咨询与建议

限定检索结果

文献类型

  • 30,381 篇 会议
  • 18,748 篇 期刊文献
  • 639 册 图书

馆藏范围

  • 49,768 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28,454 篇 工学
    • 17,874 篇 计算机科学与技术...
    • 14,505 篇 软件工程
    • 6,058 篇 信息与通信工程
    • 4,659 篇 控制科学与工程
    • 4,214 篇 电气工程
    • 3,711 篇 电子科学与技术(可...
    • 3,210 篇 生物工程
    • 2,813 篇 生物医学工程(可授...
    • 2,242 篇 机械工程
    • 2,087 篇 光学工程
    • 1,968 篇 化学工程与技术
    • 1,800 篇 仪器科学与技术
    • 1,743 篇 动力工程及工程热...
    • 1,338 篇 材料科学与工程(可...
    • 961 篇 安全科学与工程
    • 946 篇 交通运输工程
  • 18,227 篇 理学
    • 8,507 篇 数学
    • 6,825 篇 物理学
    • 3,793 篇 生物学
    • 2,678 篇 统计学(可授理学、...
    • 2,063 篇 化学
    • 2,000 篇 系统科学
  • 7,208 篇 管理学
    • 4,478 篇 管理科学与工程(可...
    • 2,986 篇 图书情报与档案管...
    • 2,265 篇 工商管理
  • 2,801 篇 医学
    • 2,381 篇 临床医学
    • 2,057 篇 基础医学(可授医学...
    • 1,296 篇 药学(可授医学、理...
    • 1,000 篇 公共卫生与预防医...
  • 1,190 篇 法学
    • 998 篇 社会学
  • 879 篇 经济学
  • 665 篇 农学
  • 635 篇 教育学
  • 145 篇 文学
  • 91 篇 军事学
  • 65 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,292 篇 computer science
  • 953 篇 accuracy
  • 939 篇 deep learning
  • 848 篇 machine learning
  • 778 篇 computational mo...
  • 761 篇 feature extracti...
  • 726 篇 training
  • 630 篇 artificial intel...
  • 581 篇 internet of thin...
  • 526 篇 optimization
  • 515 篇 support vector m...
  • 422 篇 predictive model...
  • 403 篇 neural networks
  • 388 篇 data mining
  • 372 篇 data models
  • 354 篇 mathematical mod...
  • 327 篇 convolutional ne...
  • 319 篇 testing
  • 302 篇 real-time system...
  • 301 篇 monitoring

机构

  • 1,094 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 979 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 640 篇 infn laboratori ...
  • 623 篇 infn sezione di ...
  • 606 篇 infn sezione di ...
  • 601 篇 fakultät physik ...
  • 599 篇 infn sezione di ...
  • 569 篇 university of ch...
  • 558 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 535 篇 school of physic...
  • 530 篇 iccub universita...
  • 522 篇 imperial college...
  • 518 篇 nikhef national ...
  • 516 篇 h.h. wills physi...
  • 512 篇 stfc rutherford ...
  • 509 篇 school of physic...

作者

  • 264 篇 barter w.
  • 260 篇 a. gomes
  • 250 篇 beiter a.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 241 篇 g. bella
  • 240 篇 j. strandberg
  • 238 篇 c. amelung
  • 237 篇 bellee v.
  • 236 篇 d. calvet
  • 234 篇 g. spigo
  • 233 篇 s. chen
  • 231 篇 bowcock t.j.v.
  • 228 篇 f. siegert
  • 228 篇 brundu d.
  • 227 篇 blake t.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 y. tayalati
  • 216 篇 boettcher t.

语言

  • 47,672 篇 英文
  • 1,628 篇 其他
  • 347 篇 中文
  • 109 篇 日文
  • 14 篇 德文
  • 11 篇 法文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 泰文
检索条件"机构=Faculty of Computer Science and Computer Engineering"
49768 条 记 录,以下是671-680 订阅
排序:
Facial Expression Recognition Model Depending on Optimized Support Vector Machine
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 499-515页
作者: Amel Ali Alhussan Fatma M.Talaat El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Doaa Sami Khafaga Mona Alnaggar Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Machine Learning&Information Retrieval Department Faculty of Artificial IntelligenceKafrelsheikh UniversityKafrelsheikh33516Egypt Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Robotics and Intelligent Machines Department Faculty of Artificial IntelligenceKafrelsheikh UniversityKafrelsheikh33516Egypt
In computer vision,emotion recognition using facial expression images is considered an important research *** learning advances in recent years have aided in attaining improved results in this *** to recent studies,mu... 详细信息
来源: 评论
Towards Blockchain-Based Secure BGP Routing,Challenges and Future Research Directions
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2035-2062页
作者: Qiong Yang Li Ma Shanshan Tu Sami Ullah MuhammadWaqas Hisham Alasmary Faculty of Information Technology Beijing University of TechnologyBeijing100124China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science Shaheed Benazir Bhutto UniversitySheringal18050Pakistan School of Computing and Mathematical Science Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUK School of Engineering Edith Cowan UniversityPerth6027Australia Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig... 详细信息
来源: 评论
From 5G to 6G: The Role of AI, Machine Learning, and Deep Learning in Wireless Systems  4
From 5G to 6G: The Role of AI, Machine Learning, and Deep Le...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Gote, Pradnyawant M. Kumar, Praveen Verma, Prateek Yesankar, Prajyot Pawar, Adesh Saratkar, Saniya Faculty of Engineering and Technology Department of Computer Science & Design Maharashtra Wardha442001 India Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Wardha442001 India Faculty of Engineering and Technology Department of Artificial Intelligence & Machine Learning Maharashtra Wardha442001 India Faculty of Engineering and Technology Department of Artificial Intelligence & Data Science Maharashtra Wardha442001 India
The swift progression of wireless communication technologies-specifically from 5G to 6G is an approach that could be the most significant revolutionary leap towards changing connectivity and data transmission forever.... 详细信息
来源: 评论
Stock Market Prediction Using Genetic Algorithm Assisted LSTM-CNN Hybrid Model  14
Stock Market Prediction Using Genetic Algorithm Assisted LST...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Nikhil, Shreyas Sah, Rahul Kumar Kumar Parki, Santosh Tamang, Til Bikram Somashekhara Reddy, D. Mahesh, T.R. Faculty of Engineering and Technology Dept. of Computer Science and Engineering Bangalore India
Stock price prediction has always been a tough task for all the stakeholders involved. This paper focusses on four different models, namely LSTM, CNN, LSTM-CNN, and Genetic Algorithm-Assisted LSTM-CNN (GA-LSTM-CNN) fo... 详细信息
来源: 评论
Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3183-3198页
作者: Doaa Sami Khafaga Faten Khalid Karim Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt The Department of Civil and Environmental Engineering Florida International UniversityMiamiFLUSA Department of Information Technology College of ComputerQassim UniversityBuraydah51452Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t... 详细信息
来源: 评论
Mutual character dialogue generation with semi-supervised multitask learners and awareness
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第3期16卷 1357-1363页
作者: Ahrari Khalaf, Ayesheh Hassan Abdalla Hashim, Aisha Olowolayemo, Akeem Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia (IIUM) Kuala Lumpur Malaysia Department of Computer Science Faculty of Information and Communication Technology International Islamic University Malaysia (IIUM) Kuala Lumpur Malaysia
Consistent efforts have been ongoing to improve the friendliness and reliability of informal dialogue systems. However, most research focuses solely on mimicking human-like answers. Therefore, the interlocutors’ awar... 详细信息
来源: 评论
Can We Detect Malicious Behaviours in Encrypted DNS Tunnels Using Network Flow Entropy?
收藏 引用
Journal of Cyber Security and Mobility 2022年 第3期11卷 461-495页
作者: Khodjaeva, Yulduz Zincir-Heywood, Nur Zincir, Ibrahim Faculty of Computer Science Dalhousie University Canada Faculty of Engineering Izmir University of Economics Turkey
This paper explores the concept of entropy of a flow to augment flow statistical features for encrypted DNS tunnelling detection, specifically DNS over HTTPS traffic. To achieve this, the use of flow exporters, namely... 详细信息
来源: 评论
Penetration Testing: A Cost-Benefit Analysis of Best Practices Implementation for Software Startups  6
Penetration Testing: A Cost-Benefit Analysis of Best Practic...
收藏 引用
6th IEEE Novel Intelligent and Leading Emerging sciences Conference, NILES 2024
作者: Gaafar, Ahmed Ali Fouad, Khaled M. Sadek, Mohamed A. Nile University Faculty of Information Technology and Computer Science Cairo Egypt Benha University Faculty of Computers and Artificial Intelligence Egypt New Mansoura University Faculty of Computer Science and Engineering Egypt Nile University Egypt
Despite software startups often not handlingsensitive data, the implementation of robust security measures is crucial to mitigate significant financial and reputational risks. This study investigates the cost-benefit ... 详细信息
来源: 评论
Employing Feature engineering for River Stage Forecasting to Improve Hybrid Model Performance  32
Employing Feature Engineering for River Stage Forecasting to...
收藏 引用
32nd International Conference on Software, Telecommunications and computer Networks, SoftCOM 2024
作者: Mihel, Anna Maria Pecnik, Spela Vrbancic, Grega Lerga, Jonatan Krvavica, Nino University of Rijeka Faculty of Engineering Department of Computer Engineering Rijeka Croatia University of Maribor Intelligent Systems Laboratory Faculty of Electrical Engineering and Computer Science Maribor Slovenia University of Rijeka Faculty of Civil Engineering Department of Hydrotechnics and Geotechnics Rijeka Croatia
Establishing early warning systems and efficient management of water resources in tidal reaches is crucial for achieving adequate flood protection. In tidal reaches, the river stage interacts non-linearly with tides (... 详细信息
来源: 评论
An Improved K-means Clustering Algorithm Towards an Efficient Data-Driven Modeling
收藏 引用
Annals of Data science 2024年 第5期11卷 1525-1544页
作者: Zubair, Md. Iqbal, MD. Asif Shil, Avijeet Chowdhury, M.J.M. Moni, Mohammad Ali Sarker, Iqbal H. Department of Computer Science and Engineering Chittagong University of Engineering & ampTechnology Chittagong4349 Bangladesh Department of Computer Science and Information Technology La Trobe University Victoria3086 Australia School of Health and Rehabilitation Sciences Faculty of Health and Behavioural Sciences The University of Queensland St Lucia QLD4072 Australia
K-means algorithm is one of the well-known unsupervised machine learning algorithms. The algorithm typically finds out distinct non-overlapping clusters in which each point is assigned to a group. The minimum squared ... 详细信息
来源: 评论