunal Girkar, Fazila B.Tech. Information Technology Department of Computer Engineering and Information Technology College of Engineering Pune-5 MS India
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made dif... 详细信息
来源: 评论
A fusion of A-b MAP Cipher and ASET algorithms for the enhanced security and robustness in audio steganography
A fusion of A-B MAP Cipher and ASET algorithms for the enhan...
收藏 引用
International Conference on Recent Trends in Information technology (ICRTIT)
作者: S. Anguraj S.P. Shantharajah R. Arul Murugan E. balaji R. Maneesh S. Prasath Department of IT K.S.R. College of Engineering Timchengode Namakkal TamilNadu India Department of Computer Applications Sona College of Technology Salem Tamil Nadu India IV B.Tech. (IT) K.S.R. College of Engineering Timchengode Namakkal Dt. TamilNadu India
Having finally taken a foothold by the radial growth of the internet generation in the recent years, steganography serves as a mean for private, secure and sometimes malicious communication. From a technical eye, this... 详细信息
来源: 评论
DETERMINISTIC RULE-bASED TRAFFIC DESCRIPTORS FOR bROAD-bAND ISDN - WORST-CASE bEHAVIOR AND ITS IMPACT ON CONNECTION ACCEPTANCE CONTROLS
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 1995年 第2期8卷 91-109页
作者: DOSHI, bT HO 3M-335 AT&T Bell Laboratories Holmdel NJ 07733 U.S.A. Bharat T. Doshi is a supervisor in the Performance Analysis Department at AT&T Bell Laboratories Holmdel New Jersey. His group provides analytic support for a variety of AT&T's information management systems telecommunications systems and networks and computer networks in the areas of performance engineering capacity planning and congestion management. His group also conducts research in integrated communication systems and networks. Recent work has concentrated on frame relay networks ATMibroadband ISDN wireless networking and PCS. The focus is in the areas of error controls flow and congestion controls communication protocols routeing strategies network design and fault-tolerant operation. Bharat's research interests include queueing theory and teletraffic theory and their applications to computer and communications systems. He has over sixty publications in a variety of technical journals. Bharat received his B.Tech. from ITT Bombay in 1970 and an M.S. and Ph.D. in Operations Research from Cornell University in 1973 and 1974 respectively. Bharat is member of IEEE and ORSA and Associate Editor of the OR Letters High Speed Networking and Queueing Systems Journals.
Deterministic rule based traffic descriptors in general, and leaky bucket based (Lbb) traffic descriptors in particular, offer many advantages over statistical descriptors for specifying and monitoring traffic in the ... 详细信息
来源: 评论