咨询与建议

限定检索结果

文献类型

  • 1,333 篇 会议
  • 689 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,161 篇 工学
    • 892 篇 计算机科学与技术...
    • 748 篇 软件工程
    • 210 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 91 篇 生物工程
    • 82 篇 电气工程
    • 79 篇 电子科学与技术(可...
    • 74 篇 机械工程
    • 72 篇 生物医学工程(可授...
    • 54 篇 仪器科学与技术
    • 52 篇 安全科学与工程
    • 51 篇 化学工程与技术
    • 45 篇 光学工程
    • 45 篇 建筑学
    • 39 篇 动力工程及工程热...
    • 37 篇 土木工程
  • 571 篇 理学
    • 232 篇 数学
    • 189 篇 物理学
    • 116 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 77 篇 系统科学
    • 51 篇 化学
  • 454 篇 管理学
    • 299 篇 管理科学与工程(可...
    • 195 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 109 篇 医学
    • 88 篇 临床医学
    • 66 篇 基础医学(可授医学...
  • 62 篇 法学
    • 52 篇 社会学
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 43 篇 教育学
    • 41 篇 教育学
  • 24 篇 农学
  • 19 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 74 篇 computer science
  • 70 篇 deep learning
  • 59 篇 information syst...
  • 43 篇 machine learning
  • 41 篇 feature extracti...
  • 38 篇 accuracy
  • 36 篇 neural networks
  • 36 篇 computational mo...
  • 33 篇 data mining
  • 31 篇 security
  • 31 篇 testing
  • 30 篇 information tech...
  • 30 篇 decision making
  • 28 篇 artificial intel...
  • 27 篇 humans
  • 26 篇 internet of thin...
  • 25 篇 mathematical mod...
  • 24 篇 software
  • 24 篇 training
  • 23 篇 intrusion detect...

机构

  • 38 篇 department of co...
  • 34 篇 faculty of compu...
  • 30 篇 faculty of compu...
  • 23 篇 department of co...
  • 21 篇 faculty of compu...
  • 19 篇 department of co...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 14 篇 faculty of compu...
  • 14 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 department of sy...
  • 9 篇 applied science ...
  • 8 篇 faculty of compu...

作者

  • 25 篇 abdelwahed motwa...
  • 20 篇 mesfer al duhayy...
  • 18 篇 siti mariyam sha...
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 15 篇 habibollah haron
  • 15 篇 shamsuddin siti ...
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 12 篇 sunar mohd shahr...
  • 11 篇 ali selamat
  • 11 篇 shahaboddin sham...
  • 11 篇 yang jing
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...
  • 10 篇 stiawan deris

语言

  • 1,986 篇 英文
  • 32 篇 其他
  • 11 篇 中文
检索条件"机构=Faculty of Computer Science and Information System"
2029 条 记 录,以下是51-60 订阅
排序:
Spectral analysis of Cupric oxide (CuO) and Graphene Oxide (GO) via machine learning techniques
收藏 引用
Egyptian Informatics Journal 2025年 29卷
作者: Mufti, Zeeshan Saleem Mahboob, Kashaf Aslam, Muhammad Nauman Hussain, Sadaf Omer, Abdoalrahman S.A. Sohail, Tanweer Abbas, Sagheer Khan, Ilyas Khan, Muhammad Adnan Department of Mathematics and Statistics The University of Lahore Lahore Campus Lahore54000 Pakistan Department of Computer Science Lahore Garrison University Lahore54000 Pakistan Department of Information System College of Computer and Information Sciences Majmaah University Al-Majmaah11952 Saudi Arabia Department of Mathematics College of Education Al Fasher University Sudan Department of Mathematics University of Jhang Jhang Pakistan Department of Computer Science Prince Mohammad Bin Fahad University Al Khobar Dhahran34754 Saudi Arabia Department of Mathematics College of Science Al-Zulfi Majmaah University Al-Majmaah 11952 Saudi Arabia Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman Jordan Department of Software Faculty of Artificial Intelligence and Software Gachon University Seongnam-si 13120 Korea Republic of
Chemical graph theory has recently gained much attraction among researchers due to its extensive use in mathematical chemistry. In this research article, We have studied the spectral properties such as eigenvalues, en... 详细信息
来源: 评论
A steganographic method based on DCT and new quantization technique
收藏 引用
International Journal of Network Security 2014年 第4期16卷 265-270页
作者: Amin, Mohamed Abdullkader, Hatem M. Ibrahem, Hani M. Sakr, Ahmed S. Mathematics and Computer Science department Faculty of Science Menofia University Egypt Information System department Faculty of Computers and Information Menofia University Egypt
In this paper, an efficient data hiding technique based on the discrete cosine transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then t... 详细信息
来源: 评论
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things
收藏 引用
Scientific Reports 2025年 第1期15卷 1-17页
作者: Asaithambi, Sasikumar Nallusamy, Senthilkumar Yang, Jing Prajapat, Sunil Kumar, Gyanendra Rathore, Pramod Singh Department of Data Science and Business Systems Faculty of Engineering and Technology SRM Institute of Science & Technology Tamil Nadu Kattankulathur 603203 India Centre for Applied Nanomaterials Chennai Institute of Technology Tamil Nadu Chennai 600069 India Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur 50603 Malaysia Department of Mathematics Central University of Himachal Pradesh Dharamshala 176215 India Department of IoT and Intelligent Systems Manipal University Jaipur Jaipur 303007 India Department of Computer and Communication Engineering Manipal University Jaipur Jaipur 303007 India
The Industrial Internet of Things (IIoT) seeks to improve smart factory productivity by leveraging automation and scalability. For automation in industry, optimization, collaboration and protection, and scalability, t... 详细信息
来源: 评论
Distributed Computing Jobs Scheduling Improvement Using Simulated Annealing Optimizer
Distributed Computing Jobs Scheduling Improvement Using Simu...
收藏 引用
11th International Conference on computer Modelling and Simulation (UKSim 2009)
作者: Azmi, Zafril Rizal M. Abu Bakar, Kamalrulnizam Abdullah, Abdul Hanan Shamsir, Mohd Shahir Faculty of Computer Science and Information System UTM Faculty of Science (Biology) UTM
Over the past decade, scheduling in distributed computing system has been an active research. However, it is still difficult to find an optimal scheduling algorithm to achieve load balancing for a specific scientific ... 详细信息
来源: 评论
Corrections to “Effective Gait Abnormality Detection in Parkinson Patients for Multi-Sensors Surveillance system
收藏 引用
IEEE Access 2025年 13卷 62892-62892页
作者: Abdulwahab Alazeb Mouazma Batool Naif Al Mudawi Mohammed S. Alshehri Sultan Almakdi Nouf Abdullah Almujally Asaad Algarni Department of Computer Science College of Computer Science and Information System Najran University Najran Saudi Arabia Department of Computer Science Air University Islamabad Pakistan Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh Saudi Arabia Department of Computer Science Faculty of Computing and Information Technology Northern Border University Rafha Saudi Arabia
Presents corrections to the paper, (Corrections to “Effective Gait Abnormality Detection in Parkinson Patients for Multi-Sensors Surveillance system”).
来源: 评论
Open source software adaptation in Africa: Is a matter of inferior or cheap is not quality?
收藏 引用
International Journal of Open Source Software and Processes 2014年 第1期5卷 1-15页
作者: Bakar, Abubakar Diwani Md Sultan, Abu Bakar Zulzalil, Hazura Din, Jamilah Department of Information System Faculty of Computer Science and Information Technology University Putra Malaysia Serdang Selangor Malaysia
The African continent has long benefited from adopting OSS in its private and public organizations that have changed their way of development, the use and how to acquire proprietary software. This frequency of adaptat... 详细信息
来源: 评论
Generalization Bounds of ERM Algorithm with Markov Chain Samples
收藏 引用
Acta Mathematicae Applicatae Sinica 2014年 第1期30卷 223-238页
作者: Bin ZOU Zong-ben XU Jie XU Faculty of Mathematics and Computer Science Hubei University Institute for Information and System Science School of Mathematics and StatisticsXi’an Jiaotong University
One of the main goals of machine learning is to study the generalization performance of learning algorithms. The previous main results describing the generalization ability of learning algorithms are usually based on ... 详细信息
来源: 评论
The sign tales of Hurst parameter: A revisit
The sign tales of Hurst parameter: A revisit
收藏 引用
2nd International Conference on Convergent information Technology, ICCIT 07
作者: Salleh, Mazleena Bakar, Ahmad Zaki Abu Department of Computer System and Communication Faculty of Computer Science and Information System Universiti Teknologi Malaysia Department of Information System Faculty of Computer Science and Information System Universiti Teknologi Malaysia
Network traffic measurement studies have shown the presence of self-similar behavior in both local area and wide area traffic traces. In this study we investigated the magnitude of the self-similarity behavior of netw... 详细信息
来源: 评论
Blog quality model
收藏 引用
International Journal of Web Based Communities 2013年 第1期9卷 25-50页
作者: Zain, Zuhaira Muhammad Ghani, Abdul Azim Abd Abdullah, Rusli Atan, Rodziah Yaakob, Razali Department of Information System Faculty of Computer Science and Information Technology Universiti Putra Malaysia 43400 Serdang Selangor Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia 43400 Serdang Selangor Malaysia
Breakthroughs in technology are making the internet an ever-growing phenomenon, and we have witnessed an enormous growth of blogs in the blogosphere. However, the blogosphere has been crippled by disorganised and unco... 详细信息
来源: 评论
Realization of E-University for distance learning
收藏 引用
WSEAS Transactions on computers 2009年 第1期8卷 48-59页
作者: El-Bakry, Hazem M. Mastorakis, Nikos Faculty of Computer Science and Information System Mansoura University Egypt Hellenic Naval Academy Greece
In previous work [27], the authors proposed an E-University but they did not take into account some essential parts. In this paper, the system presented in [27] is modified and developed. New critical important items ... 详细信息
来源: 评论