咨询与建议

限定检索结果

文献类型

  • 4,828 篇 会议
  • 4,106 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 8,955 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,947 篇 工学
    • 2,346 篇 计算机科学与技术...
    • 1,890 篇 软件工程
    • 1,006 篇 信息与通信工程
    • 833 篇 电气工程
    • 820 篇 电子科学与技术(可...
    • 699 篇 控制科学与工程
    • 556 篇 核科学与技术
    • 498 篇 仪器科学与技术
    • 446 篇 光学工程
    • 414 篇 生物工程
    • 377 篇 化学工程与技术
    • 376 篇 生物医学工程(可授...
    • 344 篇 材料科学与工程(可...
    • 312 篇 动力工程及工程热...
    • 288 篇 机械工程
    • 253 篇 网络空间安全
    • 209 篇 土木工程
  • 4,400 篇 理学
    • 2,581 篇 物理学
    • 1,062 篇 数学
    • 630 篇 地球物理学
    • 558 篇 生物学
    • 518 篇 化学
    • 369 篇 统计学(可授理学、...
    • 206 篇 天文学
  • 971 篇 管理学
    • 664 篇 管理科学与工程(可...
    • 341 篇 图书情报与档案管...
    • 331 篇 工商管理
  • 519 篇 医学
    • 414 篇 临床医学
    • 356 篇 基础医学(可授医学...
    • 254 篇 公共卫生与预防医...
  • 198 篇 法学
  • 155 篇 经济学
  • 147 篇 农学
  • 72 篇 教育学
  • 24 篇 文学
  • 6 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 385 篇 accuracy
  • 285 篇 deep learning
  • 272 篇 real-time system...
  • 216 篇 machine learning
  • 199 篇 internet of thin...
  • 199 篇 feature extracti...
  • 181 篇 hadron colliders
  • 167 篇 computational mo...
  • 162 篇 convolutional ne...
  • 153 篇 training
  • 150 篇 support vector m...
  • 150 篇 predictive model...
  • 123 篇 security
  • 108 篇 artificial intel...
  • 103 篇 technological in...
  • 101 篇 optimization
  • 98 篇 scalability
  • 91 篇 reliability
  • 91 篇 medical services
  • 91 篇 cloud computing

机构

  • 601 篇 department of ph...
  • 583 篇 physikalisches i...
  • 566 篇 cavendish labora...
  • 492 篇 oliver lodge lab...
  • 432 篇 school of physic...
  • 348 篇 faculty of scien...
  • 332 篇 department of ph...
  • 327 篇 department for p...
  • 326 篇 department of ph...
  • 315 篇 yerevan physics ...
  • 313 篇 department of ph...
  • 312 篇 kirchhoff-instit...
  • 306 篇 department of ph...
  • 297 篇 dept. of astrono...
  • 293 篇 infn laboratori ...
  • 291 篇 dept. of physics...
  • 279 篇 dept. of physics...
  • 273 篇 institute of phy...
  • 262 篇 fakultät für phy...
  • 262 篇 european organiz...

作者

  • 268 篇 a. gomes
  • 259 篇 j. m. izen
  • 257 篇 c. alexa
  • 247 篇 g. bella
  • 244 篇 j. strandberg
  • 244 篇 d. calvet
  • 244 篇 c. amelung
  • 232 篇 s. chen
  • 230 篇 g. spigo
  • 226 篇 f. siegert
  • 218 篇 hoshina k.
  • 212 篇 haungs a.
  • 211 篇 fürst p.
  • 209 篇 y. tayalati
  • 209 篇 r. ströhmer
  • 204 篇 m. rijssenbeek
  • 203 篇 s. jin
  • 201 篇 g. gaudio
  • 196 篇 m. gandelman
  • 196 篇 t. gershon

语言

  • 7,399 篇 英文
  • 1,509 篇 其他
  • 46 篇 中文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Be in Computer Engineering L D College of Engineering"
8955 条 记 录,以下是721-730 订阅
排序:
Intelligent Time Management Recommendations Using Bayesian Optimization
Intelligent Time Management Recommendations Using Bayesian O...
收藏 引用
2024 IEEE International Conference on Communication, Computing and Signal Processing, IICCCS 2024
作者: Chandramowleeswaran, G. Sindhu, M. Alabdeli, Haider Mishra, Anshu Vinod, Priya Kaur, Harmeet Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Commerce and Business Administration Chennai600062 India Prince Shri Venkateshwara Padmavathy Engineering College Chennai India The Islamic University College Of Technical Engineering Department Of Computers Techniques Engineering Najaf Iraq The Islamic University Of Al Diwaniyah College Of Technical Engineering Department Of Computers Techniques Engineering Al Diwaniyah Iraq Ies University Ies Institute of Technology and Management Department of Computer Science & Engineering M.P. Bhopal India Christ University School Of Business And Management India Chandigarh Group of Colleges Chandigarh Engineering College Department of Computer Application Punjab Jhanjeri Mohali140307 India
This paper focuses on the improvement of the intelligent time management system which employ Bayesian optimization for suggesting time management plans for each particular person. In this sense, through historical dat... 详细信息
来源: 评论
Comparative Analysis of differential Privacy Implementations on Synthetic data  15
Comparative Analysis of Differential Privacy Implementations...
收藏 引用
15th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2025
作者: Said, Huwida E. Mahmoud, Qusay H. Goyal, Mandeep Hashim, Faiza College of Technological Innovation Zayed University Department of Computing and Applied Technolgy Dubai United Arab Emirates Ontario Tech University Department of Electrical Computer and Software Engineering OshawaONL1G 0C6 Canada College of Information Technology Uae University Department of Computer Science and Software Engineering AI-Ain United Arab Emirates
differential privacy offers a promising solution to balance data utility and user privacy. This paper compares two prominent differential privacy tools-PydP and IBM's diffprivlib-that are applied to a synthetic da... 详细信息
来源: 评论
Crafting Customer Segmentation Strategies for Advanced Recommendation System  3
Crafting Customer Segmentation Strategies for Advanced Recom...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Seethalakshmi, K. Bhagyalakshmi, A. Anitha, G. Sheela, E. Sandeep, Varada Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science & Engineering Tami Nadu Chennai India S.A Engineering College Department of Computer Science and Business Systems Tamil Nadu Chennai India St Peter's Institute of Higher Education and Research Department of Computer Science & Engineering Tamil Nadu Chennai India
With the static nature of recommender systems, it is crucial to take into account the intricate details of customer behaviour to better improve operating efficiencies. This paper is about original methods to augment r... 详细信息
来源: 评论
Machine learning in Recent Technology: Shaping the Future of Intelligent Applications and data Analysis  5
Machine Learning in Recent Technology: Shaping the Future of...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Karpagam, P. Uma Maheswari, S. Kumar, A. Pandi, V.Samuthira Jose, P. Virushabadoss, S. Dhanalakshmi College of Engineering Department of Computer Science Engineering India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Biosciences Chennai India Dhanalakshmi College of Engineering Department of Electronics and Communication Engineering Tamil Nadu Chennai India Centre for Advanced Wireless Integrated Technology Chennai Institute of Technology Tamil Nadu Chennai India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of CSE Chennai India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India
In the present day, machine learning (Ml), which is a subset of artificial intelligence (AI), has emerged as a crucial technology that has revolutionized the way in which we interact with data and construct intelligen... 详细信息
来源: 评论
Cloud Top Management Role in Reducing Mobile Broadband Transmission Hazards and Offering Safety  3
Cloud Top Management Role in Reducing Mobile Broadband Trans...
收藏 引用
3rd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2023
作者: Manjunath, C.R. Sharma, Sachin Sharma, Aditi Sunil Kumar, M. Kelkar, Sandeep Vishal deshmukh, Sheetal Department of Computer Science and Engineering Bangalore India Dev Bhoomi Uttarakhand University Department of Computer Science and Engineering Uttarakhand Dehradun India Parul University PIT Department of Computer Science and Engineering Gujarat Vadodara India Mohan Babu University Erstwhile SreeVidyanikethan Engineering College Department of Computer Science and Engineering AP Tirupathi India Prin L.N. Welingkar Institute of Management Development and Research India Yashwantrao Mohite Institute of Management Department of Computer Applications Karad India
In both the academic and industrial worlds, cloud technology is becoming a widely used research area. Both providers of cloud services and consumers profit from cloud computation. The literature has mostly focused on ... 详细信息
来源: 评论
Service Migration for delay-Sensitive IoT Applications in Edge Networks
收藏 引用
IEEE Transactions on Services Computing 2025年 第3期18卷 1782-1797页
作者: li, Xiaocui Zhou, Zhangbing Wang, Yasha deng, Shuiguang Hung, Patrick C. K. School of Information Engineering Beijing100083 China Peking University National Research & Engineering Center of Software Engineering Beijing100871 China Peking University New Generation Information Technology Research Institute Tianjin300380 China School of Information Engineering Frontiers Science Center for Deep-Time Digital Earth Beijing100083 China Institut Polytechnique de Paris Télécom SudParis Palaiseau91120 France Zhejiang University College of Computer Science and Technology Hangzhou310012 China Ontario Tech University Faculty of Business and Information Technology Oshawa Canada
The proliferation of Internet of Things (IoT) applications prompts extraordinary demands for the collaboration of large amounts of computational resources provided by IoT devices in edge networks, and these applicatio... 详细信息
来源: 评论
MlIdS: Revolutionizing of IoT based digital Security Mechanism with Machine learning Assisted Intrusion detection System
MLIDS: Revolutionizing of IoT based Digital Security Mechani...
收藏 引用
2024 IEEE International Conference on Automation and Computation, AUTOCOM 2024
作者: Vijaya Vardan Reddy, S.P. Manonmani, S.Priskilla Anitha, C. Jaganathan, d. Reena, R. Suresh, M. R.M.K. Engineering College Department of Ece Tamil Nadu Chennai India Meenakshi Sundararajan Engineering College Department of Information Technology Tamil Nadu Chennai India Saveetha School of Engineering Simats Department of Cse Tamil Nadu Chennai India Madanapalle Institute of Technology & Science Department of Artificial Intelligence Andhra Pradesh India Prince Shri Venkateshwara Padmavathy Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India R.M.D. Engineering College Department of Mathematics Tamil Nadu Chennai India
It is becoming more critical to detect intrusions on these devices due to the exponential growth of the Internet of Things (IoT) and the accompanying explosion in the number of IoT devices. In order to create intrusio... 详细信息
来源: 评论
Analysis of different Encryption Techniques used in Watermarking Algorithm for the Security of Medical Image  10
Analysis of Different Encryption Techniques used in Watermar...
收藏 引用
10th International Conference on Emerging Trends in engineering and Technology - Signal and Information Processing, ICETET-SIP-22 2022
作者: Pulgam, Namita d. Shinde, Subhash K. Ramrao Adik Institute of Technology D y Patil Deemaed to Be University Computer Engineering Navi Mumbai India Lokmanya Tilak College of Engineering Computer Engineering Navi Mumbai India
Today, in the computerized age, the development and use of internet technology in healthcare has been increasing rapidly. Quick improvement is going on in the telemedicine field with a clear goal to design integrated ... 详细信息
来源: 评论
data Visualization for Corona Patients Globally using Real-Time APIs  2
Data Visualization for Corona Patients Globally using Real-T...
收藏 引用
2nd International Conference on Sustainable Computing and data Communication Systems, ICSCdS 2023
作者: durai, S. Iqbal, M. Mohamed Kumar, S Niresh Alagappan, Chockalingam Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Avadi Dept. of Cse Chennai India VIT-AP University School of Computer Science and Engineering Amaravati India Dhanalakshmi Srinivasan College of Engineering and Technology Department of Computer Science and Engineering Mamallapuram India M.Kumarasamy College of Engineering Department of Electrical and Electronics Engineering Tamilnadu Karur639113 India
All the nations' administrative units are concerned about the COVId-19 outbreak in different regions of the world. India is also trying to control the spread of the virus with strict measures and has managed to sl... 详细信息
来源: 评论
Privacy-Preserving Human Activity Recognition in Smart Homes using deep learning and Edge Computing for Real-Time Processing  5
Privacy-Preserving Human Activity Recognition in Smart Homes...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Mariappan, K. Gopal, Baskar Parthasarathy, J. Sreekanth, G.R. Nanmaran, R. Jegajothi, B. SRM Institute of Science and Technology Department of Computer Science and Applications Chennai India College of Engineering University of Technology & Applied Science Nizwa Oman Computer Science & Engineering Jayalakshmi Institute Of Technology Dharmapuri India Information Technology Nandha Engineering College Erode52 India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India SRS Tech Solutions Chennai India
The rapid advancement of smart home technologies necessitates efficient human activity recognition (HAR) systems while ensuring user privacy. This research presents a novel architecture that integrates deep learning a... 详细信息
来源: 评论