咨询与建议

限定检索结果

文献类型

  • 1,044 篇 会议
  • 195 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 102 篇 生物工程
    • 89 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 77 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 181 篇 数学
    • 114 篇 生物学
    • 86 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 103 篇 医学
    • 85 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 53 篇 法学
    • 40 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 64 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 22 篇 medical services
  • 22 篇 analytical model...
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 mlr institute of...
  • 17 篇 department of co...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...
  • 9 篇 lloyd institute ...

作者

  • 24 篇 keshav kaushik
  • 24 篇 obaidat mohammad...
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 pronaya bhattach...
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 1,107 篇 英文
  • 137 篇 其他
  • 13 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School of Engineering and Technology"
1251 条 记 录,以下是491-500 订阅
排序:
BlockTwins: Blockchain Empowered Supply Chain Digital Twins in Metaverse
BlockTwins: Blockchain Empowered Supply Chain Digital Twins ...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Shubhani Aggarwal Neeraj Kumar Amritpal Singh Gagangeet Singh Aujla Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University Punjab India Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala India Department of Engineering Durham University Durham United Kingdom Department of Computer Science Durham University Durham United Kingdom
Digital twins function as digital replicas of physical entities and play a pivotal role as facilitators in the digital world. They establish and foster the communication bridge between the physical and digital realms.... 详细信息
来源: 评论
Efficient Vulnerability Assessment and Penetration Testing: A Framework for Automation
Efficient Vulnerability Assessment and Penetration Testing: ...
收藏 引用
Computational Intelligence and Sustainable engineering Solutions (CISES), International Conference on
作者: Yash Tyagi Shweta Bhardwaj Shubham Shekhar Abhishek P Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Noida Uttar Pradesh India
Due to a variety of factors, the number of computers connected to the internet has been growing exponentially. The dependence that resulted from this exponential growth has profound cybersecurity consequences. The mai...
来源: 评论
Deep Learning Model for Identification and Classification of Web based Toxic Comments
Deep Learning Model for Identification and Classification of...
收藏 引用
Advances in Power, Signal, and Information technology (APSIT), International Conference in
作者: Anubhav Shukla Deepak Arora Department of Computer Science & Engineering Amity School of Engineering and Technology Lucknow Amity University Uttar Pradesh India
Everyday, many individuals face online trolling and receive hate on different social media platforms like Twitter, Instagram to name a few. Often these comments involving racial abuse, hate based on religion, caste ar...
来源: 评论
CallerId Application Design using Amazon Web Services
CallerId Application Design using Amazon Web Services
收藏 引用
Advances in Computation, Communication and Information technology (ICAICCIT), International Conference on
作者: Shourya Chawla Mohd. Abuzer Abhinav Singh Dolly Sharma Department of Computer Science Amity School of Engineering and Technology Amity University Noida India
A phone number is a personal unique number which can identify its owner. Personal information can be exploited through a person’s phone number. Many methods such as phishing and spam attacks have been used to exploit...
来源: 评论
Deep Learning Model for computer Vision: Sustainable Image Classification Using Machine Learning  1st
Deep Learning Model for Computer Vision: Sustainable Image C...
收藏 引用
1st International Conference on Sustainable Development through Machine Learning, Artificial Intelligence, and IoT, ICSD 2023
作者: Alankar, Bhavya Chauhan, Ritu Kaur, Harleen Ebadati, E. Omid Mahdi Department of Computer Science and Engineering School of Engineering Sciences and Technology Jamia Hamdard New Delhi India Artificial Intelligence and IoT Lab Center for Computational Biology and Bioinformatics Amity University UP Noida India Department of Mathematics and Computer Science Kharazmi University Tehran Iran
The core challenge within computer vision is image classification, which involves assigning an image a label and categorizing it using the features that have been extracted from it. Even though this work appears rudim... 详细信息
来源: 评论
A Deep Learning Based Approach for Sugarcane Disease Detection
A Deep Learning Based Approach for Sugarcane Disease Detecti...
收藏 引用
Delhi Section Conference (DELCON), IEEE
作者: Vishan Kumar Gupta Garima Sharma Vidisha Mukesh Kumar Singh Amity School of Engineering & Technology Amity University Punjab Mohali India Department of Computer Science & Engineering Graphic Era (Deemed to be University) Dehradun Uttarakhand India Computer Science & Engineering Department Galgotias College of Engineering and Technology Greater Noida India
The world's largest producers of sugarcane, which is used to make both sugar and bioethanol, are Brazil and India. The crop is primarily grown in tropical and subtropical regions. These nations produce 40% of the ... 详细信息
来源: 评论
Analytical Approach of Machine Learning for Prediction Models
Analytical Approach of Machine Learning for Prediction Model...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Mohit Kumar Sanjay Kumar Dubey Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Noida Uttar Pradesh India
With the increasing availability of data, machine learning (ML) predictive models have become a popular tool for making informed decisions in various fields. However, choosing suitable algorithms and techniques to dev...
来源: 评论
Zero Knowledge based Authentication for Internet of Medical Things
Zero Knowledge based Authentication for Internet of Medical ...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Garima Misha Bramah Hazela Brijesh Kumar Chaurasia Computer Science and Engineering Amity School of Engineering and Technology Lucknow Amity University Uttar Pradesh India Computer Science and Engineering Pranveer Sing Institute of Technology Kanpur India
Internet of Things (IoT) applications, such as e-healthcare departments have grown tremendously where devices gather patient data and instantly transmit it over a distance to servers. Despite its huge advantages, IoT ...
来源: 评论
Detection and Classification of Bone Fracture Using Digital Image Processing
Detection and Classification of Bone Fracture Using Digital ...
收藏 引用
IEEE UP Section Conference on Electrical computer and Electronics (UPCON)
作者: Simran Makwane Anjali Kiran Shweta Bhardwaj Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Noida Uttar Pradesh India
This research paper presents an innovative approach for automated bone fracture discovery and bracket using digital image processing ways and the Scale Invariant point Transform (SIFT) algorithm. The proposed system e...
来源: 评论
Leveraging Natural Language Processing and Machine Learning for Efficient Fake News Detection  3
Leveraging Natural Language Processing and Machine Learning ...
收藏 引用
3rd International Conference on Technological Advancements in Computational sciences, ICTACS 2023
作者: Kumar, Naresh Malhotra, Meetu Aggarwal, Bharti Rai, Dinesh Aggarwal, Gaurav Msit Department of Computer Science & Engineering Janakpuri Delhi India Harrisburg University of Science and Technology United States School of Eng & Tech Sushant University Gurugram India Amity University Tashkent Uzbekistan
In today's digital world, the internet deeply ingrains in all facets of our lives. People highly depend on myriad of online sources for news. The proliferation of fake news is increasingly recognized as a signific... 详细信息
来源: 评论