咨询与建议

限定检索结果

文献类型

  • 1,044 篇 会议
  • 195 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 102 篇 生物工程
    • 89 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 77 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 181 篇 数学
    • 114 篇 生物学
    • 86 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 103 篇 医学
    • 85 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 53 篇 法学
    • 40 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 64 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 22 篇 medical services
  • 22 篇 analytical model...
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 mlr institute of...
  • 17 篇 department of co...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...
  • 9 篇 lloyd institute ...

作者

  • 24 篇 keshav kaushik
  • 24 篇 obaidat mohammad...
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 pronaya bhattach...
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 1,107 篇 英文
  • 137 篇 其他
  • 13 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School of Engineering and Technology"
1251 条 记 录,以下是421-430 订阅
排序:
Emotion Recognition by Using Machine Learning for Enhancing Human-computer Interaction
Emotion Recognition by Using Machine Learning for Enhancing ...
收藏 引用
2024 International Conference on Artificial Intelligence and Emerging technology, Global AI Summit 2024
作者: Ghai, Kapil Anupriya Jain, Paras Gupta, Vishan Kumar Vidisha Shakya, Harish Graphic Era hill University Department of Chemistry UK Dehradun India School of Computing Graphic Era Hill University UK Dehradun India School of Computing Engineering and Artificial Intelligence Vit Bhopal University Kothri Kalan MP Bhopal India Amity School of Engineering and Technology Amity University Punjab Mohali India Manipal University Department of Computer Science and Engineering Rajasthan Jaipur India
Emotion recognition as the aspect of artificial intelligence is the ability of a system to understand people's emotions from information that includes face, voice, and text. More complex algorithms such as CNNs an... 详细信息
来源: 评论
Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy  6
Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Amellal, Hicham Hajjami, Salma El Kaushik, Keshav Chhabra, Gunjan Yadav, Suman Avdhesh LabSIV Faculty of Science Department of Computer Science Agadir Morocco School of Computer Sciences University of Petroleum and Energy Studies Uttarakhand Dehradun India Graphic Era Hill University Department of CSE Uttarakhand Dehradun India Amity School of Engineering and Technology Department of Computer Science Amity University Uttar Pradesh Greater Noida India
Quantum Key Distribution (QKD) protocols theo- retically propose a high-security level based on the advantages of quantum computing. This paper analyze the security level of one of the most well-known QKD protocols, B... 详细信息
来源: 评论
An Analysis of Machine Learning Methods used in Cyber Security during the Last Decade
An Analysis of Machine Learning Methods used in Cyber Securi...
收藏 引用
2024 International Conference on Intelligent and Innovative Practices in engineering and Management, IIPEM 2024
作者: Suresh Babu, Rakesh Thoppaen Dhar Diwan, Tarun Vishnoi, Ankit William, P. Madan, Parul Kaushik, Keshav HEXAWARE TECHNOLOGIES INC 101 Wood Avenue South IselinNJ08830 United States Atal Bihari Vajpayee University Bilaspur India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttarakhand Dehradun India Sanjivani College of Engineering Deaprtment of Information Technology Kopargaon India Amity University Dubai United Arab Emirates Amity University Punjab Amity School of Engineering and Technology Mohali India
This paper examines cybersecurity machine learning (ML) methods over the last decade. In this study, we examine how cyberthreats have evolved and how machine learning has progressed to combat them. Each problem is wel... 详细信息
来源: 评论
Towards Optimized Physical Activity: A Fusion of Graph Convolutional Networks and XGBoost for Exercise Analysis
Towards Optimized Physical Activity: A Fusion of Graph Convo...
收藏 引用
Smart Systems for Electrical, Electronics, Communication and computer engineering (ICSSEECC), International Conference on
作者: Kishan V Rajesh M Dhanush B Rajiv Vincent School of Computer Science and Engineering Student Vellore Institute of Technology Chennai Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai Chennai India School of Computer Science and Engineering Student Vellore Institute of Technology Chennai Chennai India
This research explores the implementation of the GCN-XGBoost with attention mechanism within the detection and correction of exercises through computer vision, utilizing the 2-dimensional pose coordinates from the MMF... 详细信息
来源: 评论
Impact of COVID-19 Variants Using Multi-Criteria Selection Approach
Impact of COVID-19 Variants Using Multi-Criteria Selection A...
收藏 引用
Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA), International Conference on
作者: Shrddha Sagar Avadhesh Kumar Sofia Singh Garima Shukla Diwakar Upadhyay School of Computer Science and Engineering Galgotias University Uttar Pradesh India Department of Artificial Intelligence Amity School of Engineering and Technology Amity University Noida Uttar Pradesh Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Mumbai Maharashtra School of Computing Graphic Era Hill University Haldwani India
The aim of the proposed work is related to the detailed study of various types of COVID-19 along with its symptoms. This study utilized a retrospective approach to the COVID data from 2019 to 2021 to assess the severi... 详细信息
来源: 评论
Enabling Speech Recognition for Lesser-Known Language  6
Enabling Speech Recognition for Lesser-Known Language
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Jha, Amit Kushwaha, Pradeep Kumar Srivastava, Arun Pratap Thakur, Anil Kumar, Devesh Gupta, Shubhi Amity School of Engineering and Technology Department of Computer Science Uttar Pradesh India Lloyed Institute of Engineering and Technology Uttar Pradesh Greater Noida India Lloyd Law College Uttar Pradesh Greater Noida India Amity University Uttar Pradesh Greater Noida India
An overview of Automatic Speech Recognition (ASR) technology, including its history and challenges in implementing it for regional languages. The challenges include lack of training data, dialectal and pronunciation v... 详细信息
来源: 评论
Framework to analyze and exploit the smart home IoT firmware
收藏 引用
Measurement: Sensors 2025年 37卷
作者: Kaushik, Keshav Bhardwaj, Akashdeep Dahiya, Susheela School of Computer Science University of Petroleum and Energy Studies Uttarakhand Dehradun India Amity School of Engineering and Technology Amity University Punjab Mohali India Department of Computer Science and Engineering Graphic Era Hill University Uttarakhand Dehradun India
Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. Currently, there are around 8 billion devices online,... 详细信息
来源: 评论
A Proposed Framework for Robot-Mediated Healthcare and Response Systems
A Proposed Framework for Robot-Mediated Healthcare and Respo...
收藏 引用
International Conference on Inventive Research in Computing Applications (ICIRCA)
作者: Hafsah Khan Deepak Arora Sheenu Rizvi Department of Computer Science & Engineering Amity School of Engineering and Technology Amity University Lucknow India
The study proposes an experimental model for robot-mediated systems in healthcare. The framework outline and required modules are discussed successively alongside the methodology needed to achieve the system's bas...
来源: 评论
Online social network automation attack detection methods for energy analysis and consumption modelling
收藏 引用
International Journal of Information technology (Singapore) 2024年 1-13页
作者: Rawat, Romil Sikarwar, Ranjana Maravi, Prakash Kumar Ingle, Mandakini Bhardwaj, Vivek Rawat, Anjali Rawat, Hitesh Department of Computer Science Engineering Shri Vaishnav Institute of Information Technology Shri Vaishnav Vidyapeeth Vishwavidyalaya Indore Indore India Department of CSE Amity University Madhya Pradesh Gwalior India Department of Computer Science Engineering Parul University Gujarat Vadodara India Department of CSE Medicaps University Indore India School of Computer Science and Engineering Manipal University-Jaipur Rajasthan Jaipur India Department of Computer and Communication Technology University of Extremadura Badajoz Spain Department of Business Management and Economics University of Extremadura Badajoz Spain
Preventing the spread of Domain Name System (DNS) tunnelling and the use of automation infrastructure is one of the key problems that the idea of a contemporary smart OSN (online social network) must address. The prop... 详细信息
来源: 评论
Role of Smali Opcodes in Identifying Android Malware Obfuscation Variants
Role of Smali Opcodes in Identifying Android Malware Obfusca...
收藏 引用
International Conference on computer, Communication, Control and Information technology (C3IT)
作者: Abhishek Anand Jyoti Prakash Singh Amity School of Engineering and Technology Amity University Patna Patna India Computer Science and Engineering National Institute of Technology Patna Patna India
With the widespread adoption of Android and its applications, obfuscated malware poses significant challenges to the platform's security. Addressing these challenges requires automated, lightweight, and scalable m... 详细信息
来源: 评论