咨询与建议

限定检索结果

文献类型

  • 7,837 篇 会议
  • 6,139 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 13,983 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,395 篇 工学
    • 6,180 篇 计算机科学与技术...
    • 5,022 篇 软件工程
    • 1,973 篇 信息与通信工程
    • 1,345 篇 控制科学与工程
    • 1,070 篇 生物工程
    • 895 篇 电气工程
    • 854 篇 生物医学工程(可授...
    • 825 篇 电子科学与技术(可...
    • 662 篇 机械工程
    • 570 篇 光学工程
    • 480 篇 仪器科学与技术
    • 399 篇 动力工程及工程热...
    • 397 篇 网络空间安全
    • 390 篇 化学工程与技术
    • 315 篇 安全科学与工程
  • 5,070 篇 理学
    • 2,360 篇 数学
    • 1,763 篇 物理学
    • 1,235 篇 生物学
    • 759 篇 统计学(可授理学、...
    • 535 篇 系统科学
    • 445 篇 化学
  • 2,683 篇 管理学
    • 1,590 篇 管理科学与工程(可...
    • 1,171 篇 图书情报与档案管...
    • 789 篇 工商管理
  • 1,029 篇 医学
    • 861 篇 临床医学
    • 699 篇 基础医学(可授医学...
    • 423 篇 公共卫生与预防医...
    • 409 篇 药学(可授医学、理...
  • 448 篇 法学
    • 379 篇 社会学
  • 272 篇 经济学
    • 271 篇 应用经济学
  • 249 篇 教育学
  • 211 篇 农学
  • 83 篇 文学
  • 40 篇 军事学
  • 36 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 485 篇 deep learning
  • 324 篇 machine learning
  • 320 篇 computer science
  • 230 篇 information tech...
  • 225 篇 feature extracti...
  • 222 篇 computational mo...
  • 221 篇 accuracy
  • 216 篇 internet of thin...
  • 185 篇 support vector m...
  • 178 篇 data mining
  • 157 篇 optimization
  • 150 篇 predictive model...
  • 121 篇 covid-19
  • 111 篇 neural networks
  • 101 篇 security
  • 99 篇 image segmentati...
  • 98 篇 real-time system...
  • 97 篇 reliability
  • 96 篇 training
  • 95 篇 authentication

机构

  • 291 篇 faculty of scien...
  • 291 篇 department for p...
  • 286 篇 department of ph...
  • 283 篇 departamento de ...
  • 276 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 265 篇 department of ph...
  • 265 篇 department of ph...
  • 259 篇 faculté des scie...
  • 251 篇 institute of phy...
  • 245 篇 fakultät für phy...
  • 233 篇 yerevan physics ...
  • 233 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 210 篇 department of ph...
  • 210 篇 institute of phy...
  • 197 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 259 篇 y. nagasaka
  • 256 篇 s. guindon
  • 250 篇 d. guest

语言

  • 13,474 篇 英文
  • 425 篇 其他
  • 69 篇 中文
  • 22 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 3 篇 斯洛文尼亚文
  • 2 篇 俄文
  • 1 篇 荷兰文
检索条件"机构=Department of Multimedia in Faculty Computer Science and Information Technology"
13983 条 记 录,以下是41-50 订阅
排序:
Shear Let Transform Residual Learning Approach for Single-Image Super-Resolution
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3193-3209页
作者: Israa Ismail Ghada Eltaweel Mohamed Meselhy Eltoukhy Department of Computer Science Faculty of Computers and InformaticsSuez Canal UniversityIsmailia51422Egypt Department of Information Technology College of Computing and Information Technology at KhulaisUniversity of JeddahJeddahSaudi Arabia
Super-resolution techniques are employed to enhance image resolution by reconstructing high-resolution images from one or more low-resolution ***-resolution is of paramount importance in the context of remote sensing,... 详细信息
来源: 评论
Transfer function adaptation for effective feature selection with the side-blotched lizard algorithm
收藏 引用
multimedia Tools and Applications 2024年 1-21页
作者: Eisa, Mohamed Abdel-lah, Marwa Farouk, Fifi Abdel-aal, Amr System and Information Technology Department Faculty of Management Technology and Information System Port Said University Port Said Egypt Department of Computer Science Faculty of Computer and Informatics Zagazig University Zagazig Egypt
Feature selection is a crucial preprocessing step in data mining and machine learning, enhancing model performance and computational efficiency. This paper investigates the effectiveness of the Side-Blotched Lizard Op... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Energy and QoS-aware virtual machine placement approach for IaaS cloud datacenter
收藏 引用
Neural Computing and Applications 2025年 第4期37卷 2211-2237页
作者: Elsedimy, E.I. Herajy, Mostafa Abohashish, Sara M. M. Department of Information Technology Management Faculty of Management Technology and Information Systems Port Said University Port Said Egypt Department of Mathematics and Computer Science Faculty of Science Port Said University Port Said Egypt Cyber Secuirty Department Faculty of Science Al-Esraa University College Baghdad Iraq
Virtualization technology enables cloud providers to abstract, hide, and manage the underlying physical resources of cloud data centers in a flexible and scalable manner. It allows placing multiple independent virtual... 详细信息
来源: 评论
Fusion Strategy for Improving Medical Image Segmentation
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3627-3646页
作者: Fahad Alraddady E.A.Zanaty Aida HAbu bakr Walaa M.Abd-Elhafiez Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Information System Department Faculty of Computers and InformationSohag UniversitySohagEgypt Mathematical and Computer Science Department Faculty of ScienceAswan UniversityAswanEgypt College of Computer Science&Information Technology Jazan UniversityJazanKingdom of Saudi Arabia Computer Science Department Faculty of Computers and Artificial IntelligenceSohag UniversitySohagEgypt
In this paper,we combine decision fusion methods with four metaheuristic algorithms(Particle Swarm Optimization(PSO)algorithm,Cuckoo search algorithm,modification of Cuckoo Search(CS McCulloch)algorithm and Genetic al... 详细信息
来源: 评论
A Package Level Regression Test Selection Approach for Java Software Systems
收藏 引用
IEEE Access 2025年 13卷 87848-87861页
作者: Al-Refai, Mohammed Hammad, Mahmoud M. Faculty of Computer and Information Technology Computer Science Department Jordan university of science and technology P.O. Box 3030 Irbid22110 Jordan Ajman University Department of Information Technology Faculty of Engineering and Information Technology Ajman United Arab Emirates Jordan University of Science and Technology Faculty of Computer and Information Technology Software Engineering Department P.O. Box 3030 Irbid22110 Jordan
Regression testing of software systems is an important and critical activity but can be expensive and resource-intensive. An approach to enhance its efficiency is Regression Test Selection (RTS), which selectively re-... 详细信息
来源: 评论
Enhancing Drone Security Through Multi-Sensor Anomaly Detection and Machine Learning
收藏 引用
SN computer science 2024年 第5期5卷 651页
作者: Alzahrani, Mohammed Y. Department of Information Technology Faculty of Computer Science & amp Information Technology AlBaha University AlBaha Saudi Arabia
Unmanned Aerial Vehicles (UAVs), commonly referred to as drones, have determined numerous applications across industries, ranging from aerial surveillance to package shipping. As drones are used in vital operations, e... 详细信息
来源: 评论
A Novel Framework for Gauging information Extracted from Smartphones Using Neutrosophic Logic
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 154-171页
作者: Abou Alzahab, R.M. Ismail, Amr Abd Elkhalik, S.H. Shams, M.Y. El-Bakry, H.M. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Department. of Communication and Computer Engineering Air Defense University Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Department of Information Systems. Faculty of Computer and Information Science Mansoura University Egypt
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and... 详细信息
来源: 评论
Enhanced Federated Learning Framework based on Deep Learning and Neutrosophic Set for Android Malware Classification
收藏 引用
Neutrosophic Sets and Systems 2025年 82卷 781-799页
作者: Abdellah, Mohamed Refaat Oudah, Hasan H. Badawy, Ahmed Mohamed Ahmed Mohamed, Abdelfattah Abdelfattah M. Bedier, Shady Ahmed Metwaly, Ahmed A. Eassa, Mohamed Abdelhafeez, Ahmed The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt College of Arts Department of Journalism Ahl Al Bayt University Karbala Iraq Cybersecurity Department Faculty of Computers and Artificial Intelligence Helwan University Egypt Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Department of Computer Science Faculty of Computers and Informatics Zagazig University Zagazig44519 Egypt Applied Science Research Center Applied Science Private University Amman Jordan
Malware detection is one of the critical tasks of cybersecurity, especially considering the growing popularity of mobile devices. The integrity and security of mobile ecosystems rely on the capacity to identify malwar... 详细信息
来源: 评论
A three-step SEM-Bayesian network approach for predicting the determinants of CloudIoT-based healthcare adoption
收藏 引用
International Journal of information technology (Singapore) 2024年 1-21页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
Adopting the CloudIoT-based healthcare paradigm provides various prospects for medical IT and considerably enhances healthcare services. However, compared to the advanced development of CloudIoT-based healthcare syste... 详细信息
来源: 评论