咨询与建议

限定检索结果

文献类型

  • 1,044 篇 会议
  • 195 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 102 篇 生物工程
    • 89 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 77 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 181 篇 数学
    • 114 篇 生物学
    • 86 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 103 篇 医学
    • 85 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 53 篇 法学
    • 40 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 64 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 22 篇 medical services
  • 22 篇 analytical model...
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 mlr institute of...
  • 17 篇 department of co...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...
  • 9 篇 lloyd institute ...

作者

  • 24 篇 keshav kaushik
  • 24 篇 obaidat mohammad...
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 pronaya bhattach...
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 1,107 篇 英文
  • 137 篇 其他
  • 13 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School of Engineering and Technology"
1251 条 记 录,以下是401-410 订阅
排序:
Ant Colony Optimization based Edge Detection in Digital Images  5
Ant Colony Optimization based Edge Detection in Digital Imag...
收藏 引用
5th International Conference on Computational Intelligence and Communication Technologies, CCICT 2022
作者: Srivastava, Atul Singh, Rajeev Juneja, Shilpa Verma, Garima Amity University Amity School of Engineering and Technology Lucknow India ABES Engineering College Department of Computer Science and Engineering Gaziabad India Nirankari Baba Gurbachan Singh Memorial College Department of Computer Science and Engineering Sohna India Pranveer Singh Institute of Technology Department of Computer Science and Engineering Kanpur India
Edge detection is identifying the discontinuities in the intensity of the pixel and grouping the contour of edges. Edge detection in digital images is a significant phenomenon in computer vision. In the initial stages... 详细信息
来源: 评论
Machine Learning-Based Counterfeit Currency Detection
Machine Learning-Based Counterfeit Currency Detection
收藏 引用
Advances in Computation, Communication and Information technology (ICAICCIT), International Conference on
作者: Srishti Srivastava Anshika Panwar Jalaj Bhati Dolly Sharma Amity School of Engineering and Technology (ASET) Amity University Noida India Department of Computer Science and Engineering Amity University Noida India
Counterfeit currency detection is a critical issue posing significant challenges to economies worldwide. Traditional methods relying on manual inspection are prone to error and inefficiency. To enhance detection accur... 详细信息
来源: 评论
Investigating Blockchain Security Mechanisms for Tamper-Proof Data Storage  2
Investigating Blockchain Security Mechanisms for Tamper-Proo...
收藏 引用
2nd IEEE International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023
作者: Thilakavathy, P. Jayachitra, S. Aeron, Anurag Kumar, Narendra Ali, Syed Sumera Malathy, M. Computer Science and Engineering Vels Institute of Science Technology and Advanced Studies Chennai India Psna College of Engineering and Technology Department of Ece Tamilnadu Dindigul India School of Computing Dit University Dehradun Computer Science and Engineering India Amity University Department of Computer Science and Engineering Jharkhand Ranchi India Csmss Chh Shahu College of Engineering Electronics and Computer Engineering Department Maharashtra Aurangabad India Vel Tech High Tech Dr Rangarajan Dr Sakunthala Engineering College Department of Computer Science and Engineering Chennai Avadi India
Across a wide range of sectors, blockchain technology has emerged as a game-changing option for secure data storage. This research dives into the mechanisms that enable blockchain to protect data integrity and immutab... 详细信息
来源: 评论
Edge Intelligence Hybrid Framework for Real-Time IoT Applications using Multi-Stage Adaptive Processing Methods  6
Edge Intelligence Hybrid Framework for Real-Time IoT Applica...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Suneel, Sajja Yadav, Rakesh Kumar Nirmala Devi, K. Teja sree, B. Aarthi, R. Upadhyay, Shrikant Institute of Aeronautical Engineering Dundigal Telangana Hyderabad500043 India Amity School of Engineering and Technology Amity University Bihar Patna India Department of Computer Applications Madanapalle Institute of Technology & Science India Department of IT S.R.K.R Engineering College Bhimavaram India Department of ECE Rajalakshmi Institute of Technology Kuthambakkam Post Tamil Nadu Chembarambakkam600124 India Department of Electronics and Communication Engineering MLR Institute of Technology Hyderabad India
The rapid proliferation of IoT devices has created an unprecedented need for real-time data processing and decision-making. This paper proposes an Edge Intelligence Hybrid Framework designed for real-time IoT applicat... 详细信息
来源: 评论
Performance Analysis of DGA-Driven Botnets using Artificial Neural networks  10
Performance Analysis of DGA-Driven Botnets using Artificial ...
收藏 引用
10th International Conference on Reliability, Infocom Technologies and Optimization ,Trends and Future Directions, ICRITO 2022
作者: Manikandan, N. Ruby, D. Murali, S. Sharma, Vandana School of Computer Science and Engineering Vellore Institute of Technology Vellore India Amity Institute of Information Technology Amity University Noida Campus India
A botnet is a network of devices infected with malware and controlled remotely by a person with malicious intent. Botnets can launch attacks to steal data, perform phishing, spamming and set up DDoS. Some botnets use ... 详细信息
来源: 评论
Android Malware Detection and its Security  6
Android Malware Detection and its Security
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Kushwaha, Pradeep Kumar Kumar, Vikas Saraswat, Manish Singh, Pankaj Kumar, Rajesh Vashisht, Swati Amity School of Engineering and Technology Department of Computer Science Amity University Uttar Pradesh Greater Noida India CSE Amity School of Engineering and Technology Amity University Bachelor of Technology Uttar Pradesh Greater Noida India Lloyd Institute of Engineering and Technology Uttar Pradesh Greater Noida India Lloyd Law College Uttar Pradesh Greater Noida India ACSE GL Bajaj Institute of Technology and Management Uttar Pradesh Greater Noida India
The popularity of mobile apps is growing thanks to advancements in technology. This article specifically discusses the Android mobile platform and its layered approach to app development, as well as the security conce... 详细信息
来源: 评论
Recipe Recommender System Using BERTopic Modelling Technique  23
Recipe Recommender System Using BERTopic Modelling Technique
收藏 引用
Proceedings of the 5th International Conference on Information Management & Machine Intelligence
作者: Janmejay Singh Bramah Hazela Pallavi Asthana Shikha Singh Anil Kumar Tiwari Computer Science & Engineering Amity School of Engineering & Technology Lucknow Amity University Uttar Pradesh India India Electronics and Electrical Engineering Amity School of Engineering & Technology Lucknow Amity University Uttar Pradesh India India
Human civilization has been significantly impacted by technology, ushering in an era of tremendous growth. From the dawn of agriculture to the digital era, technical advancements have transformed communication, transp... 详细信息
来源: 评论
Sentiment Analysis in Social Media Using Deep Learning Techniques
Sentiment Analysis in Social Media Using Deep Learning Techn...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Babu, M. Shinde, Pravin Vishnu Agrawal, Neha Bhaskar, M. Vijaya Hemabala, K. Priya, Sweta Rajalakshmi Institute of Technology Department of Computer Science and Engineering Chennai600124 India Shah and Anchor Kutchhi Engineering College Affiliated to University of Mumbai Department of Artificial Intelligence & Data Science Maharashtra India Maharaja Agrasen Institute of Technology Department of It New Delhi110085 India SriVenkateswara Institute of Technology Department of Computer Science & Engineering Andhra Pradesh Anantapur India Department of Freshmen Tiruvathi517502 India Amity University Department of Amity School of Communication University Patna801503 India
This work offers a thorough investigation of sentiment analysis in social media using deep learning techniques. Understanding stoner sentiment has become essential for colourful operations like marketing, public opini... 详细信息
来源: 评论
A Machine Learning Approach Towards Prediction of User’s Responsiveness to Notifications with Best Device Identification for Notification Delivery
A Machine Learning Approach Towards Prediction of User’s R...
收藏 引用
International Conference on Advances and Applications of Artificial Intelligence and Machine Learning, ICAAAIML 2022
作者: Srivastav, Devansh Srivastava, Hinal Mittal, Naman Deepak Singh, Bayare Bachu, Induvadan Kumar Yadav, Ashwani Gothwal, Pushpa Sharma, Mssk Krishnamurthy, Bhargav Saarbrücken Germany Saarland University Saarbrücken Germany University of Sheffield Sheffield United Kingdom Department of Computer Science and Engineering Amity University Uttar Pradesh Noida India Amity School of Engineering and Technology Amity University Rajasthan Jaipur India School of Computer Science and Engineering Vellore Institute of Technology Vellore India Samsung Research Institute Karnataka Bangalore India University of Southern California Los Angeles United States
With an increasing number of connected devices, the number of notifications a user receives has multiplied manifolds. With the advent of smart home appliances, this number has even increased. Such a large number of no... 详细信息
来源: 评论
Extensive Analysis of Deep Learning Algorithms for Automatic Detection of Liver Anomalies Using MRI and CT Scanned Images
Extensive Analysis of Deep Learning Algorithms for Automatic...
收藏 引用
Technological Advancements in Computational sciences (ICTACS), International Conference on
作者: Sugandha Chakraverti Smita Sharma Vijay Shukla Department of Computer Science and Engineering Amity School of Engineering and Technology Greater Noida Campus Amity University Uttar Pradesh Amity School of Engineering and Technology Greater Noida Campus Amity University Uttar Pradesh Department of Computer Science and Engineering Greater Noida Institute of Technology Greater Noida India
The liver's segmentation during medical imaging is crucial for the diagnosis and prognosis of liver diseases., including fibroid cysts, malignant growths, and other pathological problems. The World Health Organiza... 详细信息
来源: 评论