咨询与建议

限定检索结果

文献类型

  • 4,828 篇 会议
  • 4,106 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 8,955 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,947 篇 工学
    • 2,346 篇 计算机科学与技术...
    • 1,890 篇 软件工程
    • 1,006 篇 信息与通信工程
    • 833 篇 电气工程
    • 820 篇 电子科学与技术(可...
    • 699 篇 控制科学与工程
    • 556 篇 核科学与技术
    • 498 篇 仪器科学与技术
    • 446 篇 光学工程
    • 414 篇 生物工程
    • 377 篇 化学工程与技术
    • 376 篇 生物医学工程(可授...
    • 344 篇 材料科学与工程(可...
    • 312 篇 动力工程及工程热...
    • 288 篇 机械工程
    • 253 篇 网络空间安全
    • 209 篇 土木工程
  • 4,400 篇 理学
    • 2,581 篇 物理学
    • 1,062 篇 数学
    • 630 篇 地球物理学
    • 558 篇 生物学
    • 518 篇 化学
    • 369 篇 统计学(可授理学、...
    • 206 篇 天文学
  • 971 篇 管理学
    • 664 篇 管理科学与工程(可...
    • 341 篇 图书情报与档案管...
    • 331 篇 工商管理
  • 519 篇 医学
    • 414 篇 临床医学
    • 356 篇 基础医学(可授医学...
    • 254 篇 公共卫生与预防医...
  • 198 篇 法学
  • 155 篇 经济学
  • 147 篇 农学
  • 72 篇 教育学
  • 24 篇 文学
  • 6 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 385 篇 accuracy
  • 285 篇 deep learning
  • 272 篇 real-time system...
  • 216 篇 machine learning
  • 199 篇 internet of thin...
  • 199 篇 feature extracti...
  • 181 篇 hadron colliders
  • 167 篇 computational mo...
  • 162 篇 convolutional ne...
  • 153 篇 training
  • 150 篇 support vector m...
  • 150 篇 predictive model...
  • 123 篇 security
  • 108 篇 artificial intel...
  • 103 篇 technological in...
  • 101 篇 optimization
  • 98 篇 scalability
  • 91 篇 reliability
  • 91 篇 medical services
  • 91 篇 cloud computing

机构

  • 601 篇 department of ph...
  • 583 篇 physikalisches i...
  • 566 篇 cavendish labora...
  • 492 篇 oliver lodge lab...
  • 432 篇 school of physic...
  • 348 篇 faculty of scien...
  • 332 篇 department of ph...
  • 327 篇 department for p...
  • 326 篇 department of ph...
  • 315 篇 yerevan physics ...
  • 313 篇 department of ph...
  • 312 篇 kirchhoff-instit...
  • 306 篇 department of ph...
  • 297 篇 dept. of astrono...
  • 293 篇 infn laboratori ...
  • 291 篇 dept. of physics...
  • 279 篇 dept. of physics...
  • 273 篇 institute of phy...
  • 262 篇 fakultät für phy...
  • 262 篇 european organiz...

作者

  • 268 篇 a. gomes
  • 259 篇 j. m. izen
  • 257 篇 c. alexa
  • 247 篇 g. bella
  • 244 篇 j. strandberg
  • 244 篇 d. calvet
  • 244 篇 c. amelung
  • 232 篇 s. chen
  • 230 篇 g. spigo
  • 226 篇 f. siegert
  • 218 篇 hoshina k.
  • 212 篇 haungs a.
  • 211 篇 fürst p.
  • 209 篇 y. tayalati
  • 209 篇 r. ströhmer
  • 204 篇 m. rijssenbeek
  • 203 篇 s. jin
  • 201 篇 g. gaudio
  • 196 篇 m. gandelman
  • 196 篇 t. gershon

语言

  • 7,399 篇 英文
  • 1,509 篇 其他
  • 46 篇 中文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Be in Computer Engineering L D College of Engineering"
8955 条 记 录,以下是761-770 订阅
排序:
Application of deep Neural Networks for Weed detection and Classification  2
Application of Deep Neural Networks for Weed Detection and C...
收藏 引用
2nd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2023
作者: Ganesan, R. Manjula, G. Chandan, Madhavarapu Thamarai, I. Rajavelu, S. Bhatt, Upendra Mohan Sarkar, Swagata Vel Tech RangarajanDr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai600062 India Rmk College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Thiruvallur601206 India Koneru Lakshmaiah Education Foundation Department of Computer Science Engineering Andhra Pradesh Vaddeswaram522302 India Panimalar Engineering College Department of Computer Science and Engineering Chennai city campus Tamil Nadu 600029 India Department of Physics Tamil Nadu Dindigul624622 India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttarakhand Dehradun248002 India Sri Sairam Engineering College Department OfArtificial Intelligence and Data Science Tamil Nadu Chennai600044 India
Weeds compete for natural resources both in forest areas, harming the development of native vegetation, and in agricultural areas, affecting crop quality. The need then arises to classify these species, so that mechan... 详细信息
来源: 评论
Robust Heart Rate Monitoring System: Contactless Approach using Fast Fourier Transform  15
Robust Heart Rate Monitoring System: Contactless Approach us...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Sujatha, E. divya, M. Nandhini, I. Raju, d. Naveen Chennai India Chennai India Department of Electronics and Communication Engineering School of Electrical and Communication Vel Tech Rangarajan R&D Institute of Science and Technology Avadi Chennai India Department of Computer Science and Engineering R.M.K. Engineering College Kavaraipettai Chennai India
Today, to be alive in this world we need to have all our body parts working in good condition and since technology is improving faster day by day everything has become automatic and AI enabled. Measuring the heart-rat... 详细信息
来源: 评论
Enhancing Predictive Maintenance in Industrial IoT through Machine learning Models  4
Enhancing Predictive Maintenance in Industrial IoT through M...
收藏 引用
4th IEEE Asian Conference on Innovation in Technology, ASIANCON 2024
作者: Rani, A. Jaya Mabel Prithivirajan, V. Shiney, S Arumai Babaiah, Ch. Swamy, Hemanth Sivagamidevi, G. Saveetha University Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Saveetha School of Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Ece Tamil Nadu Chennai India S A Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India Mlr Institute of Technology Department of Electronics and Communication Engineering Dundigal Hyderabad India Motorola Solutions India Dhanalakshmi College of Engineering Department of Ai & Ds Tamil Nadu Chennai India
Significant production losses and increased maintenance costs can arise from unplanned downtime in industrial settings caused by machine faults. In order to identify issues early and prevent significant breakdowns, pr... 详细信息
来源: 评论
SVM-based Predictive Modeling of drowsiness in Hospital Staff for Occupational Safety Solution via IoT Infrastructure  2
SVM-based Predictive Modeling of Drowsiness in Hospital Staf...
收藏 引用
2nd International Conference on computer, Communication and Control, IC4 2024
作者: Ganesh, B. Jai Vijayan, P. Vaidehi, V. Murugan, S. Meenakshi, R. Rajmohan, M. R.M.D. Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India Saveetha Engineering College Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India Vinayaka Mission's Kirupananda Variyar Arts and Science College Department of Computer Science Tamil Nadu Salem India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Biomedical Engineering Tamil Nadu Chennai India Chennai Institute of Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Hindustan Institute of Technology and Science Department of Electronics and Communication Engineering Tamil Nadu Chennai India
This research proposes an efficient approach to improve hospital worker safety on the job by detecting and preventing drowsiness. The system incorporates data from hospital-deployed Internet of Things (IoT) infrastruc... 详细信息
来源: 评论
A Innovative Network Security Regulations dependent on Improved Support Vector Machine from the Outlook of Modern Cities
A Innovative Network Security Regulations Dependent on Impro...
收藏 引用
International Conference on computer and Communications Technologies (ICCCT)
作者: Vasanthan P S. Srinivasan Dept. of Information Technology Sri Sairam Engineering College Dept. of Computer Science and Engineering R.M.D Engineering College
The concerns about the security created by the PC have gotten more advanced and complicated. Interruption detection is a pragmatic subject in the area of PC security whose essential target is to identify uncommon assa... 详细信息
来源: 评论
leveraging Consumer Technology for Healthcare Systems Using Blockchain Based Bio-Sensor devices
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 1-1页
作者: Shabaz, Mohammad Rahman, Mohammad Zia Ur Alsaadi, Mahmood Raparthi, Mohan Maaliw, Renato R. Keshta, Ismail Soni, Mukesh Patni, Jagdish Chandra Byeon, Haewon Model Institute of Engineering and Technology Jammu India Department of Electronics and Communication Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Guntur Dist A.P. India Department of computer science Al-Maarif University College Al Anbar Iraq Dallas Texas College of Engineering Southern Luzon State University Lucban Quezon Philippines Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia Dr. D. Y. Patil Vidyapeeth Pune India School of advance Computing Alliance University Bengaluru India Department of Digital Anti-Aging Healthcare Inje University Gimhae Republic of Korea
Wireless biosensor devices have significantly enhanced level of convenience associated with patient treatment. Presently, most uncertified aggregate signature methods struggle to withstand key attacks that employ only... 详细信息
来源: 评论
Advanced Fake Review detection via Aspect Extraction and TPA-BilSTM-CSSA  2
Advanced Fake Review Detection via Aspect Extraction and TPA...
收藏 引用
2nd IEEE International Conference on data Science and Network Security, ICdSNS 2024
作者: Thakkar, Nilam Kumar, Arvind Sukumar, P. Sarode, deepika G. Patil, Harshal Vijayakumar, E. Ldrp - Institute of Technology & Research Ksv University Svkm Department of Information & Technology Gujarat India School of Computer Applications Mriirs Haryana Faridabad India Nandha Engineering College Department of Computer Science and Engineering Erode India Dr.D.Y.Patil Institute of Technology Department of Engineering Pune Pimpri India Iilm University Department of Computer Science and Engineering Greater Noida India KIT-Kalaignar Karunanidhi Institute of Technology Department of Mca Coimbatore India
In recent years, methods to detect bogus reviews have attracted the attention of numerous businesses and educational organizations. In order for reviews to accurately represent genuine user experiences and opinions, i... 详细信息
来源: 评论
An Advanced decentralized Architecture enabled logical Identity based Encryption logic using Blockchain Assistance  4
An Advanced Decentralized Architecture enabled Logical Ident...
收藏 引用
4th International Conference on Intelligent Technologies, CONIT 2024
作者: Geetha, R. Kalpana, S. Roopa Chandrika, R. Preetha, M. Santhoshini, P. Nithila, Ezhil E Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Eee Saveetha School of Engineering Tamil Nadu Chennai India Department of Computer Science Dubai United Arab Emirates Karpagam Academy of Higher Education Department of Computer Science and Engineering Tamil Nadu Coimbatore India Prince Shri Venkateshwara Padmavathy Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India Rmd Engineering College Department of Electronics and Communications Engineering Tamil Nadu Chennai India Veltech Rangarajan Dr Sagunthala R&d Institute of Science and Technology Department of Ece Tamil Nadu Chennai India
Using electronic signatures, blockchain technology, and identity-based encryption, essential documents may be certified and electronic contracts can be signed. All of the system's nodes, operations, and transactio... 详细信息
来源: 评论
Prediction of Rental demands using different Machine learning Algorithms
Prediction of Rental Demands using different Machine Learnin...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Ravikumar, S. Vijay, K. Pavithra, S. Prithi, S. Kannan, Sriram Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineeirng Chennai India Rajalakshmi Engineering College Department of Computer Science and Engineering Chennai India VIT University School of Computer Science and Engineering Chennai India SRM IST School of Computing Department of Computational Intelligence Kattankulathur India Sri Sivasubramaniya Nadar College of Engineering Tamil Nadu Chennai India
A Bike rental expectation conjectures the interest for bikes rentals in reliance of climate conditions like the temperature and calendric data. In bike rental frameworks, it is vital that the managers have to realize ... 详细信息
来源: 评论
Recognition of Identifying Malicious Cyber Attack Intention in Cyber Physical System
Recognition of Identifying Malicious Cyber Attack Intention ...
收藏 引用
International Conference on computer and Communications Technologies (ICCCT)
作者: P Vasanthan S. Srinivasan Dept. of Information Technology Sri Sairam Engineering College Dept. of Computer Science and Engineering R.M.D Engineering College
As the threat over the cyber-attack is predominantly increasing in every aspects such as based on network traffic, spoofing, phishing attacks the intrusion detection system is used. The network layer is maliciously at... 详细信息
来源: 评论