咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 198 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 727 篇 工学
    • 613 篇 计算机科学与技术...
    • 527 篇 软件工程
    • 230 篇 信息与通信工程
    • 141 篇 控制科学与工程
    • 103 篇 生物工程
    • 91 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 84 篇 网络空间安全
    • 78 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 359 篇 理学
    • 181 篇 数学
    • 115 篇 生物学
    • 85 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 101 篇 医学
    • 83 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 54 篇 法学
    • 41 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 65 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 23 篇 analytical model...
  • 22 篇 medical services
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 amity school of ...
  • 18 篇 department of co...
  • 18 篇 mlr institute of...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 department of co...
  • 12 篇 school of comput...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 school of engine...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 lloyd institute ...

作者

  • 26 篇 obaidat mohammad...
  • 24 篇 keshav kaushik
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 pronaya bhattach...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 972 篇 英文
  • 276 篇 其他
  • 15 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School of Engineering and Technology"
1255 条 记 录,以下是681-690 订阅
排序:
A comprehensive survey of state-of-art techniques in digital watermarking  4
A comprehensive survey of state-of-art techniques in digital...
收藏 引用
4th International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2022
作者: Allwadhi, Sachin Joshi, Kamaldeep Yadav, Ashok Kumar Nandal, Rainu Jain, Rishabh M.D.University Deptt. of Computer Science & Engg Haryana Rohtak India Amity University Amity School of Engg. & Technology U.P Noida India Galgotias College of Engineering and Technology Deptt. of Computer Science & Engg Greater Noida India
Digital image watermarking refers to implanting secret information for copyright protection, content authentication of a given media to avoid future conflicts or illegal possession of data. A number of applications ar... 详细信息
来源: 评论
Balancing Usability and Security Innovative Approaches to Privacy in Digital Environments
Balancing Usability and Security Innovative Approaches to Pr...
收藏 引用
Communication, computer sciences and engineering (IC3SE), International Conference on
作者: Swathi Baswaraju M Geeta Yadav Ginni Nijhawan Ajay Rana T K. Pushpa Rani Taqi Mohammed Khattab Al-Rubaye Department of Computer Science – Data Science New Horizon College of Engineering Bangalore India Department of Computer Science And Engineering Institute Of Aeronautical Engineering Hyderabad Telangana India Lovely Professional University Phagwara India Amity School of Engineering and Technology Amity University Greater Noida India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Telangana India Department of Medical Laboratory Technology College Of Medical Technologies The Islamic University Najaf Iraq
Data analysis, private protection, detecting unusual things, identifying people, and transferring data are part of the study's unique security design. The major system method is AUA. Your authentication level depe... 详细信息
来源: 评论
Use of Artificial Intelligence in Smart City Development  3
Use of Artificial Intelligence in Smart City Development
收藏 引用
3rd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2023
作者: Behera, Nihar Ranjan Tak, Sana Thakur, Gaurav Prabhanjan, Neduri Ibrahim, Waleed Khalid Alazzam, Malik Bader Swiss School of Business and Management Geneva Petit-Lancy1213 Switzerland Amity University Computer Science & Engineering Chhattisgarh India Uttaranchal University Uttaranchal Institute of Technology India Sr University School of Engineering Department of Civil Engineering Telangana Warangal India Al-Farahidi University Medical Technical College Baghdad10021 Iraq Ajloun National University Information Technology College Jordan
A revolutionary concept that is yet in its infancy, artificial intelligence has the potential to, when employed skilfully, provide a vehicle for good change that might elevate supportable adjustments from an asset-eff... 详细信息
来源: 评论
Brain Image Segmentation based on U-Net Architecture with Adaptive Histogram Equalization  9
Brain Image Segmentation based on U-Net Architecture with Ad...
收藏 引用
9th IEEE International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2021
作者: Kapoor, Anjali Agarwal, Rekha University School of Information Communication Technology GGSIPU Amity School of Engineering and Technology Noida Department of Computer Science and Engineering New Delhi India
In this paper, a brain tumor segmentation method has been proposed. Image segmentation is required for the detection of brain tumors. For this purpose, brain images are divided into two distinct areas. This is one of ... 详细信息
来源: 评论
Advancing Intrusion Detection Systems Innovative Approaches for Prevention and Response
Advancing Intrusion Detection Systems Innovative Approaches ...
收藏 引用
Communication, computer sciences and engineering (IC3SE), International Conference on
作者: M Siva Swetha Reddy BSS Murali Krishna V. Asha Ginni Nijhawan Ajay Rana Ahmed sabah Abed Al-Zahra Jabbar Department of Computer Science and Engineering Institute of Aeronautical Engineering Hyderabad Telangana India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Telangana India New Horizon College of Engineering Bangalore India Lovely Professional University Phagwara India Amity School of Engineering and Technology Amity University Greater Noida India Technology Department Medical Laboratory The Islamic University Najaf Iraq
A group intruder detection system built on K-Nearest Neighbors, Decision Trees, Neural Networks, Support Vector Machines, and Random Forests is shown in this study. A thorough study on ablation shows how the algorithm... 详细信息
来源: 评论
Implementation of Intrusion Detection System Using Various Machine Learning Approaches with Ensemble learning
Implementation of Intrusion Detection System Using Various M...
收藏 引用
Advancement in Computation & computer Technologies (InCACCT), International Conference on
作者: Pragati Vijaykumar Pandit Shashi Bhushan Pratibha Vitthal Waje Computer Science & Engineering Shri Jagdishprasad Jhabarmal Tibrewala University Jhunjhunu India Department of Computer Science Amity School of Engineering and Technology Amity University Mohali Punjab Information Technology Sir Visvesvaraya Institute of Technology Chincholi Nashik India
recent years have seen an increase in advanced threat attacks, yet feature filtering-based network intrusion detection systems have a number of shortcomings that make it challenging for security managers and analysts ...
来源: 评论
Honeypot Comparison of Attack Detection and Mitigation of SSH Attack
Honeypot Comparison of Attack Detection and Mitigation of SS...
收藏 引用
Delhi Section Conference (DELCON), IEEE
作者: Wasif Ali Ahthasham Sajid Tanvi Ajit Ghodke Rida Malik Neeru Malik Keshav Kaushik Department of Cyber Security Riphah Institute of System Engineering Riphah International University Islamabad Pakistan Department of Computer Science and Engineering Pimpri Chinchwad University Maharashtra India School of Engineering & Technology Pimpri Chinchwad University Pune Maharashtra India Amity School of Engineering and Technology Amity University Mohali India
This research study addresses the importance of honeypots at multiple levels, which includes but not limited to placement in network or group of networks working alongside in an organization. This paper talks about th... 详细信息
来源: 评论
A systematic review and analysis of blockchain technology for corporate remittance and settlement process  4
A systematic review and analysis of blockchain technology fo...
收藏 引用
4th International Conference on Computational Intelligence and Communication Technologies, CCICT 2021
作者: Mor, Parveen Tyagi, Rajesh Kumar Jain, Charu Verma, Deepak Kumar Amity School of Engineering and Technology Department of Computer Science and Engineering Haryana Gurgaon India Department of Computer Science and Engineering Haryana Gurgaon India ABES Engineering College Department of Computer Science and Engineering Uttarpradesh Noida India
Unlike traditional remittance approaches, blockchain infrastructure fundamentally alters international transfers. This is because blockchain provides an effective, open, and reliable method of facilitating internation... 详细信息
来源: 评论
HydroPro: An IoT-Based Smart Water Bottle
HydroPro: An IoT-Based Smart Water Bottle
收藏 引用
IEEE Region 10 Symposium
作者: Aadi Nirbhavane Riti Kushwaha Gaurav Singal Abhinav Tomar Vipin Pal Ankur Gupta Amity International School Delhi India School of Computer Science and Technology Bennett University Greater Noida India Computer Science and Engineering Department Netaji Subhas University of Technology Delhi India Department of Computer Science Rishihood University and Newton School of Technology Sonipat India
Water is a necessity for the correct functioning of the human body. In the modern era, most people have hectic schedules, making it difficult for them to remember to drink enough water and track their water consumptio... 详细信息
来源: 评论
Emotion Analysis for predicting the emotion labels using Machine Learning approaches  8
Emotion Analysis for predicting the emotion labels using Mac...
收藏 引用
8th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and computer engineering, UPCON 2021
作者: Sharma, Tanya Diwakar, Manoj Singh, Prabhishek Lamba, Sumita Kumar, Pramod Joshi, Kapil Graphic Era Deemed to Be University Department of Cse Dehradun India Amity University Uttar Pradesh Amity School of Engineering and Technology Noida India Ajay Kumar Garg Engineering College India Krishna Engineering College Department of Cse UP Ghaziabad India Uttaranchal University Uit Department of Computer Science and Engineering Dehradun India
Advanced Web technologies used in this era, created huge amount of data provided to the internet operators Social Networking sites such as Facebook, Google, Twitter are platforms where people share and exchange their ... 详细信息
来源: 评论