咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 198 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 727 篇 工学
    • 613 篇 计算机科学与技术...
    • 527 篇 软件工程
    • 230 篇 信息与通信工程
    • 141 篇 控制科学与工程
    • 103 篇 生物工程
    • 91 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 84 篇 网络空间安全
    • 78 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 359 篇 理学
    • 181 篇 数学
    • 115 篇 生物学
    • 85 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 101 篇 医学
    • 83 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 54 篇 法学
    • 41 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 65 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 23 篇 analytical model...
  • 22 篇 medical services
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 amity school of ...
  • 18 篇 department of co...
  • 18 篇 mlr institute of...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 department of co...
  • 12 篇 school of comput...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 school of engine...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 lloyd institute ...

作者

  • 26 篇 obaidat mohammad...
  • 24 篇 keshav kaushik
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 pronaya bhattach...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 972 篇 英文
  • 276 篇 其他
  • 15 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School Of Engineering and Technology"
1255 条 记 录,以下是1201-1210 订阅
排序:
Gray scale image watermarking using fuzzy entropy and Lagrangian twin SVR in DCT domain  8
Gray scale image watermarking using fuzzy entropy and Lagran...
收藏 引用
8th International Conference on Contemporary Computing, IC3 2015
作者: Yadav, Ashok Kumar Mehta, Rajesh Kumar, Raj Department of Computer Science and Engineering UIET Maharishi Dayanand University Rohtak India Amity School of Engineering and Technology Department of Computer Science New Delhi India
In this paper, the effect of low, middle and high frequency DCT coefficients are investigated onto gray scale image watermarking in terms of imperceptibility and robustness. The performance of Lagrangian twin support ... 详细信息
来源: 评论
Real life optimization problems solving by IUDE
Real life optimization problems solving by IUDE
收藏 引用
International Conference on Computing, Communication & Automation (ICCCA)
作者: Pravesh Kumar Rani Astya Millie Pant Musrrat Ali Department of Mathematics Amity University Haryana Department of Applied Sciences and Engineering IIT Roorkee India Dept. Computer Science & Engg. IILM Greater Noida UP India School of Technology Glocal University Saharanpur India
In this paper a new variant named IUDE of Differential Evolution (DE) algorithm is presented. IUDE proposed an information utilization selection operation for DE algorithm. In order to check the performance, IUDE is i... 详细信息
来源: 评论
Analytical approach for security of sensitive business database
International Journal of Database Theory and Application
收藏 引用
International Journal of Database Theory and Application 2015年 第3期8卷 49-56页
作者: Gupta, Anusha Dubey, Sanjay Kumar India Department of Computer Science and Engineering in Amity School of Engineering and Technology Amity University Uttar Pradesh India
Sensitive database security is an integral part to meet the company's abeyance. Securing the sensitive data in mixed database environment has increased over the past few years. This paper conducts the literature r... 详细信息
来源: 评论
Image encryption: Using AES, feature extraction and random no. generation
Image encryption: Using AES, feature extraction and random n...
收藏 引用
International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: Akanksha Upadhyaya Vinod Shokeen Garima Srivastava Amity Institute of Information Technology Amity School of Engineering Computer Science Amity University WUST Shandong India
During data transmission, data can be transmitted in the form of text, image, audio and video, hence securing all kinds of data is most essential in today's era. Securing Image data is one of the major concern and...
来源: 评论
Gram Sandesh Transmission-a web based information system for farmers
Gram Sandesh Transmission-a web based information system for...
收藏 引用
International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: Parv Gupta Rana Majumdar Mrigendra Kumar Nishant Chauhan Subhash Chand Gupta Information Technology Department Amity School of Engg. & Technology India Department of Computer Science & Engineering Amity School of Engg. & Technology India
This paper presents the experimentation done in order to flourish a low price and impressionable information system to provide useful information to farmers in a timely manner so as to assist their decision making pro...
来源: 评论
Gray scale image watermarking using fuzzy entropy and Lagrangian twin SVR in DCT domain
Gray scale image watermarking using fuzzy entropy and Lagran...
收藏 引用
International Conference on Contemporary Computing (IC3)
作者: Ashok Kumar Yadav Rajesh Mehta Raj Kumar Department of Computer Science and Engineering Maharishi Dayanand University Rohtak India Department of Computer Science Amity School of Engineering and Technology New Delhi India
In this paper, the effect of low, middle and high frequency DCT coefficients are investigated onto gray scale image watermarking in terms of imperceptibility and robustness. The performance of Lagrangian twin support ... 详细信息
来源: 评论
Design of a Binary to BCD Converter Using 2-Dimensional 2-Dot 1-Electron Quantum Dot Cellular Automata
收藏 引用
Procedia computer science 2015年 70卷 153-159页
作者: Kakali Datta Debarka Mukhopadhyay Paramartha Dutta Department of Computer & System Sciences Visva-Bharati University Santiniketan West Bengal-731235 India Department of Computer Science Amity School of Engineering and Technology Amity University Kolkata West Bengal-700156 India
Among the emerging technologies in the nanotechnology domain Quantum-Dot Cellular Automata (QCA) is an important name. It overcomes the serious technical limitations of CMOS at the nano level In this article, we have ... 详细信息
来源: 评论
Lagrangian support vector regression based image watermarking in wavelet domain
Lagrangian support vector regression based image watermarkin...
收藏 引用
International Conference on Signal Processing and Integrated Networks (SPIN)
作者: Rajesh Mehta Virendra P. Vishwakarma Navin Rajpal Department of Computer science & Engineering Amity school of Engineering & Technology New Delhi India University School of Information & Communication Technology Guru Gobind Singh Indraprastha University New Delhi India
To enhance the imperceptibility and robustness against image processing operations, the advantage of artificial neural network (ANN) and machine learning algorithms such as support vector regression (SVR), extreme lea... 详细信息
来源: 评论
Affect detection in normal groups with the help of biological markers
Affect detection in normal groups with the help of biologica...
收藏 引用
IEEE India Conference (INDICON)
作者: Saikat Basu Arnab Bag Mahadevappa M Jayanta Mukherjee Rajlakshmi Guha Department of Computer Science and Engineering West Bengal University of Technology Department of Electronics and Electrical Communication Engineering Indian Institute of Technology Kharagpur School of Medical Science and Technology Indian Institute of Technology Kharagpur Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Student Counselling Centre Indian Institute of Technology Kharagpur
Emotion Recognition always has been one of the key areas in human machine interaction, machine learning or affective computing. Two dimensional valence arousal model has been used here. In this paper, we present how s... 详细信息
来源: 评论
Emotion Recognition Based on Physiological Signals using Valence-Arousal Model
Emotion Recognition Based on Physiological Signals using Val...
收藏 引用
International Conference on Image Information Processing
作者: Saikat Basu Nabakumar Jana Arnab Bag Mahadevappa, M. Jayanta Mukherjee Somesh Kumar Rajlakshmi Guha School of Medical Science and Technology Indian Institute of Technology Kharagpur and Department of Computer Science and Engineering West Bengal University of Technology Department of Mathematics Indian Institute of Technology Kharagpur and Department of Mathematics National Institute of Technology Meghalaya Department of Electronics and Electrical Communication Engineering Indian Institute of Technology Kharagpur School of Medical Science and Technology Indian Institute of Technology Kharagpur Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Department of Mathematics Indian Institute of Technology Kharagpur Student Counselling Centre Indian Institute of Technology Kharagpur
This paper considers two dimensional valence-arousal model. Pictorial stimuli of International Affective Picture Systems were chosen for emotion elicitation. Physiological signals like, Galvanic Skin Response, Heart R... 详细信息
来源: 评论