咨询与建议

限定检索结果

文献类型

  • 9,589 篇 会议
  • 5,398 篇 期刊文献
  • 325 册 图书

馆藏范围

  • 15,312 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,699 篇 工学
    • 6,316 篇 计算机科学与技术...
    • 5,023 篇 软件工程
    • 1,774 篇 信息与通信工程
    • 1,499 篇 控制科学与工程
    • 933 篇 电气工程
    • 860 篇 生物工程
    • 754 篇 生物医学工程(可授...
    • 722 篇 电子科学与技术(可...
    • 647 篇 机械工程
    • 486 篇 光学工程
    • 462 篇 仪器科学与技术
    • 415 篇 化学工程与技术
    • 392 篇 动力工程及工程热...
    • 364 篇 网络空间安全
    • 341 篇 安全科学与工程
  • 4,641 篇 理学
    • 2,437 篇 数学
    • 1,183 篇 物理学
    • 1,044 篇 生物学
    • 810 篇 统计学(可授理学、...
    • 669 篇 系统科学
    • 517 篇 化学
  • 3,064 篇 管理学
    • 1,971 篇 管理科学与工程(可...
    • 1,285 篇 图书情报与档案管...
    • 1,210 篇 工商管理
  • 912 篇 医学
    • 767 篇 临床医学
    • 626 篇 基础医学(可授医学...
    • 393 篇 公共卫生与预防医...
    • 320 篇 药学(可授医学、理...
  • 535 篇 法学
    • 456 篇 社会学
  • 463 篇 经济学
    • 457 篇 应用经济学
  • 275 篇 教育学
  • 197 篇 农学
  • 64 篇 文学
  • 31 篇 艺术学
  • 23 篇 军事学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 405 篇 computer science
  • 389 篇 deep learning
  • 301 篇 machine learning
  • 258 篇 computational mo...
  • 231 篇 accuracy
  • 223 篇 artificial intel...
  • 220 篇 internet of thin...
  • 188 篇 information syst...
  • 178 篇 feature extracti...
  • 176 篇 support vector m...
  • 175 篇 predictive model...
  • 169 篇 optimization
  • 168 篇 neural networks
  • 161 篇 data mining
  • 143 篇 information tech...
  • 137 篇 real-time system...
  • 135 篇 reliability
  • 134 篇 training
  • 127 篇 software enginee...
  • 126 篇 monitoring

机构

  • 129 篇 centre of interd...
  • 69 篇 maharishi school...
  • 62 篇 department of co...
  • 53 篇 faculty of compu...
  • 46 篇 chitkara univers...
  • 40 篇 department of in...
  • 38 篇 department of co...
  • 37 篇 faculty of busin...
  • 34 篇 faculty of compu...
  • 33 篇 faculty of compu...
  • 31 篇 computer science...
  • 27 篇 faculty of compu...
  • 26 篇 faculty of compu...
  • 25 篇 department of in...
  • 25 篇 faculty of infor...
  • 24 篇 vishwakarma inst...
  • 24 篇 department of in...
  • 23 篇 institute for sy...
  • 23 篇 faculty of compu...
  • 22 篇 university of bu...

作者

  • 38 篇 abdelwahed motwa...
  • 37 篇 el-bakry hazem m...
  • 36 篇 vikram kumar
  • 35 篇 pedrycz witold
  • 34 篇 dulski k.
  • 30 篇 anwer mustafa hi...
  • 28 篇 kozik t.
  • 26 篇 prabowo harjanto
  • 26 篇 radwa marzouk
  • 26 篇 el-sayed m.el-ke...
  • 26 篇 kubicz e.
  • 25 篇 mastorakis nikos
  • 24 篇 tao dacheng
  • 22 篇 abu sarwar zaman...
  • 22 篇 kaplon l.
  • 21 篇 czerwiński e.
  • 21 篇 turowski klaus
  • 21 篇 meenakshi r.
  • 18 篇 ali elrashidi
  • 18 篇 mohammed rizwanu...

语言

  • 14,414 篇 英文
  • 798 篇 其他
  • 61 篇 中文
  • 34 篇 日文
  • 8 篇 德文
  • 4 篇 法文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=Faculty of Computer Science and Business Computer Systems"
15312 条 记 录,以下是201-210 订阅
排序:
A Neutrosophic Approach to Robust Web Security: Mitigating XSS Attacks
收藏 引用
Neutrosophic Sets and systems 2025年 79卷 1-22页
作者: Salama, A.A. Aboelfotoh, El-Said F. El-Bakry, Hazem M. Khalid, Huda E. Essa, Ahmed K. Sabbagh, Ramiz El-Morshedy, Doaa S. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Information Systems Faculty of Computers and Information Mansoura University Mansoura Egypt Telafer University Telafer Iraq Department of the Scientific Affairs Telafer University Mosul Iraq
Cross-Site Scripting (XSS) is one of the most grievous vulnerabilities-a pitfall through which web applications are affected. These types of attacks are complex, and the available threat landscape is always changing, ... 详细信息
来源: 评论
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 857-873页
作者: Amardeep Singh Hamad Ali Abosaq Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa School of Computer Information Sciences University of CumberlandsWilliamsburgKentucky40769USA Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Electrical Electronics and Computer SystemsCollege of Engineering and TechnologyUniversity of SargodhaSargodha40100Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Department of Electrical Engineering The University of LahoreLahore54000Pakistan Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... 详细信息
来源: 评论
Representing Nonmonotonic Inference Based on c-Representations as an SMT Problem  17th
Representing Nonmonotonic Inference Based on c-Representati...
收藏 引用
17th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty, ECSQARU 2023
作者: von Berg, Martin Sanin, Arthur Beierle, Christoph Knowledge-Based Systems Faculty of Mathematics and Computer Science FernUniversität in Hagen Hagen58084 Germany
As a semantics for conditional knowledge bases, ranking functions order possible worlds by mapping them to a degree of plausibility. c-Representations are special ranking functions that are obtained by assigning indiv... 详细信息
来源: 评论
Approximations of System W Between c-Inference, System Z, and Lexicographic Inference  17th
Approximations of System W Between c-Inference, System Z, a...
收藏 引用
17th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty, ECSQARU 2023
作者: Haldimann, Jonas Beierle, Christoph Knowledge-Based Systems Faculty of Mathematics and Computer Science FernUniversität in Hagen Hagen58084 Germany
Inductive inference operators have been introduced to formalize the process of completing a conditional belief base to a full inference relation. In this paper, we investigate the approximation of inductive inference ... 详细信息
来源: 评论
Novel Framework of Segmentation 3D MRI of Brain Tumors
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3489-3502页
作者: Ibrahim Mahmoud El-Henawy Mostafa Elbaz Zainab H.Ali Noha Sakr Department of Computer Science Faculty of Computers and InformaticsZagazig UniversityZagazigEgypt Department of Computer Science Faculty of Computers and InformaticsKafrelsheikh UniversityKafrelsheikhEgypt Department of Embedded Network Sys.and Tec. Faculty of Artificial IntelligenceKafrelsheikh UniversityKafrelsheikhEgypt Computers Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansouraEgypt
Medical image segmentation is a crucial process for computer-aided diagnosis and *** image segmentation refers to portioning the images into small,disjointed parts for simplifying the processes of analysis and *** and... 详细信息
来源: 评论
Novel Optimized Feature Selection Using Metaheuristics Applied to Physical Benchmark Datasets
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4027-4041页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Fadwa Alrowais Sunil Kumar Abdelhameed Ibrahim Abdelaziz A.Abdelhamid Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt School of Computer Science University of Petroleum and Energy StudiesDehradun248001India Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a da... 详细信息
来源: 评论
Towards a User-Friendly Web Application Firewall  11
Towards a User-Friendly Web Application Firewall
收藏 引用
11th IEEE International Conference on Intelligent Computing and Information systems, ICICIS 2023
作者: Omar, Fatima Ahmed, Dalia Elnakib, Omar Ahmed, Mohamed Farhan, Nada Hindy, Hanan Abdel-Hamid, Mahmoud Badawi, Yehia Ain Shams University Faculty of Computer and Information Science Cyber Security Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Computer Systems Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Cyber Security Department Giza Egypt Ain Shams University Faculty of Computer and Information Science Computer Science Department Cairo Egypt
Web Application Firewall (WAF) systems play a vital role in protecting web applications from various security vulnerabilities. However, existing WAF solutions are often costly and complex to configure, limiting their ... 详细信息
来源: 评论
A Partial MaxSAT Approach to Nonmonotonic Reasoning with System W  37
A Partial MaxSAT Approach to Nonmonotonic Reasoning with Sys...
收藏 引用
37th International Florida Artificial Intelligence Research Society Conference, FLAIRS 2024
作者: Beierle, Christoph Spang, Aron Haldimann, Jonas FernUniversität in Hagen Knowledge Based Systems Faculty of Mathematics and Computer Science Hagen58084 Germany
The only recently introduced System W is a nonmonotonic inductive inference operator exhibiting some notable properties like extending rational closure and satisfying syntax splitting postulates for inference from con... 详细信息
来源: 评论
Pose-Critical Keypoint Attention model for Dynamic Yoga Pose Classification  2
Pose-Critical Keypoint Attention model for Dynamic Yoga Pose...
收藏 引用
2nd International Conference on computer Vision and Internet of Things, ICCVIoT 2024
作者: Meghana, J.H. Chethan, H.K. Prakash, S.P. Shiva Department of Studies in Computer Science University of Mysore Karnataka Mysore India Department of Computer Science and Engineering Maharaja Institute of Technology Karnataka Mysore India Department of Information Science and Engineering & Computer Science and Business Systems JSS Science and Technology University Karnataka Mysuru India
Yoga pose detection and classification have garnered considerable attention in recent years due to their significant applications in various domains, including fitness, health monitoring, and rehabilitation programs. ... 详细信息
来源: 评论
Stepwise AI Interpretive Approach for Multimodal Data Fusion  6
Stepwise AI Interpretive Approach for Multimodal Data Fusion
收藏 引用
6th International Conference on Intelligent Computing in Data sciences, ICDS 2024
作者: Long, Bowen Liu, Enjie Qiu, Renxi Duan, Yanqing University of Bedfordshire Faculty of Computer Science and Technology Luton United Kingdom University of Bedfordshire Faculty of Business Luton United Kingdom
In recent years, Artificial Intelligence technology has excelled in various tasks and is taking the world by storm. However, the various transformations in neural networks make it difficult to make sense of the reason... 详细信息
来源: 评论