咨询与建议

限定检索结果

文献类型

  • 1,044 篇 会议
  • 195 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 102 篇 生物工程
    • 89 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 77 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 181 篇 数学
    • 114 篇 生物学
    • 86 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 103 篇 医学
    • 85 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 53 篇 法学
    • 40 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 64 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 22 篇 medical services
  • 22 篇 analytical model...
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 mlr institute of...
  • 17 篇 department of co...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...
  • 9 篇 lloyd institute ...

作者

  • 24 篇 keshav kaushik
  • 24 篇 obaidat mohammad...
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 pronaya bhattach...
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 1,107 篇 英文
  • 137 篇 其他
  • 13 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School Of Engineering and Technology"
1251 条 记 录,以下是221-230 订阅
排序:
GeoCamp Online Reviewing Application Using NodeJS and MongoDB  6
GeoCamp Online Reviewing Application Using NodeJS and MongoD...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Lohani, Bhanu Prakash Singh, Devang Pratap Kumar, Navneet Akhil Singh, Pankaj Ansari, Salim Amity School of Engineering and Technology Department of Computer Science and Engineering Greater Noida India Amity School of Engineering and Technology Department of Computer Science and Engineering Uttar Pradesh Greater Noida India Lloyd Law College Uttar Pradesh Greater Noida India Lloyed Institute of Engineering and Technology Uttar Ptadesh Greater Noida India
Today's consumers frequently use online search to reduce the perceived risk involved with relying on unfamiliar businesses and services. Consumers may turn to online reviews in particular (i.e., reviews written by... 详细信息
来源: 评论
Twitter Sentiment Analysis using Machine Learning  12
Twitter Sentiment Analysis using Machine Learning
收藏 引用
12th International Conference on Cloud Computing, Data science and engineering, Confluence 2022
作者: Ikram, Abdullah Kumar, Mohit Munjal, Geetika Computer Science And Engineering Amity School Of Engineering Uttar Pradesh Noida India Computer Science And Engineering Amity School Of Engineering And Technology Uttar Pradesh Noida India
In this exponentially evolving age of technology, the emergence of social media has enveloped all life forms on our planet. Twitter is that social media platform on which millions of users post their opinions or senti... 详细信息
来源: 评论
FaceWave: SVM and Wavelet Transformation-Based Face Recognition Framework for Women Cricketers  4th
FaceWave: SVM and Wavelet Transformation-Based Face Recogni...
收藏 引用
4th International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT 2024
作者: Kumar, Sachin Prasad, Vivek Kumar Bhattacharya, Pronaya Dutta, Pushan Kumar Tikadar, Subrata Bhushan, Bharat Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat Ahmedabad309081 India Amity School of Engineering and Technology Amity University West Bengal Kolkata700135 India Department of Computer Science and Engineering School of Engineering and Technology Sharda University Greater Noida201310 India
Advancements in machine learning (ML) have significantly enhanced image processing algorithms, leading to notable improvements in face recognition technology. The paper introduces a framework, FaceWave, which uses a s... 详细信息
来源: 评论
Short Range Visible Light Communication: LED Based Applications  5th
Short Range Visible Light Communication: LED Based Applicati...
收藏 引用
5th EAI International Conference on Cognitive Computing and Cyber Physical Systems, IC4S 2024
作者: Mishra, Sumita Grover, Jyoti Gupta, Nishu Electronics and Communication Engineering Department Amity School of Engineering and Technology Amity University Uttar Pradesh Lucknow Campus India Computer Science and Engineering Department Malaviya National Institute of Technology Jaipur India VTT Technical Research Centre of Finland Ltd. Oulu Finland
Visible Light Communication (VLC) systems are capable of providing significantly higher data rates compared to traditional wireless technologies. Apart from high data rate, other advantages offered by VLC are license ... 详细信息
来源: 评论
Stock Price Prediction for Market Forecasting Using Machine Learning Analysis  4th
Stock Price Prediction for Market Forecasting Using Machine ...
收藏 引用
4th International Conference on Computing, Communications, and Cyber-Security, IC4S 2022
作者: Prasad, Vivek Kumar Savaliya, Darshan Sanghavi, Sakshi Sakariya, Vatsal Bhattacharya, Pronaya Verma, Jai Prakash Shah, Rushabh Tanwar, Sudeep Institute of Technology Nirma University Gujarat Ahmedabad India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University West Bengal Kolkata700135 India
A common opinion of stock market in society is that the stock market is either insecure to invest in or troublesome to trade, so many people are disinterested. The stock market is a marketplace that facilitates the ac... 详细信息
来源: 评论
Transfer Learning Approach for Detection of Autism Spectrum Disorder using Facial Images  10
Transfer Learning Approach for Detection of Autism Spectrum ...
收藏 引用
10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and computer engineering, UPCON 2023
作者: Patel, Krisha Ramanuj, Ashwini Sakhiya, Sohan Kumar, Yogesh Rana, Ajay Pandit Deendayal Energy University Department of Computer Science and Engineering Gandhinagar India Amity School of Engineering and Technology Amity University UP Greater Noida India
Autism Spectrum Disorder (ASD) is characterized by deficits in social interaction, communication issues, and repetitive behavioral patterns. Effective ASD intervention and assistance depend on early detection and diag... 详细信息
来源: 评论
Evaluation of Trust Establishment Mechanisms in Wireless Networks: A Statistical Perspective  1
收藏 引用
3rd International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication, MARC 2021
作者: Choudhary, Ashutosh Kumar Rahamatkar, Surendra Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University Chhattisgarh Raipur India Amity School of Engineering & Technology Amity University Chhattisgarh Raipur India
Establishing trust in wireless networks requires the network designer to incorporate different levels of security protocols in the network. These security protocols enable certain checks in the network which if found ... 详细信息
来源: 评论
Balancing Usability and Security Innovative Approaches to Privacy in Digital Environments
Balancing Usability and Security Innovative Approaches to Pr...
收藏 引用
2024 International Conference on Communication, computer sciences and engineering, IC3SE 2024
作者: Baswaraju, Swathi Yadav, M. Geeta Nijhawan, Ginni Rana, Ajay Rani, T. K. Pushpa Al-Rubaye, Taqi Mohammed Khattab New Horizon College Of Engineering Department Of Computer Science - Data Science Bangalore India Institute Of Aeronautical Engineering Department Of Computer Science And Engineering Telangana Hyderabad India Lovely Professional University Phagwara India Amity School Of Engineering And Technology Amity University Greater Noida India Mlr Institute Of Technology Department Of Computer Science And Engineering Telangana Hyderabad India College Of Medical Technologies The Islamic University Department Of Medical Laboratory Technology Najaf Iraq
Data analysis, private protection, detecting unusual things, identifying people, and transferring data are part of the study's unique security design. The major system method is AUA. Your authentication level depe... 详细信息
来源: 评论
Honeypot Comparison of Attack Detection and Mitigation of SSH Attack  3
Honeypot Comparison of Attack Detection and Mitigation of SS...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Ali, Wasif Sajid, Ahthasham Ghodke, Tanvi Ajit Malik, Rida Malik, Neeru Kaushik, Keshav Riphah Institute of System Engineering Riphah International University Department of Cyber Security Islamabad Pakistan Pimpri Chinchwad University Department of Computer Science and Engineering Maharashtra India School of Engineering & Technology Pimpri Chinchwad University Maharashtra Pune India Amity School of Engineering and Technology Amity University Mohali India
This research study addresses the importance of honeypots at multiple levels, which includes but not limited to placement in network or group of networks working alongside in an organization. This paper talks about th... 详细信息
来源: 评论
Improving Trust Levels In Wireless Networks Using Blockchain Powered Dempster Shaffer Route Optimization  1
Improving Trust Levels In Wireless Networks Using Blockchain...
收藏 引用
1st International Conference on Technologies for Smart Green Connected Society 2021, ICTSGS 2021
作者: Choudhary, Ashutosh Kumar Rahamatkar, Surendra Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University Chhattisgarh Raipur India Amity School of Engineering & Technology Amity University Chhattisgarh Raipur India
Improved node and network trust levels in wireless networks assist the network to have better security and quality of service (QoS) performance, Security performance is measured in terms of number of attacks detected ... 详细信息
来源: 评论