咨询与建议

限定检索结果

文献类型

  • 4,116 篇 会议
  • 2,760 篇 期刊文献
  • 136 册 图书

馆藏范围

  • 7,012 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,270 篇 工学
    • 3,250 篇 计算机科学与技术...
    • 2,634 篇 软件工程
    • 915 篇 信息与通信工程
    • 689 篇 控制科学与工程
    • 458 篇 电气工程
    • 453 篇 生物工程
    • 370 篇 电子科学与技术(可...
    • 370 篇 生物医学工程(可授...
    • 332 篇 机械工程
    • 266 篇 光学工程
    • 198 篇 仪器科学与技术
    • 173 篇 动力工程及工程热...
    • 165 篇 网络空间安全
    • 144 篇 化学工程与技术
    • 144 篇 交通运输工程
  • 2,049 篇 理学
    • 1,021 篇 数学
    • 578 篇 物理学
    • 523 篇 生物学
    • 320 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 166 篇 化学
  • 1,382 篇 管理学
    • 912 篇 管理科学与工程(可...
    • 536 篇 图书情报与档案管...
    • 459 篇 工商管理
  • 426 篇 医学
    • 359 篇 临床医学
    • 289 篇 基础医学(可授医学...
    • 177 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 215 篇 法学
    • 180 篇 社会学
  • 156 篇 经济学
    • 154 篇 应用经济学
  • 133 篇 教育学
  • 89 篇 农学
  • 32 篇 文学
  • 24 篇 艺术学
  • 16 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 197 篇 machine learning
  • 194 篇 deep learning
  • 170 篇 software enginee...
  • 159 篇 computer science
  • 151 篇 artificial intel...
  • 132 篇 accuracy
  • 131 篇 feature extracti...
  • 123 篇 computational mo...
  • 104 篇 internet of thin...
  • 104 篇 software
  • 95 篇 training
  • 90 篇 information tech...
  • 89 篇 optimization
  • 87 篇 security
  • 84 篇 information syst...
  • 83 篇 predictive model...
  • 78 篇 data mining
  • 73 篇 support vector m...
  • 72 篇 testing
  • 71 篇 cloud computing

机构

  • 36 篇 department of so...
  • 34 篇 college of compu...
  • 34 篇 department of co...
  • 27 篇 department of in...
  • 26 篇 faculty of infor...
  • 24 篇 department of so...
  • 21 篇 faculty of engin...
  • 20 篇 school of softwa...
  • 20 篇 state key labora...
  • 20 篇 college of compu...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 faculty of infor...
  • 18 篇 computer enginee...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 department of in...
  • 17 篇 school of comput...
  • 17 篇 department of in...
  • 17 篇 faculty of softw...

作者

  • 51 篇 tao dacheng
  • 24 篇 ismail leila
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 21 篇 pedrycz witold
  • 18 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 choo kim-kwang r...
  • 16 篇 runyao duan
  • 15 篇 muhammad waseem ...
  • 15 篇 bentahar jamal
  • 14 篇 noraziah a.
  • 14 篇 anwer mustafa hi...
  • 13 篇 lee sai peck
  • 13 篇 khan arif ali
  • 13 篇 ahmed bestoun s.
  • 13 篇 jakimi abdeslam
  • 13 篇 yang jian
  • 12 篇 niyato dusit
  • 12 篇 abu sarwar zaman...

语言

  • 6,741 篇 英文
  • 220 篇 其他
  • 45 篇 中文
  • 10 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Computer Information Systems and Software Engineering"
7012 条 记 录,以下是41-50 订阅
排序:
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Impact of Artificial Intelligence on Decision-Making in information systems  5
Impact of Artificial Intelligence on Decision-Making in Info...
收藏 引用
5th International Conference on Advanced Research in Computing, ICARC 2025
作者: Rajasinghe, Rwmr Dharani Faculty of Computing Nsbm Green University Dept. of Software Engineering & Information Systems Homagama Sri Lanka
The study examines how artificial intelligence (AI) affects information systems (IS) decision-making, emphasizing how AI improves precision, speed, and flexibility in a range of industries. AI presents potential and p... 详细信息
来源: 评论
Leveraging Geographic information systems and Remote Sensing for Enhanced Water Resource Management in Kazakhstan  4
Leveraging Geographic Information Systems and Remote Sensing...
收藏 引用
4th International Conference on Technological Advancements in Computational Sciences, ICTACS 2024
作者: Hamada, Mohamed Ahmed Tolkyn, Orden Hamada, Gehad M. International It University Information Systems Department Almaty Kazakhstan International It University Computer Systems and Software Engineering Department Almaty Kazakhstan
Kazakhstan's deputy member is vast, and is one of sparse population, scattering and creating an overwhelming challenge to map and assess the water resources. Most of the waters are in remote and poorly equipped ar... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
Skin cancer detection with MobileNet-based transfer learning and MixNets for enhanced diagnosis
收藏 引用
Neural Computing and Applications 2024年 第34期36卷 21383-21413页
作者: Zakariah, Mohammed Al-Razgan, Muna Alfakih, Taha Department of Computer Sciences and Engineering College of Applied Science King Saud University Riyadh11543 Saudi Arabia Department of Software Engineering College of Computer and Information Sciences King Saud University Riyadh11345 Saudi Arabia Department of Information Systems College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia
Skin cancer poses a significant health hazard, necessitating the utilization of advanced diagnostic methodologies to facilitate timely detection, owing to its escalating prevalence in recent years. This paper proposes... 详细信息
来源: 评论
Enhancing Image Security with Rossler Attractor-Based Encryption  2
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia University Of Petra Faculty Of Information Technology Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
A privacy and compliance in regulated anonymous payment system based on blockchain
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第8期15卷 3141-3157页
作者: Elfadul, Issameldeen Wu, Lijun Elhabob, Rashad Elkhalil, Ahmed School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China School of Computer and Information Engineering Qilu Institute of Technology Shandong Jinan250200 China Faculty of Computer Science and Information Technology Karary University Khartoum Sudan
Decentralized Anonymous Payment systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention... 详细信息
来源: 评论
Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing
收藏 引用
Multimedia Tools and Applications 2024年 第18期84卷 1-36页
作者: Al-Aiash, Issa Alquran, Rabee AlJamal, Mahmoud Alsarhan, Ayoub Aljaidi, Mohammad Al-Fraihat, Dimah Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unautho... 详细信息
来源: 评论
Attention Management: Extending in Progress  24
Attention Management: Extending in Progress
收藏 引用
24th IEEE International Symposium on Computational Intelligence and Informatics, CINTI 2024
作者: Brodniansky, Juraj Lang, Ján Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak Technical University in Bratislava Bratislava Slovakia
Attention management in software development proves to be a highly relevant issue. It offers various ways of managing the user’s attention using visual perception of the work environment. Awareness of the workplace p... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论