咨询与建议

限定检索结果

文献类型

  • 1,068 篇 会议
  • 681 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,761 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,041 篇 工学
    • 809 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 204 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 92 篇 生物工程
    • 80 篇 机械工程
    • 75 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 65 篇 电气工程
    • 52 篇 光学工程
    • 51 篇 仪器科学与技术
    • 44 篇 安全科学与工程
    • 43 篇 建筑学
    • 41 篇 化学工程与技术
    • 36 篇 网络空间安全
    • 35 篇 土木工程
  • 514 篇 理学
    • 205 篇 数学
    • 176 篇 物理学
    • 110 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 58 篇 系统科学
    • 46 篇 化学
  • 404 篇 管理学
    • 270 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 110 篇 医学
    • 93 篇 临床医学
    • 62 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
  • 59 篇 法学
    • 49 篇 社会学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 34 篇 教育学
  • 28 篇 农学
  • 16 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 69 篇 deep learning
  • 49 篇 machine learning
  • 47 篇 computer science
  • 44 篇 information syst...
  • 40 篇 data mining
  • 36 篇 feature extracti...
  • 32 篇 multimedia syste...
  • 28 篇 information tech...
  • 25 篇 internet of thin...
  • 24 篇 neural networks
  • 24 篇 computational mo...
  • 23 篇 security
  • 23 篇 artificial intel...
  • 22 篇 application soft...
  • 22 篇 testing
  • 22 篇 accuracy
  • 21 篇 support vector m...
  • 20 篇 decision making
  • 20 篇 humans
  • 18 篇 authentication

机构

  • 38 篇 department of co...
  • 23 篇 distributed mult...
  • 22 篇 department of el...
  • 22 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 department of el...
  • 17 篇 distributed mult...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 12 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 department of sy...
  • 8 篇 computer science...
  • 8 篇 applied science ...

作者

  • 25 篇 abdelwahed motwa...
  • 25 篇 shu-ching chen
  • 24 篇 mei-ling shyu
  • 20 篇 mesfer al duhayy...
  • 19 篇 chen shu-ching
  • 18 篇 shyu mei-ling
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 11 篇 shahaboddin sham...
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...
  • 10 篇 hala j.alshahran...
  • 10 篇 ahmedy ismail
  • 10 篇 rusli abdullah

语言

  • 1,716 篇 英文
  • 38 篇 其他
  • 8 篇 中文
检索条件"机构=Department of Computer Graphics and Multimedia Faculty of Computer Science and Information System"
1761 条 记 录,以下是221-230 订阅
排序:
Improved Metaheuristics with Deep Learning Enabled Movie Review Sentiment Analysis
收藏 引用
computer systems science & Engineering 2023年 第10期47卷 1249-1266页
作者: Abdelwahed Motwakel Najm Alotaibi Eatedal Alabdulkreem Hussain Alshahrani MohamedAhmed Elfaki Mohamed K Nour Radwa Marzouk Mahmoud Othman Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Prince Saud AlFaisal Institute for Diplomatic Studies RiyadhSaudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt
Sentiment Analysis(SA)of natural language text is not only a challenging process but also gains significance in various Natural Language Processing(NLP)*** SA is utilized in various applications,namely,education,to im... 详细信息
来源: 评论
Strengthening IT Governance in the Crypto Marketplace: Leveraging Penetration Testing and Standards Alignment
Strengthening IT Governance in the Crypto Marketplace: Lever...
收藏 引用
2023 International Conference on Informatics, multimedia, Cyber and information systems, ICIMCIS 2023
作者: Yulianto, Semi Krisnanik, Erly Hartawan, Muhammad Syarif Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta11480 Indonesia University of Pembangunan Nasional Veteran Information System Department Jakarta12450 Indonesia University of Krisnadwipayana Faculty of Technology Jakarta13077 Indonesia Asia e University Ict Department Malaysia
This research explores the vital role of penetration testing in cybersecurity, specifically its alignment with ISO 27001:2022, COBIT 2019, and NIST CSF standards in the context of crypto asset exchange management. The... 详细信息
来源: 评论
TNUE-Fight Detection: A New Challenge Benchmark for Fighting Recognition  1
收藏 引用
2nd International Conference on Advances in information and Communication Technology, ICTA 2023
作者: Vu, Duc-Quang Nguyen, Thu Hien Nguyen, Mai Nguyen, Bao Yen Phung, Trung-Nghia Thu, Trang Phung T. Department of Computer Science and Information System Thai Nguyen University of Education Thai Nguyen Viet Nam Thai Nguyen University of Information and Communication Technology Thai Nguyen Viet Nam Faculty of Basic Science School of Foreign Language Thai Nguyen University Thai Nguyen Viet Nam
Today, violence is one of the most common abnormal actions that need to be monitored and detected early. Therefore, a violence recognition system is very necessary and has great practical significance. In recent years... 详细信息
来源: 评论
A Lightweight Attention Model for Face Recognition  1
收藏 引用
2nd International Conference on Advances in information and Communication Technology, ICTA 2023
作者: Vu, Duc-Quang Nguyen, Thu Hien Nguyen, Danh Vu Nguyen, Yen Quynh Phung, Trung-Nghia Thu, Trang Phung T. Department of Computer Science and Information System Thai Nguyen University of Education Thai Nguyen Viet Nam Thai Nguyen University of Information and Communication Technology Thai Nguyen Viet Nam Faculty of Basic Science School of Foreign Language Thai Nguyen University Thai Nguyen Viet Nam
Facial recognition is one of the most popular biometric methods in the real world. To address this task, various methods have been proposed especially deep learning-based approaches. However, most of them usually focu... 详细信息
来源: 评论
The Effect of Digital Marketing on Micro, Small and Medium Enterprise in Indonesia  1
收藏 引用
International Conference on Applied Informatics and Media Design, AIMD 2019
作者: Sasongko, Alvin Igo Widjaja, Gregorius Christian Theodore, Jason Afriliana, Nunik Matsuo, Tokuro Gaol, Ford Lumban School of Information System Bina Nusantara University Jakarta Indonesia Faculty of Engineering and Informatics Universitas Multimedia Nusantara Tangerang Indonesia Computer Science Department Bina Nusantara University Jakarta Indonesia Graduate School of Industrial Technology Advanced Institute of Industrial Technology Tokyo Japan
Digital Marketing is a product marketing strategy using digital media and internet networks. Nowadays, digital marketing is a necessity for companies that thrive in the digital world. It greatly affects the growth of ... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论
Automated User Experience (UX) Testing for Mobile Application: Strengths and Limitations
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第4期16卷 30-45页
作者: Abuaddous, Hayfa. Y. Saleh, Ashraf Mousa Enaizan, Odai Ghabban, Fahad Al-Badareen, Anas Bassam Faculty of Computer Sciences and Informatics Amman Arab University Amman Jordan Department of Management Information System University of Tabuk Tabuk Saudi Arabia College of Computer Science and Engineering Taibah University Medina Saudi Arabia Department of Software Engineering Aqaba University of Technology Aqaba Jordan
User Experience (UX) evaluation has a significant importance for any interactive application. Mobile device applications have additional limitations to convey good user experiences (UX) due to the usage and features o... 详细信息
来源: 评论
Machine Learning for Intrusion Detection in Vehicular Ad-hoc Networks (VANETs): A Survey
Machine Learning for Intrusion Detection in Vehicular Ad-hoc...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Nesmah A. Al-Khulaidi Ammar T. Zahary Asma A. Al-Shargabi Muneer A. S Hazaa Department of Computer Networks Yemen Academy for Graduate Studies Sana'a Yemen Department of Computer Science Faculty of Computing and IT University of Science and Technology Sana'a Yemen Department of Information Technology College of Computer Qassim University Buraydah Saudi Arabia Department of Computer Science Faculty of Computer and Information System Thamar University Thamar Yemen
Intrusion Detection systems (IDSs) have become a key security problem due to the increasing number of connected automobiles and the sensitive nature of the data transferred in Vehicular Ad-hoc Networks (VANETs). By ke... 详细信息
来源: 评论
Crafting Compelling Argumentative Writing for Undergraduates: Exploring the Nexus of Digital Annotations, Conversational Agents, and Collaborative Concept Maps
收藏 引用
Journal of Educational Computing Research 2024年 第5期62卷 1327-1357页
作者: Sandra, Randi Proska Hwang, Wu-Yuin Zafirah, Afifah Hariyanti, Uun Engkizar, Engkizar Hadi, Ahmaddul Fauzan, Ahmad Universitas Negeri Padang West Sumatra Indonesia Graduate Institute of Network Learning Technology National Central University Taoyuan Taiwan College of Science and Engineering National Dong Hwa University Hualien Taiwan Department of Information System Faculty of Computer Science Universitas Brawijaya East Java Indonesia
Argumentative writing is a fundamental aspect of undergraduate students’ academic and scientific writing related to critical thinking and problem-solving skills. However, previous studies have shown that students fac... 详细信息
来源: 评论
Metaheuristics Enabled Clustering with Routing Scheme for Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 5491-5507页
作者: Mashael M.Asiri Saud S.Alotaibi Dalia H.Elkamchouchi Amira Sayed A.Aziz Manar Ahmed Hamza Abdelwahed Motwakel Abu Sarwar Zamani Ishfaq Yaseen Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Information Systems College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Wireless Sensor Network(WSN)is a vital element in Internet of Things(IoT)as the former enables the collection of huge quantities of data in energy-constrained *** offers independent access to the target region and per... 详细信息
来源: 评论