咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 2,530 篇 期刊文献
  • 119 册 图书

馆藏范围

  • 5,895 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,427 篇 工学
    • 2,194 篇 计算机科学与技术...
    • 1,738 篇 软件工程
    • 686 篇 控制科学与工程
    • 667 篇 信息与通信工程
    • 477 篇 电气工程
    • 414 篇 电子科学与技术(可...
    • 362 篇 生物工程
    • 339 篇 生物医学工程(可授...
    • 293 篇 机械工程
    • 243 篇 光学工程
    • 217 篇 仪器科学与技术
    • 191 篇 动力工程及工程热...
    • 156 篇 化学工程与技术
    • 146 篇 材料科学与工程(可...
    • 135 篇 交通运输工程
    • 114 篇 安全科学与工程
  • 1,947 篇 理学
    • 927 篇 数学
    • 601 篇 物理学
    • 465 篇 生物学
    • 300 篇 统计学(可授理学、...
    • 291 篇 系统科学
    • 186 篇 化学
  • 935 篇 管理学
    • 630 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 305 篇 工商管理
  • 400 篇 医学
    • 340 篇 临床医学
    • 264 篇 基础医学(可授医学...
    • 155 篇 药学(可授医学、理...
    • 138 篇 公共卫生与预防医...
  • 155 篇 法学
    • 127 篇 社会学
  • 115 篇 经济学
  • 74 篇 农学
  • 71 篇 教育学
  • 20 篇 文学
  • 19 篇 艺术学
  • 10 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 156 篇 computer science
  • 148 篇 deep learning
  • 140 篇 machine learning
  • 115 篇 artificial intel...
  • 103 篇 computational mo...
  • 92 篇 feature extracti...
  • 87 篇 accuracy
  • 82 篇 systems engineer...
  • 74 篇 optimization
  • 72 篇 internet of thin...
  • 68 篇 training
  • 67 篇 neural networks
  • 62 篇 mathematical mod...
  • 61 篇 control systems
  • 52 篇 computational in...
  • 52 篇 educational inst...
  • 52 篇 predictive model...
  • 50 篇 support vector m...
  • 50 篇 robustness
  • 48 篇 data mining

机构

  • 44 篇 faculty of compu...
  • 32 篇 department of co...
  • 26 篇 department of in...
  • 24 篇 institute for sy...
  • 24 篇 faculty of engin...
  • 20 篇 graduate school ...
  • 20 篇 inesc tec - inst...
  • 20 篇 computer enginee...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 faculty of engin...
  • 17 篇 faculty of compu...
  • 17 篇 faculty of compu...
  • 16 篇 department of co...
  • 15 篇 department of el...
  • 15 篇 department of in...
  • 15 篇 department of in...
  • 15 篇 ieee
  • 15 篇 faculty of compu...
  • 15 篇 rt-rk institute ...

作者

  • 37 篇 pedrycz witold
  • 27 篇 tao dacheng
  • 26 篇 el-sayed m.el-ke...
  • 24 篇 xin xin
  • 21 篇 abdelwahed motwa...
  • 17 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 tomio watanabe
  • 15 篇 gallegos luis en...
  • 15 篇 anwer mustafa hi...
  • 13 篇 k. inoue
  • 13 篇 watanabe tomio
  • 13 篇 fahd n.al-wesabi
  • 12 篇 ahmed bestoun s.
  • 12 篇 manar ahmed hamz...
  • 12 篇 abdelhameed ibra...
  • 11 篇 radwa marzouk
  • 11 篇 yunyoung nam
  • 11 篇 m. ishikawa
  • 11 篇 nengkun yu

语言

  • 5,646 篇 英文
  • 178 篇 其他
  • 40 篇 中文
  • 29 篇 日文
  • 3 篇 德文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computer Science of Systems Engineering"
5895 条 记 录,以下是51-60 订阅
排序:
Accurate Phase Detection for ZigBee Using Artificial Neural Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2505-2518页
作者: Ali Alqahtani Abdulaziz A.Alsulami Saeed Alahmari Mesfer Alrizq Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
Determining the Critical Factors of Antenatal Care Follow-Up Using Two-Phase Machine Learning  27
Determining the Critical Factors of Antenatal Care Follow-Up...
收藏 引用
27th International Conference on Soft Computing and Measurements, SCM 2024
作者: Bessmertny, Igor A. Enkomaryam, Bidru C. Mamuye, Adane L. Itmo University Faculty of Software Engineering and Computer Systems Saint Petersburg Russia University of Gondar Department of Computer Science Gondar Ethiopia
Determining the critical factors affecting antenatal visits will greatly contribute to reducing maternal and infant mortality. This study, thus attempted to construct a cluster-based predictive model to determine the ... 详细信息
来源: 评论
Comparative Analysis of Camera Calibration Algorithms for Football Applications  4
Comparative Analysis of Camera Calibration Algorithms for Fo...
收藏 引用
4th International Workshop on Information Technologies: Theoretical and Applied Problems, ITTAP 2024
作者: Sorokivskyi, Oleksandr Hotovych, Volodymyr Nazarevych, Oleg Shymchuk, Grygorii Department of Computer Science Faculty of Computer Information Systems and Software Engineering Ternopil Ivan Puluj National Technical University Ternopil Ukraine
In solving the problem of automated analysis of football match video recordings, special video cameras are currently used. This work presents a comparative characterization of known algorithms and methods for video ca... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Leveraging EfficientNetB3 in a Deep Learning Framework for High-Accuracy MRI Tumor Classification
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 867-883页
作者: Mahesh Thyluru Ramakrishna Kuppusamy Pothanaicker Padma Selvaraj Surbhi Bhatia Khan Vinoth Kumar Venkatesan Saeed Alzahrani Mohammad Alojail Department of Computer Science&Engineering Faculty of Engineering and TechnologyJAIN(Deemed-to-be University)Bengaluru562112India School of Computer Science and Engineering VIT-AP UniversityAmaravati522241India Department of Computer Science&Technology Madanapalle Institute of Technology&ScienceMadanapalle517325India School of Science Engineering and EnvironmentUniversity of SalfordManchesterM54WTUK School of Computer Science Engineering&Information Systems(SCORE) Vellore Institute of Technology(VIT)Vellore632014India Management Information System Department College of Business AdministrationKing Saud UniversityRiyadh11531Saudi Arabia Adjunct Research Faculty Centre for Research Impact&OutcomeChitkara UniversityRajpuraPunjab140401India
Brain tumor is a global issue due to which several people suffer,and its early diagnosis can help in the treatment in a more efficient *** different types of brain tumors,including gliomas,meningiomas,pituitary tumors... 详细信息
来源: 评论
Proposal of a Document Layout Analysis Method Adopting Pre-processing Based on Document Image Classification  16th
Proposal of a Document Layout Analysis Method Adopting Pre...
收藏 引用
16th International Conference on Genetic and Evolutionary Computing, ICGEC 2024
作者: Kakinoki, Kanta Katayama, Tetsuro Department of Computer Science and Systems Engineering Faculty of Engineering University of Miyazaki 1-1 Gakuen-Kibanadai Nishi Miyazaki889-2192 Japan
To extract important information from the document images, document layout analysis research has been carried out. Previous research analyzes document layouts only for specific document formats. This paper proposes a ... 详细信息
来源: 评论
Employing Feature engineering for River Stage Forecasting to Improve Hybrid Model Performance  32
Employing Feature Engineering for River Stage Forecasting to...
收藏 引用
32nd International Conference on Software, Telecommunications and computer Networks, SoftCOM 2024
作者: Mihel, Anna Maria Pecnik, Spela Vrbancic, Grega Lerga, Jonatan Krvavica, Nino University of Rijeka Faculty of Engineering Department of Computer Engineering Rijeka Croatia University of Maribor Intelligent Systems Laboratory Faculty of Electrical Engineering and Computer Science Maribor Slovenia University of Rijeka Faculty of Civil Engineering Department of Hydrotechnics and Geotechnics Rijeka Croatia
Establishing early warning systems and efficient management of water resources in tidal reaches is crucial for achieving adequate flood protection. In tidal reaches, the river stage interacts non-linearly with tides (... 详细信息
来源: 评论
Generating synthetic mixed-type tabular data by decoding samples from a latent-space: a case study in healthcare  28th
Generating synthetic mixed-type tabular data by decoding sam...
收藏 引用
28th International Conference on Knowledge Based and Intelligent information and engineering systems, KES 2024
作者: Drapala, Jaroslaw Swiatek, Jerzy Department of Computer Science and Systems Engineering Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wroclaw50-370 Poland
Medical data are subject to privacy regulations, which severely limit AI specialists who wish to construct decision support systems for medicine. Large amounts of this data are tabular, indicating that they are organi... 详细信息
来源: 评论