咨询与建议

限定检索结果

文献类型

  • 3,126 篇 会议
  • 2,168 篇 期刊文献
  • 108 册 图书

馆藏范围

  • 5,402 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,251 篇 工学
    • 2,515 篇 计算机科学与技术...
    • 2,047 篇 软件工程
    • 632 篇 信息与通信工程
    • 519 篇 控制科学与工程
    • 332 篇 生物工程
    • 292 篇 电气工程
    • 282 篇 生物医学工程(可授...
    • 245 篇 电子科学与技术(可...
    • 230 篇 机械工程
    • 177 篇 光学工程
    • 144 篇 仪器科学与技术
    • 119 篇 网络空间安全
    • 117 篇 动力工程及工程热...
    • 113 篇 化学工程与技术
    • 95 篇 安全科学与工程
  • 1,575 篇 理学
    • 791 篇 数学
    • 397 篇 物理学
    • 393 篇 生物学
    • 259 篇 统计学(可授理学、...
    • 213 篇 系统科学
    • 132 篇 化学
  • 1,157 篇 管理学
    • 728 篇 管理科学与工程(可...
    • 496 篇 图书情报与档案管...
    • 397 篇 工商管理
  • 357 篇 医学
    • 303 篇 临床医学
    • 223 篇 基础医学(可授医学...
    • 143 篇 公共卫生与预防医...
    • 120 篇 药学(可授医学、理...
  • 175 篇 法学
    • 137 篇 社会学
  • 122 篇 经济学
    • 121 篇 应用经济学
  • 100 篇 教育学
  • 71 篇 农学
  • 36 篇 文学
  • 23 篇 艺术学
  • 7 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 180 篇 deep learning
  • 160 篇 computer science
  • 155 篇 machine learning
  • 119 篇 artificial intel...
  • 112 篇 information syst...
  • 104 篇 feature extracti...
  • 102 篇 computational mo...
  • 84 篇 accuracy
  • 79 篇 data mining
  • 76 篇 internet of thin...
  • 73 篇 training
  • 72 篇 neural networks
  • 68 篇 security
  • 64 篇 information tech...
  • 62 篇 decision making
  • 57 篇 covid-19
  • 55 篇 support vector m...
  • 55 篇 data models
  • 53 篇 software enginee...
  • 53 篇 optimization

机构

  • 64 篇 department of co...
  • 53 篇 faculty of compu...
  • 40 篇 department of in...
  • 34 篇 faculty of compu...
  • 34 篇 faculty of compu...
  • 28 篇 faculty of compu...
  • 26 篇 department of in...
  • 25 篇 department of in...
  • 24 篇 faculty of compu...
  • 24 篇 department of co...
  • 23 篇 faculty of infor...
  • 23 篇 faculty of compu...
  • 22 篇 school of inform...
  • 21 篇 faculty of engin...
  • 20 篇 research team on...
  • 20 篇 faculty of compu...
  • 20 篇 department of co...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 19 篇 computer enginee...

作者

  • 38 篇 abdelwahed motwa...
  • 38 篇 el-bakry hazem m...
  • 37 篇 mesfer al duhayy...
  • 37 篇 manar ahmed hamz...
  • 34 篇 anwer mustafa hi...
  • 32 篇 fahd n.al-wesabi
  • 26 篇 radwa marzouk
  • 26 篇 tao dacheng
  • 26 篇 ali selamat
  • 26 篇 meyliana
  • 25 篇 mastorakis nikos
  • 24 篇 ishfaq yaseen
  • 24 篇 selamat ali
  • 23 篇 el-sayed m.el-ke...
  • 21 篇 prabowo harjanto
  • 21 篇 abu sarwar zaman...
  • 19 篇 abdelhameed ibra...
  • 18 篇 mohammed rizwanu...
  • 18 篇 abdelaziz a.abde...
  • 17 篇 siti mariyam sha...

语言

  • 5,177 篇 英文
  • 196 篇 其他
  • 22 篇 中文
  • 11 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computer Science&Information Systems"
5402 条 记 录,以下是11-20 订阅
排序:
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Accurate Phase Detection for ZigBee Using Artificial Neural Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2505-2518页
作者: Ali Alqahtani Abdulaziz A.Alsulami Saeed Alahmari Mesfer Alrizq Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(... 详细信息
来源: 评论
Spatial Correlation Module for Classification of Multi-Label Ocular Diseases Using Color Fundus Images
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 133-150页
作者: Ali Haider Khan Hassaan Malik Wajeeha Khalil Sayyid Kamran Hussain Tayyaba Anees Muzammil Hussain Department of Software Engineering Faculty of Computer SciencesLahore Garrison UniversityLahorePakistan Department of Computer Science School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan Department of Computer Science&Information Technology University of Engineering and Technology(UET)PeshawarPakistan Department of Computer Science TIMES InstituteMultan60000Pakistan Department of Software Engineering School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the d... 详细信息
来源: 评论
Data Augmentation Impact on Deep learning Performance for Stress Detection  11
Data Augmentation Impact on Deep learning Performance for St...
收藏 引用
11th IEEE International Conference on Intelligent Computing and information systems, ICICIS 2023
作者: Hamdi, Eman Mabrouk, Mohamed Rady, Sherine Aref, Mostafa Faculty of Computer and Information Science Computer Science Department Cairo Egypt Faculty of Computer and Information Science Information Systems Department Cairo Egypt
The mental health of individuals has a major influence on society. Mental disorders such as depression and anxiety are related to issues and distress to function in work, social, or family gatherings. Motivated by hel... 详细信息
来源: 评论
Fake News Classification: Past, Current, and Future
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2225-2249页
作者: Muhammad Usman Ghani Khan Abid Mehmood Mourad Elhadef Shehzad Ashraf Chaudhry Department of Computer Science University of Engineering and TechnologyLahore54890Pakistan Department of Computer Science&Information Technology Abu Dhabi UniversityAbu Dhabi59911United Arab Emirates Department of Software Engineering Faculty of Engineering and ArchitectureNisantasi UniversityIstanbulTurkey
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can qu... 详细信息
来源: 评论
Modern Standard Arabic speech disorders corpus for digital speech processing applications
收藏 引用
International Journal of Speech Technology 2024年 第1期27卷 157-170页
作者: Alqudah, Assal A. M. Alshraideh, Mohammad A. M. Abushariah, Mohammad A. M. Sharieh, Ahmad A. S. Department of Computer Science King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan
Digital speech processing applications including automatic speech recognition (ASR), speaker recognition, speech translation, and others, essentially require large volumes of speech data for training and testing purpo... 详细信息
来源: 评论
A Novel Framework for Gauging information Extracted from Smartphones Using Neutrosophic Logic
收藏 引用
Neutrosophic Sets and systems 2025年 76卷 154-171页
作者: Abou Alzahab, R.M. Ismail, Amr Abd Elkhalik, S.H. Shams, M.Y. El-Bakry, H.M. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Department. of Communication and Computer Engineering Air Defense University Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Department of Information Systems. Faculty of Computer and Information Science Mansoura University Egypt
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Integration between Bioinformatics Algorithms and Neutrosophic Theory
收藏 引用
Neutrosophic Sets and systems 2024年 66卷 34-54页
作者: Farag, Romany M. Shams, Mahmoud Y. Aldawody, Dalia A. Khalid, Huda E. El-Bakry, Hazem M. Salama, Ahmed A. Dept. of Math and Computer Science Faculty of Science Port Said Univ. Egypt Dept. of Machine Learning Faculty of Artificial Intelligence Kafrelsheikh University Egypt Telafer University Telafer Iraq Dept. of Information Systems Faculty of Computer and Information Sciences Mansoura University Egypt Dept. of Math and Computer Science Faculty of Science Port Said University Egypt
This paper presents a neutrosophic inference model for bioinformatics. The model is used to develop a system for accurate comparisons of human nucleic acids, where the new nucleic acid is compared to a database of old... 详细信息
来源: 评论