咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,783 篇 期刊文献
  • 136 册 图书

馆藏范围

  • 7,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,317 篇 工学
    • 3,281 篇 计算机科学与技术...
    • 2,658 篇 软件工程
    • 927 篇 信息与通信工程
    • 701 篇 控制科学与工程
    • 469 篇 电气工程
    • 456 篇 生物工程
    • 376 篇 电子科学与技术(可...
    • 375 篇 生物医学工程(可授...
    • 338 篇 机械工程
    • 276 篇 光学工程
    • 200 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 168 篇 网络空间安全
    • 151 篇 化学工程与技术
    • 144 篇 交通运输工程
  • 2,068 篇 理学
    • 1,027 篇 数学
    • 584 篇 物理学
    • 523 篇 生物学
    • 323 篇 统计学(可授理学、...
    • 266 篇 系统科学
    • 171 篇 化学
  • 1,391 篇 管理学
    • 913 篇 管理科学与工程(可...
    • 545 篇 图书情报与档案管...
    • 461 篇 工商管理
  • 429 篇 医学
    • 362 篇 临床医学
    • 292 篇 基础医学(可授医学...
    • 182 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 216 篇 法学
    • 181 篇 社会学
  • 157 篇 经济学
    • 155 篇 应用经济学
  • 132 篇 教育学
  • 89 篇 农学
  • 31 篇 文学
  • 24 篇 艺术学
  • 16 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 199 篇 deep learning
  • 198 篇 machine learning
  • 171 篇 software enginee...
  • 159 篇 computer science
  • 150 篇 artificial intel...
  • 134 篇 accuracy
  • 132 篇 feature extracti...
  • 123 篇 computational mo...
  • 106 篇 software
  • 105 篇 internet of thin...
  • 94 篇 training
  • 90 篇 information tech...
  • 89 篇 optimization
  • 89 篇 security
  • 84 篇 information syst...
  • 84 篇 predictive model...
  • 78 篇 data mining
  • 74 篇 support vector m...
  • 73 篇 testing
  • 70 篇 cloud computing

机构

  • 36 篇 department of so...
  • 34 篇 department of co...
  • 33 篇 college of compu...
  • 27 篇 department of in...
  • 26 篇 faculty of infor...
  • 24 篇 department of so...
  • 21 篇 faculty of engin...
  • 21 篇 college of compu...
  • 20 篇 school of softwa...
  • 20 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 school of comput...
  • 18 篇 faculty of infor...
  • 18 篇 computer enginee...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 department of in...
  • 17 篇 school of comput...
  • 17 篇 department of in...

作者

  • 51 篇 tao dacheng
  • 24 篇 ismail leila
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 21 篇 pedrycz witold
  • 18 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 choo kim-kwang r...
  • 16 篇 runyao duan
  • 15 篇 muhammad waseem ...
  • 15 篇 bentahar jamal
  • 14 篇 noraziah a.
  • 14 篇 anwer mustafa hi...
  • 13 篇 lee sai peck
  • 13 篇 khan arif ali
  • 13 篇 ahmed bestoun s.
  • 13 篇 mesfer al duhayy...
  • 13 篇 yang jian
  • 12 篇 niyato dusit
  • 12 篇 abu sarwar zaman...

语言

  • 6,662 篇 英文
  • 337 篇 其他
  • 45 篇 中文
  • 10 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"机构=Faculty of Computer Information Systems and Software Engineering"
7051 条 记 录,以下是661-670 订阅
排序:
Aspects Related to the Marathon and Performance That Can Be Supported by Artificial Intelligence (AI): A Systematic Literature Review  7
Aspects Related to the Marathon and Performance That Can Be ...
收藏 引用
7th International Conference of computer and Informatics engineering, IC2IE 2024
作者: Wandy, Wandy Adi, Kusworo Ayu, Media Anugerah Diponegoro University Doctoral Program of Information Systems School of Postgraduate Studies Semarang Indonesia Diponegoro University Faculty of Science and Mathematics Department of Physics Semarang Indonesia Sampoerna University Faculty of Engineering and Technology Department of Computer Science South Jakarta Indonesia
Full-marathon and Half-marathon distances are categorized as road running. Full-marathon running is becoming increasingly popular, and Half-marathon is increasing worldwide in both sexes and all age groups. Some aspec... 详细信息
来源: 评论
Using Formal Knowledge to Support Episodic Evidence-Based Nursing Care
Using Formal Knowledge to Support Episodic Evidence-Based Nu...
收藏 引用
34th Medical Informatics Europe Conference, MIE 2024
作者: Jaffe, Shai Ben Shahar, Bruria Shahar, Yuval Goldstein, Ayelet Shalom, Erez Selivanova, Maya Rimon, Ephraim Cohen, Odeya Department of Nursing Faculty of Health Sciences Ben-Gurion University of the Negev Israel Nursing Informatics lab Faculty of Health Sciences Ben-Gurion University of the Negev Israel Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel Computer Science Department Hadassah Academic College Israel Herzfeld Geriatric Rehabilitation Medical Center Israel
Applying evidence-based medicine prevents medical errors highlighting the need for applying Clinical Guidelines (CGs) to improve patient care by nurses. However, nurses often face challenges in utilizing CGs due to pa... 详细信息
来源: 评论
Robust graph‐based localization for industrial Internet of things in the presence of flipping ambiguities
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1140-1149页
作者: Mian Imtiaz ul Haq Ruhul Amin Khalil Muhannad Almutiry Ahmad Sawalmeh Tanveer Ahmad Nasir Saeed Faculty of Electrical Engineering Swedish College of Engineering and TechnologyWah CanttPakistan Department of Electrical Engineering Faculty of Electrical and Computer EngineeringUniversity of Engineering and TechnologyPeshawarPakistan Department of Electrical Engineering Remote Sensing UnitNorthern Border UniversityArarSaudi Arabia Data Science and Artificial Intelligence Department‐College of Science and Information Technology Irbid National UniversityIrbadJordan Innovation Education and Research Center for On‐Device AI Software(Bk21) Department of Computer Science and EngineeringChungnam National UniversityDaejeonRepublic of Korea Department of Electrical and Communication Engineering United Arab Emirates University(UAEU)Al AinUnited Arab Emirates
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various ***,a novel localisation algorithm is proposed for noisy range measurements in IIoT *** position of an unknown ... 详细信息
来源: 评论
Utilizing Machine Learning Algorithms for Effectively Detection IoT DDoS Attacks  1st
Utilizing Machine Learning Algorithms for Effectively Detect...
收藏 引用
1st International Conference on Advances in Computing Research, ACR’23
作者: Mughaid, Ala Alqahtani, Ali AlZu’bi, Shadi Obaidat, Ibrahim Alqura’n, Rabee AlJamal, Mahmoud AL-Marayah, Raid Department of Information Technology Faculty of Prince Al-Hussien Bin Abdullah for IT The Hashemite University Zarqa Jordan Department of Networks and Communication Engineering College of Computer Science and Information Systems Najran University Najran Saudi Arabia Computer Science Department Faculty of Science and Information Technology Al Zaytoonah University of Jordan Amman Jordan
One of the most critical features of the Internet of Things (IoT) is that it allows a massive number of devices to communicate with each other at the same time, for example (cars, smoke alarms, watches, glasses, web c... 详细信息
来源: 评论
MABPD: Mobile Agent-Based Prevention and Black Hole Attack Detection in Wireless Sensor Networks  2
MABPD: Mobile Agent-Based Prevention and Black Hole Attack D...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Ashraf, Humaira Khan, Fizza Ihsan, Uswa Al-Quayed, Fatima Jhanjhi, N.Z. Humayun, Mamoona International Islamic University Islamabad Department of Computer Science and Software Engineering Islamabad Pakistan Jouf University College of Computer and Information Sciences Department of Computer Science Sakakah Saudi Arabia Malaysia Applied Science Private University Applied Science Research Center Amman11937 Jordan Jouf University College of Computer and Information Sciences Department of Information Systems Sakakah Saudi Arabia
With the advancement and availability of the internet in the present age, everything is being wireless. Be it our home appliances or high defined monitoring systems, Wireless sensor networks play an important role. Bu... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
Computing, Sciences and Communications (ICCSC), International Conference on
作者: Abeer Mathur Abhinav Sudhakar Dubey Pranav Singh Mahara Usha Devi Gandhi Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Information Technology School of Computer Science Engineering & Information Systems Vellore Institute of Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
An Architectural Approach for Enhanced Data Interoperability Across Building systems  7
An Architectural Approach for Enhanced Data Interoperability...
收藏 引用
7th Conference on Cloud and Internet of Things, CIoT 2024
作者: Yefi, Peter Ejaz, Sikandar Menon, Ramanunni Parakkal Eicker, Ursula Guéhéneuc, Yann-Gaël Concordia University Computer Science and Software Engineering Dept. Montreal Canada Concordia University Institute for Information Systems Engineering Montreal Canada Institute for Solar Research German Aerospace Center Jülich Germany Concorida University NextGen Cities Institute Montreal Canada
Access to building data is crucial for creating portable applications and improving building operation and energy efficiency. Ensuring data transmutability is essential for facilitating research and overcoming the div... 详细信息
来源: 评论
Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment
收藏 引用
computer systems Science & engineering 2023年 第9期46卷 3121-3139页
作者: Khaled M.Alalayah Fatma S.Alrayes Jaber S.Alzahrani Khadija M.Alaidarous Ibrahim M.Alwayle Heba Mohsen Ibrahim Abdulrab Ahmed Mesfer Al Duhayyim Department of Computer Science College of Science and ArtsSharurahNajran UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Computer Department Applied CollegeNajran UniversityNajran66462Saudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial *** Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized the concepts of... 详细信息
来源: 评论
TELEX: Two-Level Learned Index for Rich Queries on Enclave-based Blockchain systems
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年 第7期37卷 4299-4313页
作者: Wu, Haotian Tang, Yuzhe Shen, Zhaoyan Tao, Jun Lin, Chenhao Peng, Zhe The Hong Kong Polytechnic University Department of Industrial and Systems Engineering Hong Kong Syracuse University Department of Electrical Engineering and Computer Science United States Shandong University School of Computer Science and Technology China Southeast University School of Cyber Science and Engineering China Xi'an Jiaotong University Faculty of Electronic and Information Engineering China The Hong Kong Polytechnic University Shenzhen Research Institute Hong Kong
Blockchain has become a popular paradigm for secure and immutable data storage. Despite its numerous applications across various fields, concerns regarding the user privacy and result integrity during data queries per... 详细信息
来源: 评论
Optimal Method Combining Blockchain and Multi-Agent System to Ensure Data Integrity and Deduplication in the Cloud Environment
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第10期18卷 90-105页
作者: El Ghazouani, Mohamed Ikidid, Abdelouafi Zaouiat, Charafeddine Ait Aziz, Layla Ichahane, Moulay Youssef Er-Rajy, Latifa ESIM Polydisciplinary Faculty of Sidi Bennour Chouaîb Doukkali University El Jadida Morocco Laboratory of System Analysis Information Processing and Industrial Management EST Salé Mohammed V University Salé Morocco Information Technology Laboratory National School of Applied Sciences Chouaîb Doukkali University El Jadida Morocco Computer Science Department Laboratory of Information Systems Engineering Cadi Ayyad University Marrakesh Morocco
Cloud computing (CC) refers to the transmission, storage, and processing of any type of information at a location that is not owned or controlled by the information owner. This information can be stored and accessed a... 详细信息
来源: 评论