咨询与建议

限定检索结果

文献类型

  • 9,525 篇 会议
  • 5,354 篇 期刊文献
  • 324 册 图书

馆藏范围

  • 15,203 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,601 篇 工学
    • 6,251 篇 计算机科学与技术...
    • 4,983 篇 软件工程
    • 1,751 篇 信息与通信工程
    • 1,472 篇 控制科学与工程
    • 915 篇 电气工程
    • 859 篇 生物工程
    • 746 篇 生物医学工程(可授...
    • 714 篇 电子科学与技术(可...
    • 638 篇 机械工程
    • 474 篇 光学工程
    • 454 篇 仪器科学与技术
    • 407 篇 化学工程与技术
    • 387 篇 动力工程及工程热...
    • 358 篇 网络空间安全
    • 338 篇 安全科学与工程
  • 4,600 篇 理学
    • 2,426 篇 数学
    • 1,171 篇 物理学
    • 1,040 篇 生物学
    • 805 篇 统计学(可授理学、...
    • 666 篇 系统科学
    • 502 篇 化学
  • 3,048 篇 管理学
    • 1,958 篇 管理科学与工程(可...
    • 1,279 篇 图书情报与档案管...
    • 1,200 篇 工商管理
  • 904 篇 医学
    • 759 篇 临床医学
    • 619 篇 基础医学(可授医学...
    • 382 篇 公共卫生与预防医...
    • 320 篇 药学(可授医学、理...
  • 534 篇 法学
    • 456 篇 社会学
  • 462 篇 经济学
    • 456 篇 应用经济学
  • 274 篇 教育学
  • 196 篇 农学
  • 65 篇 文学
  • 31 篇 艺术学
  • 23 篇 军事学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 405 篇 computer science
  • 379 篇 deep learning
  • 296 篇 machine learning
  • 258 篇 computational mo...
  • 226 篇 accuracy
  • 225 篇 artificial intel...
  • 220 篇 internet of thin...
  • 188 篇 information syst...
  • 177 篇 feature extracti...
  • 176 篇 predictive model...
  • 174 篇 support vector m...
  • 170 篇 optimization
  • 168 篇 neural networks
  • 162 篇 data mining
  • 142 篇 information tech...
  • 132 篇 reliability
  • 132 篇 training
  • 128 篇 real-time system...
  • 126 篇 software enginee...
  • 126 篇 decision making

机构

  • 130 篇 centre of interd...
  • 69 篇 maharishi school...
  • 63 篇 department of co...
  • 53 篇 faculty of compu...
  • 46 篇 chitkara univers...
  • 40 篇 department of in...
  • 38 篇 department of co...
  • 38 篇 faculty of busin...
  • 34 篇 faculty of compu...
  • 33 篇 faculty of compu...
  • 31 篇 computer science...
  • 27 篇 faculty of compu...
  • 26 篇 faculty of compu...
  • 25 篇 department of in...
  • 25 篇 faculty of infor...
  • 25 篇 department of in...
  • 24 篇 vishwakarma inst...
  • 23 篇 institute for sy...
  • 23 篇 faculty of compu...
  • 23 篇 faculty of compu...

作者

  • 38 篇 abdelwahed motwa...
  • 37 篇 el-bakry hazem m...
  • 36 篇 vikram kumar
  • 35 篇 dulski k.
  • 35 篇 pedrycz witold
  • 31 篇 anwer mustafa hi...
  • 30 篇 kozik t.
  • 27 篇 radwa marzouk
  • 26 篇 prabowo harjanto
  • 26 篇 el-sayed m.el-ke...
  • 26 篇 kubicz e.
  • 25 篇 mastorakis nikos
  • 24 篇 tao dacheng
  • 23 篇 kaplon l.
  • 22 篇 abu sarwar zaman...
  • 21 篇 czerwiński e.
  • 21 篇 turowski klaus
  • 21 篇 meenakshi r.
  • 20 篇 shopa r.y.
  • 18 篇 ali elrashidi

语言

  • 14,644 篇 英文
  • 461 篇 其他
  • 59 篇 中文
  • 34 篇 日文
  • 5 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer Science and Business Computer Systems"
15203 条 记 录,以下是1-10 订阅
排序:
DP-ARTS: Dynamic Prioritization for Adaptive Resource Allocation and Task Scheduling in Cloud Computing
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 793-807页
作者: BEN ALLA, Hicham BEN ALLA, Said EZZATI, Abdellah Computer Science Mathematics and Computer Science Department Science and Technical Faculty Hassan 1 University Settat Morocco Embedded Systems and Computer Science National School of Applied Sciences of Berrechid Hassan 1 University Settat Morocco
Efficient task scheduling and resource allocation are essential for optimizing performance in cloud computing environments. The presence of priority constraints necessitates advanced solutions capable of addressing th... 详细信息
来源: 评论
Analysis, Trends, and Utilization of Security Information and Event Management (SIEM) in Critical Infrastructures  10
Analysis, Trends, and Utilization of Security Information an...
收藏 引用
10th International Conference on Advanced Computing and Communication systems, ICACCS 2024
作者: Sashwin, K. Nithika, K.S. Priyadharshini, S. Maduvant, S.P. Saranya Sri Eshwar College of Engineering Department of Computer Science and Business Systems Computer Science and Business Systems Coimbatore India Sri Eshwar College of Engineering Department of Computer Science and Business Systems Coimbatore India
Security Information and Event Management (SIEM) systems have become essential assets in the realm of cybersecurity. They fulfill a central role in the prevention, detection, and response to cyber threats. Over time, ... 详细信息
来源: 评论
Teaching Tip Rethinking How We Teach Git: Pedagogical Recommendations and Practical Strategies for the Information systems Curriculum
收藏 引用
Journal of Information systems Education 2025年 第1期36卷 1-12页
作者: Wagner, Gerit Thurner, Laureen Faculty Information Systems and Applied Computer Science Otto-Friedrich-Universität Bamberg Bamberg Germany
Git, as the leading version-control system, is frequently employed by software developers, digital product managers, and knowledge workers. Information systems (IS) students aspiring to fill software engineering, mana... 详细信息
来源: 评论
An Efficient Two-State Feature Attention-Based GRU for Text Classification
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第15期49卷 95-112页
作者: Mohammed, Dhurgham Ali Patel, Kalyani A. Faculty of Computer Science Gujarat University Ahmedabad India Department of Computer Science Faculty of Education for Girl University of Kufa Iraq K.S. School of Business Management and Information Technology Gujarat University India
Text classification has become crucial for mechanically sorting documents into specific categories. The goal of classification is to assign a predefined group or class to an instance based on its characteristics. To a... 详细信息
来源: 评论
Enhancing connectivity and coverage in wireless sensor networks: a hybrid comprehensive learning-Fick’s algorithm with particle swarm optimization for router node placement
收藏 引用
Neural Computing and Applications 2024年 第34期36卷 21671-21702页
作者: Amer, Dina A. Soliman, Sarah A. Hassan, Asmaa F. Zamel, Amr A. Computer Science Department Higher Technological Institute Tenth of Ramadan44228 Egypt Management Information Systems Department Faculty of Management Economics and Business Technology Egyptian Russian University Badr11829 Egypt Computer and Systems Engineering Department Faculty of Engineering Zagazig University Zagazig44519 Egypt
Wireless Sensor Networks (WSNs) are essential for collecting and transmitting data in modern applications that rely on data, where effective network connectivity and coverage are crucial. The optimal placement of rout... 详细信息
来源: 评论
Phishing Attacks Detection Using EnsembleMachine Learning Algorithms
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1325-1345页
作者: Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Marwan Abu-Zanona Bassam Mohammad Elzaghmouri Farah H.Zawaideh Mouiad Fadeil Alawneh Department of Computer Science and Information Systems College of Applied SciencesAlmaarefa UniversityDiriyahRiyadh13713Saudi Arabia Applied College King Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Computer Science Faculty of Computer Science and Information TechnologyJerash UniversityJerash26110Jordan Department of Business Intelligence and Data Analysis Faculty of Financial Sciences and BusinessIrbid National UniversityIrbid21110Jordan Faculty of Information Technology Ajloun National UniversityAjloun26767Jordan
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based *** indicates a persistent rise in phishing **... 详细信息
来源: 评论
Analysis of Statistical and Deep Learning Techniques for Temperature Forecasting
收藏 引用
Recent Advances in computer science and Communications 2024年 第2期17卷 49-65页
作者: Kruthika, Sriram Ganesan Rajasekaran, Umamaheswari Alagarsamy, Malini Sharma, Vandana Department of Computer Science and Business Systems Thiagarajar College of Engineering Tamil Nadu Madurai India NCR Delhi India
In the field of meteorology, temperature forecasting is a significant task as it has been a key factor in industrial, agricultural, renewable energy, and other sectors. High accuracy in temperature forecasting is need... 详细信息
来源: 评论
Enforcing Image Encryption using Cryptographic Algorithms  15
Enforcing Image Encryption using Cryptographic Algorithms
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Kumar, K. Siva Rathinavel, S. Dharun Raghavendharan, M. Lilian, Felicia Department of computer science and Business systems Madurai15 India
This paper proposes a methodology to ensure the user Image privacy in social media platform using image encryption method. Social media has long been a significant part of online communication. However, image and user...
来源: 评论
Detection of Left Ventricular Cavity from Cardiac MRI Images Using Faster R-CNN
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1819-1835页
作者: Zakarya Farea Shaaf Muhammad Mahadi Abdul Jamil Radzi Ambar Ahmed Abdu Alattab Anwar Ali Yahya Yousef Asiri Faculty of Electrical and Electronic Engineering Universiti Tun Hussein Onn MalaysiaParit RajaBatu Pahat86400JohorMalaysia Department of Computer Science College of Science and ArtsSharurahNajran UniversityNajran61441Saudi Arabia Department of Computer Science Faculty of Computer Science and Info.SystemsThamar UniversityDhamar87246Yemen Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
The automatic localization of the left ventricle(LV)in short-axis magnetic resonance(MR)images is a required step to process cardiac images using convolutional neural networks for the extraction of a region of interes... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论