咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 198 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 727 篇 工学
    • 613 篇 计算机科学与技术...
    • 527 篇 软件工程
    • 230 篇 信息与通信工程
    • 141 篇 控制科学与工程
    • 103 篇 生物工程
    • 91 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 84 篇 网络空间安全
    • 78 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 359 篇 理学
    • 181 篇 数学
    • 115 篇 生物学
    • 85 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 101 篇 医学
    • 83 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 54 篇 法学
    • 41 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 65 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 23 篇 analytical model...
  • 22 篇 medical services
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 amity school of ...
  • 18 篇 department of co...
  • 18 篇 mlr institute of...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 department of co...
  • 12 篇 school of comput...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 school of engine...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 lloyd institute ...

作者

  • 26 篇 obaidat mohammad...
  • 24 篇 keshav kaushik
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 pronaya bhattach...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 972 篇 英文
  • 276 篇 其他
  • 15 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School Of Engineering and Technology"
1255 条 记 录,以下是11-20 订阅
排序:
Review the Deep Learning Strategies for Enhancing the Security of Body Area Networks Against Adversarial Attack
Review the Deep Learning Strategies for Enhancing the Securi...
收藏 引用
2024 International Conference on Advances in Computing Research on science engineering and technology, ACROSET 2024
作者: Nagdiya, Jagrati Goyal, Rajeev Amity School of Engineering and Technology Computer Science and Engineering Gwalior India
Thereis an urgent need for strong security measures to protect Body Area Networks (BANs) from malicious threats, as their use in health monitoring and telemedicine continues to grow. To improve BAN security, this rese... 详细信息
来源: 评论
Network Anomaly Detection using Autoencoder on Various Datasets: A Comprehensive Review
收藏 引用
Recent Patents on engineering 2024年 第9期18卷 63-77页
作者: Singh, Richa Srivastava, Nidhi Kumar, Ashwani Amity Institute of Information Technology Amity University Lucknow Campus Uttar Pradesh Lucknow India Department of Computer Science and Engineering School of Engineering and Technology Sharda University Greater Noida India
The scientific community is currently very concerned about information and communication technology security because any assault or network anomaly can have a remarkable collision on a number of areas, including natio... 详细信息
来源: 评论
An Enhanced Aspect-Based Sentiment Analysis Model Based on RoBERTa For Text Sentiment Analysis
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 193-202页
作者: Chauhan, Amit Sharma, Aman Mohana, Rajni Jaypee University of Information Technology HP Solan173234 India Department of Computer Science Amity School of Engineering and Technology Amity University Punjab Punjab Mohali140306 India
Using an aspect-based sentiment analysis task, sentiment polarity towards specific aspect phrases within the same sentence or document is to be identified. The process of mechanically determining the underlying attitu... 详细信息
来源: 评论
Mitigating Cross-Site Request Forgery Vulnerabilities: An Examination of Prevention Systems  18
Mitigating Cross-Site Request Forgery Vulnerabilities: An Ex...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Singh, Yuvraj Goel, Paranjay Aggarwal, Shubhani Chaudhary, Rajat Budhiraja, Ishan Amity University Amity School of Engineering & Technology Department of Computer Science & Engineering Punjab India Bennett University School of Computer Science Engineering and Technology Greater Noida India
Cross-Site Request Forgery (CSRF) remains a pervasive vulnerability in web applications, appearing regularly in the OWASP Top 10 lists, posing significant threats to user data and system integrity despite the existenc... 详细信息
来源: 评论
Modified Blowfish Encryption Standard with Optimization Strategy for Secured Cloud Storage with Data Dynamics
Modified Blowfish Encryption Standard with Optimization Stra...
收藏 引用
2024 IEEE International Conference on Information technology, Electronics and Intelligent Communication Systems, ICITEICS 2024
作者: Singh, Prabhdeep Singh, Pawan Agarwal, Abhay Kumar Kumar, Anil Computer Science and Engineering Amity School of Engineering and Technology Lucknow India Computer Science and Engineering Kamla Nehru Institute of Technology Sultanpur India Amity School of Engineering and Technology Lucknow Amity University Uttar Pradesh India
Organizations and individuals can store, transport, and backup a rising quantity of data at an affordable cost through the assistance of cloud storage service providers, who also give them access to other cloud servic... 详细信息
来源: 评论
Predictive Data Analysis to Support Decision-Making Based on Long-Term Impacts of Disasters  1
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Mishra, Shailendra Kumar Rahamatkar, Surendra Amity School of Engineering and Technology Department of Computer Science and Engineering Amity University Chhattisgarh Raipur India
Research into disaster relief is a field with a lot of potential, and predictions made about its future are based on historical data. It is a difficult task to analyze the long-term consequences of a disaster. Governm... 详细信息
来源: 评论
C-SPIN: Classification of Satellite Images for Prediction Network  14
C-SPIN: Classification of Satellite Images for Prediction Ne...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Kumar, Sumit Mittal, Devanshu Nehra, Vibha Amity School of Engineering and Technology Department of Computer Science Engineering Noida India
Satellite image classification and prediction are crucial, with applications in domains ranging from environmental monitoring to urban planning, geological exploration, mapping, disaster response management, and agric... 详细信息
来源: 评论
Machine Learning Classification of Shoulder Pain Pathologies: A Scoping Review  15
Machine Learning Classification of Shoulder Pain Pathologies...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Shukla, Garima Bhagat, Khushi Chaudhari, Vedant Navaneeth Krishnan, E. Bhadauria, Mansi Chauhan Chouksey, Yash Amity University Mumbai Amity School of Engineering and Technology Department of Computer Science and Engineering Mumbai India
Shoulder problem is a widely known musculoskeletal disorder that impacts heavily on the life of patients. Effective treatment for this must be preceded by accurate and timely diagnosis but traditional diagnostic techn... 详细信息
来源: 评论
Live Audio Recognition and Text Conversion System  2
Live Audio Recognition and Text Conversion System
收藏 引用
2nd International Conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Sharma, Pratyaksha Gupta, Sumita Bhavya, Boddu Asmitha Sharma, Khushi Dhir, Saru Gambhir, Sapna Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University UP India Department of Information Technology Amity School of Engineering & Technology Amity University UP India Dept. of Computer Science College of Engineering and Computing George Mason University United States
With the advancement of technologies, different methods are currently being used for converting spoken language into text. These systems offer a hands-free alternative to traditional input methods, especially for indi... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论