咨询与建议

限定检索结果

文献类型

  • 5,104 篇 会议
  • 4,076 篇 期刊文献

馆藏范围

  • 9,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,452 篇 工学
    • 3,937 篇 计算机科学与技术...
    • 3,189 篇 软件工程
    • 1,082 篇 信息与通信工程
    • 839 篇 控制科学与工程
    • 623 篇 生物工程
    • 563 篇 电气工程
    • 519 篇 生物医学工程(可授...
    • 485 篇 电子科学与技术(可...
    • 402 篇 机械工程
    • 347 篇 光学工程
    • 266 篇 仪器科学与技术
    • 254 篇 化学工程与技术
    • 220 篇 动力工程及工程热...
    • 176 篇 网络空间安全
    • 163 篇 安全科学与工程
  • 3,322 篇 理学
    • 1,490 篇 数学
    • 1,162 篇 物理学
    • 755 篇 生物学
    • 500 篇 统计学(可授理学、...
    • 370 篇 系统科学
    • 287 篇 化学
  • 1,744 篇 管理学
    • 1,073 篇 管理科学与工程(可...
    • 746 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 601 篇 医学
    • 512 篇 临床医学
    • 387 篇 基础医学(可授医学...
    • 236 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 272 篇 法学
    • 223 篇 社会学
  • 205 篇 经济学
    • 201 篇 应用经济学
  • 153 篇 教育学
  • 123 篇 农学
  • 51 篇 文学
  • 34 篇 艺术学
  • 12 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 307 篇 deep learning
  • 241 篇 machine learning
  • 230 篇 computer science
  • 176 篇 feature extracti...
  • 167 篇 computational mo...
  • 153 篇 information syst...
  • 146 篇 accuracy
  • 118 篇 data mining
  • 110 篇 neural networks
  • 108 篇 internet of thin...
  • 107 篇 semantics
  • 98 篇 information tech...
  • 96 篇 covid-19
  • 96 篇 security
  • 96 篇 artificial intel...
  • 90 篇 optimization
  • 90 篇 predictive model...
  • 86 篇 support vector m...
  • 86 篇 training
  • 74 篇 decision making

机构

  • 291 篇 department for p...
  • 290 篇 faculty of scien...
  • 285 篇 department of ph...
  • 282 篇 departamento de ...
  • 276 篇 department of ph...
  • 265 篇 kirchhoff-instit...
  • 264 篇 department of ph...
  • 263 篇 department of ph...
  • 259 篇 faculté des scie...
  • 256 篇 institute of phy...
  • 237 篇 fakultät für phy...
  • 234 篇 institute of phy...
  • 230 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 209 篇 department of ph...
  • 202 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 257 篇 r. ströhmer
  • 255 篇 m. rijssenbeek
  • 254 篇 h. sakamoto
  • 254 篇 s. jin
  • 254 篇 g. gaudio
  • 254 篇 s. mohapatra
  • 253 篇 y. nagasaka
  • 248 篇 s. guindon
  • 243 篇 y. tayalati

语言

  • 8,878 篇 英文
  • 254 篇 其他
  • 34 篇 中文
  • 17 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty Information Systems and Applied Computer Science"
9180 条 记 录,以下是1-10 订阅
排序:
Teaching Tip Rethinking How We Teach Git: Pedagogical Recommendations and Practical Strategies for the information systems Curriculum
收藏 引用
Journal of information systems Education 2025年 第1期36卷 1-12页
作者: Wagner, Gerit Thurner, Laureen Faculty Information Systems and Applied Computer Science Otto-Friedrich-Universität Bamberg Bamberg Germany
Git, as the leading version-control system, is frequently employed by software developers, digital product managers, and knowledge workers. information systems (IS) students aspiring to fill software engineering, mana... 详细信息
来源: 评论
Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2237-2258页
作者: Nisreen Innab Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information ***,IoHT is susceptible to cybersecur... 详细信息
来源: 评论
Revolutionizing online shopping with FITMI: a realistic virtual try-on solution
收藏 引用
Neural Computing and Applications 2025年 第8期37卷 6125-6144页
作者: Samy, Tassneam M. Asham, Beshoy I. Slim, Salwa O. Abohany, Amr A. Department of Computer Science Faculty of Computers and Artificial Intelligence Helwan University Cairo Egypt Department of Information Systems Faculty of Computers and Information Damanhour University Damanhour Egypt Department of Information Systems Faculty of Computers and Information Kafrelsheikh University Kafrelsheikh Egypt
In today’s digital age, consumers increasingly rely on online shopping for convenience and accessibility. However, a significant drawback of online shopping is the inability to physically try on clothing before purch... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
Advanced Machine Learning Approaches for Breast Cancer Detection with Neutrosophic Sets
收藏 引用
Neutrosophic Sets and systems 2025年 81卷 273-284页
作者: Elbehiery, Hussam Fathi, Hanaa Eassa, Mohamed Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Mahmoud, Hadeer Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt College of Information Technology Amman Arab University Amman Jordan Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Artificial Intelligence Faculty of Computers and Artificial Intelligence Modern University for Technology & Information Cairo Egypt
Breast Cancer (BC) remains a significant health challenge for women and is one of the leading causes of mortality worldwide. Accurate diagnosis is critical for successful therapy and increased survival rates. Recent a... 详细信息
来源: 评论
Phishing Attacks Detection Using EnsembleMachine Learning Algorithms
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1325-1345页
作者: Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Marwan Abu-Zanona Bassam Mohammad Elzaghmouri Farah H.Zawaideh Mouiad Fadeil Alawneh Department of Computer Science and Information Systems College of Applied SciencesAlmaarefa UniversityDiriyahRiyadh13713Saudi Arabia Applied College King Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Computer Science Faculty of Computer Science and Information TechnologyJerash UniversityJerash26110Jordan Department of Business Intelligence and Data Analysis Faculty of Financial Sciences and BusinessIrbid National UniversityIrbid21110Jordan Faculty of Information Technology Ajloun National UniversityAjloun26767Jordan
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based *** indicates a persistent rise in phishing **... 详细信息
来源: 评论
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3065-3089页
作者: Ali Arshad Muhammad Nadeem Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic university of MadinahMedinah42351Saudi Arabia Department of Information Systems Faculty of Computer and Information Sciences CollegeMajmaah University11952Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah 11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is th... 详细信息
来源: 评论
DP-ARTS: Dynamic Prioritization for Adaptive Resource Allocation and Task Scheduling in Cloud Computing
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 793-807页
作者: BEN ALLA, Hicham BEN ALLA, Said EZZATI, Abdellah Computer Science Mathematics and Computer Science Department Science and Technical Faculty Hassan 1 University Settat Morocco Embedded Systems and Computer Science National School of Applied Sciences of Berrechid Hassan 1 University Settat Morocco
Efficient task scheduling and resource allocation are essential for optimizing performance in cloud computing environments. The presence of priority constraints necessitates advanced solutions capable of addressing th... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
Enhanced MADM Strategy with Heptapartitioned Neutrosophic Distance Metrics
收藏 引用
Neutrosophic Sets and systems 2025年 78卷 74-96页
作者: Eassa, Mohamed Myvizhi, M. Elkholy, Mohamed Abdelhafeez, Ahmed Elbehiery, Hussam Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Mathematics KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Faculty of Computer Science& Engineering Alamein International University Egypt
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent... 详细信息
来源: 评论