咨询与建议

限定检索结果

文献类型

  • 1,070 篇 会议
  • 689 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,771 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,048 篇 工学
    • 814 篇 计算机科学与技术...
    • 679 篇 软件工程
    • 204 篇 信息与通信工程
    • 157 篇 控制科学与工程
    • 93 篇 生物工程
    • 80 篇 机械工程
    • 77 篇 生物医学工程(可授...
    • 74 篇 电子科学与技术(可...
    • 66 篇 电气工程
    • 53 篇 光学工程
    • 52 篇 仪器科学与技术
    • 45 篇 建筑学
    • 44 篇 安全科学与工程
    • 41 篇 化学工程与技术
    • 37 篇 土木工程
    • 36 篇 网络空间安全
  • 517 篇 理学
    • 205 篇 数学
    • 177 篇 物理学
    • 110 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 59 篇 系统科学
    • 46 篇 化学
  • 405 篇 管理学
    • 270 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 113 篇 医学
    • 96 篇 临床医学
    • 65 篇 基础医学(可授医学...
    • 46 篇 公共卫生与预防医...
  • 59 篇 法学
    • 49 篇 社会学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 34 篇 教育学
  • 29 篇 农学
  • 16 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 69 篇 deep learning
  • 49 篇 machine learning
  • 47 篇 computer science
  • 44 篇 information syst...
  • 40 篇 data mining
  • 36 篇 feature extracti...
  • 32 篇 multimedia syste...
  • 28 篇 information tech...
  • 26 篇 internet of thin...
  • 24 篇 neural networks
  • 24 篇 computational mo...
  • 23 篇 security
  • 23 篇 artificial intel...
  • 22 篇 application soft...
  • 22 篇 testing
  • 22 篇 accuracy
  • 21 篇 support vector m...
  • 20 篇 decision making
  • 20 篇 humans
  • 18 篇 authentication

机构

  • 38 篇 department of co...
  • 23 篇 distributed mult...
  • 22 篇 department of el...
  • 22 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 department of el...
  • 17 篇 distributed mult...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 12 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 department of sy...
  • 8 篇 computer science...
  • 8 篇 applied science ...

作者

  • 25 篇 abdelwahed motwa...
  • 25 篇 shu-ching chen
  • 24 篇 mei-ling shyu
  • 20 篇 mesfer al duhayy...
  • 19 篇 chen shu-ching
  • 18 篇 shyu mei-ling
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 11 篇 shahaboddin sham...
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...
  • 10 篇 hala j.alshahran...
  • 10 篇 ahmedy ismail
  • 10 篇 rusli abdullah

语言

  • 1,705 篇 英文
  • 59 篇 其他
  • 9 篇 中文
检索条件"机构=Department of Computer Graphics and Multimedia Faculty of Computer Science and Information System"
1771 条 记 录,以下是391-400 订阅
排序:
A novel Facial Recognition technique with Focusing on Masked Faces
arXiv
收藏 引用
arXiv 2025年
作者: Abdullah, Dana A. Hamad, Dana Rasul Beitollahi, Hakem Maolood, Ismail Y. Abdullah, Abdulhady Abas Ameen, Aso Khaleel - System Information Ministry of Higher Education and Scientific Research Department of Computer Science College of Science Knowledge University Erbil44001 Iraq Computer Science Department Faculty of Science Soran University Erbil Soran Iraq Artificial Intelligence and Innovation Centre University of Kurdistan Hewlêr Erbil Iraq
Recognizing the same faces with and without masks is important for ensuring consistent identification in security, access control, and public safety. This capability is crucial in scenarios like law enforcement, healt... 详细信息
来源: 评论
Stakeholder Identification Overview and Challenges in Requirements Engineering Prospective  2
Stakeholder Identification Overview and Challenges in Requir...
收藏 引用
2nd International Conference on Computing and information Technology, ICCIT 2022
作者: Elneel, Duha Awad Fakharudin, Abdul Sahli Ahmed, Elsadig Musa Kahtan, Hasan Abdullateef, Mansoor Universiti Malaysia Pahang Faculty of Computing Kuantan26300 Malaysia Multimedia University Faculty of Business Melaka Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Knowbis Solutions Consultancy Selangor Malaysia
Stakeholder identification (SI) illustrates a critical part of the requirements elicitation activity. It helps software analysts gather accurate system requirements to ensure high quality and avoid system failure. Sta... 详细信息
来源: 评论
Priority Based Cyber Incident Handling: Work in Progress
Priority Based Cyber Incident Handling: Work in Progress
收藏 引用
International Conference on Electrical Engineering, computer science and Informatics (EECSI)
作者: Mulyati Deris Stiawan Wijang Widhiarso Rahmat Budiarto Department of Information System Multi Data Palembang University & Faculty of Engineering Universitas Sriwijaya Palembang Indonesia Faculty of Computer Science Sriwijaya University Palembang Indonesia Department of Informatics Multi Data Palembang University Palembang Indonesia College of Computer Science & IT Albaha University Saudi Arabia
Effective and efficient cyber incident handling is crucial for maintaining the security of information systems and organizational data. This research aims to develop a priority-based cyber incident handling method by ... 详细信息
来源: 评论
The Impact of Social Media in Marketing on Brand Awareness and Customer Trust in Increasing Purchase Intention
The Impact of Social Media in Marketing on Brand Awareness a...
收藏 引用
information Technology Research and Innovation (ICITRI), International Conference on
作者: Erick Fernando Yulius Denny Prabowo Winanti Department of Information Systems Faculty of Engineering and Informatics Universitas Multimedia Nusantara Tangerang Indonesia Computer Science Department Binus Online Learning Bina Nusantara University Jakarta Indonesia Department of Information Systems Universitas Insan Pembangunan Indonesia
In the current digital era, marketing has developed using technology through media to reach consumers. One prominent feature is influencer marketing, where individuals with significant social media influence promote p... 详细信息
来源: 评论
Gamification using Octalysis Framework in Knowledge Management system for Vocational High Schools during the Covid-19 Pandemic
Gamification using Octalysis Framework in Knowledge Manageme...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Mgs. Afriyan Firdaus Dwi Rosa Indah Yoppy Sazaki Eka Prasetyo Ariefin Muhammad Fachri Nuriza Muhammad Rafly Information System Department Faculty of Computer Science Universitas Sriwijaya Palembang Indonesia Data Structure and Accounting Information System Laboratory Faculty of Computer Science Universitas Sriwijaya Palembang Indonesia Informatics Management Department Faculty of Computer Science Universitas Sriwijaya Palembang Indonesia
Knowledge management systems enable teachers and students to interact directly in the knowledge transfer process during the Covid-19 pandemic. In addition, applying the gamification concept in vocational disciplines c... 详细信息
来源: 评论
HANDLING TRUST IN A CLOUD BASED MULTI AGENT system
arXiv
收藏 引用
arXiv 2022年
作者: Bouabdallah, Imen Mellah, Hakima Department of Computer Science USTHB Bab Ezzouar Algeria Information and Multimedia System Department CERIST Ben Aknoun Algeria
Cloud computing is an opened and distributed network that guarantees access to a large amount of data and IT infrastructure at several levels (software, hardware...). With the increase demand, handling clients’ needs... 详细信息
来源: 评论
Improved Attentive Recurrent Network for Applied Linguistics-Based Offensive Speech Detection
收藏 引用
computer systems science & Engineering 2023年 第11期47卷 1691-1707页
作者: Manar Ahmed Hamza Hala J.Alshahrani Khaled Tarmissi Ayman Yafoz Amira Sayed A.Aziz Mohammad Mahzari Abu Sarwar Zamani Ishfaq Yaseen Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Applied Linguistics College of LanguagesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversityMakkahSaudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of English College of Science&HumanitiesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Applied linguistics is one of the fields in the linguistics domain and deals with the practical applications of the language studies such as speech processing,language teaching,translation and speech *** ever-growing ... 详细信息
来源: 评论
Enhanced Classification method for Large-Scale Medical Data
Enhanced Classification method for Large-Scale Medical Data
收藏 引用
Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), International
作者: Ahmed Hassan Khaled M Fouad Alaa Eldin Abdalla Yassin Somia Mohamed ElSewedy University of Technology Cairo Egypt Faculty of computer science and engineering New Mansoura University Mansoura Egypt Information System department Benha University Benha Egypt
The medical community has been concerned about how to increase the accuracy of different classification methods with large data that are being generated every day. The traditional KNN method has many limitations, such... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
Decision Aid sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Zainab Mohammed Hussein Ali Hamza Najim Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Computer Science Information System University of Technology Imam AIKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
Colon and lung cancer classification from multi-modal images using resilient and efficient neural network architectures
收藏 引用
Heliyon 2024年 第9期10卷 e30625页
作者: Uddin, A. Hasib Chen, Yen-Lin Akter, Miss Rokeya Ku, Chin Soon Yang, Jing Por, Lip Yee Department of Computer Science and Engineering Khwaja Yunus Ali University Enayetpur Chouhali Sirajganj 6751 Bangladesh Department of Computer Science and Information Engineering National Taipei University of Technology Taipei 106344 Taiwan Department of Computer Science Universiti Tunku Abdul Rahman Kampar 31900 Malaysia Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur 50603 Malaysia
Automatic classification of colon and lung cancer images is crucial for early detection and accurate diagnostics. However, there is room for improvement to enhance accuracy, ensuring better diagnostic precision. This ... 详细信息
来源: 评论