咨询与建议

限定检索结果

文献类型

  • 2,210 篇 会议
  • 1,711 篇 期刊文献
  • 85 册 图书

馆藏范围

  • 4,006 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,415 篇 工学
    • 1,850 篇 计算机科学与技术...
    • 1,491 篇 软件工程
    • 501 篇 信息与通信工程
    • 420 篇 控制科学与工程
    • 264 篇 生物工程
    • 253 篇 电气工程
    • 218 篇 电子科学与技术(可...
    • 205 篇 生物医学工程(可授...
    • 194 篇 机械工程
    • 131 篇 光学工程
    • 112 篇 仪器科学与技术
    • 103 篇 网络空间安全
    • 92 篇 动力工程及工程热...
    • 83 篇 化学工程与技术
    • 80 篇 交通运输工程
  • 1,183 篇 理学
    • 587 篇 数学
    • 332 篇 物理学
    • 307 篇 生物学
    • 197 篇 统计学(可授理学、...
    • 150 篇 系统科学
    • 89 篇 化学
  • 847 篇 管理学
    • 545 篇 管理科学与工程(可...
    • 343 篇 图书情报与档案管...
    • 283 篇 工商管理
  • 271 篇 医学
    • 227 篇 临床医学
    • 172 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
    • 90 篇 药学(可授医学、理...
  • 121 篇 法学
    • 100 篇 社会学
  • 82 篇 经济学
    • 82 篇 应用经济学
  • 77 篇 教育学
  • 60 篇 农学
  • 23 篇 文学
  • 15 篇 艺术学
  • 8 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 150 篇 deep learning
  • 121 篇 machine learning
  • 94 篇 artificial intel...
  • 71 篇 computer science
  • 71 篇 information tech...
  • 68 篇 feature extracti...
  • 67 篇 internet of thin...
  • 66 篇 computational mo...
  • 62 篇 accuracy
  • 56 篇 training
  • 53 篇 optimization
  • 50 篇 information syst...
  • 47 篇 data mining
  • 45 篇 security
  • 43 篇 decision making
  • 42 篇 predictive model...
  • 41 篇 software
  • 41 篇 cloud computing
  • 39 篇 covid-19
  • 38 篇 support vector m...

机构

  • 42 篇 department of co...
  • 36 篇 department of in...
  • 24 篇 department of in...
  • 24 篇 department of in...
  • 23 篇 faculty of infor...
  • 22 篇 school of inform...
  • 20 篇 faculty of busin...
  • 20 篇 research team on...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 19 篇 computer enginee...
  • 19 篇 faculty of infor...
  • 19 篇 college of compu...
  • 15 篇 department of co...
  • 15 篇 rt-rk institute ...
  • 14 篇 department of co...
  • 14 篇 ieee
  • 14 篇 faculty of compu...

作者

  • 27 篇 abdelwahed motwa...
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 tao dacheng
  • 23 篇 abdelhameed ibra...
  • 21 篇 ishfaq yaseen
  • 21 篇 manar ahmed hamz...
  • 20 篇 mesfer al duhayy...
  • 18 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 pedrycz witold
  • 16 篇 salabun wojciech
  • 15 篇 wojciech sałabun
  • 15 篇 doaa sami khafag...
  • 15 篇 fahd n.al-wesabi
  • 15 篇 barik lalbihari
  • 14 篇 radwa marzouk
  • 14 篇 patra sudhansu s...
  • 13 篇 abu sarwar zaman...
  • 13 篇 mohamed k.nour
  • 13 篇 kizielewicz bart...

语言

  • 3,580 篇 英文
  • 403 篇 其他
  • 23 篇 中文
  • 11 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computer Systems and Information Technology"
4006 条 记 录,以下是1-10 订阅
排序:
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Olive Leaf Disease Detection via Wavelet Transform and Feature Fusion of Pre-Trained Deep Learning Models
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3431-3448页
作者: Mahmood A.Mahmood Khalaf Alsalem Department of Information Systems College of Computer and Information SciencesJouf UniversitySakakahKingdom of Saudi Arabia Department of Information Systems and Technology Faculty of Graduate Studies and ResearchCairo UniversityGizaEgypt
Olive trees are susceptible to a variety of diseases that can cause significant crop damage and economic *** detection of these diseases is essential for effective *** propose a novel transformed wavelet,feature-fused... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
A Robust Tuned Random Forest Classifier Using Randomized Grid Search to Predict Coronary Artery Diseases
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4633-4648页
作者: Sameh Abd El-Ghany A.A.Abd El-Aziz Department of Information Systems College of Computer and Information SciencesJouf UniversityKSA Department of Information Systems Faculty of Computers and InformationMansoura UniversityEgypt Department of Information Systems and Technology Faculty of Graduate Studies for Statistical ResearchCairo UniversityEgypt
Coronary artery disease(CAD)is one of themost authentic cardiovascular afflictions because it is an uncommonly overwhelming heart *** breakdown of coronary cardiovascular disease is one of the principal sources of dea... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
Modern Standard Arabic speech disorders corpus for digital speech processing applications
收藏 引用
International Journal of Speech technology 2024年 第1期27卷 157-170页
作者: Alqudah, Assal A. M. Alshraideh, Mohammad A. M. Abushariah, Mohammad A. M. Sharieh, Ahmad A. S. Department of Computer Science King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan
Digital speech processing applications including automatic speech recognition (ASR), speaker recognition, speech translation, and others, essentially require large volumes of speech data for training and testing purpo... 详细信息
来源: 评论
Priority Detector and Classifier Techniques Based on ML for the IoMT
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1853-1870页
作者: Rayan A.Alsemmeari Mohamed Yehia Dahab Badraddin Alturki Abdulaziz A.Alsulami Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia
Emerging telemedicine trends,such as the Internet of Medical Things(IoMT),facilitate regular and efficient interactions between medical devices and computing *** importance of IoMT comes from the need to continuously ... 详细信息
来源: 评论
Fast anomalous traffic detection system for secure vehicular communications
收藏 引用
Intelligent and Converged Networks 2024年 第4期5卷 356-369页
作者: Qasem Abu Al-Haija Abdulaziz A.Alsulami Department of Cybersecurity Faculty of Computer&Information TechnologyJordan University of Science and TechnologyIrbid 22110Jordan Department of Information Systems King Abdulaziz UniversityJeddah 21589Saudi Arabia
In modern automotive systems,introducing multiple connectivity protocols has transformed in-vehicle network communication,resulting in the widely recognized Controller Area Network(CAN)*** its ubiquitous use,the CAN p... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论