咨询与建议

限定检索结果

文献类型

  • 3,530 篇 期刊文献
  • 3,421 篇 会议
  • 187 册 图书

馆藏范围

  • 7,138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,240 篇 工学
    • 2,873 篇 计算机科学与技术...
    • 2,312 篇 软件工程
    • 812 篇 信息与通信工程
    • 569 篇 控制科学与工程
    • 533 篇 生物工程
    • 507 篇 生物医学工程(可授...
    • 375 篇 电气工程
    • 338 篇 电子科学与技术(可...
    • 316 篇 光学工程
    • 296 篇 核科学与技术
    • 264 篇 机械工程
    • 187 篇 仪器科学与技术
    • 184 篇 化学工程与技术
    • 150 篇 动力工程及工程热...
    • 143 篇 安全科学与工程
    • 129 篇 建筑学
  • 3,016 篇 理学
    • 1,322 篇 数学
    • 1,238 篇 物理学
    • 641 篇 生物学
    • 408 篇 统计学(可授理学、...
    • 248 篇 系统科学
    • 196 篇 化学
  • 1,247 篇 管理学
    • 674 篇 管理科学与工程(可...
    • 615 篇 图书情报与档案管...
    • 353 篇 工商管理
  • 558 篇 医学
    • 468 篇 临床医学
    • 377 篇 基础医学(可授医学...
    • 240 篇 药学(可授医学、理...
    • 203 篇 公共卫生与预防医...
  • 182 篇 法学
    • 146 篇 社会学
  • 107 篇 经济学
  • 106 篇 农学
  • 100 篇 教育学
  • 42 篇 文学
  • 19 篇 军事学
  • 7 篇 艺术学

主题

  • 212 篇 deep learning
  • 176 篇 machine learning
  • 167 篇 artificial intel...
  • 122 篇 accuracy
  • 113 篇 feature extracti...
  • 101 篇 computational mo...
  • 98 篇 computer science
  • 85 篇 support vector m...
  • 84 篇 training
  • 82 篇 informatics
  • 82 篇 hadron colliders
  • 79 篇 internet of thin...
  • 75 篇 data mining
  • 67 篇 computational in...
  • 66 篇 covid-19
  • 64 篇 image segmentati...
  • 64 篇 testing
  • 63 篇 convolutional ne...
  • 62 篇 security
  • 61 篇 semantics

机构

  • 416 篇 department for p...
  • 408 篇 faculty of scien...
  • 403 篇 department of ph...
  • 403 篇 kirchhoff-instit...
  • 388 篇 department of ph...
  • 387 篇 department of ph...
  • 385 篇 institute of phy...
  • 371 篇 institute of phy...
  • 368 篇 fakultät für phy...
  • 331 篇 instituto de fís...
  • 312 篇 department of ph...
  • 286 篇 graduate school ...
  • 280 篇 department of ph...
  • 275 篇 department of ph...
  • 272 篇 universidade fed...
  • 269 篇 dipartimento di ...
  • 264 篇 ictp trieste
  • 260 篇 nikhef national ...
  • 256 篇 yerevan physics ...
  • 256 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 334 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 327 篇 g. spigo
  • 327 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 320 篇 s. mohapatra
  • 312 篇 s. guindon
  • 307 篇 a. kaczmarska
  • 302 篇 y. tayalati
  • 298 篇 j. schaarschmidt
  • 293 篇 a. d. pilkington
  • 291 篇 l. chevalier
  • 285 篇 m. klein

语言

  • 6,393 篇 英文
  • 715 篇 其他
  • 27 篇 中文
  • 6 篇 德文
  • 6 篇 日文
  • 5 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 2 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 法文
检索条件"机构=Department of computer Science Faculty of computers and informatics"
7138 条 记 录,以下是71-80 订阅
排序:
Early Detection of Alzheimer’s Disease Based on Laplacian Re-Decomposition and XGBoosting
收藏 引用
computer Systems science & Engineering 2023年 第9期46卷 2773-2795页
作者: Hala Ahmed Hassan Soliman Shaker El-Sappagh Tamer Abuhmed Mohammed Elmogy Information Technology Department Faculty of Computers and InformationMansoura UniversityMansoura35511Egypt Faculty of Computer Science and Engineering Galala UniversitySuez435611Egypt Faculty of Computers and Artificial Intelligence Benha UniversityBanha13518Egypt College of Computing and Informatics Sungkyunkwan UniversitySuwonKorea
The precise diagnosis of Alzheimer’s disease is critical for patient treatment,especially at the early stage,because awareness of the severity and progression risks lets patients take preventative actions before irre... 详细信息
来源: 评论
A Hybrid Machine Learning and Metaheuristic Based Model for E-Business Risk Management
收藏 引用
SN computer science 2024年 第7期5卷 1-13页
作者: Elhoseny, Mohamed Darwiesh, Abdelaziz El-Baz, A.H. Tarabia, A.M.K. College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Faculty of Computers and Information Mansoura University Mansoura Egypt Department of Mathematics Faculty of Science Damietta University New Damietta 34517 Egypt Department of Computer Science Faculty of Computers and Artificial Intelligence Damietta University New Damietta 34517 Egypt
This study introduces a novel approach to enhance e-business firms by identifying potential risks through the analysis of customers’ Twitter posts. Unlike traditional lexicon-based methods, which can be complex, we p... 详细信息
来源: 评论
Ensemble Classifiers for Acute Leukemia Classification Using Microarray Gene Expression Data under uncertainty
收藏 引用
Neutrosophic Sets and Systems 2022年 49卷 164-183页
作者: Gamal, Mona Zaied, Abdel Nasser H. Rushdy, Ehab Faculty of Computers and Informatics Zagazig University Egypt Vice Dean for students' affairs Faculty of Computer Science MIU Egypt
One of the most prevalent cancers in children and adults, acute leukemia has the potential to lead to death if left untreated. Within a few weeks after diagnosis, childhood ALL has spread throughout the body, posing a... 详细信息
来源: 评论
Enhancing single-lead electrocardiogram arrhythmia detection with empirical mode decomposition
收藏 引用
Neural Computing and Applications 2025年 第17期37卷 11583-11605页
作者: Issa, Mohamed F. Yousry, Ahmed Tuboly, Gergely Wang, Zeyu Zoltan, Juhasz Selim, Mazen M. AbuEl-Atta, Ahmed H. Department of Scientific Computing Faculty of Computers and Artificial Intelligence Benha University Benha13511 Egypt Department of Computer Science Faculty of Computers and Artificial Intelligence Benha University Benha13511 Egypt Department of Electrical Engineering and Information Systems University of Pannonia Veszprem8200 Hungary Department of Mechatronics Delta University for Science and Technology Gamasa35712 Egypt
Cardiac arrhythmias pose a significant challenge to health care, requiring accurate and reliable detection methods to enable early diagnosis and treatment. However, traditional ECG beat classification methods often la... 详细信息
来源: 评论
A Neutrosophic Approach to Robust Web Security: Mitigating XSS Attacks
收藏 引用
Neutrosophic Sets and Systems 2025年 79卷 1-22页
作者: Salama, A.A. Aboelfotoh, El-Said F. El-Bakry, Hazem M. Khalid, Huda E. Essa, Ahmed K. Sabbagh, Ramiz El-Morshedy, Doaa S. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Information Systems Faculty of Computers and Information Mansoura University Mansoura Egypt Telafer University Telafer Iraq Department of the Scientific Affairs Telafer University Mosul Iraq
Cross-Site Scripting (XSS) is one of the most grievous vulnerabilities-a pitfall through which web applications are affected. These types of attacks are complex, and the available threat landscape is always changing, ... 详细信息
来源: 评论
A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement
收藏 引用
International Journal of Cognitive Computing in Engineering 2024年 第1期5卷 379-397页
作者: Hameed, Mohamed Abdel Hassaballah, M. Abdelazim, Riem Sahu, Aditya Kumar Department of Computer Science Faculty of Computers and Information Luxor University Luxor85951 Egypt Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University AlKharj16278 Saudi Arabia Department of Computer Science Faculty of Computers and Information South Valley University Qena Egypt Department of Information Systems College of Information Technology Misr University for Science and Technology Giza Egypt Amrita School of Computing Amrita Vishwa Vidyapeetham Andhra Pradesh Amaravati522503 India
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv... 详细信息
来源: 评论
Interactive Chatbot for Improving the Text Classification Data Quality  1
收藏 引用
15th International Conference on Interactive Mobile Communication, Technologies, and Learning, IMCL 2023
作者: Elzanfaly, Doaa S. Mohamed, Nada Amr Othman, Nermin Abdelhakim Department of Information Systems Faculty of Computers and Artificial Intelligence Helwan University Cairo Egypt Department of Information Systems Faculty of Informatics and Computer Science British University in Egypt Cairo Egypt
The pandemic is affecting the global community in many ways. In most developing countries, there is a limitation in the detection facilities, which affect many suspected cases. This paper proposes a chatbot framework ... 详细信息
来源: 评论
Efficient Machine Learning Algorithms for DDoS Attack Detection  6
Efficient Machine Learning Algorithms for DDoS Attack Detect...
收藏 引用
6th International Conference on Computing and informatics, ICCI 2024
作者: Al-Eryani, Amal M. Hossny, Eman Omara, Fatma A. Department of Computer Science Faculty of Computers and Artificial Intelligence Cairo University Cairo Egypt
Distributed Denial of Service (DDoS) attack is a widely spread attack that posing a major threat to organizations dependent on online services. DDoS attacks aim to disrupt services by overwhelming servers with fake tr... 详细信息
来源: 评论
Improve the efficiency of network traffic in IoT using dimensionality reduction  6
Improve the efficiency of network traffic in IoT using dimen...
收藏 引用
6th International Conference on Computing and informatics, ICCI 2024
作者: Mohamed, Ibrahim Ali Wassif, Khaled Bayomi, Hanaa Department of Computer Science Faculty of Computers and Artificial Intelligence Cairo University Cairo Egypt
IoT has changed our lives through the increased convenience of automating mundane tasks, enhancing home security systems, wearable devices to improve health and wellness, and improved connectivity. Vast volumes of dat... 详细信息
来源: 评论
Efficient Key Management in Lightweight Cryptography: A New Hashing-Based Approach  8
Efficient Key Management in Lightweight Cryptography: A New ...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Al-Mahmood, Haider H. Alsaad, Saad N. Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq University of Mustansiriyah Department of Computer Science College of Science Baghdad Iraq
Lightweight encryption methods are introduced to overcome the challenges of high-power consumption and high memory usage in the traditional cryptography system. The primary goal of the lightweight encryption technique... 详细信息
来源: 评论