咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 194 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 612 篇 计算机科学与技术...
    • 526 篇 软件工程
    • 229 篇 信息与通信工程
    • 140 篇 控制科学与工程
    • 103 篇 生物工程
    • 90 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 83 篇 网络空间安全
    • 78 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 358 篇 理学
    • 180 篇 数学
    • 115 篇 生物学
    • 85 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 101 篇 医学
    • 83 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 54 篇 法学
    • 41 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 65 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 23 篇 analytical model...
  • 22 篇 medical services
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 29 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 amity school of ...
  • 18 篇 school of comput...
  • 18 篇 department of co...
  • 18 篇 mlr institute of...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 department of co...
  • 12 篇 school of comput...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 lloyd institute ...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 school of engine...

作者

  • 25 篇 obaidat mohammad...
  • 24 篇 keshav kaushik
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 gupta sumita
  • 18 篇 hazela bramah
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 pronaya bhattach...
  • 11 篇 tanwar sudeep
  • 11 篇 yadav suman avdh...
  • 10 篇 sudeep tanwar
  • 10 篇 ather danish
  • 10 篇 kaur harleen

语言

  • 968 篇 英文
  • 276 篇 其他
  • 15 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School of Engineering and Technology"
1251 条 记 录,以下是661-670 订阅
排序:
Quant-Jack: Quantum Machine Learning to Detect Cryptojacking Attacks in IIoT Networks
Quant-Jack: Quantum Machine Learning to Detect Cryptojacking...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Pronaya Bhattacharya Aparna Kumari Sudeep Tanwar Ishan Budhiraja Sahil Patel Joel J.P.C Rodrigues Department of Computer Science and Engineering ASET Amity University Kolkata India Department of Computer Science and Engineering Institute of Technology Nirma University Ahmedabad India School of Computer Science Engineering and Technology Bennett University Greater Noida India COPELABS Luso fona University Lisbon Portugal
The paper presents a scheme, Quant-Jack, which employs Quantum Machine Learning (QML) to combat the cryptojacking threat in Industrial Internet-of-Things (IIoT) networks. We propose a dual-layered QML architecture, ba... 详细信息
来源: 评论
Association rule learning for threat analysis using traffic analysis and packet filtering approach
收藏 引用
International Journal of Information technology (Singapore) 2023年 第6期15卷 3245-3255页
作者: Rawat, Romil Chakrawarti, Rajesh Kumar Raj, A. Samson Arun Mani, Gayathri Chidambarathanu, K. Bhardwaj, Ramakant Computer and Communication Technology Department University of Extremadura Badajoz Spain Department of Computer Science and Engineering Sushila Devi Bansal College (SDBC) Bansal Group of Institutions (BGI) Indore India Karunya Institute of Technology and Sciences Karunya Nagar Tamil Nadu Coimbatore India Department of Computing Technologies School of Computing SRM Institute of Science and Technology Kattankulathur Chennai India Department of Computer Science and Business Systems R.M.K. Engineering College Chennai India Department of Mathematics Amity University West Bengal Kolkata India
The Mirai botnet source code, which was distributed on the dark web, is still changing as malware designers modify it to produce more sophisticated varieties of the botnet—the Satori—based on the malware source code... 详细信息
来源: 评论
Deep Learning Based Image Classification for Automated Face Spoofing Detection Using Machine Learning: Convolutional Neural Network
Deep Learning Based Image Classification for Automated Face ...
收藏 引用
Communication & Computing (WCONF), World Conference on
作者: Biresh Kumar Kumari Manisha Anurag Sinha Abhishek Kumar Jeevan Kumar Amity Institute of Information Technology Amity University Ranchi Jharkhand India School of Computing and information Science IGNOU New Delhi India Computer Science and Engineering Jharkhand University of Technology Ranchi India RVS College of Engineering & Technology RVSCET Jamshedpur India
Facial recognition technology has gained widespread use in various applications, raising concerns about the weakness of frameworks to confront mocking assaults. This study presents an implementation of face spoofing d... 详细信息
来源: 评论
Segmentation and Classification of Skin Cancer Using K-means Clustering and EfficientNetB0 Model  5th
Segmentation and Classification of Skin Cancer Using K-means...
收藏 引用
5th International Conference on Communication, Device and Networking, ICCDN 2021
作者: Anand, Vatsala Gupta, Sheifali Koundal, Deepika Nayak, Soumya Ranjan Shafi, Jana Bhoi, Akash Kumar Institute of Engineering and Technology Chitkara University Chitkara University Punjab Rajpura India Department of Systemics School of Computer Science University of Petroleum and Energy Studies Uttrakhand Dehradun India Amity School of Engineering and Technology Amity University Uttar Pradesh Noida India Department of Computer Science College of Arts and Science Prince Sattam Bin Abdul Aziz University Wadi Ad-Dwasir11991 Saudi Arabia KIET Group of Institutions Delhi-NCR Ghaziabad201206 India Directorate of Research Sikkim Manipal University Gangtok Sikkim737102 India
Nowadays, skin cancer is the widely recognized cancer all over the world. As the spreading rate of skin cancer is increasing day by day, so, there is a need to develop a technique that can detect skin cancer at an ear... 详细信息
来源: 评论
Optimized Web Searching Using Inverted Indexing Technique  11
Optimized Web Searching Using Inverted Indexing Technique
收藏 引用
11th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2022
作者: Saini, Dilip Kumar Jang Bahadur Patil, Pratap Gupta, Keshav Dev Kumar, Sarvesh Singh, Prabhishek Diwakar, Manoj Swami Rama Himalayan University Himalayan School of Science and Technology Department of Computer and Information Science Swami Ram Nagar Jolly Grant Uttarakhand Dehradun248016 India Amity University in Tashkent Labzak 70 100128 Uzbekistan Apex University Department of Computer Science and It Jaipur India Babu Banarasi das University Department of Computer Science and Engineering Lucknow India Amity University Amity School of Engineering and Technology Uttar Pradesh Noida India Graphic Era Deemed to Be University Uttarakhand Dehradun India
As the information on world wide web (WWW) is growing exponentially, it is very difficult to retrieve the relevant search results from datacenter repositories quickly. Prior research shows that the performance of an i... 详细信息
来源: 评论
Critical Review: Fog Computing Dimensions for Data Security Features Cloud-Based Applications
Critical Review: Fog Computing Dimensions for Data Security ...
收藏 引用
International Conference on ICT in Business Industry & Government (ICTBIG)
作者: Kanta Prasad Sharma Girish Paliwal Deepshikha Bhargava Vijay Mohan Shrimal Ashish Kumar Amity School of Engineering & Technology Amity University Uttar Pradesh Apex Institute of Technology Chandigarh University Mohali Punjab Department of Computer Science and Engineering Institute of Technical Education and Research Siksha 'O' Anusandhan Bhuvneshwar Odisha
Fog computing combines traditional cloud services with the proximity of users and devices to enhance service efficiency and speed up processes, allowing for mobility and several users to perform heterogeneous computin... 详细信息
来源: 评论
Leveraging Cloud technology for Enhanced Online Examination System
Leveraging Cloud Technology for Enhanced Online Examination ...
收藏 引用
International Conference on ICT in Business Industry & Government (ICTBIG)
作者: Vijay Mohan Shrimal Girish Paliwal Kanta Prasad Sharma Deepshikha Bhargava Ashish Kumar Apex Institute of Technology Chandigarh University Mohali Punjab Amity School of Engineering & Technology Amity University Uttar Pradesh Department of Computer Science and Engineering Institute of Technical Education and Research Siksha 'O' Anusandhan Bhuvneshwar Udisha
An online cloud-based Examination Framework is a web application in which the user can try an online exam. Through a web browser, the user can search for an exam for a particular subject that they want to improve. Use... 详细信息
来源: 评论
A Novel MobileInceptionNet Architecture for Apple Leaf Disease Classification
A Novel MobileInceptionNet Architecture for Apple Leaf Disea...
收藏 引用
Intelligent Technologies (ACOIT), Asian Conference on
作者: Ritesh Maurya Rahul Sharma T Gopalakrishnan Nageshwar Nath Pandey Soumyashree M Panchal Amity Centre for Artificial Intelligence Amity University Noida India Amity School of Engineering & Technology Amity University Noida India Department of Information Technology Manipal Academy of Higher Education Manipal Institute of Technology Bengaluru Manipal India Computer Science & Engineering ITER Shiksha ‘O’ Anusandhan Odisha India Department of Computer Science and Engineering Manipal Academy of Higher Education Manipal Institute of Technology Bengaluru Manipal India
Diagnosis of agricultural plant leaf diseases is a significant, but a time-taking process, if performed manually. Therefore, automated systems are much required for the early diagnosis of the leaf diseases. Recent adv... 详细信息
来源: 评论
Binary Particle Swarm Optimization Algorithm Based on Z-shaped Probability Transfer Function to Solve 0-1 Knapsack Problem
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2021年 第2期48卷 1-9页
作者: Sun, Wei-Zhong Zhang, Min Wang, Jie-Sheng Guo, Sha-Sha Wang, Min Hao, Wen-Kuo A lecturer of School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China A postgraduate student of School of Electronic and Information Engineering University of Science and Technology Liaoning Anshan114051 China A professor of School of International Finance and Banking University of Science and Technology Liaoning Anshan114051 China
Binary particle swarm optimization (BPSO) algorithm can map the original continuous searching space to the binary searching space by introducing a new velocity transfer function. For the 0-1 knapsack problem, a binary... 详细信息
来源: 评论
Transfer Learning Approach for Detection of Autism Spectrum Disorder using Facial Images
Transfer Learning Approach for Detection of Autism Spectrum ...
收藏 引用
IEEE UP Section Conference on Electrical computer and Electronics (UPCON)
作者: Krisha Patel Ashwini Ramanuj Sohan Sakhiya Yogesh Kumar Ajay Rana Department of Computer Science and Engineering Pandit Deendayal Energy University Gandhinagar India Amity School of Engineering and Technology Amity University Greater Noida UP India
Autism Spectrum Disorder (ASD) is characterized by deficits in social interaction, communication issues, and repetitive behavioral patterns. Effective ASD intervention and assistance depend on early detection and diag...
来源: 评论