咨询与建议

限定检索结果

文献类型

  • 7,837 篇 会议
  • 6,139 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 13,983 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,395 篇 工学
    • 6,180 篇 计算机科学与技术...
    • 5,022 篇 软件工程
    • 1,973 篇 信息与通信工程
    • 1,345 篇 控制科学与工程
    • 1,070 篇 生物工程
    • 895 篇 电气工程
    • 854 篇 生物医学工程(可授...
    • 825 篇 电子科学与技术(可...
    • 662 篇 机械工程
    • 570 篇 光学工程
    • 480 篇 仪器科学与技术
    • 399 篇 动力工程及工程热...
    • 397 篇 网络空间安全
    • 390 篇 化学工程与技术
    • 315 篇 安全科学与工程
  • 5,070 篇 理学
    • 2,360 篇 数学
    • 1,763 篇 物理学
    • 1,235 篇 生物学
    • 759 篇 统计学(可授理学、...
    • 535 篇 系统科学
    • 445 篇 化学
  • 2,683 篇 管理学
    • 1,590 篇 管理科学与工程(可...
    • 1,171 篇 图书情报与档案管...
    • 789 篇 工商管理
  • 1,029 篇 医学
    • 861 篇 临床医学
    • 699 篇 基础医学(可授医学...
    • 423 篇 公共卫生与预防医...
    • 409 篇 药学(可授医学、理...
  • 448 篇 法学
    • 379 篇 社会学
  • 272 篇 经济学
    • 271 篇 应用经济学
  • 249 篇 教育学
  • 211 篇 农学
  • 83 篇 文学
  • 40 篇 军事学
  • 36 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 485 篇 deep learning
  • 324 篇 machine learning
  • 320 篇 computer science
  • 230 篇 information tech...
  • 225 篇 feature extracti...
  • 222 篇 computational mo...
  • 221 篇 accuracy
  • 216 篇 internet of thin...
  • 185 篇 support vector m...
  • 178 篇 data mining
  • 157 篇 optimization
  • 150 篇 predictive model...
  • 121 篇 covid-19
  • 111 篇 neural networks
  • 101 篇 security
  • 99 篇 image segmentati...
  • 98 篇 real-time system...
  • 97 篇 reliability
  • 96 篇 training
  • 95 篇 authentication

机构

  • 291 篇 faculty of scien...
  • 291 篇 department for p...
  • 286 篇 department of ph...
  • 283 篇 departamento de ...
  • 276 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 265 篇 department of ph...
  • 265 篇 department of ph...
  • 259 篇 faculté des scie...
  • 251 篇 institute of phy...
  • 245 篇 fakultät für phy...
  • 233 篇 yerevan physics ...
  • 233 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 210 篇 department of ph...
  • 210 篇 institute of phy...
  • 197 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 259 篇 y. nagasaka
  • 256 篇 s. guindon
  • 250 篇 d. guest

语言

  • 13,474 篇 英文
  • 425 篇 其他
  • 69 篇 中文
  • 22 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 3 篇 斯洛文尼亚文
  • 2 篇 俄文
  • 1 篇 荷兰文
检索条件"机构=Department of Multimedia in Faculty Computer Science and Information Technology"
13983 条 记 录,以下是11-20 订阅
排序:
Metaheuristic task offloading approaches for minimization of energy consumption on edge computing: a systematic review
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-30页
作者: Latip, Rohaya Aminu, Jafar Hanafi, Zurina Mohd Kamarudin, Shafinah Gabi, Danlami Faculty of Computer Science and Information Technology Universiti Putra Serdang Malaysia Department of Computer Science Kebbi State University of Science and Technology Aleiro Aleiro Nigeria
A systematic review of metaheuristic Algorithms for energy-efficient task offloading in edge computing is provided. The Grey Wolf Optimizer (GWO) is explored as a promising approach for reducing energy consumption. Fu... 详细信息
来源: 评论
An Experimental Study on Dynamic Lifelong Learning with GPT for Mitigating Catastrophic Forgetting in Aspect-Based Sentiment Analysis
收藏 引用
IEEE Access 2025年 13卷 90316-90332页
作者: Huang, Huang Asemi, Adeleh Universiti Malaya Faculty of Computer Science Information Technology Department of Software Engineering Kuala Lumpur Malaysia
GPT is widely recognized as one of the most versatile and powerful large language models, excelling across diverse domains. However, its significant computational demands often render it economically unfeasible for in... 详细信息
来源: 评论
Advanced Machine Learning Approaches for Breast Cancer Detection with Neutrosophic Sets
收藏 引用
Neutrosophic Sets and Systems 2025年 81卷 273-284页
作者: Elbehiery, Hussam Fathi, Hanaa Eassa, Mohamed Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Mahmoud, Hadeer Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt College of Information Technology Amman Arab University Amman Jordan Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Artificial Intelligence Faculty of Computers and Artificial Intelligence Modern University for Technology & Information Cairo Egypt
Breast Cancer (BC) remains a significant health challenge for women and is one of the leading causes of mortality worldwide. Accurate diagnosis is critical for successful therapy and increased survival rates. Recent a... 详细信息
来源: 评论
Central Tendency Feature Selection (CTFS): a novel approach for efficient and effective feature selection in intrusion detection systems
收藏 引用
multimedia Tools and Applications 2025年 1-22页
作者: Bouke, Mohamed Aly Abdullah, Azizol Udzir, Nur Izura Samian, Normalia Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia 43400 Serdang Malaysia
In the digital era, the escalation of data generation and cyber threats has heightened the importance of network security. Machine Learning-based Intrusion Detection Systems (IDS) play a crucial role in combating thes... 详细信息
来源: 评论
Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1723-1734页
作者: Awny Sayed Maha Mahrous Enas Elgeldawi Computer Science Department Faculty of ScienceMinia UniversityMinia61519Egypt Faculty of Computing and Information Technology Information Technology DepartmentKing Abdulaziz UniversityJeddah21589Saudi Arabia Computer Science Department Faculty of Computers and InformationMinia UniversityMinia61519Egypt
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern.A robust data security system should protect the information assets of any organization against cybercr... 详细信息
来源: 评论
Stylometry-driven framework for Urdu intrinsic plagiarism detection: a comprehensive analysis using machine learning, deep learning, and large language models
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6479-6513页
作者: Manzoor, Muhammad Faraz Farooq, Muhammad Shoaib Abid, Adnan Department of Computer Science University of Management and Technology Lahore Pakistan Department of Data Science Faculty of Computing and Information Technology University of the Punjab Lahore Pakistan
Detecting plagiarism in documents is a well-established task in natural language processing (NLP). Broadly, plagiarism detection is categorized into two types (1) intrinsic: to check the whole document or all the pass... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
Modern Standard Arabic speech disorders corpus for digital speech processing applications
收藏 引用
International Journal of Speech technology 2024年 第1期27卷 157-170页
作者: Alqudah, Assal A. M. Alshraideh, Mohammad A. M. Abushariah, Mohammad A. M. Sharieh, Ahmad A. S. Department of Computer Science King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan
Digital speech processing applications including automatic speech recognition (ASR), speaker recognition, speech translation, and others, essentially require large volumes of speech data for training and testing purpo... 详细信息
来源: 评论
Workout Action Recognition in Video Streams Using an Attention Driven Residual DC-GRU Network
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3067-3087页
作者: Arnab Dey Samit Biswas Dac-Nhuong Le Department of Computer Science and Technology Indian Institute of Engineering Science and TechnologyShibpurHowrah711103India Faculty of Information Technology Haiphong UniversityHaiphong180000Vietnam
Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions i... 详细信息
来源: 评论