咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 198 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 730 篇 工学
    • 615 篇 计算机科学与技术...
    • 528 篇 软件工程
    • 230 篇 信息与通信工程
    • 141 篇 控制科学与工程
    • 102 篇 生物工程
    • 91 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 77 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 51 篇 机械工程
    • 49 篇 光学工程
    • 45 篇 动力工程及工程热...
    • 40 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 360 篇 理学
    • 182 篇 数学
    • 114 篇 生物学
    • 87 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 103 篇 医学
    • 85 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 53 篇 法学
    • 40 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 64 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 24 篇 reliability
  • 22 篇 medical services
  • 22 篇 analytical model...
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 mlr institute of...
  • 17 篇 department of co...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 amity school of ...
  • 12 篇 school of comput...
  • 11 篇 department of co...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...
  • 9 篇 lloyd institute ...

作者

  • 24 篇 keshav kaushik
  • 24 篇 obaidat mohammad...
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 pronaya bhattach...
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 1,111 篇 英文
  • 137 篇 其他
  • 13 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School of Engineering and Technology"
1255 条 记 录,以下是141-150 订阅
排序:
Blockchain - A Secure and Transparent Solution to Detect Counterfeit Products  1
收藏 引用
6th International Conference on Applied Machine Learning and Data Analytics, AMLDA 2023
作者: Tyagi, Ishaan Gupta, Rajat Upadhyay, Divya Dubey, Ashwani Kumar Department of Computer Science and Engineering ABES Engineering College UP Ghaziabad India Department of Electronics and Communication Engineering Amity School of Engineering and Technology Amity University Uttar Pradesh UP Noida India
Counterfeit products have had a massive impact on manufacturing industries in the past couple of years. This is affecting the company’s name, sales, and profit. Blockchain innovation has acquired an interest in the c... 详细信息
来源: 评论
A Novel Work on Analyzing STRESS and Depression level of Indian Population During COVID-19
收藏 引用
Recent Advances in computer science and Communications 2022年 第6期15卷 822-831页
作者: Gupta, Amit Kumar Mathur, Priya Bijawat, Shruti Dadhich, Abhishek Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University Rajasthan Jaipur India Department of Mathematics Poornima Institute of Engineering & Technology Rajasthan Jaipur India Department of Computer Science & Engineering Poornima Institute of Engineering & Technology Rajasthan Jaipur India
Objective: The world is facing the pandemic of COVID-19, which has led to a considerable level of stress and depression in mankind as well as in society. Statistical measurements can be made for early identification o... 详细信息
来源: 评论
Development of Emotion Recognition via Federated Learning: A Multi-modal Approach with Hybrid Convolutional Network
Development of Emotion Recognition via Federated Learning: A...
收藏 引用
2024 IEEE International Conference on Signal Processing and Advance Research in Computing, SPARC 2024
作者: Kaur, Dilsheen Misra, Anuradha Vyas, O.P. Amity University Amity School of Engineering and Technology Department of Computer Science and Engineering Lucknow Campus Lucknow India Indian Institute of Information Technology Allahabad Department of Information Technology Prayagraj India
Human emotion recognition is the crucial process for performing effective communication and intelligent interaction. Identifying human emotion through discrete technologies is an essential step. Affective computing is... 详细信息
来源: 评论
Enhancing Image Segmentation through an Innovative Hybrid Kernel: A Weighted Fusion of Sobel and Prewitt Operators Using Artificial Neural Networks  1
Enhancing Image Segmentation through an Innovative Hybrid Ke...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Verma, Ankush Dhanda, Namrata Yadav, Vibhash Amity Institute of Information Technology Amity University Uttar Pradesh Department of Information Technology Lucknow India Amity School of Engineering and Technology Amity University Uttar Pradesh Department of Computer Science & Engineering Lucknow India Rajkiya Engineering College Department of Information Technology Banda India
Image segmentation, a pivotal element in computer vision, relies on effective edge detection to delineate boundaries within images. Traditional methods, including Canny, Sobel, Prewitt, and Laplacian, while widely use... 详细信息
来源: 评论
Production prediction using machine learning  10
Production prediction using machine learning
收藏 引用
10th International Conference on Signal Processing and Integrated Networks, SPIN 2023
作者: Batra, Rakshit Abbi, Prateek Sharma, Rohan Agarwal, Hardik Bhulania, Paurush Amity University Amity School of Engineering and Technology Department of Computer Science and Engineering Uttar Pradesh Gautam Budh Nagar India
Our project is inspired from the problems faced by Micro and Small-scale industry owners who are into food production and have to manufacture their goods on daily basis of demand and sale. To plan the production these... 详细信息
来源: 评论
EleKAN: Temporal Kolmogorov-Arnold Networks for Price and Demand Forecasting Framework in Smart Cities  4th
EleKAN: Temporal Kolmogorov-Arnold Networks for Price and ...
收藏 引用
4th International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT 2024
作者: Bhattacharya, Pronaya Mukherjee, Tamoghna Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University West Bengal Kolkata 700135 India
In smart cities, the demand forecasting problem is inherently dynamic and difficult to predict. A novel forecasting framework, EleKAN is proposed, that utilizes the Temporal Kolmogorov-Arnold Networks (TKANs), which a... 详细信息
来源: 评论
Comprehensive Framework for Analyzing Grammar Error Correction with GPT -3.5
Comprehensive Framework for Analyzing Grammar Error Correcti...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Munda, Rajni Kant Kumar, Abhishek Burman, Ravi Kumar Kumar, Biresh Alam, Md. Shoaib Sinha, Anurag Jharkhand University of Technology Computer Science and Engineering Ranchi India Amity University Computer Science and Engineering Jharkhand Ranchi India Ignou School of Computing and Information Science New Delhi India
This investigate assesses the viability and exactness of an error-correction approach utilizing GPT-3.5 compared to routine instruments. Letter set rectification plays a vital part in making strides the quality of and... 详细信息
来源: 评论
Sentimental Technique Implementation on Textual Data  6
Sentimental Technique Implementation on Textual Data
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Karthik, Baggam Sai Bharat, Dhavileswarapu N.S.S.V.V. Durga Alam, Md Afroz Sai, Bandari Tharun Rana, Mrinalini Sharma, Smita Yadav, Suman Avdhesh School of Computer Science and Engineering Lovely Professional University Punjab Kapurthala India Amity School of Engineering and Technology Department of Computer Science and Engineering Amity University Uttar Pradesh Greater Noida India
The increasing amount of real-time or near-real-time data in the big data age provides organizations with opportunities to make data-driven decisions. However, social media data, such as that generated by Twitter, is ... 详细信息
来源: 评论
Enhancing Information Security for Text-Based Data Hiding Using Midpoint Folding Approach: A Comparative Analysis  4th
Enhancing Information Security for Text-Based Data Hiding Us...
收藏 引用
4th International Conference on Mobile Radio Communications and 5G Networks, MRCN 2023
作者: Allwadhi, Sachin Joshi, Kamaldeep Yadav, Ashok Kumar Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Haryana Rohtak124001 India Amity School of Engineering and Technology Amity University Uttar Pradesh Noida201301 India
The activity of concealing information or data within a carrier entity in a way that is difficult for unauthorized users to notice is known as information hiding, sometimes known as data hiding. Different types of dig... 详细信息
来源: 评论
Prevention of Attacks on Spanning Tree Protocol  2nd
Prevention of Attacks on Spanning Tree Protocol
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Adhikari, Manoj Singh Gupta, Ritika Raj, Dharm Astya, Rani Ather, Danish Agrawal, Ambuj Department of Computer Science & Engineering Sharda School of Engineering & Technology Sharda University Greater Noida India Amity University in Tashkent Tashkent Uzbekistan
Spanning Tree Protocol (STP) is an extensively used protocol in Ethernet networks that ensures loop-free paths by selectively blocking redundant links. However, STP is vulnerable to various attacks that can disrupt ne... 详细信息
来源: 评论