咨询与建议

限定检索结果

文献类型

  • 4,116 篇 会议
  • 2,740 篇 期刊文献
  • 136 册 图书

馆藏范围

  • 6,992 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,260 篇 工学
    • 3,242 篇 计算机科学与技术...
    • 2,630 篇 软件工程
    • 914 篇 信息与通信工程
    • 687 篇 控制科学与工程
    • 455 篇 电气工程
    • 453 篇 生物工程
    • 370 篇 生物医学工程(可授...
    • 368 篇 电子科学与技术(可...
    • 331 篇 机械工程
    • 267 篇 光学工程
    • 199 篇 仪器科学与技术
    • 173 篇 动力工程及工程热...
    • 165 篇 网络空间安全
    • 144 篇 化学工程与技术
    • 143 篇 交通运输工程
  • 2,044 篇 理学
    • 1,019 篇 数学
    • 576 篇 物理学
    • 521 篇 生物学
    • 320 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 165 篇 化学
  • 1,378 篇 管理学
    • 908 篇 管理科学与工程(可...
    • 536 篇 图书情报与档案管...
    • 456 篇 工商管理
  • 423 篇 医学
    • 356 篇 临床医学
    • 286 篇 基础医学(可授医学...
    • 176 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 212 篇 法学
    • 178 篇 社会学
  • 155 篇 经济学
    • 153 篇 应用经济学
  • 129 篇 教育学
  • 89 篇 农学
  • 31 篇 文学
  • 24 篇 艺术学
  • 16 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 197 篇 machine learning
  • 193 篇 deep learning
  • 170 篇 software enginee...
  • 159 篇 computer science
  • 150 篇 artificial intel...
  • 133 篇 accuracy
  • 130 篇 feature extracti...
  • 123 篇 computational mo...
  • 104 篇 internet of thin...
  • 104 篇 software
  • 95 篇 training
  • 90 篇 information tech...
  • 87 篇 optimization
  • 87 篇 security
  • 84 篇 information syst...
  • 83 篇 predictive model...
  • 78 篇 data mining
  • 73 篇 support vector m...
  • 72 篇 testing
  • 71 篇 cloud computing

机构

  • 36 篇 department of so...
  • 34 篇 department of co...
  • 33 篇 college of compu...
  • 27 篇 department of in...
  • 26 篇 faculty of infor...
  • 24 篇 department of so...
  • 21 篇 faculty of engin...
  • 20 篇 school of softwa...
  • 20 篇 state key labora...
  • 20 篇 college of compu...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 faculty of infor...
  • 18 篇 computer enginee...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 school of comput...
  • 17 篇 department of in...
  • 17 篇 faculty of softw...
  • 16 篇 school of comput...

作者

  • 51 篇 tao dacheng
  • 24 篇 ismail leila
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 21 篇 pedrycz witold
  • 18 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 choo kim-kwang r...
  • 16 篇 runyao duan
  • 15 篇 muhammad waseem ...
  • 15 篇 bentahar jamal
  • 14 篇 noraziah a.
  • 14 篇 anwer mustafa hi...
  • 13 篇 lee sai peck
  • 13 篇 khan arif ali
  • 13 篇 ahmed bestoun s.
  • 13 篇 jakimi abdeslam
  • 13 篇 yang jian
  • 12 篇 niyato dusit
  • 12 篇 abu sarwar zaman...

语言

  • 6,725 篇 英文
  • 216 篇 其他
  • 45 篇 中文
  • 10 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Computer Information Systems and Software Engineering"
6992 条 记 录,以下是291-300 订阅
排序:
Hybrid Sine Cosine and Stochastic Fractal Search for Hemoglobin Estimation
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 2467-2482页
作者: Marwa M.Eid Fawaz Alassery Abdelhameed Ibrahim Bandar Abdullah Aloyaydi Hesham Arafat Ali Shady Y.El-Mashad Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Mechanical Engineering Department Qassim UniversityBuraidah51452Saudi Arabia Department of Computer Systems Engineering Faculty of Engineering at ShoubraBenha UniversityEgypt
The sample’s hemoglobin and glucose levels can be determined by obtaining a blood sample from the human body using a needle and analyzing ***(HGB)is a critical component of the human body because it transports oxygen... 详细信息
来源: 评论
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2677-2693页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io... 详细信息
来源: 评论
Robust In-Vehicle Diagnostic-Based Intrusion Detection System
Robust In-Vehicle Diagnostic-Based Intrusion Detection Syste...
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Shafee, Ahmed Awaad, Tasneem A. Moro, Ahmed Adams State University Department of Engineering and Computer Science AlamosaCO United States Ain Shams University Faculty of Engineering Department of Computer and Systems Engineering Cairo Egypt Siemens Eda Cairo Egypt Siemens Digital Industries Software Integrated Electrical Systems Segment Cairo Egypt
Cybersecurity has become a significant concern for automotive manufacturers as modern cars increasingly incorporate electronic components. Electronic Control Units (ECUs) have evolved to become the central control uni... 详细信息
来源: 评论
Task Consistent Prototype Learning for Incremental Few-Shot Semantic Segmentation  27th
Task Consistent Prototype Learning for Incremental Few-Shot...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Xu, Wenbo Wu, Yanan Jiang, Haoran Wang, Yang Wu, Qiang Zhang, Jian Faculty of Engineering and Information Technology University of Technology Sydney Sydney2007 Australia School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Department of Computer Science and Software Engineering Concordia University MontrealH3G2J1 Canada
Incremental Few-Shot Semantic Segmentation (iFSS) tackles a task that requires a model to continually expand its segmentation capability on novel classes using only a few annotated examples. Typical incremental approa... 详细信息
来源: 评论
Performance Evaluation of Intrusion Detection System with SVM  6
Performance Evaluation of Intrusion Detection System with SV...
收藏 引用
6th International Conference on Cybernetics and Intelligent System, ICORIS 2024
作者: Diaz, Ricky Aurelius Nurtanto Putra, I. Ketut Gede Darma Sudarma, Made Sukarsa, I. Made Department of Computer Systems Faculty of Informatics and Computer Institut Teknologi dan Bisnis STIKOM Bali Bali Indonesia Department of Information Technology Faculty of Engineering Udayana University Jimbaran Hill Bali Indonesia Department of Electrical Engineering Faculty of Engineering Udayana University Jimbaran Hill Bali Indonesia
Various machine learning techniques have been proposed to improve the effectiveness of Intrusion Detection systems (IDS), where IDS is one of the important parts of the network that functions to maintain network secur... 详细信息
来源: 评论
AFuNet: an attention-based fusion network to classify texts in a resource-constrained language
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6725-6748页
作者: Hossain, Md. Rajib Hoque, Mohammed Moshiul Dewan, M. Ali Akber Hoque, Enamul Siddique, Nazmul Department of Computer Science & Engineering Chittagong University of Engineering & Technology Chittagong4349 Bangladesh School of Computing and Information Systems Faculty of Science and Technology Athabasca University AthabascaABT9S 3A3 Canada School of Information Technology York University TorontoONM3J 1P3 Canada School of Computing Engineering and Intelligent Systems Ulster University Coleraine United Kingdom
In the era of widespread Internet use and extensive social media interaction, the digital realm is accumulating vast amounts of unstructured text data. This unstructured data often contain undesirable information, nec... 详细信息
来源: 评论
A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 6141-6158页
作者: Bander Alzahrani Ahmed Barnawi Azeem Irshad Areej Alhothali Reem Alotaibi Muhammad Shafiq Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Software Engineering International Islamic University IslamabadPakistan Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea
Unmanned aerial vehicles(UAVs)have recently attractedwidespread attention in civil and commercial *** example,UAVs(or drone)technology is increasingly used in crowd monitoring solutions due to its wider air footprint ... 详细信息
来源: 评论
K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 5423-5440页
作者: Khalid Hamid Muhammad Waseem Iqbal Erssa Arif Yasir Mahmood Ahmad Salman Khan Nazri Kama Azri Azmi Atif Ikram Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of Lahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi MalaysiaKuala Lumpur54100Malaysia Faculty of Informatics and Applied Mathematics University Malaysia TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of Lahore54000Pakistan
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced env... 详细信息
来源: 评论
Deep neural network-based secure healthcare framework
收藏 引用
Neural Computing and Applications 2024年 第28期36卷 17467-17482页
作者: Aldaej, Abdulaziz Ahanger, Tariq Ahamed Ullah, Imdad College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj11942 Saudi Arabia Management Information Systems Department CoBA Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia School of Computer Science Faculty of Engineering The University of Sydney SydneyNSW2006 Australia
Healthcare stands out as a critical domain profoundly impacted by Internet of Things (IoT) technology, generating vast data from sensing devices as IoT applications expand. Addressing security challenges is paramount ... 详细信息
来源: 评论
Trustworthiness Evaluation of Deep Learning Accelerators Using UVM-based Verification with Error Injection
Trustworthiness Evaluation of Deep Learning Accelerators Usi...
收藏 引用
2024 Design and Verification Conference and Exhibition Europe, DVCon Europe 2024
作者: Aboudeif, Randa Awaad, Tasneem A. AbdElsalam, Mohamed Ismail, Yehea Electronics and Communications Engineering Department The American University in Cairo Cairo Egypt Siemens Digital Industries Software Cairo Egypt Department of Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt
Testing the reliability and trustworthiness of high-performance computing (HPC) applications has made Deep Learning Accelerators (DLAs) verification critically important. In this paper, we introduce a hardware verific... 详细信息
来源: 评论