咨询与建议

限定检索结果

文献类型

  • 1,044 篇 会议
  • 195 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 102 篇 生物工程
    • 89 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 77 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 181 篇 数学
    • 114 篇 生物学
    • 86 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 103 篇 医学
    • 85 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 53 篇 法学
    • 40 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 64 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 22 篇 medical services
  • 22 篇 analytical model...
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 mlr institute of...
  • 17 篇 department of co...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...
  • 9 篇 lloyd institute ...

作者

  • 24 篇 keshav kaushik
  • 24 篇 obaidat mohammad...
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 pronaya bhattach...
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 1,107 篇 英文
  • 137 篇 其他
  • 13 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School of Engineering and Technology"
1251 条 记 录,以下是301-310 订阅
排序:
Blockchain in Electronic Voting: A Systematic Review of Security, Scalability, and Emerging Technologies
Blockchain in Electronic Voting: A Systematic Review of Secu...
收藏 引用
Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), International Conference
作者: Shantanu Gupta Neha Tyagi Department of Computer Science and Engineering Amity School of Engineering & Technology Amity University Uttar Pradesh India
Blockchain technology has emerged as a promising solution for enhancing the security, transparency, and efficiency of electronic voting systems. This review paper presents a comprehensive analysis of recent research p... 详细信息
来源: 评论
Air Canvas for Educational Systems with Hand Tracking in Real Time using Mediapipe: A computer Vision  2
Air Canvas for Educational Systems with Hand Tracking in Rea...
收藏 引用
2nd IEEE International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023
作者: Mehra, Aastha Singh, Swapnil Singh, Prabhishek Gupta, Kunal Agrawal, Tarun Amity School of Engineering and Technology Amity University Uttar Pradesh Noida India School of Computer Science Engineering and Technology Bennett University Uttar Pradesh Greater Noida India Department of Cse & It Jaypee Institute of Information Technology Uttar Pradesh Noida India
Today, computer Vision is widely used in various tech sectors. It is very useful in developing modern applications, such as those used by Air Canvas. After reviewing numerous research publications on this subject, thi... 详细信息
来源: 评论
Prevention of Attacks in Vehicular Adhoc Networks
Prevention of Attacks in Vehicular Adhoc Networks
收藏 引用
IEEE students' Conference on Electrical, Electronics and computer science (SCEECS)
作者: Thuvva Anjali Rajeev Goyal Balaji G.N Computer Science and Engineering Amity School of Engineering and Technology Amity University Gwalior India Computer Science and Engineering School of CSE Vellore Institute of Technology Vellore India
Over the past years, numerous methods have been developed to identify anomalies in traditional VANETs networks. A survey of VANET anomaly detection and mitigation methods is presented in this analysis. This survey loo...
来源: 评论
Critical Review: Fog Computing Dimensions for Data Security Features Cloud-Based Applications  4
Critical Review: Fog Computing Dimensions for Data Security ...
收藏 引用
4th IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2024
作者: Sharma, Kanta Prasad Paliwal, Girish Bhargava, Deepshikha Shrimal, Vijay Mohan Kumar, Ashish Amity University Uttar Pradesh Amity School of Engineering & Technology Greater Noida Campus India Chandigarh University Apex Institute of Technology Punjab Mohali India Institute of Technical Education and Research Siksha 'O' Anusandhan Department of Computer Science and Engineering Odisha Bhuvneshwar India
Fog computing combines traditional cloud services with the proximity of users and devices to enhance service efficiency and speed up processes, allowing for mobility and several users to perform heterogeneous computin... 详细信息
来源: 评论
A Framework for Blockchain-Enabled Smart Contract Management System of Arms and Ammunition for Defence Industry  11
A Framework for Blockchain-Enabled Smart Contract Management...
收藏 引用
11th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2024
作者: Dhillon, Deepak Vashist, Ajay Kumar Diksha Mariaprecilla, V. Mehrotra, Deepti Amity Institute of Defence Technology Amity University Noida201313 India Banasthali Vidyapith Department of Computer Science Rajasthan Jaipur304022 India Combat Vehicle Research and Development Establishment Drdo Chennai600054 India Amity School of Engineering and Technology Amity University Noida201313 India
This paper presents an innovative solution, the Blockchain-Enabled Smart Contract- Based Management System for Arms & Ammunition, revolutionizing logistics within the Defence industry. Addressing prevalent challen... 详细信息
来源: 评论
Blockchain-Driven Framework for Fake Product Detection  2nd
Blockchain-Driven Framework for Fake Product Detection
收藏 引用
2nd International Conference on Deep sciences for Computing and Communications, IconDeepCom 2023
作者: Shah, Richa Shah, Het Obaidat, Mohammad S. Jadav, Nilesh Kumar Gupta, Rajesh Tanwar, Sudeep Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat382481 India King Abdullah II School of Information Technology The University of Jordan Amman11942 Jordan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China The Amity University UP Noida201301 India
Blockchain has a vast range of applications and has been acknowledged in this current era. It has solved various issues related to security, tracking, immutability, etc., and also verifies transactional information wi... 详细信息
来源: 评论
Blockchain and Game-based Optimal Pricing Approach for Electric Vehicles Towards 5G
Blockchain and Game-based Optimal Pricing Approach for Elect...
收藏 引用
2024 International Conference on Electronics, Electrical and Information engineering, ICEEIE 2024
作者: Kakkar, Riya Gupta, Rajesh Obaidat, Mohammad S. Jadav, Nilesh Kumar Tanwar, Sudeep Agrawal, Smita Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat 382481 India The King Abdullah II School of Information Technology The University of Jordan Amman11942 Jordan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China The Amity University UP Noida201301 India
This paper proposes an amalgamation of blockchain and interplanetary file system (IPFS) incentive approach for distributed electric vehicle (EV) charging. The incorporated blockchain technology with IPFS protocol ensu... 详细信息
来源: 评论
Advancing Monkeypox Detection with Deep Learning: A High-Accuracy ResNet50-Based Approach
Advancing Monkeypox Detection with Deep Learning: A High-Acc...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Mahajan, Manish Mittal, Shivansh Bansal, Ankit Bhattacherjee, Abhishek Vishal Kaushik, Pratham Amity School of Engineering and Technology Amity University Punjab Mohali India Mullana India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Lovely Professional University Department of Computer Science Engineering Punjab Phagwara India Centre for Research Impact & Outcome Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura140401 India
This work aims to create a deep-learning model that will be able to classify Monkeypox and Non-Monkeypox images accurately. Using 3192 equally distributed images as data., trained a ResNet50 pre-trained CNN model to c... 详细信息
来源: 评论
A Comprehensive Study on Steganography and Text-to-Image Encryption Using RGB Substitution Techniques for Cybersecurity  4
A Comprehensive Study on Steganography and Text-to-Image Enc...
收藏 引用
4th IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2024
作者: Paliwal, Girish Sharma, Kanta Prasad Shrimal, Vijay Mohan Bhargava, Deepshikha Kumar, Ashish Amity University Uttar Pradesh Amity School of Engineering & Technology Greater Noida Campus India Chandigarh University Apex Institute of Technology Punjab Mohali India Institute of Technical Education and Research Siksha 'O' Anusandhan Department of Computer Science and Engineering Udisha Bhuvneshwar India
In today's world, data is money and privacy lie at the apex of our system. There has been a cat and mouse game between the good guys and bad guys. Steganography is a process of hiding any confidential data, it mus... 详细信息
来源: 评论
Performance Evaluation of Apache Kafka-A Modern Platform for Real Time Data Streaming  2
Performance Evaluation of Apache Kafka-A Modern Platform for...
收藏 引用
2nd International Conference on Innovative Practices in technology and Management, ICIPTM 2022
作者: Vyas, Shubham Tyagi, Rajesh Kumar Jain, Charu Sahu, Shashank Amity Institute Of Information Technology Haryana Gurgaon India Amity School Of Engineering And Technology Department Of Computer Science And Engineering Haryana Gurgaon India
Current generation businesses become more demanding on timely availability of data. Many real-time data streaming tools and technologies are capable to meet business expectations. Apache Kafka is one of the capable op... 详细信息
来源: 评论