咨询与建议

限定检索结果

文献类型

  • 1,306 篇 期刊文献
  • 1,112 篇 会议
  • 14 册 图书

馆藏范围

  • 2,432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,577 篇 工学
    • 1,024 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 351 篇 信息与通信工程
    • 236 篇 控制科学与工程
    • 204 篇 电气工程
    • 202 篇 电子科学与技术(可...
    • 157 篇 生物工程
    • 148 篇 生物医学工程(可授...
    • 120 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 仪器科学与技术
    • 92 篇 动力工程及工程热...
    • 67 篇 化学工程与技术
    • 65 篇 网络空间安全
    • 56 篇 土木工程
    • 53 篇 材料科学与工程(可...
  • 826 篇 理学
    • 405 篇 数学
    • 229 篇 物理学
    • 187 篇 生物学
    • 123 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 71 篇 化学
  • 433 篇 管理学
    • 299 篇 管理科学与工程(可...
    • 130 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 195 篇 医学
    • 161 篇 临床医学
    • 113 篇 基础医学(可授医学...
    • 76 篇 公共卫生与预防医...
    • 70 篇 药学(可授医学、理...
  • 66 篇 法学
  • 49 篇 经济学
    • 49 篇 应用经济学
  • 37 篇 农学
  • 20 篇 教育学
  • 8 篇 军事学
  • 6 篇 文学
  • 5 篇 艺术学

主题

  • 101 篇 deep learning
  • 86 篇 machine learning
  • 48 篇 educational inst...
  • 48 篇 accuracy
  • 44 篇 feature extracti...
  • 43 篇 computer science
  • 43 篇 artificial intel...
  • 33 篇 training
  • 32 篇 internet of thin...
  • 29 篇 computational mo...
  • 28 篇 data mining
  • 27 篇 optimization
  • 27 篇 security
  • 25 篇 data models
  • 24 篇 real-time system...
  • 24 篇 protocols
  • 24 篇 cloud computing
  • 23 篇 support vector m...
  • 23 篇 energy efficienc...
  • 22 篇 neural networks

机构

  • 51 篇 univ. system of ...
  • 50 篇 department of co...
  • 33 篇 college of compu...
  • 28 篇 national enginee...
  • 25 篇 department of in...
  • 21 篇 department of co...
  • 20 篇 department of co...
  • 20 篇 frontiers scienc...
  • 20 篇 peng cheng labor...
  • 16 篇 department of in...
  • 16 篇 department of co...
  • 14 篇 department of co...
  • 13 篇 department of el...
  • 13 篇 research centre ...
  • 13 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 college of compu...
  • 11 篇 department of ap...
  • 11 篇 college of compu...

作者

  • 53 篇 john g. meinke
  • 39 篇 abdelwahed motwa...
  • 30 篇 mesfer al duhayy...
  • 25 篇 ishfaq yaseen
  • 25 篇 manar ahmed hamz...
  • 22 篇 mohamed k.nour
  • 21 篇 abu sarwar zaman...
  • 18 篇 anwer mustafa hi...
  • 18 篇 saud s.alotaibi
  • 17 篇 wang xingjun
  • 16 篇 abdullah mohamed
  • 16 篇 shu haowen
  • 14 篇 radwa marzouk
  • 14 篇 bowers john e.
  • 14 篇 mohamed i.eldeso...
  • 14 篇 xingjun wang
  • 13 篇 chang lin
  • 12 篇 ahmad almadhor
  • 12 篇 haowen shu
  • 12 篇 leung victor c.m...

语言

  • 2,119 篇 英文
  • 272 篇 其他
  • 38 篇 中文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer System and Networks College of Computer Science"
2432 条 记 录,以下是291-300 订阅
排序:
Automated User Experience (UX) Testing for Mobile Application: Strengths and Limitations
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第4期16卷 30-45页
作者: Abuaddous, Hayfa. Y. Saleh, Ashraf Mousa Enaizan, Odai Ghabban, Fahad Al-Badareen, Anas Bassam Faculty of Computer Sciences and Informatics Amman Arab University Amman Jordan Department of Management Information System University of Tabuk Tabuk Saudi Arabia College of Computer Science and Engineering Taibah University Medina Saudi Arabia Department of Software Engineering Aqaba University of Technology Aqaba Jordan
User Experience (UX) evaluation has a significant importance for any interactive application. Mobile device applications have additional limitations to convey good user experiences (UX) due to the usage and features o... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Attack Detection Method in Vehicular networks  3
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Atta...
收藏 引用
3rd International Seminar on Artificial Intelligence, Networking, and Information Technology, AINIT 2022
作者: Luo, Jie Li, Zhong College of Information Science and Technology Donghua University Shanghai201620 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai201804 China
Vehicular networks improve traffic safety and efficiency by wireless communications among vehicles and infrastructures. However, security has always been a challenge to vehicular networks, which may cause severe harm ... 详细信息
来源: 评论
Meta-Heuristic Based Multipath Joint Routing and Scheduling of Time-Triggered Traffic for Time-Sensitive Networking in IIoT  2
Meta-Heuristic Based Multipath Joint Routing and Scheduling ...
收藏 引用
2nd International Conference on Green Communication, Network, and Internet of Things, CNIoT 2022
作者: Chen, Chen Li, Zhong The College of Information Science and Technology Donghua University Shanghai201620 China The Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai201804 China
Time-Sensitive networking (TSN) meets the needs of industrial internet of things (IIoT). It solves the challenges of deterministic transmission and reliable communication of time sensitive data streams. Traffic schedu... 详细信息
来源: 评论
Sine Cosine Optimization with Deep Learning-Based Applied Linguistics for Sentiment Analysis on COVID-19 Tweets
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 4767-4783页
作者: Abdelwahed Motwakel Hala J.Alshahrani Abdulkhaleq Q.A.Hassan Khaled Tarmissi Amal S.Mehanna Ishfaq Yaseen Amgad Atta Abdelmageed Mohammad Mahzari Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Applied Linguistics College of LanguagesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of English College of Science and Arts at MahayilKing Khalid UniversityMuhayil63763Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversityMakkah24211Saudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11845Egypt Department of English College of Science&HumanitiesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Applied linguistics is an interdisciplinary domain which identifies,investigates,and offers solutions to language-related real-life *** new coronavirus disease,otherwise known as Coronavirus disease(COVID-19),has seve... 详细信息
来源: 评论
AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks  14
AI in Education: Improving Quality for Both Centralized and ...
收藏 引用
14th IEEE Global Engineering Education Conference, EDUCON 2023
作者: Madathil, Nisha Thorakkattu Alrabaee, Saed Al-Kfairy, Mousa Damseh, Rafat Belkacem, Abdelkader N College of IT United Arab Emirates University Department of Information Systems and Security United Arab Emirates College of Technological Innovation Zayed University Dubai United Arab Emirates College of IT Department of Computer Science and Software Engineering United Arab Emirates University United Arab Emirates College of IT Department of Computer Engineering and Networks United Arab Emirates University United Arab Emirates
Education is essential for achieving many Sustainable Development Goals (SDGs). Therefore, the education system focuses on empowering more educated people and improving the quality of the education system. One of the ... 详细信息
来源: 评论
Leveraging Adaptive Algorithms for Real-Time Data Analysis  15
Leveraging Adaptive Algorithms for Real-Time Data Analysis
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Sahoo, Girija Shankar Hannah Jessie Rani, R. Goyal, Manish Kumar Mohammed, Vazeer Ali Jana, D Little Femilin Wasatkar, Namrata N. Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Electrical and Electronics Engineering Karnataka Bangalore India Vivekananda Global University Department of Computer Science & Application Jaipur India Lewis University Illinois Department of Computer & Information System United States Prince Shri Venkateshwara Padmavathy Engineering College Department of Science and Humanities Chennai127 India Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India
This paper proposes the use of adaptive algorithms for real-time data analysis. Adaptive algorithms are a set of practical methods used for acting information-driven optimization and studying. They have a wide variety... 详细信息
来源: 评论
⁠Marine Ecosystem Monitoring Based on Remote Sensing Using Underwater Image Analysis for Biodiversity Conservation Model
收藏 引用
Remote Sensing in Earth systems sciences 2024年 第4期7卷 309-318页
作者: Rao, Chandana Narasimha Rao, A. Venkateswara Shanmugasundar, G. Hamid, Junainah Abd Haldorai, Anandakumar Naidu, G. Rama Sapthami, I. Department of Chemistry Koneru Lakshmaiah Education Foundation Green Fields Vaddeswaram Andhra Pradesh Guntur 522302 India Department of Mechanical Engineering Sri Sairam Institute of Technology Chennai 600044 India Management and Science University Selangor Shah Alam Malaysia Center for Future Networks and Digital Twin Department of Computer Science and Engineering Sri Eshwar College of Engineering Tamil Nadu Coimbatore 641202 India Department of Electronics & amp Communication Engineering Aditya University Surampalem India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
The growing focus on underwater observation and use of marine resources in recent years has led to an active research area in underwater image processing and analysis. Because of its importance in marine engineering a... 详细信息
来源: 评论
Optimizing Connections:Applied Shortest Path Algorithms for MANETs
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 787-807页
作者: Ibrahim Alameri Jitka Komarkova Tawfik Al-Hadhrami Abdulsamad Ebrahim Yahya Atef Gharbi Faculty of Medical Sciences Jabir Ibn Hayyan Medical UniversityAlkufaNajaf54001Iraq Faculty of Economics and Administration University of PardubiceStudentskaPardubice53210Czech Republic Computer Science Department School of Science and TechnologyNottingham Trent UniversityNottinghamNG118NSUK Department of Information Technology College of Computing and Information TechnologyNorthern Border UniversityArar91431Saudi Arabia Department of Information System College of Computing and Information TechnologyNorthern Border UniversityArar91431Saudi Arabia
This study is trying to address the critical need for efficient routing in Mobile Ad Hoc networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of *** objective was to delve into an... 详细信息
来源: 评论
Public Key Infrastructure Approaches Based on Blockchain
Public Key Infrastructure Approaches Based on Blockchain
收藏 引用
IEEE SSD International Multi-Conference on systems, Signals and Devices
作者: Dena S. Alani Ali M Sagheer College of Education for Women University of Anbar Anbar Iraq Department of Computer Networks Systems College of Computer Science and Information Technology University of Anbar Anbar Iraq
Public-key infrastructure or PKI, is the fundamental technology that makes safe online information sharing possible. But PKI is vulnerable to failures of Certificate Authorities (CAs), which could allow illegal certif... 详细信息
来源: 评论