咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 2,551 篇 期刊文献
  • 120 册 图书

馆藏范围

  • 5,917 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,441 篇 工学
    • 2,197 篇 计算机科学与技术...
    • 1,738 篇 软件工程
    • 688 篇 控制科学与工程
    • 668 篇 信息与通信工程
    • 478 篇 电气工程
    • 414 篇 电子科学与技术(可...
    • 362 篇 生物工程
    • 339 篇 生物医学工程(可授...
    • 294 篇 机械工程
    • 243 篇 光学工程
    • 217 篇 仪器科学与技术
    • 193 篇 动力工程及工程热...
    • 157 篇 化学工程与技术
    • 147 篇 材料科学与工程(可...
    • 135 篇 交通运输工程
    • 114 篇 安全科学与工程
  • 1,952 篇 理学
    • 928 篇 数学
    • 601 篇 物理学
    • 468 篇 生物学
    • 300 篇 统计学(可授理学、...
    • 291 篇 系统科学
    • 187 篇 化学
  • 937 篇 管理学
    • 632 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 305 篇 工商管理
  • 402 篇 医学
    • 341 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 155 篇 药学(可授医学、理...
    • 138 篇 公共卫生与预防医...
  • 156 篇 法学
    • 128 篇 社会学
  • 115 篇 经济学
  • 74 篇 农学
  • 72 篇 教育学
  • 20 篇 文学
  • 19 篇 艺术学
  • 10 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 157 篇 computer science
  • 152 篇 deep learning
  • 142 篇 machine learning
  • 118 篇 artificial intel...
  • 104 篇 computational mo...
  • 93 篇 feature extracti...
  • 88 篇 accuracy
  • 82 篇 systems engineer...
  • 74 篇 optimization
  • 72 篇 internet of thin...
  • 67 篇 neural networks
  • 67 篇 training
  • 62 篇 control systems
  • 62 篇 mathematical mod...
  • 52 篇 computational in...
  • 52 篇 educational inst...
  • 52 篇 predictive model...
  • 50 篇 support vector m...
  • 50 篇 robustness
  • 48 篇 data mining

机构

  • 44 篇 faculty of compu...
  • 32 篇 department of co...
  • 26 篇 department of in...
  • 24 篇 institute for sy...
  • 24 篇 faculty of engin...
  • 20 篇 graduate school ...
  • 20 篇 inesc tec - inst...
  • 20 篇 computer enginee...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 faculty of engin...
  • 17 篇 faculty of compu...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 department of co...
  • 16 篇 systems research...
  • 15 篇 department of el...
  • 15 篇 department of in...
  • 15 篇 ieee
  • 15 篇 faculty of compu...

作者

  • 37 篇 pedrycz witold
  • 27 篇 tao dacheng
  • 26 篇 el-sayed m.el-ke...
  • 24 篇 xin xin
  • 21 篇 abdelwahed motwa...
  • 17 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 tomio watanabe
  • 15 篇 gallegos luis en...
  • 15 篇 anwer mustafa hi...
  • 13 篇 k. inoue
  • 13 篇 watanabe tomio
  • 13 篇 fahd n.al-wesabi
  • 12 篇 ahmed bestoun s.
  • 12 篇 manar ahmed hamz...
  • 12 篇 abdelhameed ibra...
  • 11 篇 radwa marzouk
  • 11 篇 yunyoung nam
  • 11 篇 m. ishikawa
  • 11 篇 nengkun yu

语言

  • 5,667 篇 英文
  • 178 篇 其他
  • 41 篇 中文
  • 29 篇 日文
  • 3 篇 德文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computer Science of Systems Engineering"
5917 条 记 录,以下是101-110 订阅
排序:
Dynamic Evolutionary Game-based Modeling,Analysis and Performance Enhancement of Blockchain Channels
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第1期10卷 188-202页
作者: PeiYun Zhang MengChu Zhou ChenXi Li Abdullah Abusorrah IEEE the School of Computer Science Nanjing University of Information Science&TechnologyNanjing 210044China the Helen and John C.Hartmann Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA the School of Computer and Information Anhui Normal UniversityWuhu 241003China the Department of Electrical and Computer Engineering Faculty of Engineeringand Center of Research Excellence in Renewable Energy and Power SystemsKing Abdulaziz UniversityJeddah 21481Saudi Arabia
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi... 详细信息
来源: 评论
Physician Scheduling using Constraint Satisfaction Programming  11
Physician Scheduling using Constraint Satisfaction Programmi...
收藏 引用
11th International Japan-Africa Conference on Electronics, Communications, and Computations, JAC-ECC 2023
作者: Bakr, Hend A. Salama, Ahmed M. Fares, Ahmed Zaky, Ahmed B. Cairo University Biomedical Engineering Program Faculty of Engineering Giza Egypt Benha University Computer Systems Engineering Program Faculty of Engineering at Shoubra Banha Egypt Computer science and information technology Programs Alexandria Egypt Benha University On leave from Computer Systems Engineering Program Faculty of Engineering at Shoubra Egypt
Physician scheduling is a critical task that impacts the quality of patient care, staff satisfaction, and operational efficiency in healthcare institutions. The traditional approach to physician scheduling is manual a... 详细信息
来源: 评论
A New Approach for Quantum Phase Estimation Based Algorithms for Machine Learning  8th
A New Approach for Quantum Phase Estimation Based Algorithm...
收藏 引用
8th International Conference on Smart City Applications, SCA 2023
作者: Ouedrhiri, Oumayma Banouar, Oumayma El Hadaj, Salah Raghay, Said Department of Computer Science and Mathematics University of Quebec at Trois-Riviéres Trois-Riviéres Canada Faculty of Sciences and Techniques Laboratory of Computer Science Engineering and Systems Marrakesh Morocco
One of the greatest developments in computer science is undoubtedly quantum computing. It has demonstrated to give various benefits over the classical algorithms, particularly in the significant reduction of processin... 详细信息
来源: 评论
Layer-Wise External Attention by Well-Localized Attention Map for Efficient Deep Anomaly Detection
收藏 引用
SN computer science 2024年 第5期5卷 592页
作者: Nakanishi, Keiichi Shiroma, Ryo Hayakawa, Tokihisa Katafuchi, Ryoya Tokunaga, Terumasa Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Fukuoka-ken Iizuka-shi 820-8502 Japan Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Fukuoka-ken Iizuka-shi 820-8502 Japan
The external attention mechanism offers a promising approach to enhance image anomaly detection (Hayakawa et al., in: IMPROVE, pp. 100-–110, 2023). Nevertheless, the effectiveness of this method is contingent upon th... 详细信息
来源: 评论
Observer-Structured PID Controller: Flight Controller Design Examples  4
Observer-Structured PID Controller: Flight Controller Design...
收藏 引用
4th International Conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2024
作者: Sato, Masayuki Sebe, Noboru Faculty of Advanced Science and Technology Kumamoto University Kumamoto Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan
This note shows two design examples of PID con-Trollers, whose state variables estimate the selected state vari-Ables of the controlled plant systems, for LTI Parametrically Dependent (LTIPD) systems. The authors have... 详细信息
来源: 评论
A decentralized and privacy-preserving framework for electronic health records using blockchain
收藏 引用
Alexandria engineering Journal 2025年 126卷 196-203页
作者: Alahmari, Saad Alshardan, Amal Al-Wesabi, Fahd N. Sorour, Shaymaa Alghushairy, Omar Alsini, Raed Khadidos, Alaa O. Duhayyim, Mesfer Al Department of Computer Science Applied College Northern Border University Arar Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Computer Science Applied College at Mahayil King Khalid University Saudi Arabia Department of Management Information Systems College of Business Administration King Faisal University Al-Ahsa31982 Saudi Arabia Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj16273 Saudi Arabia
As healthcare services have become increasingly digitized, Electronic Health Records (EHRs) have become widely adopted, providing seamless data exchange among providers. Conventional EHRs, however, are extremely vulne... 详细信息
来源: 评论
Evaluating Pretrained Deep Learning Models for COVID-19 Detection in Medical Imaging  1
Evaluating Pretrained Deep Learning Models for COVID-19 Dete...
收藏 引用
1st Renewable Energy Technologies and Modern Communications systems: Future and Challenges Conference, RETMCS 2024
作者: AL-Shehri, Bushra A. Sabbeh, Sahar F. Dessouky, Mohamed M. Department of Data Science College of Computer Science and Engineering University of Jeddah Jeddah23218 Saudi Arabia Faculty of Computers and Artificial Intelligence Information Systems Department Benha University Benha13518 Egypt Department of Computer Science and Artificial Intelligence College of Computer Science and Engineering University of Jeddah Jeddah23218 Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt
COVID-19 is a respiratory disease for which reverse transcription-polymerase chain reaction (RT-PCR) is the standard detection method. This study introduces a hybrid deep learning approach to support the diagnosis of ... 详细信息
来源: 评论
Social and Non-social Reward Learning Contexts for Detection of Major Depressive Disorder Using EEG: A Machine Learning Approach  16th
Social and Non-social Reward Learning Contexts for Detecti...
收藏 引用
16th International Conference on Brain Informatics, BI 2023
作者: Ghattas, Philopateer Gamal, Mai Eldawlatly, Seif Computer Science and Engineering Department Faculty of Media Engineering and Technology German University in Cairo Cairo Egypt Computer and Systems Engineering Department Faculty of Engineering Ain Shams University Cairo Egypt Computer Science and Engineering Department The American University in Cairo Cairo Egypt
Major Depressive Disorder (MDD) is a leading cause of disability globally and a major cause of suicide deaths. Improving our understanding of MDD is expected to inspire better objective diagnostic and treatment tools ... 详细信息
来源: 评论
Lightweight and Roubust Key Agreement for Securing IIoT-Driven Flexible Manufacturing systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17197-17209页
作者: Hammad, Muhammad Badshah, Akhtar Almeer, Mohammed A. Waqas, Muhammad Song, Houbing Chen, Sheng Han, Zhu GIK Institute of Engineering Sciences and Technology Faculty of Mechanical Engineering Topi23640 Pakistan University of Malakand Department of Software Engineering Dir Lower18800 Pakistan University of Bahrain Computer Engineering Department College of Information Technology 32038 Bahrain University of Greenwich Faculty of Engineering and Science Centre for Sustainable Cybersecurity United Kingdom Edith Cowan University School of Engineering PerthWA6027 Australia Department of Information Systems BaltimoreMD United States University of Southampton School of Electronics and Computer Science SouthamptonSO17 1BJ United Kingdom University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The ever-evolving Internet of Things (IoT) has ushered in a new era of intelligent manufacturing across multiple industries. However, the security and privacy of real-time data transmitted over the public channel of t... 详细信息
来源: 评论
A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 379-397页
作者: Hameed, Mohamed Abdel Hassaballah, M. Abdelazim, Riem Sahu, Aditya Kumar Department of Computer Science Faculty of Computers and Information Luxor University Luxor85951 Egypt Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University AlKharj16278 Saudi Arabia Department of Computer Science Faculty of Computers and Information South Valley University Qena Egypt Department of Information Systems College of Information Technology Misr University for Science and Technology Giza Egypt Amrita School of Computing Amrita Vishwa Vidyapeetham Andhra Pradesh Amaravati522503 India
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv... 详细信息
来源: 评论