咨询与建议

限定检索结果

文献类型

  • 1,692 篇 期刊文献
  • 986 篇 会议
  • 13 册 图书

馆藏范围

  • 2,691 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,784 篇 工学
    • 1,162 篇 计算机科学与技术...
    • 937 篇 软件工程
    • 314 篇 控制科学与工程
    • 312 篇 信息与通信工程
    • 214 篇 电气工程
    • 194 篇 生物医学工程(可授...
    • 190 篇 生物工程
    • 177 篇 机械工程
    • 174 篇 电子科学与技术(可...
    • 135 篇 光学工程
    • 119 篇 动力工程及工程热...
    • 93 篇 核科学与技术
    • 88 篇 化学工程与技术
    • 83 篇 网络空间安全
    • 78 篇 仪器科学与技术
    • 67 篇 安全科学与工程
    • 60 篇 材料科学与工程(可...
  • 992 篇 理学
    • 393 篇 物理学
    • 381 篇 数学
    • 243 篇 生物学
    • 126 篇 统计学(可授理学、...
    • 97 篇 系统科学
    • 94 篇 化学
  • 521 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 156 篇 图书情报与档案管...
    • 135 篇 工商管理
  • 304 篇 医学
    • 258 篇 临床医学
    • 196 篇 基础医学(可授医学...
    • 133 篇 公共卫生与预防医...
    • 100 篇 药学(可授医学、理...
  • 70 篇 法学
  • 55 篇 经济学
  • 46 篇 农学
  • 27 篇 教育学
  • 11 篇 艺术学
  • 5 篇 军事学
  • 4 篇 文学
  • 1 篇 哲学

主题

  • 196 篇 deep learning
  • 140 篇 machine learning
  • 82 篇 accuracy
  • 70 篇 internet of thin...
  • 55 篇 artificial intel...
  • 50 篇 predictive model...
  • 50 篇 convolutional ne...
  • 40 篇 covid-19
  • 40 篇 cloud computing
  • 38 篇 security
  • 37 篇 optimization
  • 37 篇 computational mo...
  • 36 篇 feature extracti...
  • 35 篇 data models
  • 32 篇 hadron-hadron sc...
  • 31 篇 training
  • 30 篇 feature selectio...
  • 29 篇 real-time system...
  • 29 篇 machine learning...
  • 26 篇 decision making

机构

  • 112 篇 department of ph...
  • 112 篇 department for p...
  • 110 篇 infn e laborator...
  • 109 篇 department of mo...
  • 108 篇 lpnhe sorbonne u...
  • 108 篇 kirchhoff-instit...
  • 105 篇 apc université p...
  • 105 篇 department physi...
  • 104 篇 department of ph...
  • 104 篇 department of ph...
  • 104 篇 faculty of scien...
  • 104 篇 west university ...
  • 101 篇 institute of phy...
  • 100 篇 department of ph...
  • 100 篇 fakultät für phy...
  • 99 篇 deutsches elektr...
  • 98 篇 institute of phy...
  • 96 篇 ochanomizu unive...
  • 96 篇 rio de janeiro s...
  • 91 篇 universität inns...

作者

  • 60 篇 c. alexa
  • 60 篇 g. bella
  • 60 篇 d. calvet
  • 60 篇 c. amelung
  • 59 篇 f. pastore
  • 59 篇 g. spigo
  • 58 篇 j. m. izen
  • 58 篇 j. strandberg
  • 58 篇 f. siegert
  • 58 篇 r. ströhmer
  • 58 篇 m. rijssenbeek
  • 58 篇 s. jin
  • 58 篇 g. gaudio
  • 58 篇 s. mohapatra
  • 57 篇 s. guindon
  • 56 篇 bellos p.
  • 56 篇 bona m.
  • 56 篇 bachacou h.
  • 56 篇 a. kaczmarska
  • 55 篇 bressler s.

语言

  • 2,471 篇 英文
  • 208 篇 其他
  • 11 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Software Engineering College of Computer Engineering and Sciences in Al-Kharj"
2691 条 记 录,以下是2571-2580 订阅
排序:
Iris recognition using genetic algorithms and asymmetrical SVMs
收藏 引用
Machine Graphics and Vision 2010年 第1期19卷 33-62页
作者: Roy, Kaushik Bhattacharya, Prabir Department of Computer Science and Software Engineering Concordia University Montreal QC H3G1M8 Canada Department of Computer Science College of Engineering and Applied Sciences University of Cincinnati Cincinnati OH 45221-0030 United States
With the increasing demand for enhanced security, iris biometrics-based personal identification has become an interesting research topic in the field of pattern recognition. While most state-of-the-art iris recognitio... 详细信息
来源: 评论
Evaluating neural network intrusion detection approaches using Analytic Hierarchy Process
Evaluating neural network intrusion detection approaches usi...
收藏 引用
International Symposium on Information Technology, ITSim
作者: Iftikhar Ahmad Azween B Abdullah Abdullah S alghamdi Department of Computer and Information Sciences Universiti Teknologi Petronas Bandar Seri Iskandar Tronoh Perak Malaysia Department of Software Engineering College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
At present age, security in computer and network systems is a pressing concern because a solo attack may cause an immense destruction in computer and network systems. Various intrusion detection approaches be present ... 详细信息
来源: 评论
Remote to Local attack detection using supervised neural network
Remote to Local attack detection using supervised neural net...
收藏 引用
International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Iftikhar Ahmad Azween B Abdullah Abdullah S alghamdi King Saud University Saudi Arabia Department of Computer and Information Sciences Universiti Teknologi MARA Bandar Perak Malaysia Department of Software Engineering College of Computer and Information Sciences King Saud University Saudi Arabia
In order to determine Remote to Local (R2L) attack, an intrusion detection technique based on artificial neural network is presented. This technique uses sampled dataset from Kddcup99 that is standard for benchmarking... 详细信息
来源: 评论
Investigating supervised neural networks to intrusion detection
收藏 引用
ICIC Express Letters 2010年 第6 A期4卷 2133-2138页
作者: Ahmad, Iftikhar Abdullah, Azween alghamdi, Abdullah Department of Software Engineering College of Computer and Information Sciences King Saud University P. O. Box 51178 Riyadh 11543 Saudi Arabia Department of Computer and Information Sciences Universiti Teknologi PETRONAS Bandar Seri Iskandar 31750 Tronoh Perak Malaysia
The application of neural networks towards intrusion detection is becoming a mainstream and a useful approach to deal with several current issues in this area. Currently, security in computer and network is a main pro... 详细信息
来源: 评论
Bézier curve based dynamic obstacle avoidance and trajectory learning for autonomous mobile robots
Bézier curve based dynamic obstacle avoidance and trajector...
收藏 引用
International Conference on Intelligent Systems Design and Applications (ISDA)
作者: Tayyab Chaudhry Tauseef Gulrez ali Zia Shyba Zaheer Intelligent Machines & Robotics Research Group Department of Computer Science Comsats Institute of Information Technology Lahore Pakistan Department of Electrical Engineering College of Engineering and Applied Sciences Al Ghurair University Dubai UAE
This paper addresses the problem of avoiding dynamic obstacles while following the learned trajectory through non-point based maps directly through laser data. The geometric representation of free configuration area c... 详细信息
来源: 评论
Re-thinking virtual universities
收藏 引用
Procedia - Social and Behavioral sciences 2010年 第2期2卷 5769-5774页
作者: İlker Yengin Dilek Karahoca Adem Karahoca Huseyin Uzunboylu College of Education and Human Sciences University of Nebraska-Lincoln Lincoln USA Software Engineering Department Bahcesehir University Ciragan 34353 Besiktas Istanbul Turkey Department of Computer Education and Instructional Technologies Near East University Lefkosa 98010 Northern Cyprus
The purpose of this paper is to review the key issues in the virtual universities and to provide general overview of the concepts based on the latest trends for the academic decision makers, e-learning designers and t... 详细信息
来源: 评论
Comparative Analysis of Intrusion Detection Approaches
Comparative Analysis of Intrusion Detection Approaches
收藏 引用
International Conference on computer Modeling and Simulation, UKSIM
作者: Iftikhar Ahmad Azween B. Abdullah Abdullah S. alghamdi DSE CCIS King Saud University Riyadh Saudi Arabia Department of Computer & Information Sciences Universiti Teknologi Malaysia Perak Malaysia Department of Software Engineering College of Computer & Information King Saud University Riyadh Saudi Arabia
Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue ... 详细信息
来源: 评论
Applying neural network to U2R attacks
Applying neural network to U2R attacks
收藏 引用
IEEE Symposium on Industrial Electronics & Applications (ISIEA)
作者: Iftikhar Ahmad Azween B Abdullah Abdullah S alghamdi King Saud University Riyadh Saudi Arabia Department of Computer & Information Sciences Universiti Teknologi Petronas Bandar Seri Iskandar Iskandar Perak Malaysia Department of Software Engineering College of Computer & Information King Saud University Riyadh Saudi Arabia
Intrusion detection using artificial neural networks is an ongoing area and thus interest in this field has increased among the researchers. Therefore, in this paper we present a system for tackling User to Root (U2R)... 详细信息
来源: 评论
IP core logic fault test simulation environment
IP core logic fault test simulation environment
收藏 引用
IEEE Instrumentation and Measurement Technology Conference
作者: Mansour H. Assaf Leslie-Ann Moore Sunil R. Das Emil M. Petriu Satyendra N. Biswas Department of Information Communications Technology University of Trinidad and Tobago Arima Trinidad and Tobago School of Information Technology and Engineering Faculty of Engineering University of Ottawa Ottawa ONT Canada Department of Computer Science College of Arts and Sciences Troy University Montgomery AL USA Department of Electronics Engineering Norfolk State University Norfolk VA USA
A low-level logic fault test simulation environment for embedded systems directed specifically towards application-specific integrated circuits (ASICs) and intellectual property (IP) cores is proposed in the paper. Th... 详细信息
来源: 评论
Urdu noun phrase chunking: HMM based approach
Urdu noun phrase chunking: HMM based approach
收藏 引用
International Conference on Educational and Information Technology (ICEIT)
作者: Wajid ali M. Kamran Malik Sarmad Hussain Shahid Siddiq Aasim ali Department of Computer Sciences National University of Computer and Emerging Sciences Lahore Pakistan Institute of Business and Information Technology (IBIT) University of Punjab Lahore Pakistan Center of Language Engineering Al-Khawarizmi Institute of Computer Sciences UET Taxila Lahore Pakistan Punjab University College of Information Technology (PUCIT) University of Punjab Lahore Pakistan
Extraction of noun phrase (NP) from text is useful for many natural language processing applications, such as name entity recognition, indexing, searching, parsing etc. We present a noun phrase chunker for Urdu which ... 详细信息
来源: 评论