咨询与建议

限定检索结果

文献类型

  • 6,703 篇 会议
  • 5,662 篇 期刊文献
  • 226 册 图书

馆藏范围

  • 12,591 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,906 篇 工学
    • 5,691 篇 计算机科学与技术...
    • 4,613 篇 软件工程
    • 1,860 篇 信息与通信工程
    • 1,258 篇 控制科学与工程
    • 1,004 篇 生物工程
    • 931 篇 电气工程
    • 790 篇 电子科学与技术(可...
    • 748 篇 生物医学工程(可授...
    • 636 篇 机械工程
    • 537 篇 光学工程
    • 434 篇 仪器科学与技术
    • 409 篇 动力工程及工程热...
    • 374 篇 网络空间安全
    • 314 篇 化学工程与技术
    • 313 篇 安全科学与工程
  • 4,372 篇 理学
    • 2,067 篇 数学
    • 1,491 篇 物理学
    • 1,141 篇 生物学
    • 678 篇 统计学(可授理学、...
    • 483 篇 系统科学
    • 385 篇 化学
  • 2,357 篇 管理学
    • 1,469 篇 管理科学与工程(可...
    • 946 篇 图书情报与档案管...
    • 688 篇 工商管理
  • 895 篇 医学
    • 744 篇 临床医学
    • 619 篇 基础医学(可授医学...
    • 393 篇 公共卫生与预防医...
    • 347 篇 药学(可授医学、理...
  • 393 篇 法学
    • 309 篇 社会学
  • 265 篇 经济学
    • 263 篇 应用经济学
  • 198 篇 教育学
  • 177 篇 农学
  • 59 篇 文学
  • 43 篇 军事学
  • 32 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 454 篇 deep learning
  • 347 篇 machine learning
  • 230 篇 computer science
  • 226 篇 accuracy
  • 220 篇 computational mo...
  • 213 篇 internet of thin...
  • 210 篇 artificial intel...
  • 206 篇 feature extracti...
  • 175 篇 predictive model...
  • 162 篇 support vector m...
  • 159 篇 optimization
  • 155 篇 data mining
  • 150 篇 information tech...
  • 141 篇 software enginee...
  • 137 篇 real-time system...
  • 112 篇 security
  • 111 篇 computational in...
  • 108 篇 neural networks
  • 102 篇 training
  • 101 篇 covid-19

机构

  • 288 篇 department for p...
  • 287 篇 department of ph...
  • 286 篇 faculty of scien...
  • 281 篇 departamento de ...
  • 276 篇 department of ph...
  • 272 篇 kirchhoff-instit...
  • 271 篇 department of ph...
  • 268 篇 department of ph...
  • 259 篇 faculté des scie...
  • 246 篇 institute of phy...
  • 245 篇 fakultät für phy...
  • 232 篇 yerevan physics ...
  • 230 篇 institut für ast...
  • 225 篇 department of ph...
  • 224 篇 department of ph...
  • 220 篇 physics division...
  • 217 篇 department of ph...
  • 211 篇 department of ph...
  • 199 篇 department of ph...
  • 199 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 264 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 258 篇 s. guindon
  • 251 篇 d. guest

语言

  • 10,967 篇 英文
  • 1,530 篇 其他
  • 99 篇 中文
  • 16 篇 日文
  • 11 篇 德文
  • 9 篇 法文
  • 4 篇 俄文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Software Engineering Faculty of Computer Science and Information Technology"
12591 条 记 录,以下是1201-1210 订阅
排序:
Brain Tumor Detection and Segmentation Using RCNN
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 5005-5020页
作者: Maham Khan Syed Adnan Shah Tenvir Ali Quratulain Aymen Khan Gyu Sang Choi Department of Computer Science University of Engineering&TechnologyTaxila47080Pakistan Faculty of Computing The Islamia University of BahawalpurBahawalpur63100Pakistan Department of Information and Communication Engineering Yeungnam UniversityGyeongbuk38541Korea
Brain tumors are considered as most fatal *** reduce the risk of death,early identification of the disease is *** of the best available methods to evaluate brain tumors is Magnetic resonance Images(MRI).Brain tumor de... 详细信息
来源: 评论
Novel Ransomware Hiding Model Using HEVC Steganography Approach
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 1209-1228页
作者: Iman Almomani Aala AlKhayer Walid El-Shafai Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School for Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Ransomware is considered one of the most threatening *** solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding ransomware apps and... 详细信息
来源: 评论
A Conceptual Framework for Multidisciplinary Data science Education Based on IoT Projects  6
A Conceptual Framework for Multidisciplinary Data Science Ed...
收藏 引用
6th International Workshop on Artificial Intelligence and Education, WAIE 2024
作者: Marutschke, Daniel Moritz Kirjakovski, Atanas Bachtiar, Fitra A. Hananto, Valentinus Roby Kovacs, Mate Brockmann, Patricia Kryssanov, Victor V. Kyoto University of Advanced Science Faculty of Economics and Business Administration Kyoto Japan International Balkan University Department of Psychology Skopje Macedonia Universitas Brawijaya Faculty of Computer Science Malang Indonesia College of Information Science and Engineering Ritsumeikan University Osaka Japan Nuremberg Institute of Technology Faculty of Computer Science Nuremberg Germany
The necessity for professionals to make predictions using digital data has been recognized for many decades. With its roots in statistical analysis and later implemented as data analytics, Data science emerged as a wi... 详细信息
来源: 评论
Optimizing Inventory Management using Demand Forecasting based Ensemble Stacking Model with Hyperparameter Tuning  1
Optimizing Inventory Management using Demand Forecasting bas...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Pavithra, V. Abbas, Haayder M. Manjula, B.M. Chidambaram, P.K. Jothilakshmi, S. Srm Institute of Science and Technology Faculty of Science and Humanities Department of Computer Science and Applications Ramapuram Chennai India The Islamic University of Al Diwaniyah College of Technical Engineering Department of Computers Techniques Engineering Al Diwaniyah Iraq Nitte Meenakshi Institute of Technology Department of Electronics and Communication Engineering Bengaluru India New Prince Shri Bhavani College of Engineering and Technology Department of Mechanical Engineering Chennai India Dhanalakshmi Srinivasan College of Engineering and Technology Department of Information Technology Mamallapuram India
In recent days, the effective inventory management relies on accurate demand forecasting for effective management of business balance stocks. However, the traditional forecasting methods often struggled with different... 详细信息
来源: 评论
Simulation model for power electronic conversion in stationary battery storage system  7
Simulation model for power electronic conversion in stationa...
收藏 引用
7th International Conference on Smart and Sustainable Technologies, SpliTech 2022
作者: Bilandzic, Josip Pelin, Denis Brandis, Andrej Topic, Danijel Knezcvic, Goran Simic, Zvonimir Technology Osijek Faculty of Electrical Engineering Computer Science and Information Department of Power Engineering Osijek Croatia
In this paper, battery charge and discharge simulation are shown for one battery energy storage system. For this purpose, the two-stage bidirectional power converter is used to achieve power conversion from battery st... 详细信息
来源: 评论
Coverless Image Steganography System Based on Maze Game Generation
收藏 引用
Intelligent Automation & Soft Computing 2023年 第11期38卷 125-138页
作者: Al Hussien Seddik Saad Mohammed S.Reda GamalM.Behery Ahmed A.El-harby Mohammed Baz Mohamed Abouhawwash Ahmed Ismail Ebada Department of computer science Faculty of ScienceMinia UniversityShalabyMiniaEgypt Department of computer science Faculty of Computers and Artificial IntelligenceDamietta UniversityNew DamiettaDamiettaEgypt Department of Computer Engineering College of Computer and Information TechnologyTaif UniversityP.O.Box 11099Taif21994Saudi Arabia Department of Mathematics Faculty of ScienceMansoura UniversityMansoura35516Egypt Department of Computational Mathematics Scienceand Engineering(CMSE)College of EngineeringMichigan State UniversityEast LansingMI48824USA Department of Information Systems Faculty of Computers and Artificial IntelligenceDamietta UniversityNew DamiettaDamiettaEgypt
The trend of digital information transformation has become a topic of *** data are threatening;thus,protecting such data from attackers is considered an essential ***,a new methodology for data concealing has been sug... 详细信息
来源: 评论
Optimized Deep Learning Model for Colorectal Cancer Detection and Classification Model
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 5751-5764页
作者: Mahmoud Ragab Khalid Eljaaly Maha Farouk SSabir Ehab Bahaudien Ashary S.M.Abo-Dahab E.M.Khalil Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Center of Artificial Intelligence for Precision Medicines King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Mathematics Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt Department of Pharmacy Practice Faculty of PharmacyKing Abdulaziz UniversityJeddah21589Saudi Arabia Information Systems Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Electrical and Computer Engineering Department Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia Computer Science Department Faculty of Computers and InformationLuxor University85951Egypt Mathematics Department Faculty of ScienceSouth Valley UniversityQena83523Egypt Department of Mathematics Faculty of ScienceTaif UniversityTaif21944Saudi Arabia
The recent developments in biological and information technologies have resulted in the generation of massive quantities of data it speeds up the process of knowledge discovery from biological *** to the advancements ... 详细信息
来源: 评论
Performance Assessment of Multi-Controller in software Defined Network  4
Performance Assessment of Multi-Controller in Software Defin...
收藏 引用
4th IEEE International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2023
作者: Jaiswal, Ankita Patra, Sudhansu Shekhar Dash, Bibhuti Bhusan Barik, Lalbihari Pandey, Trilok Nath Mishra, Manoj Ranjan School of Computer Engineering KIlT Deemed to Be University Bhubaneswar India King Abdulaziz University Faculty of Computing and Information Technology in Rabigh Department of Information Systems Saudi Arabia School of Computer Science and Engineering Vellore Institute of Technology Chennai India
In a network design, the control plane and the data plane are separated by the architectural concept of software defined networking (SDN). A centralised controller that serves as the only point of control for the whol... 详细信息
来源: 评论
Anomaly Detection in Univariate Time Series: HOT SAX vesus LSTM-Based Method  12th
Anomaly Detection in Univariate Time Series: HOT SAX vesus L...
收藏 引用
12th EAI International Conference on Context-Aware Systems and Applications, ICCASA 2023
作者: Anh, Duong Tuan Hoai, Tran Long Department of Information Technology HCMC University of Foreign Languages and Information Technology Ho Chi Minh City Viet Nam Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh City Viet Nam
Anomaly detection in time series has been an important and challenging research topic. There have been several methods proposed for detecting anomaly subsequences in a time series. The majority of these methods is cla... 详细信息
来源: 评论
Deep learning and ensemble methods for anomaly detection in ICS security
收藏 引用
International Journal of information technology (Singapore) 2025年 第3期17卷 1761-1775页
作者: Hossain, Md. Alamgir Hasan, Tahmid Karovic, jr, Vincent Abdeljaber, Hikmat A. M. Haque, Md. Alimul Ahmad, Sultan Zafar, Aasim Nazeer, Jabeen Mishra, B.K. Department of Computer Science and Engineering State University of Bangladesh South Purbachal Kanchan Dhaka 1461 Bangladesh Department of Computer Science and Engineering Prime University Dhaka Bangladesh Department of Information Systems Faculty of Management Comenius Bratislava Odbojárov 10 Bratislava 25 82005 Slovakia Department of Computer Science Faculty of Information Technology Applied Science Private University Amman 11931 Jordan MEU Research Unit Middle East University Amman 11831 Lebanon Department of Computer Science Veer Kunwar Singh University Bihar Ara India Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Alkharj 11942 Saudi Arabia University Center for Research and Development (UCRD) Department of Computer Science and Engineering Chandigarh University Gharuan Punjab Mohali 140413 India Department of Computer Science Aligarh Muslim University U.P Aligarh 202002 India P.G. Department of Physics Veer Kunwar Singh University Bihar Ara India
This research addresses the escalating threats to industrial control systems by introducing a novel approach that combines deep learning for feature selection with a robust ensemble-based classification technique to e... 详细信息
来源: 评论