咨询与建议

限定检索结果

文献类型

  • 38,268 篇 会议
  • 14,919 篇 期刊文献
  • 1,108 册 图书
  • 485 篇 学位论文
  • 67 篇 专利

馆藏范围

  • 54,847 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 32,014 篇 工学
    • 23,659 篇 计算机科学与技术...
    • 17,191 篇 软件工程
    • 6,187 篇 信息与通信工程
    • 4,445 篇 控制科学与工程
    • 3,000 篇 机械工程
    • 2,775 篇 电气工程
    • 2,675 篇 电子科学与技术(可...
    • 2,255 篇 生物工程
    • 1,940 篇 光学工程
    • 1,826 篇 生物医学工程(可授...
    • 1,471 篇 仪器科学与技术
    • 1,311 篇 动力工程及工程热...
    • 1,120 篇 化学工程与技术
    • 991 篇 建筑学
    • 976 篇 网络空间安全
    • 965 篇 土木工程
  • 13,778 篇 理学
    • 7,189 篇 数学
    • 4,614 篇 物理学
    • 2,811 篇 生物学
    • 1,993 篇 统计学(可授理学、...
    • 1,352 篇 系统科学
    • 1,157 篇 化学
  • 9,336 篇 管理学
    • 5,950 篇 管理科学与工程(可...
    • 3,835 篇 图书情报与档案管...
    • 2,767 篇 工商管理
  • 2,002 篇 教育学
    • 1,962 篇 教育学
  • 1,939 篇 医学
    • 1,597 篇 临床医学
    • 1,316 篇 基础医学(可授医学...
  • 1,413 篇 法学
    • 1,117 篇 社会学
  • 1,064 篇 经济学
    • 1,046 篇 应用经济学
  • 979 篇 农学
  • 287 篇 文学
  • 174 篇 军事学
  • 163 篇 艺术学
  • 27 篇 哲学
  • 14 篇 历史学

主题

  • 7,129 篇 computers
  • 1,598 篇 computational mo...
  • 1,126 篇 educational inst...
  • 1,064 篇 feature extracti...
  • 964 篇 deep learning
  • 897 篇 internet
  • 857 篇 artificial intel...
  • 823 篇 software
  • 795 篇 machine learning
  • 762 篇 information tech...
  • 724 篇 accuracy
  • 696 篇 computer archite...
  • 690 篇 training
  • 688 篇 servers
  • 673 篇 data mining
  • 653 篇 databases
  • 652 篇 protocols
  • 629 篇 students
  • 624 篇 handheld compute...
  • 615 篇 security

机构

  • 289 篇 department of co...
  • 99 篇 college of techn...
  • 98 篇 massachusetts in...
  • 86 篇 information syst...
  • 82 篇 the islamic univ...
  • 72 篇 college of compu...
  • 59 篇 faculty of compu...
  • 58 篇 institute of inf...
  • 52 篇 department of in...
  • 51 篇 department of co...
  • 50 篇 scientific resea...
  • 45 篇 massachusetts in...
  • 44 篇 faculty of compu...
  • 38 篇 college of compu...
  • 38 篇 faculty of compu...
  • 38 篇 school of cyber ...
  • 37 篇 school of comput...
  • 37 篇 department of co...
  • 33 篇 hefei national l...
  • 32 篇 faculty of autom...

作者

  • 133 篇 hassanien aboul ...
  • 101 篇 aboul ella hassa...
  • 65 篇 abdelwahed motwa...
  • 54 篇 elhoseny mohamed
  • 48 篇 allen janet k.
  • 41 篇 li li
  • 38 篇 m. takizawa
  • 36 篇 chan tak-wai
  • 34 篇 abu sarwar zaman...
  • 34 篇 nashwa el-bendar...
  • 31 篇 hirashima tsukas...
  • 30 篇 el-sayed m.el-ke...
  • 30 篇 mohammed rizwanu...
  • 29 篇 radwa marzouk
  • 27 篇 cheng xinzhou
  • 27 篇 imran khan
  • 26 篇 lei wang
  • 26 篇 zhang lei
  • 25 篇 jing zhang
  • 24 篇 liu yang

语言

  • 51,716 篇 英文
  • 2,609 篇 其他
  • 647 篇 中文
  • 35 篇 日文
  • 8 篇 斯洛文尼亚文
  • 6 篇 法文
  • 5 篇 朝鲜文
  • 5 篇 俄文
  • 4 篇 德文
  • 3 篇 罗马尼亚文
  • 2 篇 西班牙文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 乌克兰文
检索条件"机构=Collage of Computers and Information Technology"
54847 条 记 录,以下是1-10 订阅
排序:
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3211-3237页
作者: Wajdi Alhakami Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in *** has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organiza... 详细信息
来源: 评论
Proposed cancelable biometrics system based on hybrid optical crypto-steganography audio framework for cyber security applications
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 17979-18004页
作者: Helmy, Mai Department of Information Technology Faculty of Computers and Information Damanhour University Damanhour Egypt
Biometric authentication systems have gained significant popularity in recent years due to their high level of security and convenience. Cancelable biometrics is a promising area of research that addresses the privacy... 详细信息
来源: 评论
A Review Of Text Mining Techniques: Trends, and Applications In Various Domains
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for Computer Science and Mathematics 2024年 第1期5卷 125-141页
作者: Aleqabie, Hiba J. Sfoq, Mais Saad Albeer, Rand Abdulwahid Abd, Enaam Hadi Computer Science Department Collage of Computer Science and Information Technology University of Kerbala Karbala Iraq Information Technology Department Collage of Computer Science and Information Technology University of Kerbala. Karbala Iraq
Text mining, a subfield of natural language processing (NLP), has received considerable attention in recent years due to its ability to extract valuable insights from large volumes of unstructured textual data. This r... 详细信息
来源: 评论
Audio Transmission Based on Hybrid Crypto-steganography Framework for Efficient Cyber Security in Wireless Communication System
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 18893-18917页
作者: Helmy, Mai Department of Information Technology Faculty of Computers and Information Damanhour University Damanhour32952 Egypt
Wireless systems enable people in last decades to communicate and access applications and information without wires, which provided better image, audio and video transmitting with progressive needing for information s... 详细信息
来源: 评论
A new four-tier technique for efficient multiple images encryption
收藏 引用
Multimedia Tools and Applications 2024年 1-19页
作者: Hosny, Khalid M. Kamal, Sara T. Department of Information Technology Faculty of Computers and Information Zagazig University Zagazig Egypt Department of Computer Sciences Faculty of Computers and Information Assiut University Assiut Egypt
People transmit millions of digital images daily over various networks, where securing these images is a big challenge. Image encryption is a successful approach widely used in securing digital images while transmitti... 详细信息
来源: 评论
Dynamic Spatial Focus in Alzheimer’s Disease Diagnosis via Multiple CNN Architectures and Dynamic GradNet
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2109-2142页
作者: Jasem Almotiri Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
The evolving field of Alzheimer’s disease(AD)diagnosis has greatly benefited from deep learning models for analyzing brain magnetic resonance(MR)*** study introduces Dynamic GradNet,a novel deep learning model design... 详细信息
来源: 评论
Explainable ensemble deep learning-based model for brain tumor detection and classification
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1289-1306页
作者: Hosny, Khalid M. Mohammed, Mahmoud A. Salama, Rania A. Elshewey, Ahmed M. Department of Information Technology Faculty of Computers and Information Zagazig University P.O.BOX 44519 Zagazig Egypt Department of Computer Science Faculty of Computers and Information Suez University P.O.BOX 43221 Suez Egypt Department of Information Technology Faculty of Computers and Information Suez University P.O.BOX 43221 Suez Egypt
Brain tumors are very dangerous as they cause death. A lot of people die every year because of brain tumors. Therefore, accurate classification and detection in the early stages can help in recovery. Various deep lear... 详细信息
来源: 评论
An Effective Fog-aware NIDS for DDoS Attack Detection
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of Computer Science 2025年 第6期52卷 1806-1814页
作者: Selim, Ibrahim Moshen Sadek, Rowayda A. Information Technology Department Faculty of Computers and Artificial Intelligence Helwan University Cairo Egypt
The Internet of Things (IoT) has introduced issues to traditional cloud infrastructure, leading to the emergence of an intermediary architectural design called fog computing. Fog computing, a subtype of cloud computin... 详细信息
来源: 评论
Self-Tuning Parameters for Decision Tree Algorithm Based on Big Data Analytics
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 943-958页
作者: Manar Mohamed Hafez Essam Eldin F.Elfakharany Amr A.Abohany Mostafa Thabet College of Computing and Information Technology Arab Academy for ScienceTechnology&Maritime TransportCairoEgypt Faculty of Computers and Information Kafrelsheikh UniversityKafrelsheikhEgypt Faculty of Computers and Information Fayoum UniversityFayoumEgypt
Big data is usually unstructured, and many applications require theanalysis in real-time. Decision tree (DT) algorithm is widely used to analyzebig data. Selecting the optimal depth of DT is time-consuming process as ... 详细信息
来源: 评论
A Proposed Feature Selection Particle Swarm Optimization Adaptation for Intelligent Logistics--A Supply Chain Backlog Elimination Framework
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4081-4105页
作者: Yasser Hachaichi Ayman E.Khedr Amira M.Idrees College of Computing and Information Technology at Khulais Department of Information SystemsUniversity of JeddahJeddah21959Saudi Arabia Faculty of Computers and Information Technology Future University in EgyptCairo11835Egypt
The diversity of data sources resulted in seeking effective manipulation and *** challenge that arises from the increasing dimensionality has a negative effect on the computation performance,efficiency,and stability o... 详细信息
来源: 评论