咨询与建议

限定检索结果

文献类型

  • 4,828 篇 会议
  • 4,106 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 8,955 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,947 篇 工学
    • 2,346 篇 计算机科学与技术...
    • 1,890 篇 软件工程
    • 1,006 篇 信息与通信工程
    • 833 篇 电气工程
    • 820 篇 电子科学与技术(可...
    • 699 篇 控制科学与工程
    • 556 篇 核科学与技术
    • 498 篇 仪器科学与技术
    • 446 篇 光学工程
    • 414 篇 生物工程
    • 377 篇 化学工程与技术
    • 376 篇 生物医学工程(可授...
    • 344 篇 材料科学与工程(可...
    • 312 篇 动力工程及工程热...
    • 288 篇 机械工程
    • 253 篇 网络空间安全
    • 209 篇 土木工程
  • 4,400 篇 理学
    • 2,581 篇 物理学
    • 1,062 篇 数学
    • 630 篇 地球物理学
    • 558 篇 生物学
    • 518 篇 化学
    • 369 篇 统计学(可授理学、...
    • 206 篇 天文学
  • 971 篇 管理学
    • 664 篇 管理科学与工程(可...
    • 341 篇 图书情报与档案管...
    • 331 篇 工商管理
  • 519 篇 医学
    • 414 篇 临床医学
    • 356 篇 基础医学(可授医学...
    • 254 篇 公共卫生与预防医...
  • 198 篇 法学
  • 155 篇 经济学
  • 147 篇 农学
  • 72 篇 教育学
  • 24 篇 文学
  • 6 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 385 篇 accuracy
  • 285 篇 deep learning
  • 272 篇 real-time system...
  • 216 篇 machine learning
  • 199 篇 internet of thin...
  • 199 篇 feature extracti...
  • 181 篇 hadron colliders
  • 167 篇 computational mo...
  • 162 篇 convolutional ne...
  • 153 篇 training
  • 150 篇 support vector m...
  • 150 篇 predictive model...
  • 123 篇 security
  • 108 篇 artificial intel...
  • 103 篇 technological in...
  • 101 篇 optimization
  • 98 篇 scalability
  • 91 篇 reliability
  • 91 篇 medical services
  • 91 篇 cloud computing

机构

  • 601 篇 department of ph...
  • 583 篇 physikalisches i...
  • 566 篇 cavendish labora...
  • 492 篇 oliver lodge lab...
  • 432 篇 school of physic...
  • 348 篇 faculty of scien...
  • 332 篇 department of ph...
  • 327 篇 department for p...
  • 326 篇 department of ph...
  • 315 篇 yerevan physics ...
  • 313 篇 department of ph...
  • 312 篇 kirchhoff-instit...
  • 306 篇 department of ph...
  • 297 篇 dept. of astrono...
  • 293 篇 infn laboratori ...
  • 291 篇 dept. of physics...
  • 279 篇 dept. of physics...
  • 273 篇 institute of phy...
  • 262 篇 fakultät für phy...
  • 262 篇 european organiz...

作者

  • 268 篇 a. gomes
  • 259 篇 j. m. izen
  • 257 篇 c. alexa
  • 247 篇 g. bella
  • 244 篇 j. strandberg
  • 244 篇 d. calvet
  • 244 篇 c. amelung
  • 232 篇 s. chen
  • 230 篇 g. spigo
  • 226 篇 f. siegert
  • 218 篇 hoshina k.
  • 212 篇 haungs a.
  • 211 篇 fürst p.
  • 209 篇 y. tayalati
  • 209 篇 r. ströhmer
  • 204 篇 m. rijssenbeek
  • 203 篇 s. jin
  • 201 篇 g. gaudio
  • 196 篇 m. gandelman
  • 196 篇 t. gershon

语言

  • 7,399 篇 英文
  • 1,509 篇 其他
  • 46 篇 中文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Be in Computer Engineering L D College of Engineering"
8955 条 记 录,以下是371-380 订阅
排序:
IoT botnet detection from software defined network using American zebra optimization algorithm with SSRNN-ElM
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 959-967页
作者: Bindu, Nalluri Venkata Madhu Nassa, Vinay Kumar Vasuki, P. Manikandan, G. Jeena, R. Mahaveerakannan, R. Department of CSE-AIML Malla Reddy Engineering College (Autonomous) Medchal Secunderabad Malkajgiri (Dist) India Ellenki College of Engineering and Technology (ECET) Patelguda (v) Ameenpur (m) Sangareddy (D) Hyderabad Telangana India Department of Information Technology Sri Sivasubramaniya Nadar College of Engineering Chennai India Department of Electronics and Communication Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India
Software-defined networking (SdN) offers centralized control over large-scale networks, enhancing flexibility and enabling tailored network applications. However, SdN introduces new security vulnerabilities, including... 详细信息
来源: 评论
A Simplified Policy Modification Framework By External provider For Human Medical Record Sharing
A Simplified Policy Modification Framework By External provi...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering, RMKMATE 2023
作者: Pandi, C. Siva Rama lingham, N. Anish, T.P. Aruna, R. Computer Science and Engineering Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Avadi India Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Avadi India Computer Science and Engineering R.M.K College of Engineering and Technology India
The great flexibility and accessibility of cloud computing make it a good fit for storing and managing Personal Health Records (PHR), which are often large and complex datasets. Personal health data, on the other hand... 详细信息
来源: 评论
Image Enhancement by Various Segmentation Techniques Using Machine learning  6th
Image Enhancement by Various Segmentation Techniques Using M...
收藏 引用
6th International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2021
作者: Chanchlani, Akshita Thakare, Vilas M. Wadhai, Vijay M. Department of Computer Science and Engineering SGBA University Amravati India Department of Electronics and Telecommunications Engineering D. Y. Patil College of Engineering Akurdi Pune India
Brain Cancer is a disease where abnormal cells grow without control and can invade other tissues, if it is identified at the early stage and treated appropriately then it can save human life. In developing countries c... 详细信息
来源: 评论
ElephantGuardNet: A Comprehensive Solution for Elephant Conservation and Human-Elephant Conflict Reduction  4
ElephantGuardNet: A Comprehensive Solution for Elephant Cons...
收藏 引用
4th International Conference on Sentiment Analysis and deep learning, ICSAdl 2025
作者: Naveen, S. dhamotharan, R. Sahebzathi, S. Krishnan, R. Santhana Kumar, V. Vinoth Sundaravadivel, P. Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Mechanical Engineering Chennai India Kalasalingam Academy of Research and Education Department of Computer Science and Information Technology Krishnankoil India Velammal College of Engineering and Technology Department of Computer Science and Engineering Madurai India Scad College of Engineering and Technology Department of Electronics and Communication Engineering Cheranmahadevi India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India Saveetha Engineering College Department of Artificial Intelligence and Machine Learning Chennai India
The ElephantGuardNet system is an advanced technological framework designed to monitor and protect elephants while minimizing human-elephant conflict. The system leverages a combination of real-time data collection, A... 详细信息
来源: 评论
Overhead-Aware Resource Allocation with Cluster-Based Network Construction in VANETs  1
Overhead-Aware Resource Allocation with Cluster-Based Networ...
收藏 引用
1st Asian Conference on Communication and Networks, ASIANComNet 2024
作者: Hariz, Hussein Muhi Hashim, Mohammed I. Manikandan, M. Kurdi, Waleed Hadi Madhloom Jaber, Zahraa Hameed Abbas, F.H. Mazaya University College Department of Computer Techniques Engineering DhiQar Iraq The Islamic University College of Technical Engineering Department of Computer Technical Engineering Najaf Iraq Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Avadi Chennai India Altoosi University College Department of Computer Science Najaf Iraq National University of Science and Technology Dhi Qar Iraq Al-Mustaqbal University Medical Laboratories Techniques Department Hillah Iraq
The feasibility in communication among the source to the destination is disturbed at the time of high-speed data transmission it increases the delay, overhead, and power utilization. Mainly to overcome such drawbacks ... 详细信息
来源: 评论
deep learning for MANET Routing
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine learning in Communications and Networking 2023年 1卷 412-424页
作者: danilchenko, Kiril Azoulay, Rina Reches, Shulamit Haddad, Yoram University of Waterloo Department of Electrical and Computer Engineering WaterlooN2L 3G1 Canada Jerusalem College of Technology Department of Computer Science Jerusalem91160 Israel
Power control and scheduling are among the most well-known resource allocation challenges in wireless networks, and are often solved as optimization problems with constraints. However, solving these optimization chall... 详细信息
来源: 评论
AN EARlY dIABETES dISEASES PREdICTION USING MACHINE lEARNING WITH OPTIMAl FEATURES SElECTION
AN EARLY DIABETES DISEASES PREDICTION USING MACHINE LEARNING...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering, RMKMATE 2023
作者: Kasinathan, Prabakaran Balamurugan, M. Rao, B. dean Beema Sangeetha, M. Aminabee, Shaik Reddy, Pundru Chandra Shaker Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Tehnology Tamilnadu Chennai India Computer Science and Engineering Sri Sairam Engineering College Tamilnadu Chennai India Computer Science and Engineering Panimalar Engineering College Tamilnadu Chennai India Computer Science and Engineering SRM Madurai College for Engineering and Technology Tamilnadu India Department of Pharmacology V. V. Institute of Pharmaceutical Sciences AP Gudlavalleru India School of Computer Science and Engineering Lovely Professional University Punjab India
diabetics have elevated blood glucose levels for a lengthy period of time, either due to insufficient insulin synthesis or a lack of effective insulin response by the body's cells. long-term harm, breakdown, and c... 详细信息
来源: 评论
Cyber-Physical Attack detection in Additive Manufacturing: An lSTM-Based Autoencoder Approach Using Reconstruction Error Analysis from Side-Channel Monitoring
Cyber-Physical Attack Detection in Additive Manufacturing: A...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2024
作者: Chithras, T. Brijesh, K.J. Paul, M. Mano Raja Karthick, S. Bhuvanesh, A. Keerthanadevi, R. Veltech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Electrical and Electronics Engineering Chennai India Gregorian Institute of Technology Department of Automobile Engineering Kottayam India Nehru Institute of Engineering and Technology Department of Electrical and Electronics Engineering Coimbatore India Sri Eshwar College of Engineering Department of English Coimbatore India Psn College of Engineering and Technology Department of Electrical and Electronics Engineering Tirunelveli India Psn College of Engineering and Technology Department of Computer Science and Engineering Tirunelveli India
In order to identify cyber-physical threats in additive manufacturing systems, this study suggests a sophisticated technique that uses data from side-channel monitoring. Strong attack detection capabilities are guaran... 详细信息
来源: 评论
Enhancing Cybersecurity in the digital Age with Machine learning for Threat detection and Prevention
Enhancing Cybersecurity in the Digital Age with Machine Lear...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering Technology, ICRASET 2024
作者: Jayarin, P.Jesu david, d. Beulah Jenifa Kumari, V. Sheeja Pillai, N. Muthuvairavan Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Information Technology Thandalam Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy India Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Thandalam Tamil Nadu Chennai India R.M.D Engineering College Department of Computer Science and Business Systems Tamil Nadu Thiruvallur India
Information security cannot be underemphasized today especially with the increased use of Information Communication Technology which requires improved threat identification techniques. In this study, we propose a nove... 详细信息
来源: 评论
An Optimized Hybrid deep learning Framework for Monitoring Botnet Attacks in IoT Networks  5
An Optimized Hybrid Deep Learning Framework for Monitoring B...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Manimaran, A. Sathish Kumar, P.J. Kartheesan, l. Kumutha, d. Surendran, R. Karpaga Vinayaga College of Engineering and Technology Technical Sciences Department of Electronics and Communication Engg Chengalpattu India Panimalar Engineering College Department of Computer Science and Engineering Chennai India Vel Tech Rangarajan Dr.Sangunthala R&D Department of Computer Science and Engineering Institute of Science and Technology Chennai India Jeppiaar Institute of Technology Department of Electronics and Communication Engg Sriperumudur India Saveetha School of Engineering Department of Computer Science and Engineering Saveetha Institute of Medical and Technical Sciences Chennai India
The serious threat of botnet attacks in the IOT world today can be effectively addressed with deep learning (dl). However, to train the model, large and complex data sets are required, which adds cost and necessitates... 详细信息
来源: 评论