咨询与建议

限定检索结果

文献类型

  • 145 篇 会议
  • 28 篇 期刊文献

馆藏范围

  • 173 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 105 篇 工学
    • 91 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 23 篇 信息与通信工程
    • 18 篇 生物工程
    • 15 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 12 篇 控制科学与工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 安全科学与工程
    • 7 篇 光学工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 建筑学
  • 51 篇 理学
    • 32 篇 数学
    • 18 篇 生物学
    • 10 篇 物理学
    • 8 篇 系统科学
    • 7 篇 统计学(可授理学、...
    • 5 篇 化学
  • 26 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 12 篇 医学
    • 12 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 药学(可授医学、理...
    • 6 篇 公共卫生与预防医...
  • 9 篇 法学
    • 7 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 9 篇 data mining
  • 9 篇 machine learning
  • 8 篇 support vector m...
  • 7 篇 deep learning
  • 7 篇 computational mo...
  • 7 篇 accuracy
  • 7 篇 cloud computing
  • 6 篇 internet of thin...
  • 6 篇 predictive model...
  • 6 篇 real-time system...
  • 6 篇 machine learning...
  • 6 篇 training
  • 6 篇 convolutional ne...
  • 5 篇 optimization
  • 5 篇 genetic algorith...
  • 5 篇 feature extracti...
  • 5 篇 classification a...
  • 5 篇 prediction algor...
  • 5 篇 measurement
  • 4 篇 conferences

机构

  • 26 篇 department of co...
  • 6 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 computer science...
  • 4 篇 department of co...
  • 3 篇 amity university...
  • 3 篇 department of co...
  • 3 篇 department of el...
  • 3 篇 aset amity unive...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 department of co...
  • 2 篇 university of th...
  • 2 篇 computer science...
  • 2 篇 computer science...
  • 2 篇 amity institute ...
  • 2 篇 department of co...
  • 2 篇 computer science...

作者

  • 8 篇 shailendra naray...
  • 6 篇 kunal gupta
  • 5 篇 bhardwaj rajat
  • 5 篇 rajat bhardwaj
  • 5 篇 singhal abhishek
  • 5 篇 gupta kunal
  • 5 篇 puneet sharma
  • 5 篇 singh shailendra...
  • 4 篇 kriti chopra
  • 4 篇 annu lambora
  • 4 篇 rakesh nitin
  • 4 篇 lambora annu
  • 4 篇 shankar achyut
  • 4 篇 pratap abhinav
  • 4 篇 chopra kriti
  • 3 篇 dubey ashwani ku...
  • 3 篇 nitin sachdeva
  • 3 篇 arunima jaiswal
  • 3 篇 bansal abhay
  • 3 篇 tyagi lakshya

语言

  • 166 篇 英文
  • 7 篇 其他
  • 1 篇 法文
检索条件"机构=Computer Science and Engineering ASET"
173 条 记 录,以下是41-50 订阅
排序:
A Hybrid Approach for Network Intrusion Detection
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 91-107页
作者: Mavra Mehmood Talha Javed Jamel Nebhen Sidra Abbas Rabia Abid Giridhar Reddy Bojja Muhammad Rizwan Department of Computer Science Kinnaird College for WomenLahore54000Pakistan ASET Labs IslamabadPakistan Prince Sattam bin Abdulaziz University College of Computer Science and EngineeringAlkharj11942Saudi Arabia College of Business and Information Systems Dakota State UniversityMadisonUnited States of America
Due to the widespread use of the internet and smart devices,various attacks like intrusion,zero-day,Malware,and security breaches are a constant threat to any organization’s network ***,a Network Intrusion Detection ... 详细信息
来源: 评论
Real-Time Facial Mask Detection Using Deep Learning  1
收藏 引用
3rd International Conference on Information Technology, InCITe 2023
作者: Chauhan, Ayush Rajput, Rohan Chaudhary, Divyansh Gupta, Aakanshi Gurugram Cognizant India Noida Paytm India Tuffplast Division Suraj Logistix Pvt. Ltd Jamshedpur India Department of Computer Science and Engineering ASET AUUP Noida India
The COVID-19 outbreak shook the world with its continuous waves. Since, the virus was mainly spreading through respiratory droplets, wearing a face mask was made compulsory for every person in the world with other pre... 详细信息
来源: 评论
Evaluating Optimization Algorithms for Dynamic Workforce Management: A Comparative Approach
Evaluating Optimization Algorithms for Dynamic Workforce Man...
收藏 引用
Computational Intelligence, Communication Technology and Networking (CICTN), International Conference on
作者: Aabhas Kumar Jha Rishita Chaubey Aadhar Goel Misha Kakkar Kushagr Kakkar Computer Science and Engineering ASET Amity University Uttar Pradesh Noida UP India Amazon USA
Effective workforce management is critical for optimizing operational efficiency in dynamic environments, particularly in healthcare settings. This paper presents a comparative analysis of five prominent optimization ... 详细信息
来源: 评论
Nirjas: An open source framework for extracting metadata from the source code
arXiv
收藏 引用
arXiv 2024年
作者: Bhardwaj, Ayush Sahil Pratap, Kaushlendra Mishra, Gaurav Department of Computer Science & Engineering ASET Amity University Noida India Sathyabama University India
Metadata/Comments are the critical element of any software development process. In this paper, we went on explaining how the metadata/comments in the source code can play an essential role in comprehending the softwar... 详细信息
来源: 评论
Optimizing the Capacity of Extreme Learning Machines for Biomedical Informatics Applications  1
Optimizing the Capacity of Extreme Learning Machines for Bio...
收藏 引用
1st IEEE International Conference on Emerging Research in Computational science, ICERCS 2023
作者: Logeshwaran, J. Bhardwaj, Rajat Salagrama, Shailaja Das, Abhijit Sri Eshwar College of Engineering Department of Electronics and Communication Engineering Tamil Nadu Coimbatore India University of the Cumberland's Department of Information Technology Kentucky Williamsburg United States Amity University Aset Department of Computer Science and Engineering Karnataka Bengaluru India Rv University School of Computer Science and Engineering Bengaluru India
the paper discusses a way of growing the capability of severe deep learning machines (ELM) for biomedical informatics programs. This technique involves varying the dimensions of the training set, the variety of neuron... 详细信息
来源: 评论
Generative Adversarial Networks (GANs) in computer-Generated Imagery
Generative Adversarial Networks (GANs) in Computer-Generated...
收藏 引用
Communication, Security and Artificial Intelligence (ICCSAI), International Conference on
作者: Sannan Ahmad Shah Shahhab Hasin Drabu Murtaza Mahdi Khan Dawar Bin Qayoom Kirmani Shailendra Narayan Singh Department ASET Computer Science and Engineering Amity University Noida India
In order to estimate the model using the method it is necessary to train two different models simultaneously. The first model, called the model (D) is responsible, for determining whether a particular sample is from t...
来源: 评论
Artificial Intelligence and Its Application in Marketing  2nd
Artificial Intelligence and Its Application in Marketing
收藏 引用
2nd Biennial International Symposium on Fluids and Thermal engineering, FLUTE 2023
作者: Gupta, Rahul Umang, Paridhi Gupta, Sumit Amity Business School Amity University Uttar Pradesh Greater Noida India Department of Computer Science Bennett University Greater Noida India Department of Mechanical Engineering ASET Amity University Uttar Pradesh Greater Noida India
AI uses are fluctuating over the years owing to the development. Applications of new technologies and the kind of outcomes it has shown are tremendous in the field of marketing. AI with deep learning or machine learni... 详细信息
来源: 评论
Agile Software Development Effort Estimation: A Comprehensive Survey
Agile Software Development Effort Estimation: A Comprehensiv...
收藏 引用
Emerging Technologies and Innovation for Sustainability (EmergIN), International Conference on
作者: Vikrant Malik Renuka Arora Deepti Mehrotra Hitesh Singh Engineering Amity University Uttar Pradesh India Computer Science and Engineering ASET Amity University Uttar Pradesh India Department of Information Technology ASET Amity University Uttar Pradesh India Computer Science and Engineering Noida Institute of Engineering and Technology Greater Noida India
This survey paper examines the evolution of effort and cost estimation methodologies in Agile software development, with a focus on Serum-based projects. Traditional techniques such as Story Points and Function Points... 详细信息
来源: 评论
An Innovative Ensemble Approach to Detecting Distributed Denial of Service Attacks Using Machine Learning
An Innovative Ensemble Approach to Detecting Distributed Den...
收藏 引用
Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA), International Conference on
作者: Deepak Singh Rajput Arvind Kumar Upadhyay Dept. of Computer Science and Engineering Amity School of Engineering &Technology (ASET) Amity University Gwalior Madhya Pradesh
In the present era marked by rapid Internet development, there is a growing emphasis on information security. Distributed Denial of Service (DDoS) attacks poses significant threats to servers globally. Various methods... 详细信息
来源: 评论
Smart Healthcare System for Biomedical and Health Care Applications using Aadhaar and Blockchain  5
Smart Healthcare System for Biomedical and Health Care Appli...
收藏 引用
5th International Conference on Information Systems and computer Networks, ISCON 2021
作者: Haidar, Mumtaj Kumar, Sunil ASET Amity University Department of Computer Science and Engineering Noida India
Bitcoin cryptocurrency was proposed in 2008 and its open-source implementation was released in 2009. Blockchain was underlying technology in the implementation of bitcoin. Blockchain is decentralized which facilitate ... 详细信息
来源: 评论