咨询与建议

限定检索结果

文献类型

  • 15,687 篇 会议
  • 10,023 篇 期刊文献
  • 461 册 图书

馆藏范围

  • 26,171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,598 篇 工学
    • 11,354 篇 计算机科学与技术...
    • 8,943 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 2,385 篇 控制科学与工程
    • 1,646 篇 电气工程
    • 1,634 篇 生物工程
    • 1,322 篇 电子科学与技术(可...
    • 1,220 篇 生物医学工程(可授...
    • 1,056 篇 机械工程
    • 883 篇 光学工程
    • 692 篇 仪器科学与技术
    • 672 篇 化学工程与技术
    • 588 篇 动力工程及工程热...
    • 527 篇 安全科学与工程
  • 8,655 篇 理学
    • 4,433 篇 数学
    • 2,527 篇 物理学
    • 1,913 篇 生物学
    • 1,444 篇 统计学(可授理学、...
    • 1,060 篇 系统科学
    • 743 篇 化学
  • 4,801 篇 管理学
    • 2,866 篇 管理科学与工程(可...
    • 2,150 篇 图书情报与档案管...
    • 1,572 篇 工商管理
  • 1,430 篇 医学
    • 1,208 篇 临床医学
    • 969 篇 基础医学(可授医学...
    • 603 篇 公共卫生与预防医...
    • 526 篇 药学(可授医学、理...
  • 885 篇 法学
    • 733 篇 社会学
  • 601 篇 经济学
    • 589 篇 应用经济学
  • 516 篇 教育学
    • 482 篇 教育学
  • 326 篇 农学
  • 129 篇 文学
  • 59 篇 军事学
  • 56 篇 艺术学
  • 17 篇 哲学
  • 6 篇 历史学

主题

  • 1,187 篇 computer science
  • 761 篇 information syst...
  • 590 篇 deep learning
  • 449 篇 machine learning
  • 360 篇 artificial intel...
  • 309 篇 computational mo...
  • 290 篇 data mining
  • 287 篇 application soft...
  • 286 篇 accuracy
  • 275 篇 feature extracti...
  • 273 篇 internet of thin...
  • 273 篇 computer archite...
  • 242 篇 support vector m...
  • 203 篇 software enginee...
  • 192 篇 neural networks
  • 192 篇 training
  • 180 篇 routing
  • 170 篇 covid-19
  • 154 篇 information syst...
  • 151 篇 image segmentati...

机构

  • 289 篇 faculty of scien...
  • 283 篇 department for p...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 274 篇 department of ph...
  • 265 篇 department of ph...
  • 263 篇 department of ph...
  • 258 篇 faculté des scie...
  • 224 篇 kirchhoff-instit...
  • 223 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 212 篇 yerevan physics ...
  • 201 篇 department of ph...
  • 197 篇 department of ph...
  • 195 篇 fakultät für phy...
  • 180 篇 institute of phy...
  • 174 篇 department of ph...
  • 170 篇 centre de calcul...
  • 169 篇 institut für ast...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 264 篇 a. c. könig
  • 260 篇 m. klein
  • 259 篇 h. a. gordon
  • 257 篇 r. ströhmer
  • 254 篇 m. rijssenbeek
  • 254 篇 s. jin
  • 254 篇 g. gaudio
  • 252 篇 h. sakamoto
  • 251 篇 s. mohapatra
  • 246 篇 y. nagasaka
  • 242 篇 y. tayalati
  • 241 篇 d. guest

语言

  • 24,743 篇 英文
  • 1,231 篇 其他
  • 181 篇 中文
  • 22 篇 日文
  • 9 篇 德文
  • 4 篇 法文
  • 4 篇 斯洛文尼亚文
  • 1 篇 俄文
检索条件"机构=Department of Information Systems and Applied Computer Science"
26171 条 记 录,以下是61-70 订阅
排序:
AMachine Learning Approach to Cyberbullying Detection in Arabic Tweets
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1033-1054页
作者: Dhiaa Musleh Atta Rahman Mohammed Abbas Alkherallah Menhal Kamel Al-Bohassan Mustafa Mohammed Alawami Hayder Ali Alsebaa Jawad Ali Alnemer Ghazi Fayez Al-Mutairi May Issa Aldossary Dalal A.Aldowaihi Fahd Alhaidari Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Networks and Communications College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
With the rapid growth of internet usage,a new situation has been created that enables practicing *** has increased over the past decade,and it has the same adverse effects as face-to-face bullying,like anger,sadness,a... 详细信息
来源: 评论
Deepfake detection using convolutional vision transformers and convolutional neural networks
收藏 引用
Neural Computing and Applications 2024年 第31期36卷 19759-19775页
作者: Soudy, Ahmed Hatem Sayed, Omnia Tag-Elser, Hala Ragab, Rewaa Mohsen, Sohaila Mostafa, Tarek Abohany, Amr A. Slim, Salwa O. Department of Computer Science Faculty of Computers and Artificial Intelligence Helwan University Cairo Egypt Department of Information Systems Faculty of Computers and Information Kafrelsheikh University Kafrelsheikh Egypt
Deepfake technology has rapidly advanced in recent years, creating highly realistic fake videos that can be difficult to distinguish from real ones. The rise of social media platforms and online forums has exacerbated... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Enhanced Adaptive Brain-computer Interface Approach for Intelligent Assistance to Disabled Peoples
收藏 引用
computer systems science & Engineering 2023年 第8期46卷 1355-1369页
作者: Ali Usman Javed Ferzund Ahmad Shaf Muhammad Aamir Samar Alqhtani Khlood M.Mehdar Hanan Talal Halawani Hassan A.Alshamrani Abdullah A.Asiri Muhammad Irfan Department of Computer Science COMSATS University IslamabadSahiwal CampusSahiwal57000Pakistan Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Anatomy Department Medicine CollegeNajran UniversityNajran61441Saudi Arabia Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Radiological Sciences Department College of Applied Medical Sciences and Information SystemsNajran UniversityNajran61441Kingdom of Saudi Arabia Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia
Assistive devices for disabled people with the help of Brain-computer Interaction(BCI)technology are becoming vital bio-medical *** with physical disabilities need some assistive devices to perform their daily *** the... 详细信息
来源: 评论
AI-powered dining: text information extraction and machine learning for personalized menu recommendations and food allergy management
收藏 引用
International Journal of information Technology (Singapore) 2025年 第4期17卷 2107-2115页
作者: Brahimi, Samiha Department of Computer Information Systems College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam 31441 Saudi Arabia
Individuals with food allergies face limitations in social events and restaurant dining. Artificial intelligence solutions should be offered to this category. In this paper, a recommender system is proposed for the be... 详细信息
来源: 评论
Modified Feature Selection with BPSO to Apply PSO for Solving Handwritten Digits  12
Modified Feature Selection with BPSO to Apply PSO for Solvin...
收藏 引用
12th International Electrical Engineering Congress, iEECON 2024
作者: Ratanavilisagul, Chiabwoot Faculty Of Applied Science Department Of Computer And Information Sciences Bangkok Thailand
The task of Handwriting Digits Recognition represents a classification challenge involving the interpretation of handwritten digits sourced from diverse mediums such as paper, photos, touch screens, and other devices.... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Automated Autism Spectral Disorder Classification Using Optimal Machine Learning Model
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5251-5265页
作者: Hanan Abdullah Mengash Hamed Alqahtani Mohammed Maray Mohamed K.Nour Radwa Marzouk Mohammed Abdullah Al-Hagery Heba Mohsen Mesfer Al Duhayyim Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Systems College of Computer ScienceCenter of Artificial Intelligence and Unit of CybersecurityKing Khalid UniversityAbhaSaudi Arabia Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of ComputerQassim UniversitySaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
Autism Spectrum Disorder (ASD) refers to a neuro-disorder wherean individual has long-lasting effects on communication and interaction *** information technologywhich employs artificial intelligence(AI) model has assi... 详细信息
来源: 评论
Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks:An Empirical Study
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1635-1654页
作者: Shahad Alzahrani Hatim Alsuwat Emad Alsuwat Independent Researcher Specializing in Data Security and Privacy Taif26571Saudi Arabia Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah24382Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif26571Saudi Arabia
Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among ***,the reliability and integrity of learned Bayesian network models are highly dependent on the quality... 详细信息
来源: 评论
Optimizing Broadcast Utilization for Efficient Disaster Management Using Wireless Ad Hoc Networks and Novel Energy-Saving Algorithms
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第20期18卷 142-156页
作者: Alzyoud, Faisal Y. Tarawneh, Monther Almaghthawi, Ahmed Altalidi, Askar Asiri, Layla Alrehaili, Meaad Department of Computer Science Faculty of Information Technology Isra University Amman Jordan Department of Information Technology College of Information Technology and Communications Tafila TechnicaUniversity Tafila Jordan Department of Computer Science College of Science & Art at Mahayil King Khalid University Abha Saudi Arabia Department of Information Science College of Science & Art at Mahayil King Khalid University Abha Saudi Arabia Departement of Computer Information System Applied college at Mahayil King Khalid University Abha Saudi Arabia Department of Computer Sciences and Artificial Intelligence Collège of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
Globalization, industry, and population growth is considered the main reasons for climate change, so when some natural calamity or disaster occurs in any area, it leads to isolating this area from the rest of the regi... 详细信息
来源: 评论