咨询与建议

限定检索结果

文献类型

  • 1,316 篇 期刊文献
  • 1,110 篇 会议
  • 15 册 图书

馆藏范围

  • 2,441 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,583 篇 工学
    • 1,029 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 353 篇 信息与通信工程
    • 239 篇 控制科学与工程
    • 206 篇 电气工程
    • 202 篇 电子科学与技术(可...
    • 157 篇 生物工程
    • 148 篇 生物医学工程(可授...
    • 120 篇 机械工程
    • 113 篇 光学工程
    • 93 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 68 篇 化学工程与技术
    • 66 篇 网络空间安全
    • 56 篇 土木工程
    • 52 篇 材料科学与工程(可...
  • 837 篇 理学
    • 410 篇 数学
    • 230 篇 物理学
    • 191 篇 生物学
    • 122 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 72 篇 化学
  • 438 篇 管理学
    • 302 篇 管理科学与工程(可...
    • 133 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 204 篇 医学
    • 168 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 76 篇 公共卫生与预防医...
    • 70 篇 药学(可授医学、理...
  • 67 篇 法学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 42 篇 农学
  • 21 篇 教育学
  • 8 篇 军事学
  • 6 篇 文学
  • 5 篇 艺术学

主题

  • 100 篇 deep learning
  • 88 篇 machine learning
  • 48 篇 educational inst...
  • 46 篇 accuracy
  • 45 篇 feature extracti...
  • 43 篇 computer science
  • 43 篇 artificial intel...
  • 33 篇 internet of thin...
  • 33 篇 training
  • 30 篇 computational mo...
  • 29 篇 optimization
  • 28 篇 data mining
  • 26 篇 security
  • 25 篇 data models
  • 24 篇 cloud computing
  • 24 篇 energy efficienc...
  • 23 篇 support vector m...
  • 23 篇 real-time system...
  • 23 篇 protocols
  • 22 篇 neural networks

机构

  • 50 篇 department of co...
  • 50 篇 univ. system of ...
  • 34 篇 college of compu...
  • 28 篇 national enginee...
  • 25 篇 department of in...
  • 21 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 frontiers scienc...
  • 17 篇 peng cheng labor...
  • 16 篇 department of in...
  • 16 篇 department of co...
  • 14 篇 department of co...
  • 13 篇 research centre ...
  • 13 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of el...
  • 12 篇 department of co...
  • 12 篇 college of compu...
  • 11 篇 department of co...
  • 11 篇 department of ap...

作者

  • 52 篇 john g. meinke
  • 39 篇 abdelwahed motwa...
  • 30 篇 mesfer al duhayy...
  • 25 篇 ishfaq yaseen
  • 25 篇 manar ahmed hamz...
  • 22 篇 mohamed k.nour
  • 21 篇 abu sarwar zaman...
  • 18 篇 anwer mustafa hi...
  • 18 篇 saud s.alotaibi
  • 17 篇 wang xingjun
  • 16 篇 abdullah mohamed
  • 14 篇 radwa marzouk
  • 14 篇 mohamed i.eldeso...
  • 14 篇 shu haowen
  • 13 篇 bowers john e.
  • 12 篇 ahmad almadhor
  • 12 篇 chang lin
  • 12 篇 huang chongwen
  • 11 篇 mohammed rizwanu...
  • 11 篇 yuen chau

语言

  • 2,263 篇 英文
  • 135 篇 其他
  • 40 篇 中文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer System and Networks College of Computer Science"
2441 条 记 录,以下是171-180 订阅
排序:
Deep Optimal VGG16 Based COVID-19 Diagnosis Model
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 43-58页
作者: M.Buvana K.Muthumayil S.Senthil kumar Jamel Nebhen Sultan S.Alshamrani Ihsan Ali Department of Computer Science and Engineering PSNA College of Engineering and TechnologyDindigul624622India Department of Information Technology PSNA College of Engineering and TechnologyDindigul624622India Department of Electrical and Electronics Engineering New Prince Shri Bhavani College of Engineering and TechnologyChennai600073India Prince Sattam Bin Abdulaziz University College of Computer Engineering and SciencesAlkharj11942Saudi Arabia Department of Information Technology College of Computer and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer System and Technology Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala Lumpur50603Malaysia
Coronavirus(COVID-19)outbreak was first identified in Wuhan,China in December *** was tagged as a pandemic soon by the WHO being a serious public medical *** spite of the fact that the virus can be diagnosed by qRT-PC... 详细信息
来源: 评论
Text Classification in Arabic Natural Language Processing: A Review  3
Text Classification in Arabic Natural Language Processing: A...
收藏 引用
3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023
作者: Al-Hadheri, Hana Al-Khulaidi, Nesmah Al-Mahwiti, Sameera Yemen Academy for Graduate Studies Department of Information Technology Sana'a Yemen Yemen Academy for Graduate Studies Department of Computer Networks Sana'a Yemen College of Computer Science and Engineering Shandong University of Science and Technology Shandong Province China
Natural language processing holds immense importance across diverse fields, primarily centered around the English language. In contrast, efforts directed at processing Arabic have been comparatively limited. Therefore... 详细信息
来源: 评论
A Dynamic Resource-Aware Routing Protocol in Resource-Constrained Opportunistic networks
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 4147-4167页
作者: Aref Hassan Kurd Ali Halikul Lenando Slim Chaoui Mohamad Alrfaay Medhat A.Tawfeek Department of Computer Systems and Communication Technologies Faculty of Computer Science and Information TechnologyUniversiti Malaysia Sarawak(UNIMAS)Kota Samarahan94300Malaysia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka2014KSA Unit-Lab of Sciences of Electronics Technologies of Information and TelecommunicationsSfax UniversitySfaxTunisia Department of Basic Sciences First Common Year DeanshipJouf UniversitySakaka2014KSA Department of Computer Sciences College of Computer and Information SciencesJouf UniversitySakaka2014KSA Department of Computer Sciences Faculty of Computers and InformationMenoufia UniversityEgypt
Recently,Opportunistic networks(OppNets)are considered to be one of the most attractive developments of Mobile Ad Hoc networks that have arisen thanks to the development of intelligent *** are characterized by a rough... 详细信息
来源: 评论
Modified Sine Cosine Optimization with Adaptive Deep Belief Network for Movie Review Classification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第7期37卷 283-300页
作者: Hala J.Alshahrani Abdulbaset Gaddah Ehab S.Alnuzaili Mesfer Al Duhayyim Heba Mohsen Ishfaq Yaseen Amgad Atta Abdelmageed Gouse Pasha Mohammed Department of Applied Linguistics College of LanguagesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of English College of Science&Art at MahayilKing Khalid UniversityMuhayel Aseer63311Saudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversityAl-Aflaj16828Saudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Sentiment analysis(SA)is a growing field at the intersection of computer science and computational linguistics that endeavors to automati-cally identify the sentiment presented in *** linguistics aims to describe the ... 详细信息
来源: 评论
ANFIS-based Multilayered Algorithm for Botnet Detection
ANFIS-based Multilayered Algorithm for Botnet Detection
收藏 引用
2023 International Conference on Recent Advances in Electrical, Electronics, Ubiquitous Communication, and Computational Intelligence, RAEEUCCI 2023
作者: Thamaraimanalan, T. Venkatesan, C. Ramkumar, M. Sivaramakrishnan, A. Marimuthu, M. Sri Eshwar College of Engineering Department of Electronics and Communication Engineering Coimbatore India Hkbk College of Engineering Department of Electronics and Communication Engineering Bangalore India Knowledge Institute of Technology Department of Computer Science and Business System Salem India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra pradesh India Sona College of Technology Department of Computer Science and Engineering Salem India
In this study, a multilayered botnet detection system for network-based botnet detection based on ANFIS is suggested. Two layers make up the suggested system, one of which is utilized for feature extraction and the ot... 详细信息
来源: 评论
DEVS-RPL: Design Formal Discrete Event Model of Routing Protocol over LLN  17
DEVS-RPL: Design Formal Discrete Event Model of Routing Prot...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Albinali, Hussah Azzedin, Farag Riaz, Muhammad King Fahd University of Petroleum and Minerals Information & Computer Science Department Dhahran Saudi Arabia Imam Abdulrahman Bin Faisal University College of Computer Science and Information Technology Networks and Communication Department Dammam Saudi Arabia King Fahd University of Petroleum and Minerals Department of Mathematics Dhahran Saudi Arabia
The Internet of Things is rapidly advancing, enabling interactions with the physical world and presenting various applications. Routing Protocol over Low-Power and Lossy networks (RPL) is the routing protocol introduc... 详细信息
来源: 评论
Robust Tweets Classification Using Arithmetic Optimization with Deep Learning for Sustainable Urban Living
收藏 引用
SN computer science 2024年 第5期5卷 549页
作者: Hamza, Manar Ahmed Hashim, Aisha Hassan Abdalla Motwakel, Abdelwahed Elhameed, Elmouez Samir Abd Osman, Mohammed Kumar, Arun Singla, Chinu Munjal, Muskaan Department of Electrical and Computer Engineering International Islamic University Malaysia Kuala Lumpur 53100 Malaysia Department of Computer and Self Development Preparatory Year Deanship Prince Sattam bin Abdulaziz University AlKharj Saudi Arabia Department of Management Information Systems College of Business Administration in Hawtat bani Tamim Prince Sattam bin Abdulaziz University AlKharj Saudi Arabia Department of Computer Science College of Post-Graduated Studies University of Science and Technology Omdurman Sudan Department of Information System Faculty of Computer Science and Information Technology Omdurman Islamic University Omdurman Sudan Department of Electronics and Communication Engineering New Horizon College of engineering Bengaluru India Computer Engineering Thapar Institute of Engineering and Technology Punjab Patiala India
Natural Language Processing (NLP) with Deep Learning (DL) for Tweets Classification includes use of advanced neural network designs to analyse and classify Twitter messages. DL techniques like recurrent neural network... 详细信息
来源: 评论
Priority Based Cyber Incident Handling: Work in Progress  11
Priority Based Cyber Incident Handling: Work in Progress
收藏 引用
11th International Conference on Electrical Engineering, computer science and Informatics, EECSI 2024
作者: Mulyati Stiawan, Deris Widhiarso, Wijang Budiarto, Rahmat Multi Data Palembang University & Faculty of Engineering Universitas Sriwijaya Department of Information System Palembang Indonesia Sriwijaya University Faculty of Computer Science Palembang Indonesia Multi Data Palembang University Department of Informatics Palembang Indonesia College of Computer Science & IT Albaha University Saudi Arabia
Effective and efficient cyber incident handling is crucial for maintaining the security of information systems and organizational data. This research aims to develop a priority-based cyber incident handling method by ... 详细信息
来源: 评论
A Study Of Dynamic Thresholds Power Detection Spectrum Sensing Techniques In CRN  9
A Study Of Dynamic Thresholds Power Detection Spectrum Sensi...
收藏 引用
9th International Conference on Advanced Computing and Communication systems, ICACCS 2023
作者: Keerthika, J. AnandaKumar, H. Priya, V. Yuvalatha, S. Gayathri, N. Sri Eshwar College of Engineering Department of Computer Science and Engineering Coimbatore India Dr NGP Institute of Technology Department of Artificial Intelligence and Data Science Coimbatore India Bannari Amman Institute of Technology Department of Computer Science and Business System Sathyamangalam India
A Cognitive radio is the mobile communication technologies which help to utilize the efficient need of radio spectrum origin. The performance of CRN is significantly impacted by the spectrum sensing function. The prob... 详细信息
来源: 评论
An Encrypted Malicious Traffic Detection Method Based on Deeper Protocol Features  9
An Encrypted Malicious Traffic Detection Method Based on Dee...
收藏 引用
9th IEEE International Conference on Data science in Cyberspace, DSC 2024
作者: Chen, Lei Chen, Yilu Liu, Chenwei Feng, Wenying National University of Defense Technology College of Computer Science and Technology Changsha China Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Guangzhou University Cyberspace Institute of Advanced Technology Guangzhou China Pengcheng Laboratory Department of New Networks Shenzhen China
Network encryption protocols can protect user privacy and data security but can also provide an opportunity to conceal network attacks. To address feature loss and incompleteness in existing encrypted malicious traffi... 详细信息
来源: 评论