咨询与建议

限定检索结果

文献类型

  • 1,044 篇 会议
  • 195 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 102 篇 生物工程
    • 89 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 77 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 181 篇 数学
    • 114 篇 生物学
    • 86 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 103 篇 医学
    • 85 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 53 篇 法学
    • 40 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 64 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 22 篇 medical services
  • 22 篇 analytical model...
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 mlr institute of...
  • 17 篇 department of co...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...
  • 9 篇 lloyd institute ...

作者

  • 24 篇 keshav kaushik
  • 24 篇 obaidat mohammad...
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 pronaya bhattach...
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 1,107 篇 英文
  • 137 篇 其他
  • 13 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School of Engineering and Technology"
1251 条 记 录,以下是391-400 订阅
排序:
Ethical Hacking: Importance, Controversies and Scope in the Future  12
Ethical Hacking: Importance, Controversies and Scope in the ...
收藏 引用
12th International Conference on computer Communication and Informatics, ICCCI 2022
作者: Vishnuram, G. Tripathi, Khushboo Tyagi, Amit Kumar School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Chennai600127 India Amity University Department of Computer Science and Engineering Haryana India
With the ongoing digitalisation of the modern world and our quest to digitalise and automate everything, issues related to cybersecurity such as data breaches, security breaches etc., will be in the spotlight. Therefo... 详细信息
来源: 评论
Use of Neural Machine Translation in Multimodal Translation  6
Use of Neural Machine Translation in Multimodal Translation
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Nair, Manavi Tanwar, Sarvesh Badotra, Sumit Kukreja, Vinay Amity Institute of Information Technology Amity University Uttar Pradesh Noida India School of Computer Science and Engineering Bennett University U.P Greater Noida India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Multimodal Neural Machine Translation (MNMT) is a type of Machine Translation that allows the translation of source language that contains various forms of information, such as images, video, audio, and signs, into th... 详细信息
来源: 评论
Majority Voting-based Consensus Mechanism for UAVs Decision Making in Battlefield
Majority Voting-based Consensus Mechanism for UAVs Decision ...
收藏 引用
2023 IEEE International Conference on computer, Information, and Telecommunication Systems, CITS 2023
作者: Kakkar, Riya Gupta, Rajesh Obaidiat, Mohammad S. Jadav, Nilesh Kumar Tanwar, Sudeep Institute of Technology Nirma University Department of Computer Science and Engineering Ahmedabad India King Abdullah Ii School of Information Technology The University of Jordan Jordan School of Computer and Communication Engineering University of Science and Technology Beijing100083 China The Amity University Uttar Pradesh Noida201301 India
The revolutionary and rapid development of Information and Communication technology (ICT) has significantly contributed to modernizing military operations by improving the long-range communication and information shar... 详细信息
来源: 评论
A Comprehensive Analysis of Various Federated Learning Techniques
A Comprehensive Analysis of Various Federated Learning Techn...
收藏 引用
Advances in Computation, Communication and Information technology (ICAICCIT), International Conference on
作者: Neha Saini Dolly Sharma Deepti Mehrotra Aikaterini Bourazeri Amity School of Engineering and Technology Amity University Noida India School of Computer Science & Electronic Engineering University of Essex UK
A method for data privacy maintenance while training machine learning models across decentralized devices is Federated Learning (FL). It comes under the category of decentralized field of machine learning. The decentr... 详细信息
来源: 评论
Analysis of Big Data in Cloud Computing Technologies
Analysis of Big Data in Cloud Computing Technologies
收藏 引用
International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: Sanjeev Thakur Lalit Verma Computer Science & Engineeering Amity School of Engineering & Technology Noida India
The abstract provides a brief summary of the research paper, highlighting the key topics covered. It explains that the paper will give a brief description of the various technologies and tools used for Big Data in clo... 详细信息
来源: 评论
Ensemble Methods on NSL-KDD  5
Ensemble Methods on NSL-KDD
收藏 引用
5th International Conference on Information Systems and computer Networks, ISCON 2021
作者: Kothari, Arun Vashishtha, Purvit Singh, Prabhishek Diwakar, Manoj Pandey, Neeraj Kumar Amity University Amity School of Engineering and Technology Department of CSE Uttar Pradesh Noida India Department of Computer Science Engineering Uttarakhand Dehradun India DIT University Department of Computer Science Engineering Dehradun India
The application of machine learning and also deep learning strategies in the field of cyber safety and security is a lot more popular than in the past. From IP (Internet Protocol) web traffic classification, a filteri... 详细信息
来源: 评论
Analysis of Image Classification Using Machine Learning Approach
Analysis of Image Classification Using Machine Learning Appr...
收藏 引用
Data, Computation and Communication (ICDCC), International Conference on
作者: Rinki Pakshwar Jhankar Moolchandani Kiran Tomar Department of Computer Science & Engineering School of Engineering and Technology ITM University Gwalior Madhya Pradesh India Department of Computer Science & Engineering Amity School of Engineering and Technology Amity University Gwalior Madhya Pradesh India Department of Computer Science & Engineering Amity University Gwalior Madhya Pradesh India
Among the technologies that are utilized in the research and development of contemporary science and technology, image classification is an essential technology. Scholars from a variety of nations have not only become... 详细信息
来源: 评论
The Impact of Industrial Automation on the Manufacturing Industry in the Era of Industry 4.0  15
The Impact of Industrial Automation on the Manufacturing Ind...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Gurav, Vidya Sunil Gugnani, Anchit Meena, Y.R. Marathe, Vijay Vijay, S. Arul Antran Nanda, Simranjeet D.K.T.E.S's Textile and Engineering Institute Department of Management Studies Ichalkaranji416115 India Amity Institute Of Physiotherapy Amity University Rajasthan Jaipur302020 India School of Engineering and Technology Department of Civil Engineering Karnataka Bangalore India Vishwakarma Institute of Technology Pune India Karpagam College of Engineering Department of Computer Science Engineering Coimbatore641032 India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
With the dawn of Industry 4.0, industrial automation has become one of the most disruptive technologies in the manufacturing industry. It encompasses the use of innovative technology and methods to automate different ... 详细信息
来源: 评论
Implementing Robust Security Protocols for Virtual Images in Cloud Computing Platform
Implementing Robust Security Protocols for Virtual Images in...
收藏 引用
Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA), International Conference on
作者: Shiv Kumar Tiwari Manish Gupta Subhrendu G. Neogi Department of Computer Science Engineering Amity School of Engineering and Technology Amity University Gwalior India Department of Computer Science Engineering The Neotia University West Bengal India
The new technology, with the aid of newly emerging knowledge known as cloud computing, can provide resources remotely and on demand. With the use of cloud computing, users can operate in settings where they are not de... 详细信息
来源: 评论
An Innovative Ensemble Approach to Detecting Distributed Denial of Service Attacks Using Machine Learning
An Innovative Ensemble Approach to Detecting Distributed Den...
收藏 引用
Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA), International Conference on
作者: Deepak Singh Rajput Arvind Kumar Upadhyay Dept. of Computer Science and Engineering Amity School of Engineering &Technology (ASET) Amity University Gwalior Madhya Pradesh
In the present era marked by rapid Internet development, there is a growing emphasis on information security. Distributed Denial of Service (DDoS) attacks poses significant threats to servers globally. Various methods... 详细信息
来源: 评论