咨询与建议

限定检索结果

文献类型

  • 5,107 篇 会议
  • 4,105 篇 期刊文献
  • 162 册 图书

馆藏范围

  • 9,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,474 篇 工学
    • 3,946 篇 计算机科学与技术...
    • 3,190 篇 软件工程
    • 1,083 篇 信息与通信工程
    • 841 篇 控制科学与工程
    • 623 篇 生物工程
    • 564 篇 电气工程
    • 519 篇 生物医学工程(可授...
    • 485 篇 电子科学与技术(可...
    • 403 篇 机械工程
    • 347 篇 光学工程
    • 266 篇 仪器科学与技术
    • 254 篇 化学工程与技术
    • 223 篇 动力工程及工程热...
    • 176 篇 网络空间安全
    • 163 篇 安全科学与工程
  • 3,327 篇 理学
    • 1,492 篇 数学
    • 1,162 篇 物理学
    • 757 篇 生物学
    • 500 篇 统计学(可授理学、...
    • 371 篇 系统科学
    • 287 篇 化学
  • 1,749 篇 管理学
    • 1,078 篇 管理科学与工程(可...
    • 746 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 603 篇 医学
    • 514 篇 临床医学
    • 388 篇 基础医学(可授医学...
    • 236 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 273 篇 法学
    • 224 篇 社会学
  • 205 篇 经济学
    • 201 篇 应用经济学
  • 155 篇 教育学
  • 123 篇 农学
  • 51 篇 文学
  • 34 篇 艺术学
  • 12 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 311 篇 deep learning
  • 247 篇 machine learning
  • 230 篇 computer science
  • 179 篇 feature extracti...
  • 176 篇 artificial intel...
  • 169 篇 computational mo...
  • 153 篇 information syst...
  • 145 篇 accuracy
  • 118 篇 data mining
  • 110 篇 internet of thin...
  • 110 篇 neural networks
  • 106 篇 semantics
  • 98 篇 information tech...
  • 96 篇 covid-19
  • 94 篇 optimization
  • 94 篇 security
  • 90 篇 predictive model...
  • 86 篇 support vector m...
  • 83 篇 training
  • 74 篇 decision making

机构

  • 289 篇 department for p...
  • 288 篇 faculty of scien...
  • 283 篇 department of ph...
  • 280 篇 departamento de ...
  • 274 篇 department of ph...
  • 266 篇 department of ph...
  • 263 篇 department of ph...
  • 263 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 253 篇 institute of phy...
  • 239 篇 fakultät für phy...
  • 231 篇 institute of phy...
  • 228 篇 yerevan physics ...
  • 225 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 211 篇 department of ph...
  • 204 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 260 篇 m. klein
  • 259 篇 h. a. gordon
  • 256 篇 r. ströhmer
  • 254 篇 m. rijssenbeek
  • 253 篇 h. sakamoto
  • 253 篇 s. jin
  • 253 篇 g. gaudio
  • 253 篇 s. mohapatra
  • 252 篇 y. nagasaka
  • 247 篇 s. guindon
  • 242 篇 y. tayalati

语言

  • 9,072 篇 英文
  • 254 篇 其他
  • 34 篇 中文
  • 17 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty Information Systems and Applied Computer Science"
9374 条 记 录,以下是641-650 订阅
排序:
Pseudo Random Number Generators Employing Three Numerical Solvers of Chaotic Generators  11
Pseudo Random Number Generators Employing Three Numerical So...
收藏 引用
11th International Japan-Africa Conference on Electronics, Communications, and Computations, JAC-ECC 2023
作者: Yacoub, Mohammed H. Sharobim, Bishoy K. Fetteha, Marwan A. Said, Lobna A. Aslan, Heba K. Nile University Nanoelectronics Integrated Systems Center Giza12588 Egypt Nile University Centre of Informatics Science Faculty of Information Technology and Computer Science Giza12588 Egypt
Pseudo-Random Number Generator (PRNG) is required for various applications, especially cryptography. PRNGs are employed in symmetric-key algorithms, where a single key is used as a seed to the PRNG to generate a seque... 详细信息
来源: 评论
Proposed Method of Seeding and Constraint in One-Parameter-At-a-Time Approach for t-way Testing
Proposed Method of Seeding and Constraint in One-Parameter-A...
收藏 引用
2022 International Conference on Digital Transformation and Intelligence, ICDI 2022
作者: Muazu, Aminu Aminu Hashim, Ahmad Sobri Sarlan, Aliza Maiwada, Umar Danjuma Universiti Teknologi Petronas Faculty of Science and Information Technology Computer & Information Sciences Department Malaysia Umaru Musa Yar'adua University Katsina Faculty of Natural and Applied Science Computer Sciences Department Nigeria
T-way testing has become a popular way to software testing since it can often deliver good error detection at a low cost, and the test case generation process is one of its biggest drawbacks. One difficulty in this fi... 详细信息
来源: 评论
TAO: a document- and person-centric ontology for storing rich metadata of manuscripts
TAO: a document- and person-centric ontology for storing ric...
收藏 引用
2024 Joint Ontology Workshops - Episode X: The Tukker Zomer of Ontology, and Satellite Events, JOWO 2024
作者: do Valle Miranda, Luiz Gomulka, Jakub Kutt, Krzysztof Nalepa, Grzegorz J. Jagiellonian Human-Centered AI Lab. Mark Kac Center for Complex Systems Research Institute of Applied Computer Science Faculty of Physics Astronomy and Applied Computer Science Jagiellonian University prof. Stanislawa Lojasiewicza 11 Kraków30-348 Poland Faculty of Humanities AGH University of Krakow Czarnowiejska 36 Kraków30-054 Poland
We present TAO (The Arcarium Ontology), an ontology that will serve as the backbone of the forthcoming Arcarium knowledge base for storing and retrieving rich metadata of manuscript collections housed at Jagiellonian ... 详细信息
来源: 评论
A Novel 3D Medical Image Segmentation Model Using Improved SAM
A Novel 3D Medical Image Segmentation Model Using Improved S...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Kuang, Yuansen Ma, Xitong Zhao, Jing Wang, Guangchen Zeng, Yijie Liu, Song Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
3D medical image segmentation is an essential task in the medical image field, which aims to segment organs or tumours into different labels. A number of issues exist with the current 3D medical image segmentation tas... 详细信息
来源: 评论
Efficient UAV Routing Strategies for Wireless Sensor Network Data Retrieval
Efficient UAV Routing Strategies for Wireless Sensor Network...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Al-Sharhanee, Kareem Ali Malalah Najim, Ali Hamza Alheeti, Khattab M. Ali Satar, Nurhizam Safie Mohd Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad10011 Iraq Department of Computer Technical Al-Diwaniyah Iraq College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3395-3412页
作者: Arar Al Tawil Laiali Almazaydeh Doaa Qawasmeh Baraah Qawasmeh Mohammad Alshinwan Khaled Elleithy Faculty of Information Technology Applied Science Private UniversityAmman11931Jordan College of Engineering Abu Dhabi UniversityAbu DhabiAl AinP.O.Box 1790United Arab Emirates Faculty of Artificial Intelligence Al-Balqa Applied UniversitySalt19117Jordan Department of Civil and Construction Engineering Western Michigan UniversityKalamazooMI 49008USA MEU Research Unit Middle East UniversityAmman11831Jordan Department of Computer Science and Engineering University of BridgeportBridgeportCT 06604USA
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as *** study utilizes three distinct methodologies,Term Frequen... 详细信息
来源: 评论
K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 5423-5440页
作者: Khalid Hamid Muhammad Waseem Iqbal Erssa Arif Yasir Mahmood Ahmad Salman Khan Nazri Kama Azri Azmi Atif Ikram Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of Lahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi MalaysiaKuala Lumpur54100Malaysia Faculty of Informatics and Applied Mathematics University Malaysia TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of Lahore54000Pakistan
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced env... 详细信息
来源: 评论
Applying Text Mining to Analyze Human Question Asking in Creativity Research  12th
Applying Text Mining to Analyze Human Question Asking in C...
收藏 引用
12th International Conference on Big Data Analytics, BDA 2024
作者: Wròblewska, Anna Korbin, Marceli Kenett, Yoed N. Dan, Daniel Ganzha, Maria Paprzycki, Marcin Faculty of Mathematics and Information Science Warsaw University of Technology Warsaw Poland Faculty of Data and Decision Sciences Technion - Israel Institute of Technology Haifa Israel School of Applied Data Science Modul University Vienna Vienna Austria Systems Research Institute Polish Academy of Sciences Warsaw Poland
Creativity relates to the ability to generate novel, and effective, ideas in the areas of interest. How are such creative ideas generated? One possible mechanism that supports creative ideation, and is gaining increas... 详细信息
来源: 评论
Privacy preserving large language models: ChatGPT case study based vision and framework
IET Blockchain
收藏 引用
IET Blockchain 2024年 第S1期4卷 706-724页
作者: Ullah, Imdad Hassan, Najm Gill, Sukhpal Singh Suleiman, Basem Ahanger, Tariq Ahamed Shah, Zawar Qadir, Junaid Kanhere, Salil S. School of Computer Science Faculty of Engineering The University of Sydney SydneyNSW Australia Higher Colleges of Technology Abu Dhabi United Arab Emirates School of Electronic Engineering and Computer Science Queen Mary University of London London United Kingdom Management Information Systems Department College of Business Administration Prince Sattam bin Abdulaziz University Al-Kharj Saudi Arabia Department of Information Technology Sydney International School of Technology and Commerce SydneyNSW Australia Department of Computer Science and Engineering College of Engineering Qatar University Doha Qatar Sydney Australia
The generative Artificial Intelligence (AI) tools based on Large Language Models (LLMs) use billions of parameters to extensively analyse large datasets and extract critical information such as context, specific detai... 详细信息
来源: 评论
Design of Intelligent Alzheimer Disease Diagnosis Model on CIoT Environment
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 5979-5994页
作者: Anwer Mustafa Hilal Fahd NAl-Wesabi Mohamed Tahar Ben Othman Khaled Mohamad Almustafa Nadhem Nemri Mesfer Al Duhayyim Manar Ahmed Hamza Abu Sarwar Zamani Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Computer Science King King Khalid UniversityMuhayel Aseer62529Saudi Arabia Faculty of Computer and IT Sana’a UniversitySana’a61101Yemen Department of Computer Science College of ComputerQassim UniversityAl-Bukairiyah52571Saudi Arabia Department of Information Systems College of Computer and Information SystemsPrince Sultan UniversitySaudi Arabia Department of Information Systems King King Khalid UniversityMuhayel Aseer62529Saudi Arabia Department of Natural and Applied Sciences College of Community-AflajPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia
Presently,cognitive Internet of Things(CIoT)with cloud computing(CC)enabled intelligent healthcare models are developed,which enables communication with intelligent devices,sensor modules,and other stakeholders in the... 详细信息
来源: 评论