咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 194 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 103 篇 生物工程
    • 90 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 78 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 180 篇 数学
    • 115 篇 生物学
    • 85 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 101 篇 医学
    • 83 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 54 篇 法学
    • 41 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 65 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 23 篇 analytical model...
  • 22 篇 medical services
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 29 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 department of co...
  • 18 篇 mlr institute of...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 department of co...
  • 12 篇 school of comput...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 lloyd institute ...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...

作者

  • 25 篇 obaidat mohammad...
  • 24 篇 keshav kaushik
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 gupta sumita
  • 18 篇 hazela bramah
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 pronaya bhattach...
  • 11 篇 tanwar sudeep
  • 11 篇 yadav suman avdh...
  • 10 篇 sudeep tanwar
  • 10 篇 ather danish
  • 10 篇 kaur harleen

语言

  • 968 篇 英文
  • 276 篇 其他
  • 15 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School Of Engineering and Technology"
1251 条 记 录,以下是321-330 订阅
排序:
Modified Blowfish Encryption Standard with Optimization Strategy for Secured Cloud Storage with Data Dynamics
Modified Blowfish Encryption Standard with Optimization Stra...
收藏 引用
Information technology, Electronics and Intelligent Communication Systems (ICITEICS), IEEE International Conference on
作者: Prabhdeep Singh Pawan Singh Abhay Kumar Agarwal Anil Kumar Computer Science and Engineering Amity School of Engineering and Technology Lucknow India Computer Science and Engineering Kamla Nehru Institute of Technology Suitanpur India Amity School of Engineering and Technology Lucknow Amity University Uttar Pradesh India
Organizations and individuals can store, transport, and backup a rising quantity of data at an affordable cost through the assistance of cloud storage service providers, who also give them access to other cloud servic... 详细信息
来源: 评论
Comparative analysis of different mining approaches for Blockchain in infant care application on IoT  5
Comparative analysis of different mining approaches for Bloc...
收藏 引用
5th International Conference on Information Systems and computer Networks, ISCON 2021
作者: Pandey, Happy Singh, Yajush Pratap Singh, Yashwant Singh, Prabhishek Diwakar, Manoj Pandey, Neeraj Kumar Amity University Amity School of Engineering Technology Department of Computer Science Engineering Uttar Pradesh Noida India Department of Computer Science Engineering Uttarakhand Dehradun India DIT University Department of Computer Science Engineering Dehradun India
Ambient means environmental elements, helped living means the kind of houses inserted with innovations that assistance in regular daily existences, in an entire it implies the utilization of environmental elements adv... 详细信息
来源: 评论
Investigating the Relationships Between Smoking, Anxiety, and Psychological Distress via SPSS Analysis  3rd
Investigating the Relationships Between Smoking, Anxiety, an...
收藏 引用
3rd International Conference on Universal Threats in Expert Applications and Solutions, UNI-TEAS 2024
作者: Bansal, Devyanshi Sharma, Sudiksha Das, Nripendra Narayan Jain, Ranjna Kumar, Praveen Department of Computer Science and Engineering Amity School of Engineering and Technology Noida India Department of Information Technology Manipal University Jaipur Rajasthan Jaipur India Manav Rachna University Faridabad India Astana IT University Astana Kazakhstan
Tobacco usage is the most prevalent form of smoking and constitutes one of the primary factors contributing to sickness and premature mortality across the globe. Smoking cigarettes is linked to a wide range of adverse... 详细信息
来源: 评论
Data Visualization in Transforming Raw Data into Compelling Visual Narratives  2
Data Visualization in Transforming Raw Data into Compelling ...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Sarkar, Prithu Priya, Yadavalli Devi Patel, Pravina B. Chatterjee Biswas, Prasanta Arigela, Sreenivasulu Sallaram, Sravanthi Amity University Amity School of Communication Kolkata India Computer Science and Engineering Vignan's Institute of Information Technology Duvvada Andhra Pradesh Vishakapatanam India Ganpat University Department of Computer Science Gujarat Mehsana India Cdoe Parul University Vadodara India Mohan Babu University Andhra Pradesh Tirupati India St.Martin's Engineering College Department of Computer Science and Engineering India
One of the main ways to evaluate information is through visual learning, which traditionally combines textual reading with visual aids like graphical representations. However, separating the visual method of learning ... 详细信息
来源: 评论
Enhancing Deep Neural Network Convergence and Performance: A Hybrid Activation Function Approach by Combining ReLU and ELU Activation Function  2
Enhancing Deep Neural Network Convergence and Performance: A...
收藏 引用
2nd International Conference on Informatics, ICI 2023
作者: Maurya, Ritesh Aggarwal, Divyam Gopalakrishnan, T. Pandey, Nageshwar Nath Amity Centre for Artificial Intelligence Amity University Noida India Amity School of Engineering and Technology Amity University Noida India Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Udupi India Computer Science and Engineering ITER Shiksha 'o' Anusandhan Odisha Bhubaneswar India
Activation functions play an important role in Deep Neural Networks. The activation function can learn nonlinearities present in the data;therefore, it can learn intricate patterns present in the data. Rectified Linea... 详细信息
来源: 评论
A Novel Approach of Object Detection using Deep Learning for Animal Safety  12
A Novel Approach of Object Detection using Deep Learning for...
收藏 引用
12th International Conference on Cloud Computing, Data science and engineering, Confluence 2022
作者: Gandhi, Rashmi Gupta, Aakankshi Yadav, Ashok Kumar Rathee, Sonia Amity School Of Engineering Technology Department Of Computer Science And Engineering Noida India Maharaja Surajmal Institute Of Technology Ggsipu Department Of Computer Science And Engineering Delhi India
This paper uses convolutional neural networks (CNN) algorithm to detect animals. Four different Object Detection frameworks are implemented and compared their performance with our novel approach. Many algorithms of co... 详细信息
来源: 评论
Mitigating Cross-Site Request Forgery Vulnerabilities: An Examination of Prevention Systems
Mitigating Cross-Site Request Forgery Vulnerabilities: An Ex...
收藏 引用
International Symposium on Advanced Networks and Telecommunication Systems (ANTS)
作者: Yuvraj Singh Paranjay Goel Shubhani Aggarwal Rajat Chaudhary Ishan Budhiraja Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University Punjab India School of Computer Science Engineering and Technology Bennett University Greater Noida India
Cross-Site Request Forgery (CSRF) remains a pervasive vulnerability in web applications, appearing regularly in the OWASP Top 10 lists, posing significant threats to user data and system integrity despite the existenc... 详细信息
来源: 评论
Detection of Cyberbullying Using Modified Dense Framework  10
Detection of Cyberbullying Using Modified Dense Framework
收藏 引用
10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and computer engineering, UPCON 2023
作者: Malik, Varun Mittal, Ruchi Singh, Vikram Mittal, Amit Singh, S Vikram Diwvedi, Shashi Prakash Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Chaudhary Devilal University Department of Computer Science and Engineering Sirsa India Chitkara Business School Chitkara University Punjab India Amity School of Engineering and Technology Amity University Greater Noida India Lloyd Institute of Engineering & Technology Greater Noida India
Cyberbullying has emerged as a significant societal concern, with the proliferation of digital communication platforms. Detecting and mitigating cyberbullying is crucial to ensure online safety and promote positive di... 详细信息
来源: 评论
Deploying Mobile Application on Cloud
Deploying Mobile Application on Cloud
收藏 引用
2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing, COM-IT-CON 2022
作者: Kharbanda, Jayant Madan, Rishi Passi, Vansh Sharma, Dolly Amity University Amity School of Engineering and Technology Uttar Pradesh Noida India Amity University Department of Computer Science and Engineering Uttar Pradesh Noida India
Today is the era of cloud-based applications. Over a span of time cloud has emerged as nascent term to new era of computing that gives access to anything, anywhere. This paper involves the study on the topic 'Mobi... 详细信息
来源: 评论
Addressing the Rising Challenge of Malware Innovative Detection and Mitigation Techniques
Addressing the Rising Challenge of Malware Innovative Detect...
收藏 引用
2024 International Conference on Communication, computer sciences and engineering, IC3SE 2024
作者: Balaram, A. Umashankari, E. Dutt, Amit Bharadwaj, Garima Revathi, V. Albawi, Ali Mlr Institute Of Technology Department Of Computer Science And Engineering Telangana Hyderabad India Institute Of Aeronautical Engineering Department Of Computer Science And Engineering Telangana Hyderabad India Lovely Professional University Phagwara India Amity Business School Amity University Greater Noida India New Horizon College Of Engineering Department Of Applied Sciences Bangalore India College Of Medical Technology The Islamic University Radiology Techniques Department Najaf Iraq
This research talks about Hybrid Anomaly Detection (HAD), a complex technology for finding and stopping malware. There are four different methods to apply the approach. The following are a few examples: EDR, DBA, TIS,... 详细信息
来源: 评论