咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,783 篇 期刊文献
  • 136 册 图书

馆藏范围

  • 7,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,317 篇 工学
    • 3,281 篇 计算机科学与技术...
    • 2,658 篇 软件工程
    • 927 篇 信息与通信工程
    • 701 篇 控制科学与工程
    • 469 篇 电气工程
    • 456 篇 生物工程
    • 376 篇 电子科学与技术(可...
    • 375 篇 生物医学工程(可授...
    • 338 篇 机械工程
    • 276 篇 光学工程
    • 200 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 168 篇 网络空间安全
    • 151 篇 化学工程与技术
    • 144 篇 交通运输工程
  • 2,068 篇 理学
    • 1,027 篇 数学
    • 584 篇 物理学
    • 523 篇 生物学
    • 323 篇 统计学(可授理学、...
    • 266 篇 系统科学
    • 171 篇 化学
  • 1,391 篇 管理学
    • 913 篇 管理科学与工程(可...
    • 545 篇 图书情报与档案管...
    • 461 篇 工商管理
  • 429 篇 医学
    • 362 篇 临床医学
    • 292 篇 基础医学(可授医学...
    • 182 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 216 篇 法学
    • 181 篇 社会学
  • 157 篇 经济学
    • 155 篇 应用经济学
  • 132 篇 教育学
  • 89 篇 农学
  • 31 篇 文学
  • 24 篇 艺术学
  • 16 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 199 篇 deep learning
  • 198 篇 machine learning
  • 171 篇 software enginee...
  • 159 篇 computer science
  • 150 篇 artificial intel...
  • 134 篇 accuracy
  • 132 篇 feature extracti...
  • 123 篇 computational mo...
  • 106 篇 software
  • 105 篇 internet of thin...
  • 94 篇 training
  • 90 篇 information tech...
  • 89 篇 optimization
  • 89 篇 security
  • 84 篇 information syst...
  • 84 篇 predictive model...
  • 78 篇 data mining
  • 74 篇 support vector m...
  • 73 篇 testing
  • 70 篇 cloud computing

机构

  • 36 篇 department of so...
  • 34 篇 department of co...
  • 33 篇 college of compu...
  • 27 篇 department of in...
  • 26 篇 faculty of infor...
  • 24 篇 department of so...
  • 21 篇 faculty of engin...
  • 21 篇 college of compu...
  • 20 篇 school of softwa...
  • 20 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 school of comput...
  • 18 篇 faculty of infor...
  • 18 篇 computer enginee...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 department of in...
  • 17 篇 school of comput...
  • 17 篇 department of in...

作者

  • 51 篇 tao dacheng
  • 24 篇 ismail leila
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 21 篇 pedrycz witold
  • 18 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 choo kim-kwang r...
  • 16 篇 runyao duan
  • 15 篇 muhammad waseem ...
  • 15 篇 bentahar jamal
  • 14 篇 noraziah a.
  • 14 篇 anwer mustafa hi...
  • 13 篇 lee sai peck
  • 13 篇 khan arif ali
  • 13 篇 ahmed bestoun s.
  • 13 篇 mesfer al duhayy...
  • 13 篇 yang jian
  • 12 篇 niyato dusit
  • 12 篇 abu sarwar zaman...

语言

  • 6,662 篇 英文
  • 337 篇 其他
  • 45 篇 中文
  • 10 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"机构=Faculty of Computer Information Systems and Software Engineering"
7051 条 记 录,以下是651-660 订阅
排序:
Automated Detection and Consistency Analysis of Tajweed Recitation Rules in the Holy Quran  4
Automated Detection and Consistency Analysis of Tajweed Reci...
收藏 引用
4th Novel Intelligent and Leading Emerging Sciences Conference, NILES 2022
作者: Mohammad, Karim Aly Kandil, Ahmed H. El-Bialy, Ahmed M. Fawzi, Sahar Ali Cairo University Systems and Biomedical Engineering Faculty of Engineering Giza Egypt El-Shorouk Academy Systems and Biomedical Engineering Faculty of Engineering Cairo Egypt Information Technology & Computer Science Nile University Giza Egypt
Precise Recitation of Holy Quran is a religious duty that must be performed with great care. Tajweed rules are constructed to guide the reader to utter the Holy Quran text as it was originally uttered by prophet Muham... 详细信息
来源: 评论
Combining unsupervised and supervised deep learning approaches for surface anomaly detection  16
Combining unsupervised and supervised deep learning approach...
收藏 引用
16th International Conference on Quality Control by Artificial Vision
作者: Racki, Domen Tomazevic, Dejan Skocaj, Danijel Sensum Computer Vision Systems Tehnoloski park 21 Ljubljana Slovenia University of Ljubljana Faculty of Electrical Engineering Trzaska cesta 25 Ljubljana Slovenia University of Ljubljana Faculty of Computer and Information Science Vecna pot 113 Ljubljana Slovenia
Anomaly detection in an unsupervised manner has become the go-To approach in applications where data labeling proves problematic. However, these approaches aren t completely unsupervised, since they rely on the weak k... 详细信息
来源: 评论
Mobile Robots through Task-Based Human Instructions using Incremental Curriculum Learning
arXiv
收藏 引用
arXiv 2024年
作者: Muttaqien, Muhammad A. Yorozu, Ayanori Ohya, Akihisa Faculty of Systems and Information Engineering Computer Science University of Tsukuba Tennodai Tsukuba Japan
This paper explores the integration of incremental curriculum learning (ICL) with deep reinforcement learning (DRL) techniques to facilitate mobile robot navigation through task-based human instruction. By adopting a ... 详细信息
来源: 评论
Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection
收藏 引用
computer systems Science & engineering 2023年 第6期45卷 3037-3052页
作者: Fatma S.Alrayes Najm Alotaibi Jaber S.Alzahrani Sana Alazwari Areej Alhogail Ali M.Al-Sharafi Mahmoud Othman Manar Ahmed Hamza Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Prince Saud Al Faisal Institute for Diplomatic Studies RiyadhSaudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Information Systems College of Computer and Information SciencesKing Saud UniversitySaudi Arabia Department of Computer Science College of Computers and Information TechnologyUniversity of BishaSaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Recent developments in computer networks and Internet of Things(IoT)have enabled easy access to *** the government and business sectors face several difficulties in resolving cybersecurity network issues,like novel at... 详细信息
来源: 评论
Model of Visualization and Analytics for Open Data (Case: Election Voters & Kids Disability Category)  1
Model of Visualization and Analytics for Open Data (Case: El...
收藏 引用
1st International Conference in Advanced Innovation on Smart City, ICAISC 2023
作者: Wibowo, Ripto Mukti Fakieh, Bahjat Ramzan, Muhammad Sher Alzahrani, Ahmed Saeed Siddiqui, Muazzam Alzahrani, Bander King Abdulaziz University Faculty of Computing and Information Technology Department of Information Systems Saudi Arabia King Abdulaziz University Faculty of Computing and Information Technology Department of Computer Science Saudi Arabia Indiana University Luddy School of Informatics Computing and Engineering Bloomington United States
Several regional head elections had to be postponed due to the pandemic, including in Indonesia because of the COVID-19 pandemic. Several big cities in Indonesia are of concern because of their large population and GD... 详细信息
来源: 评论
A Review of Algorithms's Complexities on Different Valued Sorted and Unsorted Data
A Review of Algorithms's Complexities on Different Valued So...
收藏 引用
2023 International Conference on IT and Industrial Technologies, ICIT 2023
作者: Shabbir, Attia Majeed, Asad Iftikhar, Mahnoor Ali, Raja Hashim Arshad, Usama Shabbir, Muhammad Zeeshan Zeeshan Ijaz, Ali Ali, Nisar Aftab, Ali Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany Department of Electrical Engineering Lahore Pakistan University of Regina Faculty of Electronic Systems Engineering Regina Canada
Sorting and searching are critical processes for effecttive data analysis. In this paper, we evaluate the performance of various sorting and searching algorithms and compare their time and space complexities on both s... 详细信息
来源: 评论
Attention Management: Extending in Progress
Attention Management: Extending in Progress
收藏 引用
International Symposium on Computational Intelligence and Informatics
作者: Juraj Brodniansky Ján Lang Faculty of Informatics and Information Technologies Institute of Informatics Information Systems and Software Engineering Slovak Technical University in Bratislava Bratislava Slovakia
Attention management in software development proves to be a highly relevant issue. It offers various ways of managing the user's attention using visual perception of the work environment. Awareness of the workplac... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
DeepCNN:Spectro-temporal feature representation for speech emotion recognition
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 401-417页
作者: Nasir Saleem Jiechao Gao Rizwana Irfan Ahmad Almadhor Hafiz Tayyab Rauf Yudong Zhang Seifedine Kadry Department of Electrical Engineering Faculty of Engineering and TechnologyGomal UniversityD.I.KhanPakistan Department of Computer Science University of VirginiaCharlottesvilleVirginiaUSA Department of Information Technology College of Computing and Information Technology at KhulaisUniversity of JeddahJeddahSaudi Arabia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySkaka AljoufSaudi Arabia Centre for Smart Systems AI and CybersecurityStaffordshire UniversityStoke‐on‐TrentUK School of Computing and Mathematical Sciences University of LeicesterLeicesterUK Department of Applied Data Science Noroff University CollegeKristiansandNorway Artificial Intelligence Research Center(AIRC) Ajman UniversityAjmanUnited Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityByblosLebanon
Speech emotion recognition(SER)is an important research problem in human-computer interaction *** representation and extraction of features are significant challenges in SER *** the promising results of recent studies... 详细信息
来源: 评论
A Secure and Reliable Supply chain management approach integrated with IoT and Blockchain  2
A Secure and Reliable Supply chain management approach integ...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Ashraf, Humaira Hanif, Maria Ihsan, Uswa Al-Quayed, Fatima Humayun, Mamoona Jhanjhi, N.Z. International Islamic University Islamabad Department of Computer Science and Software Engineering Islamabad Pakistan Jouf University College of Computer and Information Sciences Department of Computer Science Sakakah Saudi Arabia Jouf University College of Computer and Information Sciences Department of Information Systems Sakakah Saudi Arabia Malaysia Applied Science Research Center Applied Science Private University Amman11937 Jordan
Nowadays, secure and reliable management of logistics is highly needed. Logistics is the delivery of goods from producers to legitimate consumers in accurate amounts and good conditions. The use of low-capable sensor ... 详细信息
来源: 评论