咨询与建议

限定检索结果

文献类型

  • 8,656 篇 会议
  • 5,867 篇 期刊文献
  • 231 册 图书

馆藏范围

  • 14,754 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,851 篇 工学
    • 6,119 篇 计算机科学与技术...
    • 4,955 篇 软件工程
    • 2,210 篇 信息与通信工程
    • 1,430 篇 控制科学与工程
    • 1,142 篇 电气工程
    • 1,119 篇 生物工程
    • 1,057 篇 电子科学与技术(可...
    • 874 篇 生物医学工程(可授...
    • 736 篇 机械工程
    • 622 篇 光学工程
    • 558 篇 仪器科学与技术
    • 448 篇 动力工程及工程热...
    • 419 篇 化学工程与技术
    • 389 篇 网络空间安全
    • 328 篇 安全科学与工程
    • 294 篇 交通运输工程
  • 5,081 篇 理学
    • 2,430 篇 数学
    • 1,769 篇 物理学
    • 1,247 篇 生物学
    • 816 篇 统计学(可授理学、...
    • 561 篇 系统科学
    • 473 篇 化学
  • 2,551 篇 管理学
    • 1,576 篇 管理科学与工程(可...
    • 1,049 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 933 篇 医学
    • 788 篇 临床医学
    • 672 篇 基础医学(可授医学...
    • 410 篇 药学(可授医学、理...
    • 383 篇 公共卫生与预防医...
  • 403 篇 法学
    • 329 篇 社会学
  • 282 篇 经济学
  • 213 篇 农学
  • 205 篇 教育学
  • 63 篇 文学
  • 37 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 452 篇 deep learning
  • 288 篇 machine learning
  • 261 篇 feature extracti...
  • 257 篇 accuracy
  • 244 篇 computational mo...
  • 215 篇 information tech...
  • 213 篇 internet of thin...
  • 209 篇 optimization
  • 189 篇 artificial intel...
  • 188 篇 support vector m...
  • 182 篇 computer science
  • 175 篇 predictive model...
  • 172 篇 data mining
  • 151 篇 training
  • 134 篇 neural networks
  • 131 篇 real-time system...
  • 122 篇 covid-19
  • 117 篇 computational in...
  • 114 篇 wireless communi...
  • 110 篇 image segmentati...

机构

  • 287 篇 department for p...
  • 286 篇 faculty of scien...
  • 286 篇 department of ph...
  • 281 篇 departamento de ...
  • 276 篇 department of ph...
  • 272 篇 kirchhoff-instit...
  • 271 篇 department of ph...
  • 267 篇 department of ph...
  • 259 篇 faculté des scie...
  • 243 篇 fakultät für phy...
  • 241 篇 institute of phy...
  • 230 篇 yerevan physics ...
  • 226 篇 institut für ast...
  • 225 篇 department of ph...
  • 224 篇 department of ph...
  • 220 篇 physics division...
  • 216 篇 department of ph...
  • 214 篇 department of ph...
  • 199 篇 department of ph...
  • 192 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 263 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 254 篇 s. guindon
  • 251 篇 d. guest

语言

  • 12,849 篇 英文
  • 1,791 篇 其他
  • 110 篇 中文
  • 23 篇 日文
  • 9 篇 德文
  • 7 篇 法文
  • 4 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 1 篇 波兰文
检索条件"机构=Faculty of Computer Engineering and Information Technology"
14754 条 记 录,以下是1441-1450 订阅
排序:
Design and Simulation of Force in Rescue and Extinguishing Mega Rotor Phoenix V.1  10
Design and Simulation of Force in Rescue and Extinguishing M...
收藏 引用
10th International Conference on Artificial Intelligence and Robotics, QICAR 2024
作者: Emamy, Peiman Ghorbani, Saeedeh Guilan University Rasht Iran Irsa Sanat Shar NoAfarin Engineering Co. Qazvin Iran Master of Electronics Faculty of Electrical Computer and Information Technology Engineering Qazvin Branch Qazvin Islamic Azad University Iran
Drones have been around for years;they offer features they give which are used for different purposes. Today, these devices have become more popular and their use in various fields is increasing rapidly. Among these a... 详细信息
来源: 评论
ETL Maturity Model for Data Warehouse Systems:A CMMI Compliant Framework
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3849-3863页
作者: Musawwer Khan Islam Ali Shahzada Khurram Salman Naseer Shafiq Ahmad Ahmed T.Soliman Akber Abid Gardezi Muhammad Shafiq Jin-Ghoo Choi Department of Computer Science COMSATS University IslamabadWah Cantt47000Pakistan Faculty of Computing The Islamia University of BahawalpurBahawalpur63100Pakistan Department of Information Technology University of the Punjab Gujranwala CampusGujranwala52250Pakistan Industrial Engineering Department College of EngineeringKing Saud UniversityP.O.Box 800Riyadh11421Saudi Arabia Department of Computer Science COMSATS University IslamabadIslamabad45550Pakistan Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea
The effectiveness of the Business Intelligence(BI)system mainly depends on the quality of knowledge it *** decision-making process is hindered,and the user’s trust is lost,if the knowledge offered is undesired or of ... 详细信息
来源: 评论
Systematic Literature Review Langchain Proposed  25
Systematic Literature Review Langchain Proposed
收藏 引用
25th International Electronics Symposium, IES 2023
作者: Asyrofi, Rakha Dewi, Mutia Rahmi Lutfhi, Muhammad Irfan Wibowo, Prasetyo Faculty of Marine Science and Engineering Universitas Hangtuah Surabaya Indonesia Department of Computer Science and Information Engineering National Central University Taiwan Department of Information Technology Politeknik Negeri Padang Padang Indonesia Faculty of Engineering Universitas Negeri Yogyakarta Indonesia Graduate Institute of Network Learning Technology National Central University Taiwan Department of Informatics and Computer Engineering Politeknik Elektronika Negeri Surabaya Surabaya Indonesia
While systematic literature reviews are frequently carried out within software engineering research, performing them in a rigorous and reproducible manner can be difficult. This paper proposes some new methods for eva... 详细信息
来源: 评论
CD-FL:Cataract Images Based Disease Detection Using Federated Learning
收藏 引用
computer Systems Science & engineering 2023年 第11期47卷 1733-1750页
作者: Arfat Ahmad Khan Shtwai Alsubai Chitapong Wechtaisong Ahmad Almadhor Natalia Kryvinska Abdullah Al Hejaili Uzma Ghulam Mohammad Department of Computer Science College of ComputingKhon Kaen UniversityKhon Kaen40002Thailand College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz UniversityAlkharjSaudi Arabia School of Telecommunication Engineering Suranaree University of TechnologyNakhon Ratchasima30000Thailand Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Information Systems Department Faculty of ManagementComenius University in BratislavaOdbojárovBratislava440Slovakia Faculty of Computers&Information Technology Computer Science DepartmentUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Software Engineering International Islamic UniversityIslamabad44000Pakistan
A cataract is one of the most significant eye problems worldwide that does not immediately impair vision and progressively worsens over *** cataract prediction based on various imaging technologies has been addressed ... 详细信息
来源: 评论
A comprehensive survey on 6G-security: physical connection and service layers
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-30页
作者: Saeed, Mamoon M. Saeed, Rashid A. Hasan, Mohammad Kamrul Ali, Elmustafa Sayed Mazha, Tehseen Shahzad, Tariq Khan, Sunawar Hamam, Habib Sana00967 Yemen Department of Computer Engineering College of Computers and Information Technology Taif University P.O. Box 11099 Taif21944 Saudi Arabia Department of Electronics Engineering College of Electronics Engineering Sudan University of Science and Technology Omdurman Sudan Bangi43600 Malaysia Department of Electrical and Electronic Engineering Faculty of Engineering Red Sea University Port Sudan33312 Sudan School of Computer Science National College of Business Administration and Economics Lahore54000 Pakistan Faculty of Engineering Uni de Moncton MonctonNBE1A3E9 Canada Department of Computer Engineering COMSATS University Islamabad Sahiwal Campus Sahiwal57000 Pakistan Department of Computer Science and Software Engineering International Islamic University Islamabad44000 Pakistan School of Electrical Engineering University of Johannesburg Johannesburg2006 South Africa BP 1989 Av. Grandes Ecoles Libreville Gabon Bridges for Academic Excellence-Spectrum Tunis Tunisia Department of Computer Science School Education Department Government of Punjab Layyah31200 Pakistan Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura140401 India
After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous genera... 详细信息
来源: 评论
Enhancing Image Security with Rossler Attractor-Based Encryption
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Hazem Al-Najjar Nadia Al-Rousan Department of Computer science Faculty of information technology University of Petra Amman Jordan Department of Computer Engineering Faculty of electrical Engineering and information systems German Jordanian University
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
Optimal Deep Learning Model Enabled Secure UAV Classification for Industry 4.0
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5349-5367页
作者: Khalid A.Alissa Mohammed Maray Areej A.Malibari Sana Alazwari Hamed Alqahtani Mohamed K.Nour Marwa Obbaya Mohamed A.Shamseldin Mesfer Al Duhayyim SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Industrial and Systems Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif P.O.Box 11099Taif21944Saudi Arabia Department of Information Systems College of Computer ScienceCenter of Artificial IntelligenceUnit of CybersecurityKing Khalid UniversityAbhaSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Biomedical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Mechanical Engineering Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology th... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security information and Event Management *** machine learning–based... 详细信息
来源: 评论
Performance Evaluation of Authentication Public Blockchains
Performance Evaluation of Authentication Public Blockchains
收藏 引用
2022 International Conference on Intelligent technology, System and Service for Internet of Everything, ITSS-IoE 2022
作者: Abdulrhman, Asma Bamatraf, Makarem Mohammed Baqais, Khaled Ahmed Al Ahgaff University Faculty of Computer Science and Engineering Department of Information Technology Al-Mukalla Yemen Hadhramaut University Faculty of Engineering Department of Computer Engineering Al-Mukalla Yemen University of Aden Aden Faculty of Engineering Department of Computer Science and Engineering Yemen
The internet of things (IoT) is an integrated, interconnected system of things without any human interaction. However, the lightweight internet of things devices have limited storage and processing capacity. Due to th... 详细信息
来源: 评论
Image cyberbullying detection and recognition using transfer deep machine learning
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 14-26页
作者: Almomani, Ammar Nahar, Khalid Alauthman, Mohammad Al-Betar, Mohammed Azmi Yaseen, Qussai Gupta, Brij B. School of Computing Skyline University College University City of Sharjah P.O. Box 1797 Sharjah United Arab Emirates I.T. department Al-Huson University College AlBalqa Applied University Irbid Jordan Computer Science Department Faculty of I.T. Yarmouk University Irbid Jordan Department of Information Security Faculty of Information Technology University of Petra Amman Jordan Ajman University Ajman United Arab Emirates Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Dehradun India
Cyberbullying detection on social media platforms is increasingly important, necessitating robust computational methods. Current approaches, while promising, have not fully leveraged the combined strengths of deep lea... 详细信息
来源: 评论