咨询与建议

限定检索结果

文献类型

  • 9,589 篇 会议
  • 5,398 篇 期刊文献
  • 325 册 图书

馆藏范围

  • 15,312 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,699 篇 工学
    • 6,316 篇 计算机科学与技术...
    • 5,023 篇 软件工程
    • 1,774 篇 信息与通信工程
    • 1,499 篇 控制科学与工程
    • 933 篇 电气工程
    • 860 篇 生物工程
    • 754 篇 生物医学工程(可授...
    • 722 篇 电子科学与技术(可...
    • 647 篇 机械工程
    • 486 篇 光学工程
    • 462 篇 仪器科学与技术
    • 415 篇 化学工程与技术
    • 392 篇 动力工程及工程热...
    • 364 篇 网络空间安全
    • 341 篇 安全科学与工程
  • 4,641 篇 理学
    • 2,437 篇 数学
    • 1,183 篇 物理学
    • 1,044 篇 生物学
    • 810 篇 统计学(可授理学、...
    • 669 篇 系统科学
    • 517 篇 化学
  • 3,064 篇 管理学
    • 1,971 篇 管理科学与工程(可...
    • 1,285 篇 图书情报与档案管...
    • 1,210 篇 工商管理
  • 912 篇 医学
    • 767 篇 临床医学
    • 626 篇 基础医学(可授医学...
    • 393 篇 公共卫生与预防医...
    • 320 篇 药学(可授医学、理...
  • 535 篇 法学
    • 456 篇 社会学
  • 463 篇 经济学
    • 457 篇 应用经济学
  • 275 篇 教育学
  • 197 篇 农学
  • 64 篇 文学
  • 31 篇 艺术学
  • 23 篇 军事学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 405 篇 computer science
  • 389 篇 deep learning
  • 301 篇 machine learning
  • 258 篇 computational mo...
  • 231 篇 accuracy
  • 223 篇 artificial intel...
  • 220 篇 internet of thin...
  • 188 篇 information syst...
  • 178 篇 feature extracti...
  • 176 篇 support vector m...
  • 175 篇 predictive model...
  • 169 篇 optimization
  • 168 篇 neural networks
  • 161 篇 data mining
  • 143 篇 information tech...
  • 137 篇 real-time system...
  • 135 篇 reliability
  • 134 篇 training
  • 127 篇 software enginee...
  • 126 篇 monitoring

机构

  • 129 篇 centre of interd...
  • 69 篇 maharishi school...
  • 62 篇 department of co...
  • 53 篇 faculty of compu...
  • 46 篇 chitkara univers...
  • 40 篇 department of in...
  • 38 篇 department of co...
  • 37 篇 faculty of busin...
  • 34 篇 faculty of compu...
  • 33 篇 faculty of compu...
  • 31 篇 computer science...
  • 27 篇 faculty of compu...
  • 26 篇 faculty of compu...
  • 25 篇 department of in...
  • 25 篇 faculty of infor...
  • 24 篇 vishwakarma inst...
  • 24 篇 department of in...
  • 23 篇 institute for sy...
  • 23 篇 faculty of compu...
  • 22 篇 university of bu...

作者

  • 38 篇 abdelwahed motwa...
  • 37 篇 el-bakry hazem m...
  • 36 篇 vikram kumar
  • 35 篇 pedrycz witold
  • 34 篇 dulski k.
  • 30 篇 anwer mustafa hi...
  • 28 篇 kozik t.
  • 26 篇 prabowo harjanto
  • 26 篇 radwa marzouk
  • 26 篇 el-sayed m.el-ke...
  • 26 篇 kubicz e.
  • 25 篇 mastorakis nikos
  • 24 篇 tao dacheng
  • 22 篇 abu sarwar zaman...
  • 22 篇 kaplon l.
  • 21 篇 czerwiński e.
  • 21 篇 turowski klaus
  • 21 篇 meenakshi r.
  • 18 篇 ali elrashidi
  • 18 篇 mohammed rizwanu...

语言

  • 14,414 篇 英文
  • 798 篇 其他
  • 61 篇 中文
  • 34 篇 日文
  • 8 篇 德文
  • 4 篇 法文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=Faculty of Computer Science and Business Computer Systems"
15312 条 记 录,以下是21-30 订阅
排序:
What is the Role of Personal Knowledge in Social Robotics and Its Ethics?  6
What is the Role of Personal Knowledge in Social Robotics an...
收藏 引用
6th Social Robots with AI: Prospects, Risks, and Responsible Methods Robophilosophy, RP 2024
作者: Funk, Michael RG Cooperative Systems Faculty of Computer Science University of Vienna Austria
In this contribution to the Robophilosophy 2024 conference, I undertake a rereading of Michael Polanyi's 1958 publication, Personal Knowledge. A particular emphasis will be placed on the examination of contemporar... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 1267-1289页
作者: M.Muzaffar Hameed Rodina Ahmad Laiha Mat Kiah Ghulam Murtaza Noman Mazhar Faculty of Computer Science and Information Technology University of MalayaKuala Lumpur46400Malaysia Department of Computer Science Bahauddin Zakariya UniversityMultan60000Pakistan Department of Computer Science Sukkur Institute of Business Administration UniversitySukkur65200Pakistan
Offline signature verification(OfSV)is essential in preventing the falsification of *** learning(DL)based OfSVs require a high number of signature images to attain acceptable ***,a limited number of signature samples ... 详细信息
来源: 评论
Development and Research of Models for Optimization Information Flow in Interactive Analysis Big Data in Geographic Information systems
Development and Research of Models for Optimization Informat...
收藏 引用
International Conference on Emerging Trends and Applications in Artificial Intelligence, ICETAI 2023
作者: Alrammahi, Ali Abdulkarem Habib Sari, Farah Abbas Obaid Hilal, Bushra Kamil Department of Computer Sciences Faculty of Computer Science and Mathematics University of Kufa Najaf Iraq Department of Computer Information Systems Faculty of Computer Science and Information Technology University of Qadisiya Qadisiya Iraq
A large number of areas of application of geographic information systems (GIS) involves the continuous accumulation data. The need to record the state of an observed object or phenomenon generates an intense flow of h... 详细信息
来源: 评论
Integration between Bioinformatics Algorithms and Neutrosophic Theory
收藏 引用
Neutrosophic Sets and systems 2024年 66卷 34-54页
作者: Farag, Romany M. Shams, Mahmoud Y. Aldawody, Dalia A. Khalid, Huda E. El-Bakry, Hazem M. Salama, Ahmed A. Dept. of Math and Computer Science Faculty of Science Port Said Univ. Egypt Dept. of Machine Learning Faculty of Artificial Intelligence Kafrelsheikh University Egypt Telafer University Telafer Iraq Dept. of Information Systems Faculty of Computer and Information Sciences Mansoura University Egypt Dept. of Math and Computer Science Faculty of Science Port Said University Egypt
This paper presents a neutrosophic inference model for bioinformatics. The model is used to develop a system for accurate comparisons of human nucleic acids, where the new nucleic acid is compared to a database of old... 详细信息
来源: 评论
A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2299-2316页
作者: Bassam Mohammad Elzaghmouri Yosef Hasan Fayez Jbara Said Elaiwat Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Farah H.Zawaideh Mouiad Fadeil Alawneh Asef Al-Khateeb Marwan Abu-Zanona Department of Computer Science Faculty of Computer Science and Information TechnologyJerash UniversityJerash26150Jordan Computer Engineering Department College of Engineering&Information Technology Buraydah CollegesBuraydah51418Saudi Arabia Faculty of Architecture and Design Al-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityDiriyahRiyadh13713Saudi Arabia Applied College King Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Business Intelligence and Data Analysis Faculty of Financial Sciences and BusinessIrbid National UniversityIrbid21110Jordan Faculty of Information Technology Ajloun National UniversityAjlun26810Jordan Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense *** paper presents an innovative h... 详细信息
来源: 评论
Dynamic Resource Utilization Prediction Model for Cloud Datacenter
收藏 引用
IAENG International Journal of Applied Mathematics 2025年 第2期55卷 307-331页
作者: Bliedy, Doaa Khafagy, Mohamed H. Badry, Rasha M. Department of Information Systems Faculty of Computers and Artificial Intelligence Fayoum University Egypt Department of Computer Science Faculty of Computers and Artificial Intelligence Fayoum University Egypt
Much research has been done on predicting resource utilization in the cloud to avoid over- and under-provisioning resources. Most existing systems focus on estimating the utilization of one or two resources at most, i... 详细信息
来源: 评论
A Case Study of Cyber Subversion Attack based Design Flaw in Service Oriented Component Application Logic
收藏 引用
Journal of Cyber Security Technology 2024年 第3期8卷 204-228页
作者: Nabi, Faisal Zhou, Xujuan Iftikhar, Umna Attaullah, Hafiz Muhammad Faculty Computer Science Mohammad Ali Jinnah University Karachi Pakistan School of Business University of Southern Queensland Springfield Australia
Modern e-commerce systems are more likely focused on mechanisms of security, such as secure transactional protocols, cryptographic schemes and parameter sanitization, and it is assumed that putting these in place will... 详细信息
来源: 评论
Resilient TCP Variant Enabling Smooth Network Updates for Software-Defined Data Center Networks
收藏 引用
Tsinghua science and Technology 2024年 第5期29卷 1615-1632页
作者: Abdul Basit Dogar Sami Ullah Yiran Zhang Hisham Alasmary Muhammad Waqas Sheng Chen Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China and also with Department of Informatics and SystemsUniversity of Management and TechnologyLahore 54660Pakistan Department of Computer Science Shaheed Benazir Bhutto UniversitySheringalUpper Dir 18050Pakistan School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha 61421Saudi Arabia Department of Computer Engineering Faculty of Information TechnologyUniversity of BahrainSakheer 32038Bahrainand also with School of EngineeringEdith Cowan UniversityPerth WA 6027Australia School of Electronics and Computer Science University of SouthamptonSouthamptonSO171BJUK
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data *** TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient t... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论