咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 194 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 103 篇 生物工程
    • 90 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 78 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 180 篇 数学
    • 115 篇 生物学
    • 85 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 101 篇 医学
    • 83 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 54 篇 法学
    • 41 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 65 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 23 篇 analytical model...
  • 22 篇 medical services
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 29 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 department of co...
  • 18 篇 mlr institute of...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 department of co...
  • 12 篇 school of comput...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 lloyd institute ...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...

作者

  • 25 篇 obaidat mohammad...
  • 24 篇 keshav kaushik
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 gupta sumita
  • 18 篇 hazela bramah
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 pronaya bhattach...
  • 11 篇 tanwar sudeep
  • 11 篇 yadav suman avdh...
  • 10 篇 sudeep tanwar
  • 10 篇 ather danish
  • 10 篇 kaur harleen

语言

  • 968 篇 英文
  • 276 篇 其他
  • 15 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School Of Engineering and Technology"
1251 条 记 录,以下是151-160 订阅
排序:
Prevention of Attacks on Spanning Tree Protocol  1
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Adhikari, Manoj Singh Gupta, Ritika Raj, Dharm Astya, Rani Ather, Danish Agrawal, Ambuj Department of Computer Science & Engineering Sharda School of Engineering & Technology Sharda University Greater Noida India Amity University in Tashkent Tashkent Uzbekistan
Spanning Tree Protocol (STP) is an extensively used protocol in Ethernet networks that ensures loop-free paths by selectively blocking redundant links. However, STP is vulnerable to various attacks that can disrupt ne... 详细信息
来源: 评论
Implementation of WSN in the Smart Hanger to Facilitate MRO Operations on Aircraft Fuselage Using Machine Learning  1
收藏 引用
International Conference on Advances and Applications of Artificial Intelligence and Machine Learning, ICAAAIML 2022
作者: Singh, Tripti Rahamatkar, Surendra Department of Computer Science and Engineering ASET AUC Raipur India Faculty of Engineering and Technology Amity School of Engineering and Technology Amity University Chhattisgarh Raipur India
New technology techniques have lately been adopted to make visual examinations of the outer aircraft fuselage easier. Automated image identifiers are now capturing high-resolution images of the aircraft for offline an... 详细信息
来源: 评论
Sentimental Technique Implementation on Textual Data  6
Sentimental Technique Implementation on Textual Data
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Karthik, Baggam Sai Bharat, Dhavileswarapu N.S.S.V.V. Durga Alam, Md Afroz Sai, Bandari Tharun Rana, Mrinalini Sharma, Smita Yadav, Suman Avdhesh School of Computer Science and Engineering Lovely Professional University Punjab Kapurthala India Amity School of Engineering and Technology Department of Computer Science and Engineering Amity University Uttar Pradesh Greater Noida India
The increasing amount of real-time or near-real-time data in the big data age provides organizations with opportunities to make data-driven decisions. However, social media data, such as that generated by Twitter, is ... 详细信息
来源: 评论
Optimizing Satellite Constellations for Global Internet Coverage: A Comparative Analysis of Communication Protocols and Orbital Configuration
Optimizing Satellite Constellations for Global Internet Cove...
收藏 引用
2024 IEEE International Conference on Signal Processing and Advance Research in Computing, SPARC 2024
作者: Banerjee, Pallab Raj, Vivek Kumar, Biresh Thakur, Kanika Mitra, Dipra Kumar, Purushottam Amity University Jharkhand Dept. of Computer Science Engineering Jharkhand Ranchi India Amity University Jharkhand Amity School of Information Technology Jharkhand Ranchi India Galgotia University Dept. of Computer Science Engineering Greater Noida campus India Amity University Dept. of Computer Science Engineering Jharkhand Ranchi India
As a way to provide ubiquitous connectivity, satellite constellations are becoming more and more popular due to the growing need for worldwide internet access. In order to provide dependable and seamless worldwide int... 详细信息
来源: 评论
Advancing Vehicular Ad-Hoc Network Solutions in Emerging Economies: A Comparative Analysis of V2V Protocols Through Simulation Studies
收藏 引用
SN computer science 2024年 第8期5卷 1-13页
作者: Raj, Dharm Ather, Danish Sagar, Anil Kumar Department of Computer Science & amp Engineering Sharda School of Engineering & amp Technology Sharda University Greater Noida India Amity University in Tashkent Tashkent Uzbekistan
This paper aims at moving ahead with Vehicular Ad-Hoc Network (VANET) in the emerging economies via protocol analysis of Vehicle-to-Vehicle (V2V) communication through simulation study. Given the distinct challenges i... 详细信息
来源: 评论
Deep Learning-Powered Camouflaged Object Recognition Model  2
Deep Learning-Powered Camouflaged Object Recognition Model
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2024
作者: Tomar, Riya Chauhan, Naman Chauhan, Chhavi Tomar, Yash Singh, Soumyendra Chauhan, Nishant Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India University of Petroleum and Energy Studies School of Computer Science Dehradun India Cmr University Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Mathematics Chennai India Amity School of Engineering and Technology Amity University Department of Computer Science and Engineering Noida India
This research paper delves into the intersection of advanced technology and military strategies, specifically focusing on the imperative task of camouflaged object detection within the Indian Paramilitary forces. Leve... 详细信息
来源: 评论
Methods and Applications for Sentiment Analysis in Online Social Networks  1
Methods and Applications for Sentiment Analysis in Online So...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Srivastava, Atul Chandra, Kunal Sharma, Vijay Shankar Pillai, Anuradha Amity School of Engineering and Technology AUUP Lucknow India Communication Engineering Manipal University Department of Computer Jaipur India Symbiosis Institute of Technology Department of Computer Science and Engineering Pune India
With hyped popularity of social media, sentiment analysis, a branch of natural language processing (NLP), has gained significant attention. Social media is a treasure trove for gaining insights into the thoughts, feel... 详细信息
来源: 评论
DQNANFCT: design of a deep Q-learning network for augmented network forensics via integrated contextual trust operations
收藏 引用
International Journal of Information technology (Singapore) 2023年 第5期15卷 2729-2739页
作者: Choudhary, Ashutosh Kumar Rahamatkar, Surendra Purbey, Suniti Research Scholar Computer Science & Engineering Department Amity School of Engineering & Technology Amity University Chhattisgarh India Department of IT GMR Institute of Technology AP Rajam India Amity School of Engineering & Technology Amity University Chhattisgarh India Department of CSE GMR Institute of Technology AP Rajam India
Network forensics helps analyze pre-emptive attacks and identify attackers using temporal behavior patterns. Most deep learning methods to design high-efficiency forensic models are too complex for real-time deploymen... 详细信息
来源: 评论
Fault Tolerance and Error Handling Techniques in Apache Kafka  5
Fault Tolerance and Error Handling Techniques in Apache Kafk...
收藏 引用
5th International Conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Vyas, Shubham Tyagi, Rajesh Kumar Sahu, Shashank Amity Institute of Information Technology Haryana Gurgaon India Department of Computer Science and Engineering Amity School of Engineering and Technology Haryana Gurgaon India
Real Time streaming framework enables the availability of data for users in near real time. For achieving the high throughput, low latency and to avoid loss of any events at runtime, real time streaming frameworks has... 详细信息
来源: 评论
Deepfakes: A New Era of Misinformation  4th
Deepfakes: A New Era of Misinformation
收藏 引用
4th International Conference on Computing, Communications, and Cyber-Security, IC4S 2022
作者: Khan, Rushan Hazela, Bramah Singh, Shikha Asthana, Pallavi Department of Computer Science and Engineering Amity School of Engineering and Technology Lucknow Amity University Uttar Pradesh Lucknow India Department of Electronics and Communication Engineering Amity School of Engineering and Technology Lucknow Amity University Uttar Pradesh Lucknow India
The world that we live in today is flooded with information from sources that sometimes are true and sometimes are not. Just a simple change of narrative on the same thing might drastically change people’s opinions. ... 详细信息
来源: 评论