咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 198 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 727 篇 工学
    • 613 篇 计算机科学与技术...
    • 527 篇 软件工程
    • 230 篇 信息与通信工程
    • 141 篇 控制科学与工程
    • 103 篇 生物工程
    • 91 篇 电气工程
    • 88 篇 生物医学工程(可授...
    • 84 篇 网络空间安全
    • 78 篇 安全科学与工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 交通运输工程
    • 50 篇 机械工程
    • 50 篇 光学工程
    • 44 篇 动力工程及工程热...
    • 39 篇 化学工程与技术
    • 37 篇 仪器科学与技术
  • 359 篇 理学
    • 181 篇 数学
    • 115 篇 生物学
    • 85 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 44 篇 化学
  • 262 篇 管理学
    • 168 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 101 篇 医学
    • 83 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 54 篇 法学
    • 41 篇 社会学
  • 31 篇 经济学
  • 19 篇 农学
  • 16 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学

主题

  • 79 篇 accuracy
  • 65 篇 machine learning
  • 62 篇 deep learning
  • 48 篇 convolutional ne...
  • 47 篇 feature extracti...
  • 47 篇 training
  • 44 篇 computational mo...
  • 38 篇 real-time system...
  • 37 篇 support vector m...
  • 34 篇 predictive model...
  • 30 篇 data models
  • 29 篇 machine learning...
  • 28 篇 security
  • 28 篇 technological in...
  • 27 篇 artificial intel...
  • 25 篇 adversarial mach...
  • 23 篇 reliability
  • 23 篇 analytical model...
  • 22 篇 medical services
  • 21 篇 internet of thin...

机构

  • 47 篇 lovely professio...
  • 28 篇 chitkara univers...
  • 20 篇 amity school of ...
  • 20 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 amity school of ...
  • 18 篇 department of co...
  • 18 篇 mlr institute of...
  • 14 篇 amity school of ...
  • 13 篇 amity school of ...
  • 12 篇 department of co...
  • 12 篇 school of comput...
  • 11 篇 amity school of ...
  • 10 篇 school of comput...
  • 10 篇 amity university...
  • 10 篇 department of co...
  • 10 篇 school of engine...
  • 10 篇 department of co...
  • 9 篇 amity university...
  • 9 篇 lloyd institute ...

作者

  • 26 篇 obaidat mohammad...
  • 24 篇 keshav kaushik
  • 21 篇 arora deepak
  • 21 篇 kaushik keshav
  • 19 篇 hazela bramah
  • 19 篇 gupta sumita
  • 17 篇 bramah hazela
  • 14 篇 mohammad s. obai...
  • 14 篇 rana ajay
  • 14 篇 bhattacharya pro...
  • 14 篇 singh pawan
  • 14 篇 ajay rana
  • 13 篇 singh prabhishek
  • 12 篇 dutta pushan kum...
  • 11 篇 pronaya bhattach...
  • 11 篇 tanwar sudeep
  • 10 篇 sudeep tanwar
  • 10 篇 ather danish
  • 10 篇 kaur harleen
  • 10 篇 chaurasia brijes...

语言

  • 972 篇 英文
  • 276 篇 其他
  • 15 篇 中文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Student of Computer Science and Engineering Amity School of Engineering and Technology"
1255 条 记 录,以下是721-730 订阅
排序:
Dynamic Load Balancing for Enhanced Resource Utilization in IaaS Cloud Computing
Dynamic Load Balancing for Enhanced Resource Utilization in ...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Anshul Kumar Sandeep Mathur Adarsh Malviya Department of Computer Science in School of Science Noida International University Noida Uttar Pradesh India Amity School of Engineering and Technology Amity University Greater Noida Uttar Pradesh India Department of Computer Science Dronacharya Group of Institutions Greater Noida Uttar Pradesh India
Efficient load balancing is vital in cloud computing to optimize resource use, enhance performance, and maintain application availability. Traditional methods often underutilize the scalability of IaaS models. Hence, ... 详细信息
来源: 评论
An Intelligent Learning Approach to Case Analysis for Predicting Legal Outcomes Using Random Forest and K-Nearest Neighbors
An Intelligent Learning Approach to Case Analysis for Predic...
收藏 引用
Technological Advancements in Computational sciences (ICTACS), International Conference on
作者: Puneet Bafna Hardeo Kumar Thakur Jagendra Singh Jannam Sadana M. Muhsen Hassan M. Sree Vani Amity Law School Amity University Jaipur India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Information Technology CVR College of Engineering Hyderabad India The Islamic University Najaf Iraq Department of CSE BVRIT Hyderabad College of Engineering for Women Hyderabad India
Machine learning is an increasingly popular area of research that holds great potential for enhancing the effectiveness and precision of legal analysis and decision-making. More specifically, machine learning can be u... 详细信息
来源: 评论
Routing Protocols in Wireless Sensor Networks: A Comprehensive Review and Future Perspectives
Routing Protocols in Wireless Sensor Networks: A Comprehensi...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Puneet Kaur Kiranbir Kaur Deepak Kumar Verma Kuldeep Singh Keshav Kaushik Vineeta Singh Department of Computer Engineering & Technology Guru Nanak Dev University Amritsar Punjab India Department of Computer Science and Engineering School of Engineering and Technology (Formerly known as UIET Kanpur) Chhatrapati Shahu Ji Maharaj University Kalyanpur Uttar Pradesh India Department of Electronics Technology Guru Nanak Dev University Amritsar Punjab India Amity School of Engineering and Technology Amity University Mohali Punjab India
Wireless Sensor Networks (WSNs) have significantly transformed diverse domains such as industrial automation, healthcare, disaster management, and environmental monitoring. The complex interaction of routing protocols... 详细信息
来源: 评论
Addressing the Unique Security and Privacy Challenges in Cellular Network Environments
Addressing the Unique Security and Privacy Challenges in Cel...
收藏 引用
Communication, computer sciences and engineering (IC3SE), International Conference on
作者: N Rajashekar K Aravinda N Sirisha Ajay Rana Taqi Mohammed Khattab Al-Rubaye Atul Singla Department of Computer Science and Engineering Institute of Aeronautical Engineering Hyderabad Telangana India Electronics and Communication Engineering New Horizon College of Engineering Bangalore India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Telangana India Amity School of Engineering and Technology Amity University Greater Noida India Department of Medical Laboratory Technology College of Medical Technologies The Islamic University Najaf Iraq Lovely Professional University Phagwara India
This study offers a full solution to cellular network privacy and security challenges. The recommended remedy tackles numerous major issues with enhanced login protocols, sophisticated encryption, machine learning alg... 详细信息
来源: 评论
Behavioral Biometrics Authentication Systems: Leveraging Machine Learning for Enhanced Cybersecurity
Behavioral Biometrics Authentication Systems: Leveraging Mac...
收藏 引用
Communication, computer sciences and engineering (IC3SE), International Conference on
作者: Jhansi Bharathi Madavarapu Mudit Mittal Shailaja Salagrama Myasar Mundher Adnan Aryan Rana Kanchan Yadav Department of Information Technology University of Cumberlands Williamsburg KY USA Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Amity School of Engineering & Technology Amity University India Department of Electrical Engineering GLA University Mathura
This study focuses on behavioral biometrics and machine learning procedure that is employed vigorous in the verification frameworks to improve cybersecurity. Elaborating interesting designs in client behaviour, such a... 详细信息
来源: 评论
Optimized Classification of Firewall Log Data using Heterogeneous Ensemble Techniques
Optimized Classification of Firewall Log Data using Heteroge...
收藏 引用
2021 International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2021
作者: Sharma, Deepanshu Wason, Vansh Johri, Prashant GGS Indraprastlia University Amity School of Engineering Technology Delhi India Galgotias University School of Computer Science Engineering Uttar Pradesh India
In the ever-increasing time of network data exchange, the need for a smarter and automatic filter for web data packets is a priority. Hence, in this research study, an optimized solution for classification of firewall... 详细信息
来源: 评论
Advancing Residential Energy Management: Integrating Renewable Resources and Vehicle-to-Grid Systems for Optimized Electrical Grid Performance
Advancing Residential Energy Management: Integrating Renewab...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Rakesh Chandrashekar D Shobha Rani Ginni Nijhawan A Balaram Prateek Chaturvedi B Sankara Babu Department of Mechanical Engineering New Horizon College of Engineering Bangalore Karnataka India Department of Electrical and Electronics Engineering Institute of Aeronautical Engineering Hyderabad Telangana India Lovely Professional University Phagwara Punjab India Department of Computer Science & Engineering MLR Institute of Technology Hyderabad Telangana India Amity School of Engineering and Technology Amity University Greater Noida Uttar Pradesh India Department of Computer Science and Engineering GRIET Bachupally Hyderabad India
The term “smart grid” describes the future generation of electrical power networks, which are very complicated systems. It must take into account all aspects of the electrical system, increasing its intelligence and... 详细信息
来源: 评论
Evaluating the Ecological Footprint: Analyzing the Environmental Impact of Battery Energy Storage Systems within Electric Grids
Evaluating the Ecological Footprint: Analyzing the Environme...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: S Vikram Singh Shaik Saddam Hussain Atul Singla A Balaram Y Krishna Bargavi R Gowtham Raj Amity School of Engineering & Technology Amity University Greater Noida India Department of Computer Science & Engg VNR Vignana Jyothi Institute of Engineering and Technology Hyderabad Telangana India Lovely Professional University Phagwara India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Telangana India Department of CSE GRIET Bachupally Hyderabad Telangana India Department of Mechanical Engineering New Horizon College of Engineering Bengaluru
This research paper shall cover a detailed assessment of the overall ecological impact of BESS within electric grids, which becomes a critical component if grid reliability is to be improved, renewable energy integrat... 详细信息
来源: 评论
APE-GAN++: An Improved APE-GAN to Eliminate Adversarial Perturbations
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2021年 第3期48卷 1-18页
作者: Yang, Rui Chen, Xiu-Qing Cao, Tian-Jie Master's student of the School of Computer Science and Technology China University of Mining and Technology XuzhouJiangsu China Lecturer of the School of Medicine Information and Engineering Xuzhou Medical University XuzhouJiangsu China Professor of the School of Computer Science and Technology China University of Mining and Technology XuzhouJiangsu China
Deep neural networks (DNNs) have been deployed successfully in various scenarios, but numerous studies have shown that deep neural networks are vulnerable to the attack of adversarial examples. In order to protect dee... 详细信息
来源: 评论
Advanced Deep Learning Approaches for Real-Time Anomaly Detection in IoT Environments
Advanced Deep Learning Approaches for Real-Time Anomaly Dete...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Himanshu Rai Goyal Saif O. Husain Krishna Kant Dixit Nandini Shirish Boob B. Ravali Reddy Jaysheel Kumar Smita Sharma Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Department of computers Techniques engineering College of technical engineering The Islamic university Najaf Iraq Department of Electrical Engineering GLA University Mathura India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai Tamilnadu Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Telangana New Horizon College of Engineering Bangalore Amity School of Engineering & Technology Amity University Greater Noida Uttar Pradesh India
The proliferation of Internet of Things (IoT) systems has led to the generation of vast amounts of data, increasing the need for effective anomaly detection mechanisms to ensure system reliability and security. Tradit... 详细信息
来源: 评论