咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 194 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 103 篇 生物工程
    • 90 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 78 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 180 篇 数学
    • 115 篇 生物学
    • 85 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 101 篇 医学
    • 83 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 54 篇 法学
    • 41 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 65 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 23 篇 analytical model...
  • 22 篇 medical services
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 29 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 department of co...
  • 18 篇 mlr institute of...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 department of co...
  • 12 篇 school of comput...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 lloyd institute ...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...

作者

  • 25 篇 obaidat mohammad...
  • 24 篇 keshav kaushik
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 gupta sumita
  • 18 篇 hazela bramah
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 pronaya bhattach...
  • 11 篇 tanwar sudeep
  • 11 篇 yadav suman avdh...
  • 10 篇 sudeep tanwar
  • 10 篇 ather danish
  • 10 篇 kaur harleen

语言

  • 968 篇 英文
  • 276 篇 其他
  • 15 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School Of Engineering and Technology"
1251 条 记 录,以下是291-300 订阅
排序:
Detection of Criminal Activities/Criminal Through CCTV by Live Footage Analysis
Detection of Criminal Activities/Criminal Through CCTV by Li...
收藏 引用
2024 OPJU International technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Kumar, Rahul Rajpurohit, Divyajeet Singh Hanief, Mushraf Sharma, Shilpi Choudhury, Tanupriya Sar, Ayan Amity School of Engineering and Technology Department of Computer Science and Engineering Uttar Pradesh Noida India Graphic Era Deemed to Be University Cse Dept Uttarakhand Dehradun248002 India University of Petroleum and Energy Studies School of Computer Science Uttarakhand Dehradun248007 India
The integration of deep learning techniques, particularly the You Only Look Once (YOLO) object detection model, with Closed-Circuit Television (CCTV) systems has significantly transformed the landscape of crime detect... 详细信息
来源: 评论
Review of Software-Defined Network-Enabled Security  1st
Review of Software-Defined Network-Enabled Security
收藏 引用
1st International Conference on Computational Intelligence for engineering and Management Applications, CIEMA 2022
作者: Gupta, Neelam Tanwar, Sarvesh Badotra, Sumit Amity Institute of Information Technology Amity University Noida Uttar Pradesh Noida India School of Computer Science and Engineering Bennett University UP Noida India
In order to exploit any of the system's security holes attackers will always target software-defined networking (SDN) security. As a game-changer in modern internetworking technologies, SDN appears to be ubiquitou... 详细信息
来源: 评论
Analyse and Evaluate Quixbugs with Open AI Codex and Powering Next Generation Application  6
Analyse and Evaluate Quixbugs with Open AI Codex and Powerin...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Tyagi, Deepanshu Tanwar, Sarvesh Mittal, Neetu Badotra, Sumit Amity Institute of Information Technology Amity University Uttar Pradesh Noida India School of Computer Science and Engineering Bennett University Uttar Pradesh Noida India
The paper investigates the ordinary language age limits of massive language models, with applications to the development of two types of learning tools commonly found in programming courses. We construct programming w... 详细信息
来源: 评论
Survey Paper: Comparative Study of Machine Learning Techniques and its Recent Applications  2
Survey Paper: Comparative Study of Machine Learning Techniqu...
收藏 引用
2nd International Conference on Innovative Practices in technology and Management, ICIPTM 2022
作者: Shivahare, Basu Dev Suman, Shashikant Challapalli, Sai Sri Nandan Kaushik, Prakarsh Gupta, Amar Deep Bibhu, Vimal Amity School Of Engineering Technology Department Of Computer Science Greater Noida India
The main objective of human evolution has always been to look for ways to mold the nature to satisfy our needs. A key milestone in this regard is the invention of a machine-called the computer that can complete a task... 详细信息
来源: 评论
Advanced Deep Learning Approaches for Real-Time Anomaly Detection in IoT Environments  7
Advanced Deep Learning Approaches for Real-Time Anomaly Dete...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Goyal, Himanshu Rai Husain, Saif O. Dixit, Krishna Kant Boob, Nandini Shirish Reddy, B. Ravali Kumar, Jaysheel Sharma, Smita Graphic Era Deemed to be University Department of Computer Science & Engineering Dehradun India The Islamic university College of technical engineering Department of computers Techniques engineering Najaf Iraq Gla University Department of Electrical Engineering Mathura India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Tamilnadu Chennai India Mlr Institute of Technology Department of Computer Science and Engineering Telangana Hyderabad India New Horizon College of Engineering Bangalore India Amity University Amity School of Engineering & Technology Uttar Pradesh Greater Noida India
The proliferation of Internet of Things (IoT) systems has led to the generation of vast amounts of data, increasing the need for effective anomaly detection mechanisms to ensure system reliability and security. Tradit... 详细信息
来源: 评论
Live Audio Recognition and Text Conversion System
Live Audio Recognition and Text Conversion System
收藏 引用
Computational Intelligence, Communication technology and Networking (CICTN), International Conference on
作者: Pratyaksha Sharma Sumita Gupta Boddu Asmitha Bhavya Khushi Sharma Saru Dhir Sapna Gambhir Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University UP Department of Information Technology Amity School of Engineering & Technology Amity University UP Dept. of Computer Science College of Engineering and Computing George Mason University USA
With the advancement of technologies, different methods are currently being used for converting spoken language into text. These systems offer a hands-free alternative to traditional input methods, especially for indi... 详细信息
来源: 评论
An Approach for Predicting Admissions in Post-Graduate Programme by Using Machine Learning  1
收藏 引用
3rd International Conference on Data, engineering, and Applications, IDEA 2021
作者: Sharma, Shivam Soni, Hemant Kumar Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Madhya Pradesh MP Maharajpura Gwalior India
Machine Learning (ML) has spread its wings over a wide range of fields nowadays. For all data-driven areas, machine learning is a true game-changer. Today's most powerful firms are those that have concentrated the... 详细信息
来源: 评论
A Comprehensive Study of a Conversational AI-Driven Healthcare Bot with Pose Estimation for Precision Fitness Monitoring and Personalized Guidance
A Comprehensive Study of a Conversational AI-Driven Healthca...
收藏 引用
2024 IEEE International Conference on Big Data and Machine Learning, ICBDML 2024
作者: Sinha, Anurag Kumar, Biresh Kundu, Roumo Sharma, Amit Sharma, Mukesh Raza, Asif ICFAI University ICFAI Tech School Computer Science Department Jharkhand Ranchi India Amity University Department of Computer Engineering and Application Jharkhand India Amity Institute of Information Technology Amity University Jharkhand Jharkhand Ranchi India Lovely Professional University Department of Computer Science Phagwara India Amity University Department of Master of Computer Application Jharkhand Ranchi India
This research investigates a new healthcare paradigm through the analysis of a conversational AI-powered healthcare bot that has posture estimation capabilities for accurate fitness tracking and customized recommendat... 详细信息
来源: 评论
Intelligent Carpooling - Machine Learning Route and Pickup Optimisation
Intelligent Carpooling - Machine Learning Route and Pickup O...
收藏 引用
Computing, Power and Communication Technologies (IC2PCT), IEEE International Conference on
作者: Arunya Goojar Parth Verma Nitin Singh Shubhradeep Debnath Neha Tyagi Computer Science and Engineering Amity School of Engineering and Technology UP India
In order to encourage carpooling between workplace personnel and college students, this research article gives a unique method that makes use of machine getting to know and synthetic intelligence (AI) algorithms. The ...
来源: 评论
Review the Deep Learning Strategies for Enhancing the Security of Body Area Networks Against Adversarial Attack
Review the Deep Learning Strategies for Enhancing the Securi...
收藏 引用
Advances in Computing Research on science engineering and technology (ACROSET), International Conference on
作者: Jagrati Nagdiya Rajeev Goyal Computer Science and Engineering Amity School of Engineering and Technology Gwalior India
Thereis an urgent need for strong security measures to protect Body Area Networks (BANs) from malicious threats, as their use in health monitoring and telemedicine continues to grow. To improve BAN security, this rese... 详细信息
来源: 评论