咨询与建议

限定检索结果

文献类型

  • 20,400 篇 会议
  • 13,319 篇 期刊文献
  • 289 册 图书

馆藏范围

  • 34,008 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,096 篇 工学
    • 15,809 篇 计算机科学与技术...
    • 12,542 篇 软件工程
    • 5,643 篇 信息与通信工程
    • 3,774 篇 控制科学与工程
    • 2,632 篇 生物工程
    • 2,516 篇 电气工程
    • 2,112 篇 生物医学工程(可授...
    • 2,039 篇 电子科学与技术(可...
    • 1,597 篇 光学工程
    • 1,476 篇 机械工程
    • 1,434 篇 网络空间安全
    • 1,083 篇 安全科学与工程
    • 1,050 篇 仪器科学与技术
    • 1,047 篇 动力工程及工程热...
    • 920 篇 交通运输工程
    • 879 篇 化学工程与技术
  • 11,466 篇 理学
    • 5,740 篇 数学
    • 3,468 篇 物理学
    • 3,007 篇 生物学
    • 1,779 篇 统计学(可授理学、...
    • 1,217 篇 系统科学
    • 1,049 篇 化学
  • 6,587 篇 管理学
    • 4,136 篇 管理科学与工程(可...
    • 2,707 篇 图书情报与档案管...
    • 1,764 篇 工商管理
  • 2,599 篇 医学
    • 2,121 篇 临床医学
    • 1,814 篇 基础医学(可授医学...
    • 1,267 篇 公共卫生与预防医...
    • 1,024 篇 药学(可授医学、理...
  • 1,148 篇 法学
    • 914 篇 社会学
  • 673 篇 经济学
  • 589 篇 农学
  • 427 篇 教育学
  • 181 篇 文学
  • 106 篇 军事学
  • 79 篇 艺术学
  • 10 篇 哲学
  • 5 篇 历史学

主题

  • 1,350 篇 deep learning
  • 1,113 篇 accuracy
  • 993 篇 machine learning
  • 831 篇 feature extracti...
  • 734 篇 internet of thin...
  • 633 篇 computer science
  • 590 篇 computational mo...
  • 582 篇 training
  • 559 篇 support vector m...
  • 519 篇 educational inst...
  • 486 篇 convolutional ne...
  • 458 篇 real-time system...
  • 443 篇 artificial intel...
  • 441 篇 predictive model...
  • 381 篇 cloud computing
  • 357 篇 optimization
  • 346 篇 data mining
  • 343 篇 security
  • 284 篇 data models
  • 283 篇 reliability

机构

  • 284 篇 faculty of scien...
  • 277 篇 department of ph...
  • 273 篇 departamento de ...
  • 266 篇 department of ph...
  • 266 篇 department of ph...
  • 264 篇 department for p...
  • 260 篇 faculté des scie...
  • 256 篇 department of ph...
  • 221 篇 department of ph...
  • 221 篇 department of ph...
  • 216 篇 physics division...
  • 197 篇 department of ph...
  • 176 篇 yerevan physics ...
  • 165 篇 centre de calcul...
  • 162 篇 department of ph...
  • 159 篇 kirchhoff-instit...
  • 156 篇 nikhef national ...
  • 155 篇 department of ph...
  • 154 篇 maharishi school...
  • 153 篇 institute of phy...

作者

  • 269 篇 c. alexa
  • 269 篇 j. m. izen
  • 269 篇 g. bella
  • 269 篇 j. strandberg
  • 269 篇 d. calvet
  • 269 篇 c. amelung
  • 269 篇 g. spigo
  • 268 篇 f. siegert
  • 265 篇 a. c. könig
  • 265 篇 m. klein
  • 263 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 257 篇 s. jin
  • 256 篇 h. sakamoto
  • 255 篇 g. gaudio
  • 247 篇 s. mohapatra
  • 246 篇 y. tayalati
  • 245 篇 d. guest
  • 236 篇 y. nagasaka

语言

  • 26,658 篇 英文
  • 7,094 篇 其他
  • 348 篇 中文
  • 28 篇 斯洛文尼亚文
  • 15 篇 德文
  • 10 篇 日文
  • 9 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science College of Computing and Information Technology"
34008 条 记 录,以下是181-190 订阅
排序:
An Automatic Diagnostic Tool for Autism Spectrum Disorder using Structural Magnetic Resonance Imaging and a Tailored Binary Coded Genetic Algorithm
收藏 引用
IEIE Transactions on Smart Processing and computing 2024年 第3期13卷 236-242页
作者: Sachnev, Vasily Suresh, Mahanand Belathur Department of Information Communication and Electronics Engineering Catholic University of Korea Korea Republic of Department of Information Science and Engineering Computing Sri Jayachamarajendra College of Engineering JSS Science and Technology University Mysuru India
In this paper, we propose an automatic diagnostic tool for autism based on machine learning and structural MRI. A set of 989 relevant features extracted from structural magnetic resonance imaging (MRI) present in the ... 详细信息
来源: 评论
Object Segmentation in Thermal Images Using YOLOv8  5th
Object Segmentation in Thermal Images Using YOLOv8
收藏 引用
5th International Conference on computing and Network Communications, CoCoNet 2023
作者: Muften, Haider Ali Khayeat, Ali Retha Hasoon College of Computer Science and Information Technology University of Kerbala Computer Science Department Karbala Iraq
Thermal images are crucial for object detection in surveillance, security, industrial automation, and vehicular navigation due to their ability to capture heat signatures. However, complexities like low contrast, fluc... 详细信息
来源: 评论
Transparent and Accurate COVID-19 Diagnosis:Integrating Explainable AI with Advanced Deep Learning in CT Imaging
收藏 引用
computer Modeling in Engineering & sciences 2024年 第6期139卷 3101-3123页
作者: Mohammad Mehedi Hassan Salman A.AlQahtani Mabrook S.AlRakhami Ahmed Zohier Elhendi Department of Information Systems College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Science Technology and Innovation Department King Saud UniversityRiyadh11543Saudi Arabia
In the current landscape of the COVID-19 pandemic,the utilization of deep learning in medical imaging,especially in chest computed tomography(CT)scan analysis for virus detection,has become increasingly *** its potent... 详细信息
来源: 评论
Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5901-5914页
作者: R.Brindha S.Nandagopal H.Azath V.Sathana Gyanendra Prasad Joshi Sung Won Kim Department of Computing Technologies SRM Institute of Science and TechnologyKattankulathur603203India Department of Computing Science and Engineering Nandha College of TechnologyErode638052India School of Computing Science and Engineering VIT Bhopal UniversityBhopal466114India Department of Computer Science and Engineering K.Ramakrishnan College of EngineeringTiruchirappalli621112India Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-si38541Gyeongbuk-doKorea
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us... 详细信息
来源: 评论
DaC-GANSAEBF:Divide and Conquer-Generative Adversarial Network-Squeeze and Excitation-Based Framework for Spam Email Identification
收藏 引用
computer Modeling in Engineering & sciences 2025年 第3期142卷 3181-3212页
作者: Tawfeeq Shawly Ahmed A.Alsheikhy Yahia Said Shaaban M.Shaaban Husam Lahza Aws I.Abu Eid Abdulrahman Alzahrani Department of Electrical Engineering Faculty of Engineering at RabighKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Electrical Engineering College of EngineeringNorthern Border UniversityArar91431Saudi Arabia Center for Scientific Research and Entrepreneurship Northern Border UniversityArar73213Saudi Arabia Department of Information Technology College of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information and Communication Technology College of Computing StudiesArab Open UniversityKuwait BranchKuwait City13033Al-SafatState of Kuwait Department of Information Systems and Technology College of Computer Science and EngineeringUniversity of JeddahJeddah23218Saudi Arabia
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se... 详细信息
来源: 评论
A Deep Learning for Alzheimer’s Stages Detection Using Brain Images
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1457-1473页
作者: Zahid Ullah Mona Jamjoom Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia
Alzheimer’s disease(AD)is a chronic and common form of dementia that mainly affects elderly *** disease is dangerous because it causes damage to brain cells and tissues before the symptoms appear,and there is nomedic... 详细信息
来源: 评论
Preventing 51% Attack by Using Consecutive Block Limits in Bitcoin
收藏 引用
IEEE Access 2024年 12卷 77852-77869页
作者: Mahmood Babur, Sohail Ur Rehman Khan, Shafiq Yang, Jing Chen, Yen-Lin Soon Ku, Chin Yee Por, Lip Government Murray College Department of Information Technology Sialkot51010 Pakistan Capital University of Science and Technology Department of Computer Science Islamabad44730 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ... 详细信息
来源: 评论
Artificial intelligence-inspired comprehensive framework for desertification prediction
International Journal of Cognitive Computing in Engineering
收藏 引用
International Journal of Cognitive computing in Engineering 2025年 6卷 462-476页
作者: Alsubai, Shtwai Mosleh, Mogeeb A.A. Al-Hadhrami, Suheer A. Bhatia, Munish College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Alkharj Saudi Arabia Faculty of Engineering & Computing University of Science & Technology Aden Yemen Faculty of Engineering and Information Technology Taiz Univeristy Taiz Yemen Department of Computer Engineering College of Engineering Al Mukalla Hadhramout Yemen Department of Computer Applications National Institute of Technology Kurukshetra India
Desertification greatly affects land deterioration, farming efficiency, economic growth, and health, especially in Gulf nations. Climate change has worsened desertification, making developmental issues in the area eve... 详细信息
来源: 评论
Secure and Reliable Routing in the Internet of Vehicles Network:AODV-RL with BHA Attack Defense
收藏 引用
computer Modeling in Engineering & sciences 2024年 第4期139卷 633-659页
作者: Nadeem Ahmed Khalid Mohammadani Ali Kashif Bashir Marwan Omar Angel Jones Fayaz Hassan School of Electronic Science Beijing University of Post and TelecommunicationBeijing100086China Department of Computer Science Huanggang Normal UniversityHuanggangChina Department of Computing and Mathematics Manchester Metropolitan UniversityManchesterUK Woxsen School of Business Woxsen UniversityHyderabad502345India Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Information Technology and Management Illinois Institute of TechnologyChicagoUSA College of Computing Capital Technology UniversityLaurelUSA
Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad h... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论