咨询与建议

限定检索结果

文献类型

  • 2,224 篇 会议
  • 1,734 篇 期刊文献
  • 85 册 图书

馆藏范围

  • 4,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,445 篇 工学
    • 1,881 篇 计算机科学与技术...
    • 1,506 篇 软件工程
    • 523 篇 信息与通信工程
    • 435 篇 控制科学与工程
    • 266 篇 生物工程
    • 264 篇 电气工程
    • 222 篇 电子科学与技术(可...
    • 207 篇 生物医学工程(可授...
    • 201 篇 机械工程
    • 140 篇 光学工程
    • 115 篇 仪器科学与技术
    • 110 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 84 篇 化学工程与技术
    • 83 篇 交通运输工程
  • 1,199 篇 理学
    • 577 篇 数学
    • 340 篇 物理学
    • 311 篇 生物学
    • 185 篇 统计学(可授理学、...
    • 150 篇 系统科学
    • 93 篇 化学
  • 861 篇 管理学
    • 556 篇 管理科学与工程(可...
    • 350 篇 图书情报与档案管...
    • 285 篇 工商管理
  • 276 篇 医学
    • 229 篇 临床医学
    • 173 篇 基础医学(可授医学...
    • 113 篇 公共卫生与预防医...
    • 90 篇 药学(可授医学、理...
  • 122 篇 法学
    • 101 篇 社会学
  • 83 篇 经济学
    • 83 篇 应用经济学
  • 77 篇 教育学
  • 61 篇 农学
  • 23 篇 文学
  • 15 篇 艺术学
  • 8 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 157 篇 deep learning
  • 124 篇 machine learning
  • 95 篇 artificial intel...
  • 71 篇 computer science
  • 71 篇 information tech...
  • 70 篇 feature extracti...
  • 67 篇 internet of thin...
  • 66 篇 computational mo...
  • 65 篇 accuracy
  • 55 篇 training
  • 54 篇 optimization
  • 50 篇 information syst...
  • 48 篇 security
  • 47 篇 data mining
  • 43 篇 decision making
  • 42 篇 predictive model...
  • 41 篇 software
  • 41 篇 cloud computing
  • 40 篇 covid-19
  • 38 篇 support vector m...

机构

  • 42 篇 department of co...
  • 36 篇 department of in...
  • 24 篇 department of in...
  • 24 篇 department of in...
  • 23 篇 faculty of infor...
  • 22 篇 school of inform...
  • 20 篇 faculty of busin...
  • 20 篇 research team on...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 19 篇 computer enginee...
  • 19 篇 faculty of infor...
  • 19 篇 college of compu...
  • 15 篇 department of co...
  • 15 篇 rt-rk institute ...
  • 14 篇 department of co...
  • 14 篇 ieee
  • 14 篇 faculty of compu...

作者

  • 27 篇 abdelwahed motwa...
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 tao dacheng
  • 23 篇 abdelhameed ibra...
  • 21 篇 ishfaq yaseen
  • 21 篇 manar ahmed hamz...
  • 20 篇 mesfer al duhayy...
  • 18 篇 abdelaziz a.abde...
  • 17 篇 pedrycz witold
  • 16 篇 hayashi eiji
  • 16 篇 salabun wojciech
  • 15 篇 wojciech sałabun
  • 15 篇 doaa sami khafag...
  • 15 篇 fahd n.al-wesabi
  • 15 篇 barik lalbihari
  • 14 篇 radwa marzouk
  • 14 篇 patra sudhansu s...
  • 13 篇 abu sarwar zaman...
  • 13 篇 mohamed k.nour
  • 13 篇 kizielewicz bart...

语言

  • 3,466 篇 英文
  • 555 篇 其他
  • 23 篇 中文
  • 11 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Computer Systems and Information Technology"
4043 条 记 录,以下是11-20 订阅
排序:
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
Sustainable Water Futures: Enhancing Efficiency And Conservation In Madinah AL Munawara
Journal of Applied Science and Engineering
收藏 引用
Journal of Applied Science and Engineering 2024年 第10期28卷 2027-2042页
作者: Syed, Toqeer Ali Naqash, Muhammad Tayyab Nawaz, Waqas Namoun, Abdallah Muhammad, Munir Azam Faculty of Computer and Information System Islamic University of Madinah Saudi Arabia Civil Engineering Department Faculty of Engineering Islamic University of Madinah Madinah42351 Saudi Arabia AI Center Faculty of Computer and Information Systems Islamic University of Madinah Madinah42351 Saudi Arabia Khwaja Fareed University of Engineering & Information Technology Faculty of Computer and Information System Punjab Rahim Yar Khan Pakistan
Water resource management worldwide faces significant challenges, including high consumption rates, scarcity, and ageing infrastructure. This paper proposes a comprehensive approach to address these issues through fiv... 详细信息
来源: 评论
Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4759-4776页
作者: Yawar Abbas Aisha Ahmed Alarfaj Ebtisam Abdullah Alabdulqader Asaad Algarni Ahmad Jalal Hui Liu Faculty of Computing and AI Air UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Department of Computer Sciences Faculty of Computing and Information TechnologyNorthern Border UniversityRafha91911Saudi Arabia Department of Computer Science and Engineering College of InformaticsKorea UniversitySeoul02841Republic of Korea Cognitive Systems Lab University of BremenBremen28359Germany
Human Activity Recognition(HAR)in drone-captured videos has become popular because of the interest in various fields such as video surveillance,sports analysis,and human-robot ***,recognizing actions from such videos ... 详细信息
来源: 评论
Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第2期138卷 1427-1467页
作者: Mohammed Abdalsalam Chunlin Li Abdelghani Dahou Natalia Kryvinska School of Computer Science and Technology Wuhan University of TechnologyWuhan430070China LDDI Laboratory Faculty of Science and TechnologyUniversity of Ahmed DRAIAAdrar01000Algeria Information Systems Department Faculty of ManagementComenius UniversityBratislava82005Slovakia
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli... 详细信息
来源: 评论
Handling The Common Method Variance/Bias (CMV/CMB) in Cross-Sectional Research: A Systematic Literature Review and Bibliometric Analysis  6
Handling The Common Method Variance/Bias (CMV/CMB) in Cross-...
收藏 引用
6th International Conference on Informatics, Multimedia, Cyber and information System, ICIMCIS 2024
作者: Arista, Artika Shuib, Liyana Ismail, Maizatul Akmar Universitas Pembangunan Nasional Veteran Jakarta Information Systems Faculty of Computer Science Jakarta Indonesia Universiti Malaya Faculty of Computer Science and Information Technology Department of Information Systems Kuala Lumpur Malaysia
Concerns over the validity of survey research have grown among editors, reviewers, and authors in recent years. Common method variance (CMV) is one of the main problems. Common method variance (CMV), which measures th... 详细信息
来源: 评论
Exploring the Role of Sleep Quality, Obsessive–Compulsive Disorder, Fear of Missing Out, and Psychological Resilience on Problematic Instagram Use
收藏 引用
Journal of technology in Behavioral Science 2024年 1-11页
作者: Yilmaz, Ramazan Avci, Ummuhan Karaoglan Yilmaz, Fatma Gizem Department of Computer Technology & Information Systems Faculty of Science Bartin University Bartin Turkey Department of Management Information Systems Faculty of Economics and Administrative Sciences Bartin University Bartin Turkey
This study addresses a gap in the literature regarding the relationships between sleep quality, obsessive–compulsive disorder (OCD), fear of missing out (FoMO), psychological resilience, and problematic Instagram use... 详细信息
来源: 评论
An Adaptive Framework for Classification and Detection of Android Malware
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第21期18卷 59-73页
作者: Al Sharah, Ashraf Alrub, Yousef Abu Owida, Hamza Abu Elsoud, Esraa Abu Alshdaifat, Nawaf Khtatnaha, Hamzah Department of Electrical Engineering College of Engineering Technology Al-Balqa Applied University Amman Jordan Department of Computer Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Medical Engineering Faculty of Engineering Al-Ahliyya Amman University Amman Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Faculty of Information Technology Applied Science Private University Amman Jordan
The hardware and software of a computer are controlled by its operating system (OS), which performs essential tasks such as input and output processing, file and memory management, and the management of peripheral dev... 详细信息
来源: 评论
A three-step SEM-Bayesian network approach for predicting the determinants of CloudIoT-based healthcare adoption
收藏 引用
International Journal of information technology (Singapore) 2024年 1-21页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
Adopting the CloudIoT-based healthcare paradigm provides various prospects for medical IT and considerably enhances healthcare services. However, compared to the advanced development of CloudIoT-based healthcare syste... 详细信息
来源: 评论
Assessing and prioritizing crucial drivers for CloudIoT-based healthcare adoption: an analytic hierarchy process approach
收藏 引用
International Journal of information technology (Singapore) 2024年 1-18页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
The CloudIoT paradigm has profoundly transformed the healthcare industry, providing outstanding innovation and practical applications. However, despite its many advantages, the adoption of this paradigm in healthcare ... 详细信息
来源: 评论
A Deep Learning for Alzheimer’s Stages Detection Using Brain Images
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1457-1473页
作者: Zahid Ullah Mona Jamjoom Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia
Alzheimer’s disease(AD)is a chronic and common form of dementia that mainly affects elderly *** disease is dangerous because it causes damage to brain cells and tissues before the symptoms appear,and there is nomedic... 详细信息
来源: 评论