咨询与建议

限定检索结果

文献类型

  • 4,131 篇 会议
  • 2,757 篇 期刊文献
  • 136 册 图书

馆藏范围

  • 7,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,296 篇 工学
    • 3,268 篇 计算机科学与技术...
    • 2,653 篇 软件工程
    • 921 篇 信息与通信工程
    • 695 篇 控制科学与工程
    • 461 篇 电气工程
    • 455 篇 生物工程
    • 372 篇 生物医学工程(可授...
    • 368 篇 电子科学与技术(可...
    • 333 篇 机械工程
    • 275 篇 光学工程
    • 199 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 166 篇 网络空间安全
    • 148 篇 化学工程与技术
    • 145 篇 安全科学与工程
  • 2,059 篇 理学
    • 1,024 篇 数学
    • 581 篇 物理学
    • 523 篇 生物学
    • 324 篇 统计学(可授理学、...
    • 265 篇 系统科学
    • 167 篇 化学
  • 1,385 篇 管理学
    • 911 篇 管理科学与工程(可...
    • 541 篇 图书情报与档案管...
    • 461 篇 工商管理
  • 428 篇 医学
    • 362 篇 临床医学
    • 292 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 215 篇 法学
    • 180 篇 社会学
  • 157 篇 经济学
    • 155 篇 应用经济学
  • 132 篇 教育学
  • 89 篇 农学
  • 30 篇 文学
  • 24 篇 艺术学
  • 16 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 196 篇 machine learning
  • 192 篇 deep learning
  • 171 篇 software enginee...
  • 159 篇 computer science
  • 145 篇 artificial intel...
  • 132 篇 accuracy
  • 131 篇 feature extracti...
  • 122 篇 computational mo...
  • 104 篇 internet of thin...
  • 104 篇 software
  • 95 篇 training
  • 90 篇 information tech...
  • 88 篇 optimization
  • 88 篇 security
  • 85 篇 predictive model...
  • 84 篇 information syst...
  • 78 篇 data mining
  • 74 篇 support vector m...
  • 73 篇 testing
  • 71 篇 cloud computing

机构

  • 36 篇 department of so...
  • 34 篇 department of co...
  • 33 篇 college of compu...
  • 27 篇 department of in...
  • 26 篇 faculty of infor...
  • 25 篇 department of so...
  • 21 篇 faculty of engin...
  • 21 篇 college of compu...
  • 20 篇 school of softwa...
  • 20 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 school of comput...
  • 18 篇 faculty of infor...
  • 18 篇 computer enginee...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 school of comput...
  • 17 篇 department of in...
  • 17 篇 faculty of softw...

作者

  • 51 篇 tao dacheng
  • 24 篇 ismail leila
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 21 篇 pedrycz witold
  • 18 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 choo kim-kwang r...
  • 16 篇 runyao duan
  • 15 篇 muhammad waseem ...
  • 15 篇 bentahar jamal
  • 14 篇 noraziah a.
  • 14 篇 anwer mustafa hi...
  • 13 篇 lee sai peck
  • 13 篇 khan arif ali
  • 13 篇 ahmed bestoun s.
  • 13 篇 jakimi abdeslam
  • 13 篇 mesfer al duhayy...
  • 13 篇 yang jian
  • 12 篇 niyato dusit

语言

  • 6,628 篇 英文
  • 343 篇 其他
  • 45 篇 中文
  • 10 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"机构=Faculty of Computer Information Systems and Software Engineering"
7024 条 记 录,以下是1041-1050 订阅
排序:
Code Smell Detection Using Whale Optimization Algorithm
收藏 引用
computers, Materials & Continua 2021年 第8期68卷 1919-1935页
作者: Moatasem M.Draz Marwa S.Farhan Sarah N.Abdulkader M.G.Gafar Department of Software Engineering Faculty of Computers and InformationKafrelsheikh UniversityKafr ElsheikhEgypt Faculty of Informatics and Computer Science British University in EgyptCairoEgypt Department of Information Systems Faculty of Computers and Artificial IntelligenceHelwan UniversityCairoEgypt Department of Computer Science Faculty of Computers and Artificial IntelligenceHelwan UniversityCairoEgypt Faculty of Computer Studies Arab Open UniversityCairoEgypt Department of Computer Science College of Science and Humanities in Al-SulailPrince Sattam bin Abdulaziz UniversityKharjSaudi Arabia Department of Machine Learning and Information Retrieval Faculty of Artificial IntelligenceKafrelsheikh UniversityKafr ElsheikhEgypt
software systems have been employed in many fields as a means to reduce human efforts;consequently,stakeholders are interested in more updates of their *** smells arise as one of the obstacles in the software *** are ... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论
Leveraging Retinal Fundus Images with Deep Learning for Diabetic Retinopathy Grading and Classification
收藏 引用
computer systems Science & engineering 2023年 第8期46卷 1901-1916页
作者: Mohammad Yamin Sarah Basahel Saleh Bajaba Mona Abusurrah ELaxmi Lydia Department of Management Information Systems Faculty of Economics and Administration King Abdulaziz UniversityP.O.Box 80201Jeddah21589Saudi Arabia Department of Business Administration King Abdulaziz UniversityP.O.Box 80201Jeddah21589Saudi Arabia Department of Management Information Systems College of Business AdministrationTaibah UniversityAl-MadinahSaudi Arabia Department of Computer Science and Engineering GMR Institute of TechnologyAndhra PradeshRajam 532127India
Recently,there has been a considerable rise in the number of diabetic patients suffering from diabetic retinopathy(DR).DR is one of the most chronic diseases and makes the key cause of vision loss in middle-aged peopl... 详细信息
来源: 评论
Intelligent Deep Learning Model for Privacy Preserving IIoT on 6G Environment
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 333-348页
作者: Anwer Mustafa Hilal Jaber SAlzahrani Ibrahim Abunadi Nadhem Nemri Fahd NAl-Wesabi Abdelwahed Motwakel Ishfaq Yaseen Abu Sarwar Zamani Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Systems Prince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Systems King King Khalid UniversityMuhayel Aseer62529Saudi Arabia Department of Computer Science King King Khalid UniversityMuhayel Aseer62529Saudi Arabia Faculty of Computer and IT Sana’a UniversitySana’a61101Yemen
In recent times,Industrial Internet of Things(IIoT)experiences a high risk of cyber attacks which needs to be *** technology can be incorporated into IIoT system to help the entrepreneurs realize Industry 4.0 by overc... 详细信息
来源: 评论
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论
Evaluation of Three Different Operators for Object Highlighting in Medical RGB Images: Canny, Roberts, and LoG in Independent Color Spaces  25
Evaluation of Three Different Operators for Object Highlight...
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Ababneh, Jafar Abu-Jassar, Amer Abuowaida, Suhaila Liubchenko, Valentyn Lyashenko, Vyacheslav Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Amman Arab University College of of Computer Sciences and Information Amman Jordan Al Al-Bayt University Faculty of Information Technology Department of Computer Science Al-Mafraq Jordan Kharkiv National University of Radio Electronics Department of Informatics Kharkiv Ukraine Kharkiv National University of Radio Electronics Department of Media Systems and Technology Kharkiv Ukraine
The research presents a comparative analysis of the selection of objects of interest in color medical cytology images. For these purposes, the individual edge detection operators studied are Canny, Roberts, and LoG. T... 详细信息
来源: 评论
A power model for monitoring environmental parameters on the edge
A power model for monitoring environmental parameters on the...
收藏 引用
2021 IEEE International Conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2021
作者: Hurbungs, V. Fowdur, T.P. Bassoo, V. University of Mauritius Faculty of Information Communication Digital Technologies Software and Information Systems Department University of Mauritius Faculty of Engineering Electrical and Electronic Department
In the Internet of Things, connected devices capture real-time data which is sent to the Fog or Cloud layer for processing. The transfer of large data volumes is subject to latency and variable transfer rates. Edge co... 详细信息
来源: 评论
Development of a Model for Discriminating Electroencephalograms of Patients with Mild Cognitive Impairment and Healthy Individuals Using a Support Vector Machine  13
Development of a Model for Discriminating Electroencephalogr...
收藏 引用
Joint 13th International Conference on Soft Computing and Intelligent systems and 25th International Symposium on Advanced Intelligent systems, SCIS and ISIS 2024
作者: Tanabe, Akifumi Nakatani, Kyosuke Harachi, Kento Yamamoto, Yusuke Muramatsu, Ayumi Nagahara, Hajime Takemura, Noriko Shimojo, Shinji Furihata, Daisuke Mizuno-Matsumoto, Yuko Kamae-Shigenobu, Kazue Shinosaki, Kazuhiro Graduate School of Information Science University of Hyogo Kobe Japan School of Life Science and Technology Tokyo Institute of Technology Yokohama Japan Aino University Department of Medical Engineering Ibaraki Japan Institute for Datability Science Osaka University Suita Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan Aomori University Faculty of Software and Information Technology Aomori Japan Osaka University Cyber Media Center Suita Japan Asakayama General Hospital Sakai Japan
We performed machine learning using spectrum analysis and power spectra of electroencephalograms (EEGs) of patients with mild cognitive impairment (MCI). Spectrum analysis was performed on the EEGs of MCI patients and... 详细信息
来源: 评论
Harmonic Resonance Analysis of Buck-Boost DC-DC Converter  11
Harmonic Resonance Analysis of Buck-Boost DC-DC Converter
收藏 引用
11th International Scientific Conference on computer Science, COMSCI 2023
作者: Stanchev, Plamen Antonov Vacheva, Gergana Ilieva Hinov, Nikolay Lyuboslavov Faculty of Computer Systems and Technologies Department of Information Technologies in Industry 8 Kliment Ohridski blvd Sofia1000 Bulgaria Technical University of Sofia Faculty of Electronic Engineering and Technologies Departement of Power Electronics 8 Kliment Ohridski blvd Sofia1000 Bulgaria
In this paper, a harmonic analysis of the buck-boost converter is implemented. A mathematical model of the DC-DC converter is presented, and the differential equations are described in the state space. MATLAB software... 详细信息
来源: 评论
ASSESSING THE ACCURACY AND ETHICAL IMPLICATIONS OF AUTOMATED CRIMINAL DETECTION USING A DEEP LEARNING APPROACH
ASSESSING THE ACCURACY AND ETHICAL IMPLICATIONS OF AUTOMATED...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering, RMKMATE 2023
作者: Jagadeesan, S. Sujigarasharma, K. Manjula, R. Vetriselvi, T. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India Department of IOT School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
This study examines the accuracy and ethical implications of using convolutional neural networks (CNN) for automated crime detection. A CNN model was trained on a dataset of criminal mugshots to identify potential cri... 详细信息
来源: 评论