咨询与建议

限定检索结果

文献类型

  • 1,099 篇 会议
  • 786 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,058 篇 工学
    • 728 篇 计算机科学与技术...
    • 615 篇 软件工程
    • 190 篇 信息与通信工程
    • 172 篇 控制科学与工程
    • 117 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 96 篇 生物工程
    • 86 篇 机械工程
    • 81 篇 生物医学工程(可授...
    • 64 篇 仪器科学与技术
    • 61 篇 光学工程
    • 59 篇 化学工程与技术
    • 37 篇 动力工程及工程热...
    • 35 篇 安全科学与工程
    • 29 篇 材料科学与工程(可...
  • 590 篇 理学
    • 249 篇 数学
    • 195 篇 物理学
    • 117 篇 生物学
    • 84 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 62 篇 化学
  • 362 篇 管理学
    • 229 篇 管理科学与工程(可...
    • 152 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 110 篇 医学
    • 89 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 30 篇 公共卫生与预防医...
  • 53 篇 法学
    • 45 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 10 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 62 篇 deep learning
  • 54 篇 computer science
  • 41 篇 machine learning
  • 39 篇 feature extracti...
  • 35 篇 systems engineer...
  • 32 篇 accuracy
  • 28 篇 data mining
  • 28 篇 training
  • 27 篇 computational mo...
  • 27 篇 artificial intel...
  • 25 篇 internet of thin...
  • 25 篇 genetic algorith...
  • 24 篇 testing
  • 22 篇 predictive model...
  • 21 篇 support vector m...
  • 21 篇 neural networks
  • 21 篇 semantics
  • 21 篇 humans
  • 20 篇 information syst...
  • 20 篇 decision making

机构

  • 34 篇 department of co...
  • 21 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 faculty of compu...
  • 17 篇 department of co...
  • 16 篇 department of co...
  • 15 篇 faculty of compu...
  • 12 篇 department of co...
  • 11 篇 department of ap...
  • 11 篇 department of sy...
  • 10 篇 department of in...
  • 10 篇 faculty of elect...
  • 10 篇 department of co...
  • 9 篇 faculty of compu...
  • 9 篇 department of co...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of di...
  • 8 篇 department of in...
  • 8 篇 universiti malay...

作者

  • 20 篇 abdelwahed motwa...
  • 17 篇 ishfaq yaseen
  • 17 篇 mesfer al duhayy...
  • 15 篇 mohamed k.nour
  • 15 篇 manar ahmed hamz...
  • 11 篇 abu sarwar zaman...
  • 11 篇 tutut herawan
  • 11 篇 shamshirband sha...
  • 11 篇 siti mariyam sha...
  • 11 篇 t. toyota
  • 11 篇 hala j.alshahran...
  • 11 篇 shahaboddin sham...
  • 10 篇 xin xin
  • 9 篇 r budiarto
  • 9 篇 chen yen-lin
  • 9 篇 mostafa abotaleb
  • 9 篇 r f rahmat
  • 9 篇 heba mohsen
  • 9 篇 saud s.alotaibi
  • 9 篇 ahmedy ismail

语言

  • 1,804 篇 英文
  • 62 篇 其他
  • 19 篇 中文
  • 6 篇 日文
检索条件"机构=Faculty of Computer System and Technology"
1890 条 记 录,以下是241-250 订阅
排序:
Hunter Prey Optimization with Hybrid Deep Learning for Fake News Detection on Arabic Corpus
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4255-4272页
作者: Hala J.Alshahrani Abdulkhaleq Q.A.Hassan Khaled Tarmissi Amal S.Mehanna Abdelwahed Motwakel Ishfaq Yaseen Amgad Atta Abdelmageed Mohamed I.Eldesouki Department of Applied Linguistics College of LanguagesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of English College of Science and Arts at MahayilKing Khalid UniversityMuhayil63763Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversityMakkah24211Saudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Nowadays,the usage of socialmedia platforms is rapidly increasing,and rumours or false information are also rising,especially among Arab *** false information is harmful to society and *** and detecting the spread of ... 详细信息
来源: 评论
Similarity Measurement on Logo Image Using CBIR (Content Base Image Retrieval) and CNN ResNet-18 Architecture
Similarity Measurement on Logo Image Using CBIR (Content Bas...
收藏 引用
computer Science, Information technology and Engineering (ICCoSITE), International Conference on
作者: Larissa Navia Rani Yuhandri Yuhandri Information System Computer Science Faculty Universitas Putra Indonesia YPTK Padang Indonesia Information Technology Computer Science Faculty Universitas Putra Indonesia YPTK Padang Indonesia
In this study aimed to measure the level of similarity between two logos, both those that look different and those that look the same. This can be realized by forming a logo image database that is stored in a logo ima... 详细信息
来源: 评论
Optimal Method Combining Blockchain and Multi-Agent system to Ensure Data Integrity and Deduplication in the Cloud Environment
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第10期18卷 90-105页
作者: El Ghazouani, Mohamed Ikidid, Abdelouafi Zaouiat, Charafeddine Ait Aziz, Layla Ichahane, Moulay Youssef Er-Rajy, Latifa ESIM Polydisciplinary Faculty of Sidi Bennour Chouaîb Doukkali University El Jadida Morocco Laboratory of System Analysis Information Processing and Industrial Management EST Salé Mohammed V University Salé Morocco Information Technology Laboratory National School of Applied Sciences Chouaîb Doukkali University El Jadida Morocco Computer Science Department Laboratory of Information Systems Engineering Cadi Ayyad University Marrakesh Morocco
Cloud computing (CC) refers to the transmission, storage, and processing of any type of information at a location that is not owned or controlled by the information owner. This information can be stored and accessed a... 详细信息
来源: 评论
Face image authentication scheme based on MTCNN and SLT
收藏 引用
Multimedia Tools and Applications 2025年 1-43页
作者: Thabit, Rasha Al-Askari, Mohanad A. Mohammed, Dunya Zeki Anaam, Elham Abdulwahab Mahmood, Zainab H. Jabbar, Dina Jamal Salih, Zahraa Aqeel Information System Department College of Computer Sciences and Information Technology University of Al-Anbar Al-Anbar Iraq Computer Engineering Department College of Engineering Al-Iraqia University Baghdad Iraq Electronic and Communications Engineering Department College of Engineering Gilgamesh University Baghdad Iraq Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia Department of Cybersecurity Engineering College of Information Engineering Al-Nahrain University Baghdad Iraq Electrical Engineering Technical Collage Middle Technical University Baghdad Iraq Department of Business Administration Alamaal University College Baghdad Iraq
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Sentiment Analysis on Tourism Place using Naive Bayes
Sentiment Analysis on Tourism Place using Naive Bayes
收藏 引用
International Conference on Telecommunication systems, Services, and Applications (TSSA)
作者: Aldy Rialdy Atmadja Aprilia Rahmawati Cecep Nurul Alam Popon Dauni Yogi Saputra Informatics Department Faculty of Science and Technology UIN Sunan Gunung Djati Bandung Indonesia Information System Department Faculty of Computer Science and Information System Universitas Kebangsaan RI Bandung Indonesia
The method of extracting information from a text is called text mining. In contrast, sentiment analysis involves examining text data to determine whether a statement expresses good or negative conversations. In this s...
来源: 评论
VR REAL RUN: An immersive Oculus Quest 2-Based Virtual Reality Exergaming  4
VR REAL RUN: An immersive Oculus Quest 2-Based Virtual Reali...
收藏 引用
4th International Conference on Cybernetics and Intelligent system, ICORIS 2022
作者: Mambu, Joe Y. Rismayani Sihotang, Jay Idoan Rantung, Vivi Peggy Computer Science Faculty Universitas Klabat Airmadidi Indonesia Dipa Makassar University Dept. of Software Engineering Makassar Indonesia Faculty of Information Technology Universitas Advent Indonesia Bandung Indonesia Faculty of Information System Universitas Negeri Manado Tondano Indonesia
There are many different types of exergaming, but one of the most engaging one is the one with virtual reality. This type of gaming allows you to immerse yourself in a completely different world, and it can be a lot o... 详细信息
来源: 评论
Enabling Reachability Across Multiple Domains Without Controller Synchronization in SDN
收藏 引用
computers, Materials & Continua 2021年 第10期69卷 945-965页
作者: Nauman Khan Rosli Bin Salleh Ihsan Ali Zahid Khan Noman Mazhar Roobaea Alroobaea Fahad Almansour Usman Ali Department of Computer System and Technology Faculty of Computer Science and Information TechnologyUniversity of MalayaMalaysia Department of Computer Science and IT University of MalakandPakistan Robotics and Internet-of-Things Lab Prince Sultan UniversityRiyadhSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science College of Sciences and Arts RassQassim UniversityBuraydah51452Saudi Arabia
Software-defined networking(SDN)makes network agile and flexible due to its programmable *** extensive network has multiple domains in SDN for the scalability and performance of the ***,the inter-domain link is also c... 详细信息
来源: 评论
Preliminary Exploration on Node-To-Node Fault Tolerance Coordination in Distributed system
Preliminary Exploration on Node-To-Node Fault Tolerance Coor...
收藏 引用
Computing (ICOCO), IEEE International Conference on
作者: Muntadher Saadoon Siti Hafizah Ab. Hamid Hazrina Sofian Hamza Altarturi Nur Nasuha Zati Hakim Azizul Haqi Khalid Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Artificial Intelligence Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Computer and Communication Faculty of Engineering Universiti Putra Malaysia Selangor Malaysia
Internet of Things, edge computing devices, the widespread use of artificial intelligence and machine learning applications, and the extensive adoption of cloud computing pose significant challenges to maintaining fau...
来源: 评论
i-Know: Revolutionizing Knowledge Management with Interactive Quizzes
i-Know: Revolutionizing Knowledge Management with Interactiv...
收藏 引用
Humanitarian technology Conference (KHI-HTC), IEEE Karachi Section
作者: Zahidah Zulkifli Muhammad Darwish Bin Abdul Halim Arief Iskandar Bin Shaffei Nisrin AlSaiari Department of Information System Kulliyyah of Information and Communication Technology International Islamic University Malaysia Faculty of Computer Studies Arab Open University Saudi Arabia
This project focuses on the development of a website system designed to facilitate knowledge acquisition for students enrolled in the Kulliyyah of Information Communication and technology (KICT) at the International I...
来源: 评论