咨询与建议

限定检索结果

文献类型

  • 3,313 篇 会议
  • 2,012 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,279 篇 工学
    • 2,148 篇 计算机科学与技术...
    • 1,736 篇 软件工程
    • 766 篇 信息与通信工程
    • 561 篇 控制科学与工程
    • 398 篇 电子科学与技术(可...
    • 393 篇 电气工程
    • 328 篇 生物工程
    • 292 篇 机械工程
    • 218 篇 仪器科学与技术
    • 210 篇 生物医学工程(可授...
    • 188 篇 光学工程
    • 171 篇 动力工程及工程热...
    • 153 篇 化学工程与技术
    • 105 篇 材料科学与工程(可...
    • 105 篇 交通运输工程
    • 100 篇 土木工程
    • 99 篇 网络空间安全
  • 1,689 篇 理学
    • 840 篇 数学
    • 481 篇 物理学
    • 359 篇 生物学
    • 289 篇 统计学(可授理学、...
    • 220 篇 系统科学
    • 146 篇 化学
  • 929 篇 管理学
    • 577 篇 管理科学与工程(可...
    • 397 篇 图书情报与档案管...
    • 246 篇 工商管理
  • 211 篇 医学
    • 185 篇 临床医学
    • 133 篇 基础医学(可授医学...
  • 143 篇 法学
    • 119 篇 社会学
  • 103 篇 经济学
    • 101 篇 应用经济学
  • 60 篇 教育学
  • 58 篇 农学
  • 21 篇 文学
  • 14 篇 军事学
  • 12 篇 艺术学

主题

  • 127 篇 deep learning
  • 112 篇 feature extracti...
  • 108 篇 computer science
  • 100 篇 data mining
  • 98 篇 accuracy
  • 85 篇 machine learning
  • 84 篇 computational mo...
  • 80 篇 training
  • 69 篇 neural networks
  • 69 篇 optimization
  • 69 篇 semantics
  • 62 篇 internet of thin...
  • 62 篇 protocols
  • 61 篇 information syst...
  • 56 篇 artificial intel...
  • 54 篇 support vector m...
  • 53 篇 security
  • 48 篇 predictive model...
  • 47 篇 wireless sensor ...
  • 47 篇 clustering algor...

机构

  • 59 篇 college of infor...
  • 46 篇 hubei province k...
  • 46 篇 national enginee...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 school of inform...
  • 29 篇 department of el...
  • 29 篇 school of comput...
  • 27 篇 department of co...
  • 26 篇 college of compu...
  • 26 篇 department of co...
  • 24 篇 department of co...
  • 23 篇 national compute...
  • 23 篇 college of compu...
  • 23 篇 department of el...
  • 22 篇 department of sy...
  • 22 篇 distributed mult...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory f...
  • 20 篇 school of comput...

作者

  • 31 篇 yang yang
  • 31 篇 mei-ling shyu
  • 31 篇 shu-ching chen
  • 28 篇 zongli lin
  • 27 篇 shen linlin
  • 26 篇 ren jiadong
  • 24 篇 chen shu-ching
  • 24 篇 robbi rahim
  • 24 篇 shyu mei-ling
  • 23 篇 abdelwahed motwa...
  • 15 篇 hu shengshan
  • 15 篇 zhang leo yu
  • 15 篇 ai bo
  • 14 篇 mohamed k.nour
  • 14 篇 han zhu
  • 14 篇 dong jun
  • 14 篇 ishfaq yaseen
  • 14 篇 manar ahmed hamz...
  • 14 篇 mohamed i.eldeso...
  • 13 篇 niyato dusit

语言

  • 4,784 篇 英文
  • 447 篇 其他
  • 115 篇 中文
  • 6 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Computer and Information System Engineering"
5350 条 记 录,以下是261-270 订阅
排序:
Optimal Quad Channel Long Short-Term Memory Based Fake News Classification on English Corpus
收藏 引用
computer systems Science & engineering 2023年 第9期46卷 3303-3319页
作者: Manar Ahmed Hamza Hala J.Alshahrani Khaled Tarmissi Ayman Yafoz Amal S.Mehanna Ishfaq Yaseen Amgad Atta Abdelmageed Mohamed I.Eldesouki Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Applied Linguistics College of LanguagesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
The term‘corpus’refers to a huge volume of structured datasets containing machine-readable *** texts are generated in a natural communicative *** explosion of social media permitted individuals to spread data with m... 详细信息
来源: 评论
Management of sustainable urban green spaces through machine learning–supported MCDM and GIS integration
收藏 引用
Environmental Science and Pollution Research 2025年 第18期32卷 11466-11487页
作者: Başeğmez, Murat Doğan, Ayhan Aydın, Cevdet Coşkun Department of Geographic Information System and Real Estate Ministry of National Education Beşevler Ankara06560 Turkey Department of Computer Technologies Başkent OSB Vocational Higher School of Technical Sciences Hacettepe University Sincan Ankara06909 Turkey Department of Geomatics Engineering Hacettepe University Beytepe Ankara06800 Turkey
This study evaluates green space suitability in İzmir’s Konak district using the analytic hierarchy process, machine learning, weighted linear combination, and the technique for order preference by similarity to idea... 详细信息
来源: 评论
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model
收藏 引用
computer systems Science & engineering 2023年 第5期45卷 1679-1694页
作者: Mashael M Asiri Heba G.Mohamed Mohamed K Nour Mesfer Al Duhayyim Amira Sayed A.Aziz Abdelwahed Motwakel Abu Sarwar Zamani Mohamed I.Eldesouki Department of Computer Science College of Science&Art atMahayilKing Khalid UniversityMuhayel Aseer62529Saudi Arabia Department of Electrical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application ***,IoT environment is highly... 详细信息
来源: 评论
Designing Secured Cafe Network with Security Awareness Domain and Resource (SADAR) by Simulation using Cisco Packet Tracer  22
Designing Secured Cafe Network with Security Awareness Domai...
收藏 引用
10th International Conference on computer and Communications Management, ICCCM 2022
作者: Lubis, Muharman Lubis, Arif Ridho Department of Information System Telkom University Indonesia Department of Computer Engineering and Informatics Politeknik Negeri Medan Indonesia
computer networking has a huge part of life today, which its participation not only in one side of life but in almost all aspects of life, especially in the fields of education, organization and business. The purpose ... 详细信息
来源: 评论
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving engineering Design Problems
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 219-265页
作者: Farouq Zitouni Saad Harous Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche Department of Computer Science and Information Technology Kasdi Merbah UniversityP.O.Box 30000OuarglaAlgeria Department of Computer Science College of Computing and InformaticsUniversity of SharjahP.O.Box 27272SharjahUnited Arab Emirates Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11937Jordan Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization *** approach aims to leverage the strengths of mult... 详细信息
来源: 评论
A Coarse to Fine Detection Method for Prohibited Object in X-ray Images Based on Progressive Transformer Decoder  24
A Coarse to Fine Detection Method for Prohibited Object in X...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ma, Chunjie Du, Lina Gao, Zan Zhuo, Li Wang, Meng Shandong Jinan China School of Computer Science and Technology Shandong Jianzhu University Shandong Jinan China Faculty of Information Technology Beijing University Of Technology Beijing China School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China
Currently, Transformer-based prohibited object detection methods in X-ray images appear constantly, but there are still some shortcomings such as poor performance and high computational complexity for prohibited objec... 详细信息
来源: 评论
Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks
收藏 引用
computer systems Science & engineering 2023年 第5期45卷 2033-2047页
作者: Anwer Mustafa Hilal Aisha Hassan Abdalla Hashim Heba G.Mohamed Lubna A.Alharbi Mohamed K.Nour Abdullah Mohamed Ahmed S.Almasoud Abdelwahed Motwakel Department of Electrical and Computer Engineering International Islamic University MalaysiaKuala Lumpur53100Malaysia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Electrical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTabuk UniversityTabuk47512Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversityMecca24382Saudi Arabia Research Centre Future University in EgyptNew Cairo11845Egypt Department of Information Systems College of Computer and Information SciencesPrince Sultan UniversityRiyadh12435Saudi Arabia
Recent developments on Internet and social networking have led to the growth of aggressive language and hate *** provocation,abuses,and attacks are widely termed cyberbullying(CB).The massive quantity of user generate... 详细信息
来源: 评论
End-to-end Flow Scheduling Optimization for Industrial 5G and TSN Integrated Networks
End-to-end Flow Scheduling Optimization for Industrial 5G an...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Liu, Houling Li, Mingyan Gu, Fuqiang Li, Qihao Zhang, Weiting Guo, Songtao Chongqing University College of Computer Science Chongqing400044 China Ministry of Education of China Key Laboratory of System Control and Information Processing Shanghai China Jilin University College of Communication Engineering Changchun130015 China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100091 China
The integrated of the fifth generation (5G) and time-sensitive networking (TSN) is a promising approach to meet the requirements of deterministic forwarding with extremely low latency and high flexibility for the Indu... 详细信息
来源: 评论
Sentiment Analysis for Curriculum of Independent Learning Based on Naïve Bayes with Laplace Estimator  2
Sentiment Analysis for Curriculum of Independent Learning Ba...
收藏 引用
2nd International Conference on information Technology Research and Innovation, ICITRI 2023
作者: Ariefah, Amelia Widodo Nugraheni, Murien State University of Jakarta Dept. of Informatics and Computer Engineering Education Jakarta Indonesia State University of Jakarta Dept. of Information System and Technology Jakarta Indonesia
Curriculum changes have a significant impact on the field of education in Indonesia, especially in universities. This is because the curriculum is used as a means to achieve the goals of educational success as well as... 详细信息
来源: 评论
Distributed Denial of Service (DDoS) Mitigation: Security Awareness Domain and Resources (SADAR)  22
Distributed Denial of Service (DDoS) Mitigation: Security Aw...
收藏 引用
10th International Conference on computer and Communications Management, ICCCM 2022
作者: Hidayat, Taufik Safar Fadillah, Yoga Lubis, Muharman Lubis, Arif Ridho Department of Information System Telkom University Indonesia Department of Computer Engineering and Informatics Politeknik Negeri Medan Indonesia
information security is a constantly evolving field to safeguard confidentiality, integrity and assets with defensive measures should be developed and planned to improve information security. Therefore, it is very imp... 详细信息
来源: 评论