咨询与建议

限定检索结果

文献类型

  • 13,560 篇 会议
  • 8,265 篇 期刊文献
  • 305 册 图书

馆藏范围

  • 22,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,821 篇 工学
    • 9,415 篇 计算机科学与技术...
    • 7,714 篇 软件工程
    • 2,892 篇 信息与通信工程
    • 1,882 篇 控制科学与工程
    • 1,499 篇 生物工程
    • 1,294 篇 电气工程
    • 1,167 篇 生物医学工程(可授...
    • 1,144 篇 电子科学与技术(可...
    • 946 篇 机械工程
    • 744 篇 光学工程
    • 678 篇 仪器科学与技术
    • 610 篇 化学工程与技术
    • 529 篇 动力工程及工程热...
    • 502 篇 网络空间安全
    • 453 篇 安全科学与工程
  • 7,422 篇 理学
    • 3,580 篇 数学
    • 2,456 篇 物理学
    • 1,706 篇 生物学
    • 1,178 篇 统计学(可授理学、...
    • 835 篇 系统科学
    • 641 篇 化学
  • 4,200 篇 管理学
    • 2,434 篇 管理科学与工程(可...
    • 1,932 篇 图书情报与档案管...
    • 1,238 篇 工商管理
  • 1,293 篇 医学
    • 1,097 篇 临床医学
    • 928 篇 基础医学(可授医学...
    • 560 篇 药学(可授医学、理...
    • 521 篇 公共卫生与预防医...
  • 659 篇 法学
    • 546 篇 社会学
  • 438 篇 经济学
    • 437 篇 应用经济学
  • 383 篇 教育学
  • 303 篇 农学
  • 131 篇 文学
  • 53 篇 军事学
  • 49 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 609 篇 deep learning
  • 498 篇 computer science
  • 431 篇 accuracy
  • 396 篇 feature extracti...
  • 395 篇 information tech...
  • 374 篇 machine learning
  • 310 篇 computational mo...
  • 298 篇 support vector m...
  • 295 篇 data mining
  • 289 篇 internet of thin...
  • 257 篇 artificial intel...
  • 249 篇 training
  • 210 篇 optimization
  • 189 篇 neural networks
  • 178 篇 image segmentati...
  • 168 篇 covid-19
  • 164 篇 predictive model...
  • 157 篇 reliability
  • 153 篇 computer archite...
  • 149 篇 data models

机构

  • 290 篇 faculty of scien...
  • 290 篇 department for p...
  • 284 篇 department of ph...
  • 282 篇 departamento de ...
  • 275 篇 department of ph...
  • 270 篇 department of ph...
  • 267 篇 department of ph...
  • 259 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 228 篇 yerevan physics ...
  • 225 篇 department of ph...
  • 225 篇 fakultät für phy...
  • 224 篇 department of ph...
  • 219 篇 physics division...
  • 215 篇 department of ph...
  • 212 篇 institute of phy...
  • 202 篇 institut für ast...
  • 201 篇 department of ph...
  • 199 篇 department of ph...
  • 179 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 259 篇 y. nagasaka
  • 250 篇 d. guest
  • 246 篇 s. guindon

语言

  • 19,722 篇 英文
  • 2,268 篇 其他
  • 134 篇 中文
  • 31 篇 日文
  • 9 篇 德文
  • 9 篇 斯洛文尼亚文
  • 7 篇 法文
  • 5 篇 俄文
  • 1 篇 波兰文
检索条件"机构=Faculty of Computer Science&Information Technology"
22130 条 记 录,以下是651-660 订阅
排序:
Decision Tree-Based IoT Botnet Attack Detection  2
Decision Tree-Based IoT Botnet Attack Detection
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia College Of Information Technology University Of Petra Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
This paper investigated the predictive capabilities of three decision tree models for IoT botnet attack prediction using packet information while minimizing the number of predictors. The study employed three decision ... 详细信息
来源: 评论
An Efficient Path Planning Strategy in Mobile Sink Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 1237-1267页
作者: Najla Bagais Etimad Fadel Amal Al-Mansour Department of Computer Science Faculty of Computing and Information TechnologyKing Abdul-Aziz UniversityJeddah21589Saudi Arabia
Wireless sensor networks (WSNs) are considered the backbone ofthe Internet of Things (IoT), which enables sensor nodes (SNs) to achieveapplications similarly to human intelligence. However, integrating a WSNwith the I... 详细信息
来源: 评论
The Two Sides of AI in Cybersecurity: Opportunities and Challenges  2
The Two Sides of AI in Cybersecurity: Opportunities and Chal...
收藏 引用
2nd International Conference on Intelligent Computing and Next Generation Networks, ICNGN 2023
作者: Alzboon, Mowafaq Salem Bader, Ahmad Fuad Abuashour, Ahmad Alqaraleh, Muhyeeddin Kamel Zaqaibeh, Belal Al-Batah, Mohammad Jadara University Faculty of Science and Information Technology Department of Computer Science Irbid Jordan Arab Open University Department of Information Technology and Computing Kuwait
The advancement of artificial intelligence (AI) over the past several years has enabled businesses to identify and respond to cyberattacks in real-time. Nevertheless, its implementation is fraught with difficulties an... 详细信息
来源: 评论
An Implementation of Brain-computer Interface in Research Activities  15
An Implementation of Brain-Computer Interface in Research Ac...
收藏 引用
15th International Scientific and Practical Conference on Environment. technology. Resources, ETR 2024
作者: Mamchur, Dmytro Peksa, Janis Department of Information Technology Turiba University Riga Latvia Computer Engineering and Electronics Department Kremenchuk Mykhailo Ostrohradskyi National University Kremenchuk Ukraine Institute of Information Technology Faculty of Computer Science and Information Technology Riga Technical University Riga Latvia
The paper provides brief overview of Brain-computer Interface (BCI), highlighting BCI-based assisting technologies for disabled persons in healthcare applications as one of the key priorities. A proposed solution for ... 详细信息
来源: 评论
Why Should I Trust Your Explanation? An Evaluation Approach for XAI Methods Applied to Predictive Process Monitoring Results
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1458-1472页
作者: Elkhawaga, Ghada Elzeki, Omar M. Abu-Elkheir, Mervat Reichert, Manfred Ulm University Institute of Databases and Information Systems Ulm89081 Germany Mansoura University Faculty of Computers and Information Mansoura35516 Egypt New Mansoura University Faculty of Computer Science and Engineering Mansoura35516 Egypt German University in Cairo Faculty of Media Engineering and Technology New Cairo11835 Egypt
As a use case of process mining, predictive process monitoring (PPM) aims to provide information on the future course of running business process instances. A large number of available PPM approaches adopt predictive ... 详细信息
来源: 评论
A Review of Fintech Management and Security Development  10
A Review of Fintech Management and Security Development
收藏 引用
10th IEEE information technology International Seminar, ITIS 2024
作者: Ritonga, Ali Akbar Zuhri Harahap, Syaiful Sooai, Adri Gabriel Nugroho, Aryo Samsir Prasetyo Adi, Puput Dani Universitas Labuhanbatu Faculty of Science and Technology Department of Informatics Management North Sumatera Labuhanbatu Indonesia Universitas Labuhanbatu Faculty of Science and Technology Department of Information System North Sumatera Labuhanbatu Indonesia Universitas Katolik Widya Mandira Faculty of Computer Science Department of Computer Engineering NTT Kupang Indonesia Universitas Narotama Faculty of Computer Science Department of Information System Surabaya Indonesia Universitas Labuhanbatu Faculty of Computer Science Department of Informatics Engineering North Sumatera Labuhanbatu Indonesia Department of Telecommunication Bandung Indonesia
This research focuses on the review of Fintech and its development on the IoT Platform and also the risks that can be posed to the IoT network used. Finance is the most essential side of several other sectors which in... 详细信息
来源: 评论
Enhancing handwritten text feature extraction through key point detection and graph representation
收藏 引用
Soft Computing 2024年 第21期28卷 12977-12990页
作者: Rahman, Atta Ur Alahmadi, Tahani Jaser Alsenani, Yousef S. Ali, Sania Faculty of Computer Science and Engineering Ghulam Ishaq Khan Institute of Engineering Sciences and Technologies P.O. Box 23460 Topi Pakistan P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Computer Science University of Science and Technology Bannu P.O. Box 28100 Khyber Pakhtunkhwa Bannu Pakistan
Handwriting typically consists of a wide range of writing forms with substantial differences in the placements and size of those writing shapes. The arrangement, organization, and spatial association of individual let... 详细信息
来源: 评论
An optimized ensemble model based on meta-heuristic algorithms for effective detection and classification of breast tumors
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4881-4894页
作者: Saber, Abeer Elbedwehy, Samar Awad, Wael A. Hassan, Esraa Information Technology Department Faculty of Computers and Artificial Intelligence Damietta University Damietta34517 Egypt Department of Data Science Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33511 Egypt Department of Computer Science Faculty of Computers and Artificial Intelligence Damietta University Damietta34517 Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33511 Egypt
One of the most common cancers among women worldwide is breast cancer (BC), and early diagnosis can save lives. Early detection of BC increases the likelihood of a successful outcome by enabling treatment to start soo... 详细信息
来源: 评论
Carbon Dioxide Emission Forecasting using Machine Learning and Time Series Statistical Models  25
Carbon Dioxide Emission Forecasting using Machine Learning a...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Hassan, Tahir Mansour, Khalid Waseemullah, Waseemullah Memon, Muhammad Qasim Ned University of Engineering and Technology Department of Computer Science & Information Technology Karachi Pakistan Arab Open University Faculty of Computer Studies Bahrain Sindh Bhitshah Pakistan
Climate change is considered a global disaster that has wreaked havoc worldwide. Climate change conditions are primarily driven due to emission of carbon dioxide and other greenhouse gases. Around the globe, several c... 详细信息
来源: 评论
EDU-GAN:Edge Enhancement Generative Adversarial Networks with Dual-Domain Discriminators for Inscription Images Denoising
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1633-1653页
作者: Yunjing Liu Erhu Zhang Jingjing Wang Guangfeng Lin Jinghong Duan School of Mechanical and Precision Instrument Engineering Xi’an University of TechnologyXi’an710048China Department of Information Science Xi’an University of TechnologyXi’an710054China School of Faculty of Painting Packaging Engineering and Digital MediaXi’an University of TechnologyXi’an710048China School of Computer Science and Engineering Xi’an University of TechnologyXi’an710048China
Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research *** fromnatural images,character images pay more attention to stroke ***,existingmodelsmainly cons... 详细信息
来源: 评论