咨询与建议

限定检索结果

文献类型

  • 1,099 篇 会议
  • 786 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,058 篇 工学
    • 728 篇 计算机科学与技术...
    • 615 篇 软件工程
    • 190 篇 信息与通信工程
    • 172 篇 控制科学与工程
    • 117 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 96 篇 生物工程
    • 86 篇 机械工程
    • 81 篇 生物医学工程(可授...
    • 64 篇 仪器科学与技术
    • 61 篇 光学工程
    • 59 篇 化学工程与技术
    • 37 篇 动力工程及工程热...
    • 35 篇 安全科学与工程
    • 29 篇 材料科学与工程(可...
  • 590 篇 理学
    • 249 篇 数学
    • 195 篇 物理学
    • 117 篇 生物学
    • 84 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 62 篇 化学
  • 362 篇 管理学
    • 229 篇 管理科学与工程(可...
    • 152 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 110 篇 医学
    • 89 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 30 篇 公共卫生与预防医...
  • 53 篇 法学
    • 45 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 10 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 62 篇 deep learning
  • 54 篇 computer science
  • 41 篇 machine learning
  • 39 篇 feature extracti...
  • 35 篇 systems engineer...
  • 32 篇 accuracy
  • 28 篇 data mining
  • 28 篇 training
  • 27 篇 computational mo...
  • 27 篇 artificial intel...
  • 25 篇 internet of thin...
  • 25 篇 genetic algorith...
  • 24 篇 testing
  • 22 篇 predictive model...
  • 21 篇 support vector m...
  • 21 篇 neural networks
  • 21 篇 semantics
  • 21 篇 humans
  • 20 篇 information syst...
  • 20 篇 decision making

机构

  • 34 篇 department of co...
  • 21 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 faculty of compu...
  • 17 篇 department of co...
  • 16 篇 department of co...
  • 15 篇 faculty of compu...
  • 12 篇 department of co...
  • 11 篇 department of ap...
  • 11 篇 department of sy...
  • 10 篇 department of in...
  • 10 篇 faculty of elect...
  • 10 篇 department of co...
  • 9 篇 faculty of compu...
  • 9 篇 department of co...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of di...
  • 8 篇 department of in...
  • 8 篇 universiti malay...

作者

  • 20 篇 abdelwahed motwa...
  • 17 篇 ishfaq yaseen
  • 17 篇 mesfer al duhayy...
  • 15 篇 mohamed k.nour
  • 15 篇 manar ahmed hamz...
  • 11 篇 abu sarwar zaman...
  • 11 篇 tutut herawan
  • 11 篇 shamshirband sha...
  • 11 篇 siti mariyam sha...
  • 11 篇 t. toyota
  • 11 篇 hala j.alshahran...
  • 11 篇 shahaboddin sham...
  • 10 篇 xin xin
  • 9 篇 r budiarto
  • 9 篇 chen yen-lin
  • 9 篇 mostafa abotaleb
  • 9 篇 r f rahmat
  • 9 篇 heba mohsen
  • 9 篇 saud s.alotaibi
  • 9 篇 ahmedy ismail

语言

  • 1,804 篇 英文
  • 62 篇 其他
  • 19 篇 中文
  • 6 篇 日文
检索条件"机构=Faculty of Computer System and Technology"
1890 条 记 录,以下是311-320 订阅
排序:
Improved Power Transfer Efficiency Using a Dual Transmitter Receiver Design With Integrated Decoupling Coils for IPT EV Charging
收藏 引用
IEEE Access 2025年 13卷 91362-91373页
作者: Bilal Alam Saad Mekhilef Marizan Mubin Kok Soon Tey Addy Wahyudie Department of Electrical Engineering Power Electronics and Renewable Energy Research Laboratory University of Malaya Kuala Lumpur Malaysia School of Engineering Swinburne University of Technology Melbourne VIC Australia Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Electrical and Communication Engineering United Arab Emirates University (UAE-U) Al Ain United Arab Emirates
In high-power inductive power transfer (IPT) systems, multiple coils are used to enhance efficiency, but interactions between coils on the same side can reduce overall performance. Traditionally, decoupling coils are ... 详细信息
来源: 评论
Covert Channel Detection and Generation Techniques: A Survey
Covert Channel Detection and Generation Techniques: A Survey
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Nesmah A. AL-Khulaidi Ammar T. Zahary Muneer A.S Hazaa Adel A. Nasser Department of Computer Networks Yemen Academy for Graduate Studies Sana'a Yemen Department of Computer Science Faculty of Computing and IT University of Science and Technology Sana'a Yemen Department of Computer Science Faculty of Computer and Information System Thamar University Thamar Yemen Department of Information Systems and Computer Science Faculty of Sciences Sa'adah University Sa'adah Yemen
The use of covert communications has become more widespread recently as a solution to the information security issue. Information security can be partially solved by the discovery and creation of covert routes. Covert...
来源: 评论
Automated Spam Review Detection Using Hybrid Deep Learning on Arabic Opinions
收藏 引用
computer systems Science & Engineering 2023年 第9期46卷 2947-2961页
作者: IbrahimM.Alwayle Badriyya B.Al-onazi Mohamed K.Nour Khaled M.Alalayah Khadija M.Alaidarous Ibrahim Abdulrab Ahmed Amal S.Mehanna Abdelwahed Motwakel Department of Computer Science College of Science and ArtsSharurahNajran UniversitySaudi Arabia Department of Language Preparation Arabic Language Teaching InstitutePrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Computer Department Applied CollegeNajran UniversityNajran66462Saudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Online reviews regarding purchasing services or products offered are the main source of users’*** gain fame or profit,generally,spam reviews are written to demote or promote certain targeted products or *** practice ... 详细信息
来源: 评论
Analyzing Code Injection Attacks on Applications of Android Devices and Emulator
Analyzing Code Injection Attacks on Applications of Android ...
收藏 引用
International Conference on Computing, Engineering, and Design (ICCED)
作者: Adhitia Erfina Rahmat Hidayat Rafli Radya Rizaldi Puput Riko Maulana Falentino Sembiring Departement of Infomation System Faculty of Engineering Computing and Design Nusa Putra University Sukabumi Indonesia Master of Computer Science Faculty of Information Technology Budi Luhur University Jakarta Indonesia
The Android operating system released by Google in 2007 has experienced very significant development. In 2019, the number of Android application users reached 2.5 billion. One of the contributing factors is the nature...
来源: 评论
Machine Learning and Network Traffic to Distinguish Between Malware and Benign Applications  1st
Machine Learning and Network Traffic to Distinguish Between ...
收藏 引用
1st International Conference on Pervasive Knowledge and Collective Intelligence on Web and Social Media, PerSOM 2022
作者: Abualigah, Laith Abualigah, Sayel Almahmoud, Mothanna Forestiero, Agostino Sachdeva, Gagan Hanandeh, Essam S. Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman Jordan Faculty of Information Technology Middle East University Amman Jordan Applied Science Research Center Applied Science Private University Amman Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang George Town Malaysia Computer Science Department Prince Hussein Bin Abdullah Faculty for Information Technology Al Al-Bayt University Mafraq25113 Jordan Department of Computer Information Systems Jordan University of Science and Technology Ar-Ramtha Jordan Performance Computing and Networking National Research Council of Italy Rende87036 Italy First Abu Dhabi Bank Abu Dhabi United Arab Emirates Department of Computer Information System Zarqa University Zarqa Jordan
Virus detection software is widely used for servers, systems, and devices that seek to maintain security and reliability. Although these programs provide an excellent safety level, the traditional defense methods fail... 详细信息
来源: 评论
Information technology Challenges for Integrated Governance, Risk and Compliance (GRC)  1
Information Technology Challenges for Integrated Governance,...
收藏 引用
1st International Conference on Smart technology, Applied Informatics, and Engineering, APICS 2022
作者: Mahendra, Irfan Meyliana Prabowo, Harjanto Hidayanto, Achmad Nizar Bina Nusantara University Computer Science Program Jakarta11480 Indonesia Nusa Mandiri University Technology Information Faculty Jakarta11450 Indonesia Bina Nusantara University Information System Department Jakarta11480 Indonesia Bina Nusantara University Management Departement Jakarta11480 Indonesia Universitas Indonesia Faculty of Computer Science Depok16424 Indonesia
Integrated GRC is an area of concern for organizations today. Integrated GRC provides benefits for increasing competitiveness and organizational excellence, realizing effectiveness, efficiency, and optimization, as we... 详细信息
来源: 评论
Deep Learning in Smart Healthcare: A GAN-based Approach for Imbalanced Alzheimer's Disease Classification  19
Deep Learning in Smart Healthcare: A GAN-based Approach for ...
收藏 引用
19th International Conference on Future Networks and Communications, FNC 2024 / 21st International Conference on Mobile systems and Pervasive Computing, MobiSPC 2024 / 14th International Conference on Sustainable Energy Information technology, SEIT 2024
作者: Tufail, Hina Ahad, Abdul Puspitasari, Ira Shayea, Ibraheem Coelho, Paulo Jorge Pires, Ivan Miguel Department of Computer Science University of Management and Technology Sialkot Pakistan Information System Study Program Faculty of Science and Technology Universitas Airlangga Indonesia School of Software Northwestern Polytechnical University Shaanxi Xian China Turkey Polytechnic University of Leiria Leiria Portugal Coimbra Portugal Instituto de Telecomunicações Escola Superior de Tecnologia e Gestão de Águeda Universidade de Aveiro Águeda Portugal
Alzheimer's disease (AD) is a type of dementia that leads to memory loss and impairment, which affects patients' lives badly. It is not curable yet, but its progression can be slowed down if detected at earlie... 详细信息
来源: 评论
Traffic Congestion Control with Emergency Awareness and Optimized Communication Infrastructure using Reinforcement Learning and Non-Dominated Sorting Genetic Algorithm
收藏 引用
IEEE Access 2025年
作者: Al-Heety, Othman S. Zakaria, Zahriladha Abu-Khadrah, Ahmed Ismail, Mahamod Shakir, Mohammed Mudhafar Alani, Sameer Alsariera, Hussein Faculty of Electronic and Computer Engineering Durian Tunggal Malaysia Al-Balqa Applied University College of Engineering Technology Department of Electrical Engineering Amman Jordan Universiti Kebangsaan Malaysia UKM Bangi Department of Electrical Electronic and System Engineering Selangor Malaysia Faculty of Engineering and Electronic Engineering Batu Pahat Malaysia University of Anbar Computer Center Anbar5543 Iraq
Urban centers are grappling with increasing traffic congestion, which hampers mobility and reduces the effectiveness of emergency responses. Current traffic management systems struggle to dynamically prioritize emerge... 详细信息
来源: 评论
K-Banhatti Sombor Invariants of Certain computer Networks
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 15-31页
作者: Khalid Hamid Muhammad Waseem Iqbal Abaid Ur Rehman Virk Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Mathematics University of SialkotSialkot51013Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examinati... 详细信息
来源: 评论
A Comparative Analysis on Three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method
A Comparative Analysis on Three Duplication Elements in Copy...
收藏 引用
International Conference on Software Engineering and computer systems (ICSECS)
作者: Nur Izzati Nor Azaimi Nor Bakiah Abd Warif Nor-Syahidatul N Ismail Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Johor Malaysia Faculty of Computer Science and Information Technology Centre for Information Security Research Universiti Tun Hussein Onn Malaysia Johor Malaysia Department of Computer System and Networking Faculty of Computing Universiti Malaysia Pahang Al-Sultan Abdullah Pekan Pahang Malaysia
Image forgery is the alteration of a digital image to hide some of the important and useful information. Copy-move forgery (CMF) is one of the most difficult to detect because the copied part of the image has the same...
来源: 评论