咨询与建议

限定检索结果

文献类型

  • 701 篇 期刊文献
  • 655 篇 会议
  • 28 册 图书

馆藏范围

  • 1,384 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 852 篇 工学
    • 646 篇 计算机科学与技术...
    • 483 篇 软件工程
    • 162 篇 信息与通信工程
    • 145 篇 控制科学与工程
    • 135 篇 生物工程
    • 119 篇 电气工程
    • 91 篇 生物医学工程(可授...
    • 80 篇 光学工程
    • 71 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 41 篇 仪器科学与技术
    • 39 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 35 篇 交通运输工程
    • 35 篇 网络空间安全
    • 29 篇 安全科学与工程
  • 524 篇 理学
    • 258 篇 数学
    • 156 篇 生物学
    • 140 篇 物理学
    • 104 篇 统计学(可授理学、...
    • 50 篇 系统科学
    • 46 篇 化学
  • 258 篇 管理学
    • 163 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 96 篇 医学
    • 77 篇 临床医学
    • 65 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
    • 31 篇 药学(可授医学、理...
  • 41 篇 法学
    • 37 篇 社会学
  • 25 篇 农学
  • 23 篇 经济学
  • 20 篇 教育学
  • 6 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 66 篇 deep learning
  • 63 篇 artificial intel...
  • 42 篇 machine learning
  • 41 篇 accuracy
  • 33 篇 mcda
  • 33 篇 convolutional ne...
  • 28 篇 decision making
  • 27 篇 feature extracti...
  • 22 篇 computational in...
  • 21 篇 real-time system...
  • 21 篇 comet
  • 19 篇 internet of thin...
  • 19 篇 training
  • 17 篇 support vector m...
  • 17 篇 predictive model...
  • 17 篇 topsis
  • 16 篇 data models
  • 15 篇 computer science
  • 15 篇 data mining
  • 14 篇 computational mo...

机构

  • 26 篇 school of applie...
  • 26 篇 school of comput...
  • 25 篇 school of comput...
  • 24 篇 hourani center f...
  • 22 篇 department of el...
  • 22 篇 meu research uni...
  • 20 篇 research team on...
  • 16 篇 department of ap...
  • 15 篇 law college dehr...
  • 15 篇 uttaranchal inst...
  • 15 篇 applied science ...
  • 14 篇 department of co...
  • 14 篇 hourani center f...
  • 13 篇 vector institute...
  • 13 篇 artificial intel...
  • 13 篇 school of comput...
  • 12 篇 meu research uni...
  • 12 篇 department of co...
  • 12 篇 school of life a...
  • 12 篇 department of ap...

作者

  • 25 篇 kotecha ketan
  • 24 篇 seifedine kadry
  • 22 篇 aspuru-guzik alá...
  • 22 篇 laith abualigah
  • 21 篇 ketan kotecha
  • 20 篇 wojciech sałabun
  • 19 篇 choudhury tanupr...
  • 19 篇 abualigah laith
  • 17 篇 salabun wojciech
  • 15 篇 belinkov yonatan
  • 15 篇 tanupriya choudh...
  • 14 篇 shweta pandey
  • 14 篇 mansi sahu
  • 13 篇 han jinyoung
  • 13 篇 kizielewicz bart...
  • 12 篇 pandey shweta
  • 11 篇 wieckowski jakub
  • 11 篇 jakub więckowski
  • 10 篇 alrajeh nabil
  • 10 篇 javaid nadeem

语言

  • 1,303 篇 英文
  • 76 篇 其他
  • 8 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Artificial Intelligence and Applied Computer Science"
1384 条 记 录,以下是31-40 订阅
排序:
Improving Messenger Phishing Detection Using Heterogeneous Phishing Data
Improving Messenger Phishing Detection Using Heterogeneous P...
收藏 引用
International Conference on Electronics, Information and Communications (ICEIC)
作者: Seokjin Oh Keonwoong Noh Sunyub Kim Dohyung An Woohwan Jung Dept. of Applied Artificial Intelligence Hanyang University Seoul Republic of Korea Dept. of Computer Science Hanyang University Ansan Republic of Korea
Recently, as messenger phishing has been occurring more frequently, the need for its detection has increased; however, datasets for messenger phishing detection are publicly unavailable. In this paper, we address the ... 详细信息
来源: 评论
Can We Trust the Actionable Guidance from Explainable AI Techniques in Defect Prediction?
Can We Trust the Actionable Guidance from Explainable AI Tec...
收藏 引用
IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Gichan Lee Hansae Ju Scott Uk-Jin Lee Dept. of Computer Science & Engineering Hanyang University Ansan Republic of Korea Dept of Applied Artificial Intelligence Hanyang University Ansan Republic of Korea
Despite advances in high-performance Software Defect Prediction (SDP) models, practitioners remain hesitant to adopt them due to opaque decision-making and a lack of actionable insights. Recent research has applied va... 详细信息
来源: 评论
A Multi-Scale Deep Learning Framework Combining MobileViT-ECA and LSTM for Accurate ECG Analysis
收藏 引用
IEEE Access 2025年 13卷 85473-85492页
作者: Ba Mahel, Abduljabbar S. Al-Gaashani, Mehdhar S. A. M. Alkanhel, Reem Ibrahim Hassan, Dina S. M. Muthanna, Mohammed Saleh Ali Muthanna, Ammar Aziz, Ahmed University of Electronic Science and Technology of China School of Life Science and Technology Chengdu610054 China University of Electronic Science and Technology of China School of Resources and Environment Chengdu610056 China Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia Tashkent State University of Economics Department of International Business Management Tashkent Uzbekistan RUDN University Department of Applied Probability and Informatics Peoples’Friendship University of Russia 6 Miklukho-Maklaya St Moscow117198 Russia Faculty of Computer and Artificial Intelligence Benha University Department of Computer Science Egypt Central Asian University Engineering school Tashkent Uzbekistan
Electrocardiogram (ECG) analysis is crucial for diagnosing cardiovascular diseases (CVD), especially atrial fibrillation (AF), a prevalent cardiac rhythm abnormality. However, the variability and complexity of ECG sig... 详细信息
来源: 评论
Designing a hybrid neural network framework for real-time anomaly detection in cybersecurity applications
收藏 引用
International Journal of Information Technology (Singapore) 2025年 1-7页
作者: Jain, Aaditya Ead, Waleed M. Alshahrani, Mohammed Altamimi, Jawaher Suliman Aklan, Fawaz Rihan, Shaza Dawood College of Computing Sciences and Information Technology Teerthanker Mahaveer University Uttar Pradesh Moradabad India Faculty of Computing and Information Al-Baha University Al-Baha Saudi Arabia Faculty of Computers and Artificial Intelligence Beni-Suef University Beni-Suef Egypt Computers Department Applied College Najran University Najran Saudi Arabia Applied College Najran University Najran Saudi Arabia Department of Computer Science Faculty of Applied Science Taiz University Taiz P.O. Box 6803 Taiz Yemen
As cybersecurity is becoming a prominent domain, it is an imperative to provide real-time anomaly detection for early threat detection and to keep networks safe. In this paper, an optimized hybrid neural network-frame... 详细信息
来源: 评论
Sustainable energy management in the AI era: a comprehensive analysis of ML and DL approaches
收藏 引用
Computing 2025年 第6期107卷 1-64页
作者: Javed, Haseeb Eid, Fatma El-Sappagh, Shaker Abuhmed, Tamer Department of Computer Science and Engineering College of Computing and Informatics Sungkyunkwan University Suwon Korea Republic of Technology Management Stony Brook University NY11794 United States Applied Artificial Intelligence College of Computing and Informatics Sungkyunkwan University Suwon Korea Republic of Faculty of Computer Science and Engineering Galala University Suez435611 Egypt Information Systems Department Faculty of Computers and Artificial Intelligence Benha University Banha13518 Egypt
This study comprehensively analyzes the application of innovative deep learning (DL) and machine learning (ML) techniques in smart energy management systems (EMSs), with an emphasis on load forecasting, demand respons... 详细信息
来源: 评论
Enhancing malware detection performance: leveraging K-Nearest Neighbors with Firefly Optimization Algorithm
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10071-10094页
作者: Al Saaidah, Adeeb Abualhaj, Mosleh M. Shambour, Qusai Y. Abu-Shareha, Ahmad Adel Abualigah, Laith Al-Khatib, Sumaya N. Alraba’nah, Yousef H Department of Networks and Cybersecurity Al-Ahliyya Amman University Amman Jordan Department of Software Engineering Al-Ahliyya Amman University Amman Jordan Department of Data Science and Artificial Intelligence Al-Ahliyya Amman University Amman Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan Research Center University of Tabuk Tabuk71491 Saudi Arabia MEU Research Unit Middle East University Amman11831 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon College of Engineering Yuan Ze University Taoyuan32003 Taiwan Applied Science Research Center Applied Science Private University Amman11931 Jordan School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia
Malware detection plays a crucial role in ensuring robust cybersecurity amidst the ever-evolving cyber threats. This research paper delves into the realm of machine learning (ML) algorithms for malware detection, with... 详细信息
来源: 评论
A Detailed Investigation into the Brain Cancer Detection Capabilities of CNN
A Detailed Investigation into the Brain Cancer Detection Cap...
收藏 引用
International Health Informatics Conference, IHIC 2023
作者: Singh, Kamred Udham Kumar, Ankit Kumar, Gaurav Singh, Teekam Choudhury, Tanupriya Kotecha, Ketan School of Computing Graphic Era Hill University Dehradun India Department of Computer Engineering and Applications GLA University UP Mathura India Department of Computer Science and Engineering Graphic Era Deemed to Be University Dehradun India School of Computer Science University of Petroleum and Energy Studies Uttarakhand Dehradun248007 India Department of Computer Science and Engineering Symbiosis Institute of Technology Symbiosis International University Lavale Campus Pune India Symbiosis Centre for Applied Artificial Intelligence Symbiosis Institute of Technology Symbiosis International University Pune411045 India
Brain tumour detection is an accepted testing task in the beginning phases of life. Yet, presently it has progressed with different AI calculations. Along these lines, to identify the brain tumour of a patient we cons... 详细信息
来源: 评论
Resource Allocation in Cloud Computing Using Quasi-Opposition Learning Based Aquila Optimizer
Resource Allocation in Cloud Computing Using Quasi-Oppositio...
收藏 引用
International Conference on 6G Communications Networking and Signal Processing, SGCNSP 2023
作者: Kumari, K. Aruna Muvva, Vijaya Bhaskar Reddy Kumar, K. Sudheer Rai, B. Karunakara Shakir, Aboothar Mahmood Department of CSE SRKR Engineering College Bhimavaram Chinaamiram India Department of Information Technology College of Computing and Information Sciences University of Technology and Applied Sciences -Shinas Shinas Oman School of Computer Science and Artificial Intelligence SR University Warangal India Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India The Islamic University Najaf Iraq
The resource allocation is focus on enhancing the service provider proceedings and obtaining customer satisfaction by Service Level Agreements (SLA). Cloud technology has significantly transformed the organizations to... 详细信息
来源: 评论
IP SafeGuard - An AI-Driven Malicious IP Detection Framework
收藏 引用
IEEE Access 2025年 13卷 90249-90261页
作者: Siam, Abdullah Al Alazab, Moutaz Awajan, Albara Hasan, Md Rakibul Obeidat, Areej Faruqui, Nuruzzaman Daffodil International University Daffodil Smart City Birulia Department of Software Engineering Dhaka1216 Bangladesh Oryx Universal College with Liverpool John Moores University School of Computing and Data Sciences Cybersecurity Department Doha34110 Qatar Al-Balqa Applied University Faculty of Artificial Intelligence Department of Intelligent Systems Al-Salt19385 Jordan Department of Computer Science and Engineering Dhaka Bangladesh Amman Jordan
The rising frequency and sophistication of cyberattacks have made real-time malicious IP detection a critical challenge for modern Security Operations Center (SOC). Traditional solutions, such as static blacklists and... 详细信息
来源: 评论
Design of a Dual Attention Mechanism for Small Object Detection
Design of a Dual Attention Mechanism for Small Object Detect...
收藏 引用
International Symposium on Computational and Business intelligence (ISCBI)
作者: Cheng Qian Simon Fong Hongxu Yin Chao Gao Huafeng Qin João Alexandre Lobo Marques School of Artificial Intelligence Chongqing Technology and Business University ChongQing China Department of Computer and Information Science University of Macau Laboratory of Applied Neurosciences - University of Saint Joseph Macau SAR China
Detecting small objects remains a challenging task in object detection, with even notable models like YOLO struggling to achieve high accuracy in complex backgrounds. A dual attention (DA) mechanism specifically desig... 详细信息
来源: 评论