咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,783 篇 期刊文献
  • 136 册 图书

馆藏范围

  • 7,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,317 篇 工学
    • 3,281 篇 计算机科学与技术...
    • 2,658 篇 软件工程
    • 927 篇 信息与通信工程
    • 701 篇 控制科学与工程
    • 469 篇 电气工程
    • 456 篇 生物工程
    • 376 篇 电子科学与技术(可...
    • 375 篇 生物医学工程(可授...
    • 338 篇 机械工程
    • 276 篇 光学工程
    • 200 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 168 篇 网络空间安全
    • 151 篇 化学工程与技术
    • 144 篇 交通运输工程
  • 2,068 篇 理学
    • 1,027 篇 数学
    • 584 篇 物理学
    • 523 篇 生物学
    • 323 篇 统计学(可授理学、...
    • 266 篇 系统科学
    • 171 篇 化学
  • 1,391 篇 管理学
    • 913 篇 管理科学与工程(可...
    • 545 篇 图书情报与档案管...
    • 461 篇 工商管理
  • 429 篇 医学
    • 362 篇 临床医学
    • 292 篇 基础医学(可授医学...
    • 182 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 216 篇 法学
    • 181 篇 社会学
  • 157 篇 经济学
    • 155 篇 应用经济学
  • 132 篇 教育学
  • 89 篇 农学
  • 31 篇 文学
  • 24 篇 艺术学
  • 16 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 199 篇 deep learning
  • 198 篇 machine learning
  • 171 篇 software enginee...
  • 159 篇 computer science
  • 150 篇 artificial intel...
  • 134 篇 accuracy
  • 132 篇 feature extracti...
  • 123 篇 computational mo...
  • 106 篇 software
  • 105 篇 internet of thin...
  • 94 篇 training
  • 90 篇 information tech...
  • 89 篇 optimization
  • 89 篇 security
  • 84 篇 information syst...
  • 84 篇 predictive model...
  • 78 篇 data mining
  • 74 篇 support vector m...
  • 73 篇 testing
  • 70 篇 cloud computing

机构

  • 36 篇 department of so...
  • 34 篇 department of co...
  • 33 篇 college of compu...
  • 27 篇 department of in...
  • 26 篇 faculty of infor...
  • 24 篇 department of so...
  • 21 篇 faculty of engin...
  • 21 篇 college of compu...
  • 20 篇 school of softwa...
  • 20 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 school of comput...
  • 18 篇 faculty of infor...
  • 18 篇 computer enginee...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 department of in...
  • 17 篇 school of comput...
  • 17 篇 department of in...

作者

  • 51 篇 tao dacheng
  • 24 篇 ismail leila
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 21 篇 pedrycz witold
  • 18 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 choo kim-kwang r...
  • 16 篇 runyao duan
  • 15 篇 muhammad waseem ...
  • 15 篇 bentahar jamal
  • 14 篇 noraziah a.
  • 14 篇 anwer mustafa hi...
  • 13 篇 lee sai peck
  • 13 篇 khan arif ali
  • 13 篇 ahmed bestoun s.
  • 13 篇 mesfer al duhayy...
  • 13 篇 yang jian
  • 12 篇 niyato dusit
  • 12 篇 abu sarwar zaman...

语言

  • 6,662 篇 英文
  • 337 篇 其他
  • 45 篇 中文
  • 10 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"机构=Faculty of Computer Information Systems and Software Engineering"
7051 条 记 录,以下是721-730 订阅
排序:
A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1631-1657页
作者: Maria Gul Imran Ali Khan Gohar Zaman Atta Rahman Jamaluddin Mir Sardar Asad Ali Biabani May IssaAldossary Mustafa Youldash Ashraf Saadeldeen Maqsood Mahmud Asiya Abdus Salam Dania Alkhulaifi Abdullah AlTurkey31Department of Computer Science COMSATS University IslamabadAbbottabad CampusAbbottabad22010Pakistan Department of Computer Science Abbottabad University of Science and TechnologyAbbottabad22010Pakistan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Science and Technology Unit Umm Al-Qura UniversityMakkah21955Saudi Arabia Deanship of Scientific Research Umm Al-Qura UniversityMakkah21955Saudi Arabia Department of Computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Science Faculty of Computer Science and Information TechnologyOmdurman Islamic UniversityOmdurman14415Sudan Business Analytic Program Department of Management and MarketingCollege of Business AdministrationUniversity of BahrainSakhir32038Bahrain
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret... 详细信息
来源: 评论
QoS Based Cloud Security Evaluation Using Neuro Fuzzy Model
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 1127-1140页
作者: Nadia Tabassum Tahir Alyas Muhammad Hamid Muhammad Saleem Saadia Malik Syeda Binish Zahra Department of Computer Science Virtual University of PakistanLahore54000Pakistan Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan Department of Statistics and Computer science University of veterinary and animal sciencesLahore54000Pakistan Department of Industrial Engineering Faculty of EngineeringRabighKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology-RabighKing Abdulaziz UniversityJeddah21589Saudi Arabia
Cloud systems are tools and software for cloud computing that are deployed on the Internet or a cloud computing network,and users can use them at any *** assessing and choosing cloud providers,however,customers confro... 详细信息
来源: 评论
Self-Guided Autoencoders for Unsupervised Change Detection in Heterogeneous Remote Sensing Images
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2458-2471页
作者: Shi, Jiao Wu, Tiancheng Kai Qin, Alex Lei, Yu Jeon, Gwanggil Northwestern Polytechnical University School of Electronics and Information Xi'an710129 China Northwestern Polytechnical University in Shenzhen Research and Development Institute Shenzhen518057 China Chongqing Innovation Center of Northwestern Polytechnical University Chongqing401135 China Swinburne University of Technology Department of Computer Science and Software Engineering HawthornVIC3122 Australia Incheon National University Department of Embedded Systems Engineering Incheon22012 Korea Republic of
To address the problem of enormous differences in two heterogeneous images, the traditional unsupervised frameworks are most normally realized by converting two images into a common domain with various auxiliary strat... 详细信息
来源: 评论
An Efficient Steganographic Approach for Securing Text Transmission Using S-Box in Cloud  2
An Efficient Steganographic Approach for Securing Text Trans...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Ashraf, Humaira Malik, Javeria Ihsan, Uswa Al-Quayed, Fatima Humayun, Mamoona Jhanjhi, N.Z. International Islamic University Department of Computer Science and Software Engineering Islamabad Pakistan Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Information Systems College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Taylor's University Malaysia Applied Science Research Center Applied Science Private University Amman11937 Jordan
In era of modern world and technology where everything is digitalized. Cloud computing emerged as one of the fastest growing parts of digital industry. With the Succor of cloud computing models, business accomplishes ... 详细信息
来源: 评论
IPL Data Analysis by Web Scraping and Using PowerBI
IPL Data Analysis by Web Scraping and Using PowerBI
收藏 引用
IT Innovation and Knowledge Discovery (ITIKD), International Conference on
作者: Mogith P Mothiswar T B G Mohammad Abubak J. Jagannathan N. Balaganesh Software Engineering Vellore Institute of Technology Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Cricket fans throughout the world avidly follow the Indian Premier League (IPL), a competition of great fame. The IPL data is examined in this using Exploratory Data Analysis (EDA) approaches to find hidden trends, pa... 详细信息
来源: 评论
Building the metaverse using digital twins at all scales,states,and relations
收藏 引用
Virtual Reality & Intelligent Hardware 2022年 第6期4卷 459-470页
作者: Zhihan LV Shuxuan XIE Yuxi LI M.Shamim HOSSAIN Abdulmotaleb El SADDIK Department of Game Design Faculty of ArtsUppsala UniversitySweden College of Computer Science and Technology Qingdao UniversityQingdaoChina Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia School of Electrical Engineering and Computer Science(EECS) University of OttawaOttawaOntarioCanada
Developments in new-generation information technology have enabled Digital Twins to reshape the physical world into a virtual digital space and provide technical support for constructing the *** objects can be at the ... 详细信息
来源: 评论
Arabic Sentiment Analysis of Mobile Banking Services Reviews  10
Arabic Sentiment Analysis of Mobile Banking Services Reviews
收藏 引用
10th International Conference on Social Networks Analysis, Management and Security, SNAMS 2023
作者: Khabour, Safaa M. Mustafa, Dheya Althebyan, Qutaibah Yarmouk University Faculty of Information Technology and Computer Sciences Dept. of Information Systems Irbid21163 Jordan The Hashemite University Faculty of Engineering Dept. of Computer Engineering Zarqa13133 Jordan Al Ain University Dept. of Cybersecurity Al Ain United Arab Emirates Jordan University of Science and Technology Irbid Jordan
Online customer reviews have developed into a significant source of information about a business's performance. Due to shifting consumer expectations and growing internet penetration, the Middle East, especially J... 详细信息
来源: 评论
Sentiment Analysis to manage Health Crisis in Smart Cities  18
Sentiment Analysis to manage Health Crisis in Smart Cities
收藏 引用
18th IEEE International Conference on computer Science and information Technologies, CSIT 2023
作者: Bouhissi, Houda El Itmacene, Ouardia Oubekkou, Milissa Pavlova, Olga Hovorushchenko, Tetiana Shestakevych, Tetiana University of Bejaia LMED Laboratory Faculty of Exact Sciences Bejaia06000 Algeria University of Bejaia Faculty of Exact Sciences Bejaia06000 Algeria Khmelnytskyi National University Department of Computer Engineering & Information Systems Khmelnytskyi Ukraine Lviv Polytechnic National University Information Systems and Networks Department Lviv Ukraine
Sentiment analysis is a branch of natural language processing that analyzes textual data and provides insights into users' opinions. In the context of smart cities, sentiment analysis seeks to seamlessly integrate... 详细信息
来源: 评论
Peak-Average-Power Ratio Techniques for 5G Waveforms Using D-SLM and D-PTS
收藏 引用
computer systems Science & engineering 2023年 第5期45卷 1199-1210页
作者: Himanshu Sharma karthikeyan Rajagopal G.Gugapriya Rajneesh Pareek Arun Kumar HayaMesfer Alshahrani Mohamed K.Nour Hany Mahgoub Mohamed Mousa Anwer Mustafa Hilal Department of Computer Science&Engineering JECRC UniversityJaipurIndia Centre for Nonlinear Systems Chennai Institute of TechnologyChennaiIndia School of Electronics Engineering Vellore Institute of TechnologyChennaiIndia Department of Electronics and Communication Engineering JECRC UniversityJaipurIndia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Electrical Engineering Department Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular *** generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to be import... 详细信息
来源: 评论
Learning-Based Artificial Algae Algorithm with Optimal Machine Learning Enabled Malware Detection
收藏 引用
computer systems Science & engineering 2023年 第9期46卷 3103-3119页
作者: Khaled M.Alalayah Fatma S.Alrayes Mohamed K.Nour Khadija M.Alaidarous Ibrahim M.Alwayle Heba Mohsen Ibrahim Abdulrab Ahmed Mesfer Al Duhayyim Department of Computer Science College of Science and ArtsNajran UniversitySharurahSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Computer Department Applied CollegeNajran UniversityNajran66462Saudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
Malware is a‘malicious software program that performs multiple cyberattacks on the Internet,involving fraud,scams,nation-state cyberwar,and *** malicious software programs come under different classifications,namely ... 详细信息
来源: 评论