咨询与建议

限定检索结果

文献类型

  • 8,723 篇 会议
  • 5,934 篇 期刊文献
  • 231 册 图书

馆藏范围

  • 14,888 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,852 篇 工学
    • 6,213 篇 计算机科学与技术...
    • 4,999 篇 软件工程
    • 2,280 篇 信息与通信工程
    • 1,490 篇 控制科学与工程
    • 1,198 篇 电气工程
    • 1,125 篇 生物工程
    • 1,082 篇 电子科学与技术(可...
    • 880 篇 生物医学工程(可授...
    • 766 篇 机械工程
    • 638 篇 光学工程
    • 572 篇 仪器科学与技术
    • 462 篇 动力工程及工程热...
    • 424 篇 化学工程与技术
    • 421 篇 网络空间安全
    • 340 篇 安全科学与工程
    • 308 篇 交通运输工程
  • 5,144 篇 理学
    • 2,433 篇 数学
    • 1,790 篇 物理学
    • 1,255 篇 生物学
    • 805 篇 统计学(可授理学、...
    • 561 篇 系统科学
    • 493 篇 化学
  • 2,597 篇 管理学
    • 1,608 篇 管理科学与工程(可...
    • 1,073 篇 图书情报与档案管...
    • 751 篇 工商管理
  • 957 篇 医学
    • 798 篇 临床医学
    • 678 篇 基础医学(可授医学...
    • 412 篇 药学(可授医学、理...
    • 393 篇 公共卫生与预防医...
  • 409 篇 法学
    • 334 篇 社会学
  • 283 篇 经济学
  • 217 篇 农学
  • 206 篇 教育学
  • 64 篇 文学
  • 37 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 467 篇 deep learning
  • 294 篇 machine learning
  • 261 篇 feature extracti...
  • 256 篇 accuracy
  • 240 篇 computational mo...
  • 215 篇 internet of thin...
  • 215 篇 information tech...
  • 209 篇 optimization
  • 188 篇 support vector m...
  • 184 篇 artificial intel...
  • 182 篇 computer science
  • 172 篇 predictive model...
  • 169 篇 data mining
  • 150 篇 training
  • 134 篇 neural networks
  • 124 篇 real-time system...
  • 122 篇 covid-19
  • 117 篇 computational in...
  • 115 篇 wireless communi...
  • 113 篇 image segmentati...

机构

  • 288 篇 department for p...
  • 287 篇 faculty of scien...
  • 287 篇 department of ph...
  • 282 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 269 篇 department of ph...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 243 篇 fakultät für phy...
  • 241 篇 institute of phy...
  • 231 篇 yerevan physics ...
  • 226 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 214 篇 department of ph...
  • 211 篇 department of ph...
  • 197 篇 department of ph...
  • 192 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 254 篇 s. guindon
  • 251 篇 d. guest

语言

  • 12,354 篇 英文
  • 2,427 篇 其他
  • 112 篇 中文
  • 24 篇 日文
  • 10 篇 德文
  • 8 篇 法文
  • 5 篇 俄文
  • 5 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 波兰文
检索条件"机构=Faculty of Computer Information and Engineering Technology"
14888 条 记 录,以下是251-260 订阅
排序:
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论
The Impact of Domain Name Server(DNS)over Hypertext Transfer Protocol Secure(HTTPS)on Cyber Security:Limitations,Challenges,and Detection Techniques
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4513-4542页
作者: Muhammad Dawood Shanshan Tu Chuangbai Xiao Muhammad Haris Hisham Alasmary Muhammad Waqas Sadaqat Ur Rehman Faculty of Information Technology Beijing University of TechnologyBeijing100124China National Center of Robotics and Automation University of Engineering and TechnologyPeshawar25000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia School of Computing and Engineering Sciences Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUnited Kingdom School of Engineering Edith Cowan UniversityPerthWA 6027Australia School of Computer Science and Engineering University of SalfordManchesterM54BRUnited Kingdom
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a... 详细信息
来源: 评论
Identification and Classification of Crowd Activities
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 815-832页
作者: Manar Elshahawy Ahmed O.Aseeri Shaker El-Sappagh Hassan Soliman Mohammed Elmogy Mervat Abu-Elkheir Department of Information Technology Faculty of Computers and InformationMansoura UniversityEgypt Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Information Systems Faculty of Computers and Artificial IntelligenceBenha UniversityEgypt Faculty of Computer Science and Engineering Galala University435611SuezEgypt Department of Computer Science Faculty of Media Engineering and TechnologyGerman UniversityEgypt
The identification and classification of collective people’s activities are gaining momentum as significant themes in machine learning,with many potential applications *** need for representation of collective human ... 详细信息
来源: 评论
Lag Synchronization and Lag H∞ Synchronization for Multiweighted Coupled Reaction-Diffusion Neural Networks Suffering Topology Attacks
收藏 引用
IEEE Transactions on Control of Network Systems 2025年 第2期12卷 1488-1499页
作者: Wang, Jin-Liang Zhao, Xin-Yu Ren, Shun-Yan Huang, Tingwen Tiangong University Tianjin Key Laboratory of Autonomous Intelligence Technology and Systems School of Computer Science and Technology Tianjin300387 China Tiangong University School of Electronics & Information Engineering Tianjin300387 China University of Electronic Science and Technology of China School of Mechanical and Electrical Engineering Chengdu611731 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
This paper mainly discusses two kinds of coupled reaction-diffusion neural networks (CRNN) under topology attacks, that is, the cases with multistate couplings and with multiple spatial-diffusion couplings. On one han... 详细信息
来源: 评论
Adaptive Dynamic Dipper Throated Optimization for Feature Selection in Medical Data
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1883-1900页
作者: Ghada Atteia El-Sayed M.El-kenawy Nagwan Abdel Samee Mona M.Jamjoom Abdelhameed Ibrahim Abdelaziz A.Abdelhamid Ahmad Taher Azar Nima Khodadadi Reham A.Ghanem Mahmoud Y.Shams Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Faculty of Computers and Artificial Intelligence Benha UniversityBenha13518Egypt College of Computer and Information Sciences Prince Sultan UniversityRiyadh11586Saudi Arabia Department of Civil Engineering University of Science and TechnologyMiami33101USA Department of Civil and Environmental Engineering Florida International UniversityMiamiUSA Oral Biology Department Faculty of Oral and Dental MedicineDelta University for Science and TechnologyGamasaEgypt Faculty of Artificial Intelligence Kafrelsheikh UniversityKafrelsheikh33511Egypt
The rapid population growth results in a crucial problem in the early detection of diseases inmedical *** all the cancers unveiled,breast cancer is considered the second most severe ***,an exponential rising in death ... 详细信息
来源: 评论
Optimizing Clustering Approaches in Cloud Environments
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2023年 第19期17卷 70-94页
作者: Al-Ghuwairi, Abdel-Rahman Al-Fraihat, Dimah Sharrab, Yousef Kreishan, Yazeed Alsarhan, Ayoub Idhaim, Hasan Qahmash, Ayman Department of Software Engineering Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman Jordan Department of Data Science and Artificial Intelligence Faculty of Information Technology Isra University Amman Jordan Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Information Systems Computer Science College King Khalid University Abha Saudi Arabia
This study focuses on the challenge of developing abstract models to differentiate various cloud resources. It explores the advancements in cloud products that offer specialized services to meet specific external need... 详细信息
来源: 评论
Optimising 3D printing parameters through experimental techniques and ANOVA-Based statistical analysis
SPE Polymers
收藏 引用
SPE Polymers 2024年 第2期5卷 228-240页
作者: Naveed, Nida Anwar, Muhammad Naveed Faculty of Technology School of Engineering University of Sunderland Sunderland United Kingdom Department of Computer & Information Sciences Faculty of Engineering and Environment Northumbria University Newcastle upon Tyne United Kingdom
Additive manufacturing (AM) has revolutionized the manufacturing industry by enabling the fabrication of complex geometries and designs with ease. 3D printing—fused deposition modeling (FDM) has emerged as a prevalen... 详细信息
来源: 评论
Enhancing visual clarity in hazy media: a comprehensive approach through preprocessing and feature fusion attention-based dehazing
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18071-18093页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. Rabaie, El-Sayed M. Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt
Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the interaction between airborne particles and light, which is scattered and atte... 详细信息
来源: 评论
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1311-1328页
作者: Arslan Akram Imran Khan Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni Faculty of Computer Science and Information Technology Department of Computer ScienceSuperior UniversityLahore54000Pakistan Machine Learning Code(MLC)Lab Meharban HouseHouse Number 209Zafar ColonyOkara56300Pakistan Information Technology Services University of OkaraOkara56310Pakistan Department of Computer Science&Engineering University of Engineering&Technology LahoreNarowal CampusNarowal51601Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain11671Abu Dhabi Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information... 详细信息
来源: 评论
Research on MapReduce Heuristic Multi Table Join Algorithm Based on Binary Optimization and Pancake Parallel Strategy
收藏 引用
Recent Patents on engineering 2023年 第6期17卷 49-62页
作者: Jia, Songhao Yang, Jizheng Yang, Cai Zhang, Haiyu School of Computer Science and Technology Nanyang Normal University Nanyang China Faculty of Electronic Information Engineering Henan Polytechnic Institute Nanyang China
Background: With the development of technology, the data amount has increased signif-icantly. In data processing, the multi table query is the most frequent operation. Because the join keys cannot correspond one by on... 详细信息
来源: 评论