咨询与建议

限定检索结果

文献类型

  • 1,714 篇 期刊文献
  • 1,159 篇 会议
  • 34 册 图书

馆藏范围

  • 2,907 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,733 篇 工学
    • 986 篇 计算机科学与技术...
    • 736 篇 软件工程
    • 286 篇 信息与通信工程
    • 250 篇 电子科学与技术(可...
    • 245 篇 控制科学与工程
    • 240 篇 电气工程
    • 210 篇 光学工程
    • 170 篇 生物工程
    • 150 篇 生物医学工程(可授...
    • 146 篇 材料科学与工程(可...
    • 145 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 117 篇 机械工程
    • 109 篇 动力工程及工程热...
    • 106 篇 力学(可授工学、理...
  • 1,516 篇 理学
    • 782 篇 物理学
    • 630 篇 数学
    • 220 篇 统计学(可授理学、...
    • 209 篇 生物学
    • 208 篇 化学
    • 135 篇 系统科学
    • 94 篇 地球物理学
  • 364 篇 管理学
    • 226 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 201 篇 医学
    • 160 篇 临床医学
    • 140 篇 基础医学(可授医学...
    • 87 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 63 篇 法学
  • 57 篇 农学
  • 42 篇 教育学
  • 36 篇 经济学
  • 6 篇 文学
  • 6 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 91 篇 deep learning
  • 76 篇 machine learning
  • 62 篇 accuracy
  • 55 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 37 篇 computational mo...
  • 35 篇 internet of thin...
  • 33 篇 feature extracti...
  • 30 篇 covid-19
  • 30 篇 real-time system...
  • 29 篇 predictive model...
  • 29 篇 training
  • 27 篇 computer science
  • 26 篇 support vector m...
  • 26 篇 forecasting
  • 26 篇 data models
  • 25 篇 educational inst...
  • 22 篇 quantum entangle...
  • 22 篇 optimization
  • 22 篇 technological in...

机构

  • 50 篇 infn sezione di ...
  • 50 篇 north-west unive...
  • 49 篇 institut univers...
  • 48 篇 université de st...
  • 46 篇 national centre ...
  • 44 篇 tno technical sc...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 infn sezione di ...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 università di ca...
  • 40 篇 in2p3 lpc campus...
  • 40 篇 nikhef national ...
  • 39 篇 dipartimento di ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 51 篇 chen a.
  • 50 篇 ferrara g.
  • 50 篇 ardid m.
  • 50 篇 calvo d.
  • 48 篇 benoit d.m.
  • 48 篇 eddymaoui a.
  • 44 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 40 篇 coleiro a.
  • 39 篇 gozzini s.r.
  • 39 篇 dallier r.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 benhassi m.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 carretero v.

语言

  • 2,749 篇 英文
  • 145 篇 其他
  • 12 篇 中文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computing and Applied Technology Zayed University"
2907 条 记 录,以下是91-100 订阅
排序:
The Role of AI in Enhancing Decision-Making in Small and Medium Enterprises (SMEs)  2
The Role of AI in Enhancing Decision-Making in Small and Med...
收藏 引用
2nd International Conference on computing and Data Analytics, ICCDA 2024
作者: Ines, Joefrelin C. Tolentino, Marilou Q. Cruz, Jay C. Dela Estabillo, Rolando Madlambayan, Anthony M. Mirano, Cirilo E. Vergara, Juvy A. College of Economics and Business Administration University of Technology and Applied Sciences Department of Business Admnistration Shinas Oman College of Business Systems Plus College Foundation Angeles City Philippines College of Computing and Information Sciences University of Technology and Applied Sciences Department of It Shinas Oman
This study investigates the transformative role of artificial intelligence (AI) in enhancing decision-making processes within small and medium enterprises (SMEs). By focusing on AI applications such as predictive anal... 详细信息
来源: 评论
Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics
Infeasibility of Sequitur-Based Motif for Mouse Dynamics in ...
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Richard Ikuesan Farkhund Iqbal Abdul Kadhim Hayawi Computing and Applied Technology College of Technological Innovation Zayed University Abu Dhabi UAE Computational Systems College of Interdisciplinary Studies Zayed University Abu Dhabi UAE
Utilizing and deploying behavioral biometric modalities (BBM), specifically mouse dynamics for user attribution in a digital investigation, has seen a rapid upsurge. However, as asserted in a recent study, the current... 详细信息
来源: 评论
Maximizing Resource Efficiency in Cloud Data Centers through Knowledge-Based Flower Pollination Algorithm (KB-FPA)
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3757-3782页
作者: Nidhika Chauhan Navneet Kaur Kamaljit Singh Saini Sahil Verma Kavita Ruba Abu Khurma Pedro A.Castillo University Institute of Computing Department Chandigarh UniversityPunjab140413India Department of Computer Science and Engineering Chandigarh UniversityPunjab140413India Universidade Federal do Piauí TeresinaPiauí64049-550Brazil MEU Research Unit Faculty of Information TechnologyMiddle East UniversityAmman11831Jordan Applied Science Research Center Applied Science Private UniversityAmman11931Jordan Department of Computer Engineering Automatics and RoboticsUniversity of GranadaGranada18071Spain
Cloud computing is a dynamic and rapidly evolving field,where the demand for resources fluctuates *** paper delves into the imperative need for adaptability in the allocation of resources to applications and services ... 详细信息
来源: 评论
Advancing Industrial Cybersecurity: Machine Learning-Based Detection and Mitigation of IIoT Attacks  5
Advancing Industrial Cybersecurity: Machine Learning-Based D...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Kumar, S Gouri Kiran Prasad, Raavi Satya College of Computing and Information Sciences University of Technology and Applied Sciences Muscat Oman Dhanekula Institute of Engineering & Technology Department of Computer Science & Engineering A.P. Vijayawada India
A threatening entry or exploitation of vulnerabilities within an industrial network or system connected to IoT devices is an IIoT (Industrial Internet of Things) attack. Due to manufacturing delays, broken equipment, ... 详细信息
来源: 评论
Robust speech perception and classification-driven deep convolutional neural network with natural language processing
收藏 引用
Alexandria Engineering Journal 2025年 123卷 358-368页
作者: Alshammari, Alya Alzaidi, Muhammad Swaileh A. Alrusaini, Othman Alshuhail, Asma Allafi, Randa Yafoz, Ayman Alsini, Raed Khadidos, Alaa O. Department of Applied Linguistics College of Languages Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of English Language College of Language Sciences King Saud University P. O. Box 145111 Riyadh Saudi Arabia Department of Engineering and Applied Sciences Applied College Umm Al-Qura University Makkah Saudi Arabia Department of Information Systems College of Computer Sciences & Information Technology King Faisal University Saudi Arabia Department of Computer Science College of Sciences Northern Border University Arar Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
Speech recognition systems use computer algorithms to interpret and process spoken words and translate them into text. Speech-to-text, or Speech detection, is the proficiency of a program or machine to find spoken wor... 详细信息
来源: 评论
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 190-204页
作者: Farhan Ullah Shamsher Ullah Gautam Srivastava Jerry Chun-Wei Lin School of Software Northwestern Polytechnical UniversityXian710072ShaanxiChina Knowledge Unit of Systems and Technology University of Management and TechnologySialkot 51040Pakistan Department of Math and Computer Science Brandon UniversityBrandonMB R7A 6A9Canada Department of Computer Science and Math Lebanese American UniversityBeirut1102Lebanon Western Norway University of Applied Sciences BergenNorway Research Centre for Interneural Computing China Medical UniversityTaichungTaiwanChina
A network intrusion detection system is critical for cyber security against llegitimate *** terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcat... 详细信息
来源: 评论
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network
Explainable Artificial Intelligence to Detect Image Spam Usi...
收藏 引用
2022 International Conference on Cyber Resilience, ICCR 2022
作者: Zhang, Zhibo Damiani, Ernesto Hamadi, Hussam Al Yeun, Chan Yeob Taher, Fatma Khalifa University C2PS Department of Electrical Engineering and Computer Science Abu Dhabi United Arab Emirates Zayed University Department of Computing and Applied Technology Dubai United Arab Emirates
Image spam threat detection has continually been a popular area of research with the internet's phenomenal expansion. This research presents an explainable framework for detecting spam images using Convolutional N... 详细信息
来源: 评论
AI Modeling and Water Quality Sensing Technique Proffers Water Security: An Open Review  3
AI Modeling and Water Quality Sensing Technique Proffers Wat...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Wilfred Blessing, N.R. Palarimath, Suresh Gunasekaran, Hemalatha Haidar, Sk Wasim Sutherlin Subitha, G. Sarmila, J. University of Technology and Applied Sciences College of Computing and Information Sciences Ibri Oman University of Technology and Applied Sciences College of Computing and Information Sciences Salalah Oman Stella Mary's College of Engineering Department of Computer Science and Engineering Kanyakumari District India St. Xavier's Catholic College of Engineering Department of Computer Science and Engineering Tamil Nadu Chunkankadai India
Water Quality Sensors (WQSs) are becoming a promised tool in water quality data assessment and scientific value of aquatic structure. Such sensors are broadly used to produce live results by evaluating major water qua... 详细信息
来源: 评论
Improving Quality of Service Using a Innovative Energy Effective Reinforcement Based Path Finding in Mobile Ad Hoc Network  2
Improving Quality of Service Using a Innovative Energy Effec...
收藏 引用
2nd International Conference on computing and Data Analytics, ICCDA 2024
作者: Singaravelan, M. Saleem Raja, A. Thangam, S. School of Computing Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Avadi Chennai India College of Computing and information Sciences University of Technology and Applied Sciences Shinas Oman Amrita school of computing Department of computer science and engineering Bengaluru India
RL stands for reinforcement learning, is a component of the broader field of machine learning. It provides a framework its features help to select an efficient action using previously learned information of interactio... 详细信息
来源: 评论
Automating the Selection of Proxy Variables of Unmeasured Confounders  41
Automating the Selection of Proxy Variables of Unmeasured Co...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Xie, Feng Chen, Zhengming Luo, Shanshan Miao, Wang Cai, Ruichu Geng, Zhi Department of Applied Statistics Beijing Technology and Business University Beijing China School of Computer Science Guangdong University of Technology Guangzhou510006 China Machine Learning Department Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates Department of Probability and Statistics Peking University Beijing China
Recently, interest has grown in the use of proxy variables of unobserved confounding for inferring the causal effect in the presence of unmeasured confounders from observational data. One difficulty inhibiting the pra... 详细信息
来源: 评论