咨询与建议

限定检索结果

文献类型

  • 6,763 篇 会议
  • 5,730 篇 期刊文献
  • 226 册 图书

馆藏范围

  • 12,719 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,897 篇 工学
    • 5,785 篇 计算机科学与技术...
    • 4,660 篇 软件工程
    • 1,926 篇 信息与通信工程
    • 1,316 篇 控制科学与工程
    • 1,011 篇 生物工程
    • 985 篇 电气工程
    • 810 篇 电子科学与技术(可...
    • 757 篇 生物医学工程(可授...
    • 658 篇 机械工程
    • 550 篇 光学工程
    • 446 篇 仪器科学与技术
    • 419 篇 动力工程及工程热...
    • 406 篇 网络空间安全
    • 326 篇 安全科学与工程
    • 316 篇 化学工程与技术
  • 4,425 篇 理学
    • 2,070 篇 数学
    • 1,503 篇 物理学
    • 1,148 篇 生物学
    • 668 篇 统计学(可授理学、...
    • 484 篇 系统科学
    • 399 篇 化学
  • 2,404 篇 管理学
    • 1,503 篇 管理科学与工程(可...
    • 969 篇 图书情报与档案管...
    • 691 篇 工商管理
  • 919 篇 医学
    • 753 篇 临床医学
    • 625 篇 基础医学(可授医学...
    • 406 篇 公共卫生与预防医...
    • 349 篇 药学(可授医学、理...
  • 405 篇 法学
    • 320 篇 社会学
  • 268 篇 经济学
    • 266 篇 应用经济学
  • 200 篇 教育学
  • 180 篇 农学
  • 61 篇 文学
  • 43 篇 军事学
  • 32 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 473 篇 deep learning
  • 352 篇 machine learning
  • 231 篇 computer science
  • 221 篇 accuracy
  • 218 篇 computational mo...
  • 213 篇 internet of thin...
  • 207 篇 artificial intel...
  • 204 篇 feature extracti...
  • 171 篇 predictive model...
  • 162 篇 support vector m...
  • 161 篇 optimization
  • 154 篇 data mining
  • 150 篇 information tech...
  • 141 篇 software enginee...
  • 136 篇 real-time system...
  • 110 篇 computational in...
  • 110 篇 security
  • 109 篇 neural networks
  • 101 篇 covid-19
  • 100 篇 training

机构

  • 289 篇 department for p...
  • 288 篇 department of ph...
  • 287 篇 faculty of scien...
  • 282 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 269 篇 department of ph...
  • 266 篇 department of ph...
  • 260 篇 faculté des scie...
  • 246 篇 fakultät für phy...
  • 246 篇 institute of phy...
  • 233 篇 yerevan physics ...
  • 230 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 214 篇 department of ph...
  • 209 篇 department of ph...
  • 200 篇 institute of phy...
  • 197 篇 department of ph...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 263 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 258 篇 s. guindon
  • 251 篇 d. guest

语言

  • 10,536 篇 英文
  • 2,095 篇 其他
  • 101 篇 中文
  • 17 篇 日文
  • 12 篇 德文
  • 10 篇 法文
  • 5 篇 俄文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
检索条件"机构=Department of Software Engineering. Faculty of Computer Science and Information Technology"
12719 条 记 录,以下是31-40 订阅
排序:
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
science China(information sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Fake News Classification: Past, Current, and Future
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2225-2249页
作者: Muhammad Usman Ghani Khan Abid Mehmood Mourad Elhadef Shehzad Ashraf Chaudhry Department of Computer Science University of Engineering and TechnologyLahore54890Pakistan Department of Computer Science&Information Technology Abu Dhabi UniversityAbu Dhabi59911United Arab Emirates Department of Software Engineering Faculty of Engineering and ArchitectureNisantasi UniversityIstanbulTurkey
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can qu... 详细信息
来源: 评论
Smart Glove with Mobile Application to Detect Static Arabic Hijaiyah Hand Code for Quran Recitation  21
Smart Glove with Mobile Application to Detect Static Arabic ...
收藏 引用
21st International Learning and technology Conference, L and T 2024
作者: Elshareif, Mohamed Elgilani Eltahir Ahmad Alias, Nurul Aswani Jomhari, Nazean Sofian, Hazrina University of Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur Malaysia
The use of assistive technology in the field of education is now a common practice in today's tech-driven era. The implementation is quite rampant in all levels and sections of education, including by special need... 详细信息
来源: 评论
Leveraging the Potential of Large Language Models
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第8期48卷 1-16页
作者: Prasad, Shreya Gupta, Himank Ghosh, Arup Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Computer Science and Information Technology Graceland University LamoniIA United States
This study focuses on enhancing Natural Language Processing (NLP) in generative AI chatbots through the utilization of advanced pre-trained models. We assessed five distinct Large Language Models (LLMs): TRANSFORMER M... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Feature engineering.Methods for Analyzing Blood Samples for Early Diagnosis of Hepatitis Using Machine Learning Approaches
收藏 引用
computer Modeling in engineering.& sciences 2025年 第3期142卷 3229-3254页
作者: Mohamed A.G.Hazber Ebrahim Mohammed Senan Hezam Saud Alrashidi Department of Information and Computer Science College of Computer Science and EngineeringUniversity of Ha’ilHail81481Saudi Arabia Department of Computer Science College of Applied SciencesHajjah UniversityHajjah9677Yemen Department of Artificial Intelligence Faculty of Computer Science and Information TechnologyAl-Razi UniversitySana’a9671Yemen
Hepatitis is an infection that affects the liver through contaminated foods or blood transfusions,and it has many types,from normal to *** is diagnosed through many blood tests and factors;Artificial Intelligence(AI)t... 详细信息
来源: 评论
An Adaptive Framework for Classification and Detection of Android Malware
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第21期18卷 59-73页
作者: Al Sharah, Ashraf Alrub, Yousef Abu Owida, Hamza Abu Elsoud, Esraa Abu Alshdaifat, Nawaf Khtatnaha, Hamzah Department of Electrical Engineering College of Engineering Technology Al-Balqa Applied University Amman Jordan Department of Computer Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Medical Engineering Faculty of Engineering Al-Ahliyya Amman University Amman Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Faculty of Information Technology Applied Science Private University Amman Jordan
The hardware and software of a computer are controlled by its operating system (OS), which performs essential tasks such as input and output processing, file and memory management, and the management of peripheral dev... 详细信息
来源: 评论
A Parallel Hybrid Testing Technique for Tri-Programming Model-Based software Systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4501-4530页
作者: Huda Basloom Mohamed Dahab Abdullah Saad AL-Ghamdi Fathy Eassa Ahmed Mohammed Alghamdi Seif Haridi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia KTH Royal Institute of Technology StockholmSweden
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ... 详细信息
来源: 评论