咨询与建议

限定检索结果

文献类型

  • 5,057 篇 会议
  • 3,317 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 8,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,198 篇 工学
    • 3,442 篇 计算机科学与技术...
    • 2,754 篇 软件工程
    • 1,205 篇 信息与通信工程
    • 804 篇 控制科学与工程
    • 753 篇 电气工程
    • 725 篇 电子科学与技术(可...
    • 516 篇 生物工程
    • 438 篇 动力工程及工程热...
    • 431 篇 生物医学工程(可授...
    • 399 篇 机械工程
    • 352 篇 化学工程与技术
    • 336 篇 光学工程
    • 288 篇 仪器科学与技术
    • 288 篇 材料科学与工程(可...
    • 214 篇 交通运输工程
    • 209 篇 网络空间安全
    • 190 篇 安全科学与工程
  • 2,915 篇 理学
    • 1,305 篇 数学
    • 1,066 篇 物理学
    • 600 篇 生物学
    • 404 篇 统计学(可授理学、...
    • 392 篇 化学
    • 284 篇 系统科学
  • 1,383 篇 管理学
    • 935 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 451 篇 工商管理
  • 529 篇 医学
    • 444 篇 临床医学
    • 378 篇 基础医学(可授医学...
    • 241 篇 公共卫生与预防医...
    • 192 篇 药学(可授医学、理...
  • 206 篇 法学
  • 188 篇 经济学
  • 109 篇 农学
  • 94 篇 教育学
  • 26 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学

主题

  • 351 篇 deep learning
  • 278 篇 machine learning
  • 224 篇 accuracy
  • 183 篇 computational mo...
  • 176 篇 internet of thin...
  • 173 篇 computer science
  • 141 篇 feature extracti...
  • 123 篇 predictive model...
  • 121 篇 security
  • 111 篇 optimization
  • 110 篇 wireless sensor ...
  • 101 篇 artificial intel...
  • 98 篇 support vector m...
  • 96 篇 training
  • 94 篇 real-time system...
  • 91 篇 data models
  • 84 篇 convolutional ne...
  • 80 篇 wireless communi...
  • 79 篇 throughput
  • 76 篇 cloud computing

机构

  • 112 篇 department of ph...
  • 112 篇 department for p...
  • 112 篇 the islamic univ...
  • 110 篇 infn e laborator...
  • 109 篇 department of mo...
  • 108 篇 lpnhe sorbonne u...
  • 105 篇 apc université p...
  • 104 篇 department of ph...
  • 104 篇 department of ph...
  • 104 篇 faculty of scien...
  • 104 篇 west university ...
  • 104 篇 kirchhoff-instit...
  • 100 篇 department of ph...
  • 99 篇 department physi...
  • 96 篇 national univers...
  • 95 篇 computer technol...
  • 95 篇 ochanomizu unive...
  • 95 篇 institute of phy...
  • 94 篇 fakultät für phy...
  • 93 篇 deutsches elektr...

作者

  • 60 篇 c. alexa
  • 60 篇 g. bella
  • 60 篇 d. calvet
  • 60 篇 c. amelung
  • 59 篇 f. pastore
  • 59 篇 g. spigo
  • 58 篇 j. m. izen
  • 58 篇 j. strandberg
  • 58 篇 f. siegert
  • 58 篇 r. ströhmer
  • 58 篇 m. rijssenbeek
  • 58 篇 s. jin
  • 58 篇 g. gaudio
  • 58 篇 s. mohapatra
  • 56 篇 bellos p.
  • 56 篇 bona m.
  • 56 篇 bachacou h.
  • 56 篇 s. guindon
  • 54 篇 ananiev v.
  • 54 篇 a. kaczmarska

语言

  • 7,785 篇 英文
  • 565 篇 其他
  • 32 篇 中文
  • 5 篇 法文
  • 4 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Al Computer Science and Engineering"
8391 条 记 录,以下是11-20 订阅
排序:
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Secure kNN For Distributed Cloud Environment Using Fully Homomorphic Encryption
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 721-736页
作者: Fukuchi, Yuuya Hashimoto, Sota Sakai, Kazuya Fukumoto, Satoshi Sun, Min-Te Ku, Wei-Shinn Tokyo Metropolitan University Department of Electrical Engineering and Computer Science Tokyo Japan Tokyo Metropolitan University Department of Computer Science Tokyo Japan National Central University Department of Computer Science and Information Engineering Taoyuan Taiwan Auburn University Department of Computer Science and Software Engineering AuburnAL United States
Privacy-preserving k-nearest neighbor (PPkNN) classification for multiple clouds enables categorizing queried data into a class in keeping with data privacy, where the database and key servers jointly perform cryptogr... 详细信息
来源: 评论
How Artificial Intelligence Helped the Humanity During the COVID-19 Pandemic: A Review
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第2期5卷 480-489页
作者: alnoman, ali American University of Ras Al Khaimah Department of Computer Science and Engineering Ras Al-Khaimah10021 United Arab Emirates
The unprecedented circumstances encountered during the COVID-19 pandemic in a variety of life aspects such as health, economy, and environment have urged the humanity to devise new solutions to control and mitigate th... 详细信息
来源: 评论
Adversarial attacks and defenses for digital communication signals identification
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 756-764页
作者: Qiao Tian Sicheng Zhang Shiwen Mao Yun Lin College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China College of Information and Communication Engineering Harbin Engineering UniversityHarbin150000China Department of Electrical and Computer Engineering Auburn UniversityAuburnAL36849USA
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi... 详细信息
来源: 评论
Classification of plant diseases in images using dense-inception architecture with attention modules
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Khan, Sultan Daud Basalamah, Saleh Naseer, Atif Department of Computer Science National University of Technology Islamabad Pakistan Department of Computer Engineering Umm Al-Qura University Makkah Saudi Arabia Department of Computer Science Umm Al-Qura University Makkah Saudi Arabia
Agriculture plays a vital role in providing food to a growing world population. However, plant diseases and pests result in 50% reductions in crop yields, which exacerbates poverty and threatens a sustainable food sys... 详细信息
来源: 评论
An optimized multi-scale convolutional autoencoder for efficient abnormal event detection using rgb, depth and optical flow data
收藏 引用
Multimedia Tools and Applications 2025年 1-35页
作者: alqahtani, Abdullah Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University KSA Al-Kharj Saudi Arabia
In this study, we propose a novel framework for detecting abnormal events in surveillance videos, a critical yet challenging task in security applications. This research introduces a robust and efficient solution for ... 详细信息
来源: 评论
Neural acceleration of incomplete factorization preconditioning
收藏 引用
Neural Computing and Applications 2025年 第2期37卷 1009-1026页
作者: Booth, Joshua Dennis Sun, Hongyang Garnett, Trevor Computer Science University of Alabama in Huntsville HuntsvilleAL35899 United States Electrical Engineering & Computer Science University of Kansas LawrenceKS66046 United States
The solution of a sparse system of linear equations is ubiquitous in scientific applications. Iterative methods, such as the preconditioned conjugate gradient (PCG) method and the generalized minimal residuals (GMRES)... 详细信息
来源: 评论
SMILES2DTA: a CNN-based approach for identifying drug candidates and predicting drug-target binding affinity
收藏 引用
Neural Computing and Applications 2024年 第4期37卷 2891-2910页
作者: Mukit, Hasanul Hossain, Sayeed Farabi, Mirza Milan Chowdhury, Mehrab Zaman Pritom, Ahmed Iqbal Rana, Humayan Kabir Department of Computer Science and Engineering Green University of Bangladesh Narayanganj-1461 Dhaka Bangladesh Department of Computer Science The University of Alabama at Birmingham BirminghamAL United States Department of Computer Science and Engineering Islamic University of Technology Gazipur Bangladesh
Computational approaches can speed up the drug discovery process by predicting drug-target affinity, otherwise it is time-consuming. In this study, we developed a convolutional neural network (CNN)-based model named S... 详细信息
来源: 评论
Optimized deep autoencoder and BiLSTM for intrusion detection in IoTs-Fog computing
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 4907-4943页
作者: alqahtani, Abdullah Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University KSA Al-Kharj16278 Saudi Arabia
Our world is rapidly evolving toward the Internet of Things (IoT), that connects all gadgets to digital services and simplifies our lives. As IoT devices expand, network vulnerabilities may rise, leading to more netwo... 详细信息
来源: 评论
Enhancing User Experience in AI-Powered Human-computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2909-2929页
作者: Ahmed alhussen Arshiya Sajid Ansari Mohammad Sajid Mohammadi Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim51911Saudi Arabia
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... 详细信息
来源: 评论