咨询与建议

限定检索结果

文献类型

  • 13,560 篇 会议
  • 8,226 篇 期刊文献
  • 303 册 图书

馆藏范围

  • 22,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,825 篇 工学
    • 9,411 篇 计算机科学与技术...
    • 7,714 篇 软件工程
    • 2,892 篇 信息与通信工程
    • 1,880 篇 控制科学与工程
    • 1,499 篇 生物工程
    • 1,294 篇 电气工程
    • 1,167 篇 生物医学工程(可授...
    • 1,144 篇 电子科学与技术(可...
    • 945 篇 机械工程
    • 743 篇 光学工程
    • 677 篇 仪器科学与技术
    • 610 篇 化学工程与技术
    • 529 篇 动力工程及工程热...
    • 501 篇 网络空间安全
    • 453 篇 安全科学与工程
  • 7,418 篇 理学
    • 3,580 篇 数学
    • 2,451 篇 物理学
    • 1,706 篇 生物学
    • 1,179 篇 统计学(可授理学、...
    • 835 篇 系统科学
    • 641 篇 化学
  • 4,199 篇 管理学
    • 2,434 篇 管理科学与工程(可...
    • 1,932 篇 图书情报与档案管...
    • 1,238 篇 工商管理
  • 1,291 篇 医学
    • 1,095 篇 临床医学
    • 927 篇 基础医学(可授医学...
    • 560 篇 药学(可授医学、理...
    • 520 篇 公共卫生与预防医...
  • 657 篇 法学
    • 545 篇 社会学
  • 438 篇 经济学
    • 437 篇 应用经济学
  • 382 篇 教育学
  • 303 篇 农学
  • 131 篇 文学
  • 53 篇 军事学
  • 49 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 608 篇 deep learning
  • 498 篇 computer science
  • 431 篇 accuracy
  • 397 篇 information tech...
  • 392 篇 feature extracti...
  • 369 篇 machine learning
  • 310 篇 computational mo...
  • 304 篇 data mining
  • 298 篇 support vector m...
  • 289 篇 internet of thin...
  • 260 篇 artificial intel...
  • 247 篇 training
  • 206 篇 optimization
  • 194 篇 neural networks
  • 177 篇 image segmentati...
  • 168 篇 covid-19
  • 160 篇 predictive model...
  • 157 篇 reliability
  • 153 篇 computer archite...
  • 147 篇 data models

机构

  • 289 篇 faculty of scien...
  • 288 篇 department for p...
  • 283 篇 department of ph...
  • 281 篇 departamento de ...
  • 274 篇 department of ph...
  • 269 篇 department of ph...
  • 266 篇 department of ph...
  • 257 篇 faculté des scie...
  • 254 篇 kirchhoff-instit...
  • 228 篇 yerevan physics ...
  • 224 篇 department of ph...
  • 224 篇 fakultät für phy...
  • 223 篇 department of ph...
  • 219 篇 physics division...
  • 215 篇 institute of phy...
  • 214 篇 department of ph...
  • 207 篇 institut für ast...
  • 198 篇 department of ph...
  • 195 篇 department of ph...
  • 180 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 265 篇 a. c. könig
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 262 篇 g. gaudio
  • 261 篇 s. mohapatra
  • 261 篇 y. nagasaka
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 250 篇 d. guest
  • 249 篇 s. guindon

语言

  • 19,685 篇 英文
  • 2,266 篇 其他
  • 132 篇 中文
  • 31 篇 日文
  • 9 篇 德文
  • 9 篇 斯洛文尼亚文
  • 7 篇 法文
  • 5 篇 俄文
  • 1 篇 波兰文
检索条件"机构=Faculty of Computer Science&Information Technology"
22089 条 记 录,以下是641-650 订阅
排序:
Hybrid lightweight encryption for IoT: integrating chaotic key generators with Feistel and substitution-permutation networks for secure 3DV transmission
收藏 引用
Multimedia Tools and Applications 2025年 1-47页
作者: El-Shafai, Walid Mesrega, Ahmed K. Ahmed, Hossam Eldin H. Elbahnasawy, Nirmeen A. El-Samie, Fathi E. Abd Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Deptartment of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Computer Science and Engineering Faculty of Electronic Engineering Menoufia University Menouf Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o... 详细信息
来源: 评论
Ensemble Learning for Breast Cancer Image Classification Using Pre-trained CNNs and Random Oversampling Method  5
Ensemble Learning for Breast Cancer Image Classification Usi...
收藏 引用
5th International Conference on Advanced information Technologies, ICAIT 2024
作者: Thuzar, Win Myat Moe Htay, Moe Uinversity of Computer Studies Mandalay Department of Information Technology Supporting and Maintenance Mandalay Myanmar Uinversity of Computer Studies Mandalay Faculty of Computer Science Mandalay Myanmar
The classification of breast cancer images presents significant challenges, especially when dealing with imbalanced datasets that underrepresent minority classes. This study tackles the issue by implementing ensemble ... 详细信息
来源: 评论
Preliminary Exploration on Node-To-Node Fault Tolerance Coordination in Distributed System
Preliminary Exploration on Node-To-Node Fault Tolerance Coor...
收藏 引用
2023 IEEE International Conference on Computing, ICOCO 2023
作者: Saadoon, Muntadher Hamid, Siti Hafizah Ab. Sofian, Hazrina Altarturi, Hamza Nasuha, Nur Azizul, Zati Hakim Khalid, Haqi Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Artificial Intelligence Kuala Lumpur50603 Malaysia Universiti Putra Malaysia Faculty of Engineering Department of Computer and Communication Selangor 43400 Malaysia
Internet of Things, edge computing devices, the widespread use of artificial intelligence and machine learning applications, and the extensive adoption of cloud computing pose significant challenges to maintaining fau... 详细信息
来源: 评论
Facial Expression Recognition Model Depending on Optimized Support Vector Machine
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 499-515页
作者: Amel Ali Alhussan Fatma M.Talaat El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Doaa Sami Khafaga Mona Alnaggar Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Machine Learning&Information Retrieval Department Faculty of Artificial IntelligenceKafrelsheikh UniversityKafrelsheikh33516Egypt Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Robotics and Intelligent Machines Department Faculty of Artificial IntelligenceKafrelsheikh UniversityKafrelsheikh33516Egypt
In computer vision,emotion recognition using facial expression images is considered an important research *** learning advances in recent years have aided in attaining improved results in this *** to recent studies,mu... 详细信息
来源: 评论
Generating of Test Data by Harmony Search Against Genetic Algorithms
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 647-665页
作者: Ahmed S.Ghiduk Abdullah Alharbi Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Mathematics and Computer Science Faculty of ScienceBeni-Suef UniversityBeni-Suef62521Egypt
Many search-based algorithms have been successfully applied in sev-eral software engineering *** algorithms(GAs)are the most used in the scientific domains by scholars to solve software testing *** imi-tate the theory ... 详细信息
来源: 评论
Performance Improvement Technique of RSA Algorithm in Document Data Security  12
Performance Improvement Technique of RSA Algorithm in Docume...
收藏 引用
12th International Conference on Cyber and IT Service Management, CITSM 2024
作者: Wandira, Agtori Nasution, Benny Benyamin Zarlis, M. Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia Politeknik Negeri Medan Departement of Computer Engineering Medan Indonesia
One of the first public key schemes was developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman at MIT and first published in 1978. Since then, the RSA scheme has become the most widely accepted and applied publi... 详细信息
来源: 评论
An Efficient Path Planning Strategy in Mobile Sink Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 1237-1267页
作者: Najla Bagais Etimad Fadel Amal Al-Mansour Department of Computer Science Faculty of Computing and Information TechnologyKing Abdul-Aziz UniversityJeddah21589Saudi Arabia
Wireless sensor networks (WSNs) are considered the backbone ofthe Internet of Things (IoT), which enables sensor nodes (SNs) to achieveapplications similarly to human intelligence. However, integrating a WSNwith the I... 详细信息
来源: 评论
Decision Tree-Based IoT Botnet Attack Detection  2
Decision Tree-Based IoT Botnet Attack Detection
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia College Of Information Technology University Of Petra Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
This paper investigated the predictive capabilities of three decision tree models for IoT botnet attack prediction using packet information while minimizing the number of predictors. The study employed three decision ... 详细信息
来源: 评论
A Review of Fintech Management and Security Development  10
A Review of Fintech Management and Security Development
收藏 引用
10th IEEE information technology International Seminar, ITIS 2024
作者: Ritonga, Ali Akbar Zuhri Harahap, Syaiful Sooai, Adri Gabriel Nugroho, Aryo Samsir Prasetyo Adi, Puput Dani Universitas Labuhanbatu Faculty of Science and Technology Department of Informatics Management North Sumatera Labuhanbatu Indonesia Universitas Labuhanbatu Faculty of Science and Technology Department of Information System North Sumatera Labuhanbatu Indonesia Universitas Katolik Widya Mandira Faculty of Computer Science Department of Computer Engineering NTT Kupang Indonesia Universitas Narotama Faculty of Computer Science Department of Information System Surabaya Indonesia Universitas Labuhanbatu Faculty of Computer Science Department of Informatics Engineering North Sumatera Labuhanbatu Indonesia Department of Telecommunication Bandung Indonesia
This research focuses on the review of Fintech and its development on the IoT Platform and also the risks that can be posed to the IoT network used. Finance is the most essential side of several other sectors which in... 详细信息
来源: 评论
Why Should I Trust Your Explanation? An Evaluation Approach for XAI Methods Applied to Predictive Process Monitoring Results
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1458-1472页
作者: Elkhawaga, Ghada Elzeki, Omar M. Abu-Elkheir, Mervat Reichert, Manfred Ulm University Institute of Databases and Information Systems Ulm89081 Germany Mansoura University Faculty of Computers and Information Mansoura35516 Egypt New Mansoura University Faculty of Computer Science and Engineering Mansoura35516 Egypt German University in Cairo Faculty of Media Engineering and Technology New Cairo11835 Egypt
As a use case of process mining, predictive process monitoring (PPM) aims to provide information on the future course of running business process instances. A large number of available PPM approaches adopt predictive ... 详细信息
来源: 评论