咨询与建议

限定检索结果

文献类型

  • 3,336 篇 会议
  • 2,031 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 5,386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,342 篇 工学
    • 2,323 篇 计算机科学与技术...
    • 1,856 篇 软件工程
    • 725 篇 信息与通信工程
    • 545 篇 控制科学与工程
    • 350 篇 电子科学与技术(可...
    • 333 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 机械工程
    • 208 篇 仪器科学与技术
    • 208 篇 生物医学工程(可授...
    • 195 篇 光学工程
    • 163 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 101 篇 材料科学与工程(可...
    • 94 篇 网络空间安全
  • 1,776 篇 理学
    • 914 篇 数学
    • 499 篇 物理学
    • 357 篇 生物学
    • 296 篇 统计学(可授理学、...
    • 214 篇 系统科学
    • 170 篇 化学
  • 943 篇 管理学
    • 574 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 225 篇 医学
    • 188 篇 临床医学
    • 149 篇 基础医学(可授医学...
  • 147 篇 法学
    • 120 篇 社会学
  • 102 篇 经济学
    • 101 篇 应用经济学
  • 65 篇 农学
  • 63 篇 教育学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 135 篇 feature extracti...
  • 133 篇 deep learning
  • 104 篇 accuracy
  • 90 篇 training
  • 88 篇 computer science
  • 87 篇 computational mo...
  • 86 篇 semantics
  • 78 篇 optimization
  • 78 篇 machine learning
  • 74 篇 data mining
  • 62 篇 predictive model...
  • 56 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 testing
  • 47 篇 visualization

机构

  • 184 篇 hubei province k...
  • 135 篇 school of comput...
  • 108 篇 college of compu...
  • 99 篇 department of co...
  • 60 篇 hubei province k...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 national key lab...
  • 45 篇 tsinghua nationa...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 37 篇 school of inform...
  • 37 篇 department of co...
  • 31 篇 college of infor...
  • 30 篇 university of ch...
  • 30 篇 shandong provinc...
  • 25 篇 college of compu...
  • 25 篇 key laboratory f...
  • 21 篇 guangdong provin...

作者

  • 25 篇 shen linlin
  • 25 篇 ren jiadong
  • 22 篇 liu jun
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 dan feng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 17 篇 manar ahmed hamz...
  • 17 篇 zhang kai
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 15 篇 liu zhe

语言

  • 5,006 篇 英文
  • 255 篇 其他
  • 124 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Information Technology"
5386 条 记 录,以下是311-320 订阅
排序:
Malicious URL Classification Using Artificial Fish Swarm Optimization and Deep Learning
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 607-621页
作者: Anwer Mustafa Hilal Aisha Hassan Abdalla Hashim Heba G.Mohamed Mohamed K.Nour Mashael M.Asiri Ali M.Al-Sharafi Mahmoud Othman Abdelwahed Motwakel Department of Electrical and Computer Engineering International Islamic University Malaysia 53100 Kuala LumpurMalaysia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Electrical Engineering College of EngineeringPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Computer Science College of Computers and Information TechnologyUniversity of BishaSaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt
Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital *** Uniform Resource Locators(URLs)can be embedded in email or Twitter and used to lure v... 详细信息
来源: 评论
A Multi-Agent Garage Service Search and Recommendation with Hybrid MLs and LLMs
A Multi-Agent Garage Service Search and Recommendation with ...
收藏 引用
2025 International Conference on computer, Electrical and Communication Engineering, ICCECE 2025
作者: Shuvo, Mahfuzur Rahman Rahman, Ashifur Akuthota, Vishwanath Paul, Tanay Islam, Mahfujul Ashraf, Md Sadi Roy, Prosenjit Reza, Md Tanzim International American University Department of Management Information System United States Chittagong University of Engineering and Technology Department of Computer Science and Engineering Bangladesh TechOptima Hyderabad India Brac University Department of Computer Science and Engineering Bangladesh Prairie View A & M University Department of Computer Science TX United States
The automobile service industry's explosive growth highlights the need for creative approaches to boost operational effectiveness and user experience. This study introduces a Hybrid Garage Assistance system, integ... 详细信息
来源: 评论
Automated Detection of Harmful Insects in Agriculture: A Smart Framework Leveraging IoT, Machine Learning, and Blockchain
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4787-4798页
作者: Rahman, Wahidur Hossain, Muhammad Minoar Hasan, Md. Mahedi Iqbal, Md. Sadiq Rahman, Mohammad Motiur Fida Hasan, Khondokar Moni, Mohammad Ali Mawlana Bhashani Science and Technology University Department of Computer Science and Engineering Tangail1902 Bangladesh Uttara University Department of Computer Science and Engineering Dhaka1230 Bangladesh Prime University Department of Management and Information System Mirpur Dhaka1216 Bangladesh Bangladesh University Department of Computer Science and Engineering Dhaka1207 Bangladesh School of Professional Studies CanberraNSW2052 Australia Artificial Intelligence and Cyber FuturesInstitute Charles Sturt University AI & Digital Health Technology BathurstNSW2795 Australia
Paddy cultivation is a significant global economic sector, with rice production playing a crucial role in influencing worldwide economies. However, insects in paddy farms predominantly impact the growth rate and ecolo... 详细信息
来源: 评论
Covert Channel Detection and Generation Techniques: A Survey  3
Covert Channel Detection and Generation Techniques: A Survey
收藏 引用
3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023
作者: Al-Khulaidi, Nesmah A. Zahary, Ammar T. Hazaa, Muneer A.S Nasser, Adel A. Yemen Academy for Graduate Studies Department of Computer Networks Sana'a Yemen University of Science and Technology Faculty of Computing and It Department of Computer Science Sana'a Yemen Thamar University Faculty of Computer and Information System Department of Computer Science Thamar Yemen Sa'adah University Faculty of Sciences Department of Information Systems and Computer Science Sa'adah Yemen
The use of covert communications has become more widespread recently as a solution to the information security issue. information security can be partially solved by the discovery and creation of covert routes. Covert... 详细信息
来源: 评论
Port-controllable routing of orbital angular momentum modes using a rotatable diffractive neural network
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2025年 第6期68卷 154-163页
作者: Junmin Liu Jiafu Chen Qingji Zeng Zemin Liang Xinping Wu Xin Zhao Jiangnan Xiao Huapeng Ye Ze Dong Dianyuan Fan Shuqing Chen Institute of Microscale Optoelectronics Shenzhen UniversityShenzhen 518060China College of New Materials and New Energies Shenzhen Technology UniversityShenzhen 518118China Terahertz Technology Innovation Research Institute Shanghai Key Laboratory of Modern Optical SystemTerahertz Science Cooperative Innovation CenterSchool of Optical-Electrical Computer EngineeringUniversity of Shanghai for Science and TechnologyShanghai 200093China Guangdong Provincial Key Laboratory of Optical Information Materials and Technology&Institute of Electronic Paper Displays South China Academy of Advanced OptoelectronicsSouth China Normal UniversityGuangzhou 510006China School of Information and Electronics Beijing Institute of TechnologyBeijing 100081China
Orbital angular momentum(OAM)modes provide an additional orthogonal physical dimension,offering transformative potential for enhancing optical communication *** significant progress in mode multiplexing,the developmen... 详细信息
来源: 评论
Sentiment Analysis for Curriculum of Independent Learning Based on Naïve Bayes with Laplace Estimator  2
Sentiment Analysis for Curriculum of Independent Learning Ba...
收藏 引用
2nd International Conference on information technology Research and Innovation, ICITRI 2023
作者: Ariefah, Amelia Widodo Nugraheni, Murien State University of Jakarta Dept. of Informatics and Computer Engineering Education Jakarta Indonesia State University of Jakarta Dept. of Information System and Technology Jakarta Indonesia
Curriculum changes have a significant impact on the field of education in Indonesia, especially in universities. This is because the curriculum is used as a means to achieve the goals of educational success as well as... 详细信息
来源: 评论
Automated Arabic Text Classification Using Hyperparameter Tuned Hybrid Deep Learning Model
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5447-5465页
作者: Badriyya B.Al-onazi Saud S.Alotaib Saeed Masoud Alshahrani Najm Alotaibi Mrim M.Alnfiai Ahmed S.Salama Manar Ahmed Hamza Department of Language Preparation Arabic Language Teaching InstitutePrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Systems College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Prince Saud AlFaisal Institute for Diplomatic Studies Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif P.O.Box 11099Taif21944Saudi Arabia Department of Electrical Engineering Faculty of Engineering&TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
The text classification process has been extensively investigated in various languages,especially *** classification models are vital in several Natural Language Processing(NLP)*** Arabic language has a lot of *** ins... 详细信息
来源: 评论
From Laboratory to Field:Unsupervised Domain Adaptation for Plant Disease Recognition in the Wild
收藏 引用
Plant Phenomics 2023年 第2期5卷 195-208页
作者: Xinlu Wu Xijian Fan Peng Luo Sruti Das Choudhury Tardi Tjahjadi Chunhua Hu College of Information Science and Technology Nanjing Forestry UniversityNanjing 210037China Institute of Forest Resource Information Techniques Chinese Academy of ForestryBeijing 100091China Key Laboratory of Forestry Remote Sensing and Information System National Forestry and Grassland AdministrationBeijing 100091China Department of Computer Science and Engineering University of Nebraska-LincolnLincolnNE 68588USA School of Engineering University of WarwickCoventry CV47ALUK
Plant disease recognition is of vital importance to monitor plant development and predicting crop ***,due to data degradation caused by different conditions of image acquisition,e.g.,laboratory *** environment,machine... 详细信息
来源: 评论
3D printed-electrospun PCL/hydroxyapatite/MWCNTs scaffolds for the repair of subchondral bone
收藏 引用
Regenerative Biomaterials 2023年 第1期10卷 294-305页
作者: Yanyan Cao Lei Sun Zixian Liu Zhizhong Shen Wendan Jia Peiyi Hou Shengbo Sang College of Information Science and Engineering Hebei North UniversityZhangjiakou 075000China Shanxi Key Laboratory of Micro Nano Sensors&Artificial Intelligence Perception College of Information and ComputerTaiyuan University of TechnologyTaiyuan 030024China Key Lab of Advanced Transducers and Intelligent Control System of the Ministry of Education Taiyuan University of TechnologyTaiyuan 030024China Shanxi Research Institute of 6D Artificial Intelligence Biomedical Science Taiyuan 030031China
Osteochondral defect caused by trauma or osteoarthritis exhibits a major challenge in clinical treatment with limited symptomatic effects at *** regeneration and remodeling of subchondral bone play a positive effect o... 详细信息
来源: 评论
Face image authentication scheme based on MTCNN and SLT
收藏 引用
Multimedia Tools and Applications 2025年 1-43页
作者: Thabit, Rasha Al-Askari, Mohanad A. Mohammed, Dunya Zeki Anaam, Elham Abdulwahab Mahmood, Zainab H. Jabbar, Dina Jamal Salih, Zahraa Aqeel Information System Department College of Computer Sciences and Information Technology University of Al-Anbar Al-Anbar Iraq Computer Engineering Department College of Engineering Al-Iraqia University Baghdad Iraq Electronic and Communications Engineering Department College of Engineering Gilgamesh University Baghdad Iraq Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia Department of Cybersecurity Engineering College of Information Engineering Al-Nahrain University Baghdad Iraq Electrical Engineering Technical Collage Middle Technical University Baghdad Iraq Department of Business Administration Alamaal University College Baghdad Iraq
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists... 详细信息
来源: 评论