咨询与建议

限定检索结果

文献类型

  • 114 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 89 篇 工学
    • 77 篇 计算机科学与技术...
    • 67 篇 软件工程
    • 19 篇 信息与通信工程
    • 15 篇 生物工程
    • 13 篇 生物医学工程(可授...
    • 12 篇 电气工程
    • 11 篇 控制科学与工程
    • 9 篇 机械工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 5 篇 建筑学
    • 5 篇 化学工程与技术
    • 4 篇 仪器科学与技术
    • 4 篇 材料科学与工程(可...
  • 44 篇 理学
    • 28 篇 数学
    • 15 篇 生物学
    • 10 篇 物理学
    • 7 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 4 篇 化学
  • 24 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 9 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
    • 5 篇 公共卫生与预防医...
    • 5 篇 药学(可授医学、理...
  • 8 篇 法学
    • 7 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 军事学
  • 1 篇 文学

主题

  • 8 篇 data mining
  • 7 篇 support vector m...
  • 6 篇 internet of thin...
  • 6 篇 computational mo...
  • 6 篇 machine learning
  • 5 篇 accuracy
  • 5 篇 cloud computing
  • 5 篇 convolutional ne...
  • 4 篇 conferences
  • 4 篇 deep learning
  • 4 篇 optimization
  • 4 篇 predictive model...
  • 4 篇 feature extracti...
  • 4 篇 sentiment analys...
  • 4 篇 machine learning...
  • 4 篇 training
  • 3 篇 face recognition
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 decision trees

机构

  • 26 篇 department of co...
  • 6 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 department of el...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 department of co...
  • 2 篇 university of th...
  • 2 篇 amity institute ...
  • 2 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 amity university...
  • 2 篇 sri eshwar colle...
  • 2 篇 department of co...
  • 2 篇 department of co...

作者

  • 5 篇 bhardwaj rajat
  • 5 篇 rajat bhardwaj
  • 5 篇 singhal abhishek
  • 5 篇 kunal gupta
  • 5 篇 gupta kunal
  • 4 篇 kriti chopra
  • 4 篇 annu lambora
  • 4 篇 lambora annu
  • 4 篇 shankar achyut
  • 4 篇 shailendra naray...
  • 4 篇 pratap abhinav
  • 4 篇 chopra kriti
  • 3 篇 nitin sachdeva
  • 3 篇 arunima jaiswal
  • 3 篇 rakesh nitin
  • 3 篇 bansal abhay
  • 3 篇 tyagi lakshya
  • 3 篇 singh shailendra...
  • 3 篇 bhardwaj ayush
  • 2 篇 devarajan ganesh...

语言

  • 133 篇 英文
  • 6 篇 其他
  • 1 篇 法文
检索条件"机构=Department of Computer Science and Engineering ASET"
139 条 记 录,以下是1-10 订阅
排序:
Recognition of Facial Emotions Using CNN Architecture and FER2013
Recognition of Facial Emotions Using CNN Architecture and FE...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Thomas, Bernard Bhatt, Adityavikram Singh, Shailendra Narayan Amity University ASET Department of Computer Science and Engineering Noida India
Humans are social and emotional beings. With the rapid normalization of work-from-home and hybrid work environments, most people are having a difficult time truly expressing their emotions, which when not addressed in... 详细信息
来源: 评论
Image Recognition and Classification using CNN: A Review
Image Recognition and Classification using CNN: A Review
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Yaseen, Maroofa Singh, Shailendra Narayan Amity University Noida Department of Computer Science and Engineering ASET Uttar Pradesh India
This review paper has examined the field of foggy image detection and defogging algorithms using convolutional neural networks to handle the challenges and limitations of poor visibility during harsh weather condition... 详细信息
来源: 评论
Generative Adversarial Networks (GANs) in computer-Generated Imagery  2
Generative Adversarial Networks (GANs) in Computer-Generated...
收藏 引用
2nd IEEE International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023
作者: Shah, Sannan Ahmad Drabu, Shahhab Hasin Khan, Murtaza Mahdi Kirmani, Dawar Bin Qayoom Singh, Shailendra Narayan Amity University Computer Science and Engineering Department Aset Noida India
In order to estimate the model using the method it is necessary to train two different models simultaneously. The first model, called the model (D) is responsible, for determining whether a particular sample is from t... 详细信息
来源: 评论
A Brief Review Particle Swarm Optimization on Intrusion Detection System  1
收藏 引用
6th International Conference on Innovative Computing and Communication, ICICC 2023
作者: Nandana, G.M. Yadav, Ashok Kumar Department of Computer Science and Engineering ASET Amity University Noida India
There has been an improvement in recent years towards increase in volume for remarkable data in the field of Internet and computer networks. This brings up significant security-related challenges. In the past, a numbe... 详细信息
来源: 评论
Enhanced Security in MANETs Using AODV Protocol
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第1期106卷 327-338页
作者: Gupta, Sunil Singla, Sanjay Sharma, Purushottam Chitkara University Punjab Rajpura India Department of Computer Science and Engineering UIE Chandigarh University Punjab Mohali India ASET Amity University Uttar Pradesh Noida India
This research study introduces an innovative security approach for MANETs to use with the AODV (Adhoc On-Demand Distance Vector) routing protocol, which can protect against attacks like the explicit packet-dropping as... 详细信息
来源: 评论
A new framework for distributed clustering based data aggregation in WSN
A new framework for distributed clustering based data aggreg...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Singh, Anuj Kumar Bhushan, Shashi Kumar, Ashish School of Computer Science and Engineering Galgotias University Greater Noida India Department of Computer Science ASET Amity University Punjab Mohali India Department of Computer Science and Engineering AKG Engineering College Ghaziabaad India
Wireless sensor networks (WSNs) are used in a variety of applications, such as industrial control systems, environmental monitoring, military applications, and structural health monitoring. Energy consumption is a key... 详细信息
来源: 评论
A Comparative Analysis on Machine Learning Techniques for Driver Distraction Detection  5th
A Comparative Analysis on Machine Learning Techniques for Dr...
收藏 引用
5th International Conference on Recent Innovations in Computing, ICRIC 2022
作者: Srivastava, Garima Singh, Shikha Department of Computer Science and Engineering ASET Amity University Uttar Pradesh Lucknow India
Driving any transport vehicle carries a significant amount of risk. Driving, on the other hand, is a necessity that cannot be ignored or replaced with something safer. The only thing that can be done in this concern i... 详细信息
来源: 评论
Cloud Cryptography: Mechanism of Different Encryption Standards  18
Cloud Cryptography: Mechanism of Different Encryption Standa...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Lanke, Ravikumar Md Zubair Rahman, A.M.J. Bhardwaj, Rajat Somashekhara Reddy, D. Jain, Parth Mahesh, T.R. Dept. of Computer Science and Engineering Bangalore India Al-Ameen Engineering College Karundevanpalayam Erode India Aset Amity University Department of Computer Science and Engineering Bengaluru India
The term 'cloud cryptography' describes the application of cryptographic methods and protocols to protect communications and data in cloud computing settings. The provision of computing services, including sto... 详细信息
来源: 评论
Face Recognition Using Deep Neural Network with MobileNetV3-Large  1
收藏 引用
International Conference on Advances and Applications of Artificial Intelligence and Machine Learning, ICAAAIML 2022
作者: Bisht, Sakshi Singhal, Abhishek Kaushik, Charu Department of Computer Science and Engineering ASET Amity University Uttar Pradesh Noida India
With the advancement of computer technology, multiple advanced techniques rely on machine vision, especially biometric systems, to play an essential part. The recording shows an image or video data with a face in it, ... 详细信息
来源: 评论
Hardware-based Dual Booting Switch with Customizable Setup Script and Cross Platform Support  2
Hardware-based Dual Booting Switch with Customizable Setup S...
收藏 引用
2nd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2023
作者: Chaturvedi, Venkatesh Arora, Deepak Amity School of Engineering & Technolgy Lucknow Amity University Aset Department of Computer Science & Engineering Uttar Pradesh India
Many people use numerous operating systems to do a variety of tasks in today's hectic world. While using Linux for programming and coding, someone may utilize Windows for some document editing. There are no major ... 详细信息
来源: 评论