咨询与建议

限定检索结果

文献类型

  • 2,224 篇 会议
  • 1,734 篇 期刊文献
  • 85 册 图书

馆藏范围

  • 4,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,445 篇 工学
    • 1,881 篇 计算机科学与技术...
    • 1,506 篇 软件工程
    • 523 篇 信息与通信工程
    • 435 篇 控制科学与工程
    • 266 篇 生物工程
    • 264 篇 电气工程
    • 222 篇 电子科学与技术(可...
    • 207 篇 生物医学工程(可授...
    • 201 篇 机械工程
    • 140 篇 光学工程
    • 115 篇 仪器科学与技术
    • 110 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 84 篇 化学工程与技术
    • 83 篇 交通运输工程
  • 1,199 篇 理学
    • 577 篇 数学
    • 340 篇 物理学
    • 311 篇 生物学
    • 185 篇 统计学(可授理学、...
    • 150 篇 系统科学
    • 93 篇 化学
  • 861 篇 管理学
    • 556 篇 管理科学与工程(可...
    • 350 篇 图书情报与档案管...
    • 285 篇 工商管理
  • 276 篇 医学
    • 229 篇 临床医学
    • 173 篇 基础医学(可授医学...
    • 113 篇 公共卫生与预防医...
    • 90 篇 药学(可授医学、理...
  • 122 篇 法学
    • 101 篇 社会学
  • 83 篇 经济学
    • 83 篇 应用经济学
  • 77 篇 教育学
  • 61 篇 农学
  • 23 篇 文学
  • 15 篇 艺术学
  • 8 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 157 篇 deep learning
  • 124 篇 machine learning
  • 95 篇 artificial intel...
  • 71 篇 computer science
  • 71 篇 information tech...
  • 70 篇 feature extracti...
  • 67 篇 internet of thin...
  • 66 篇 computational mo...
  • 65 篇 accuracy
  • 55 篇 training
  • 54 篇 optimization
  • 50 篇 information syst...
  • 48 篇 security
  • 47 篇 data mining
  • 43 篇 decision making
  • 42 篇 predictive model...
  • 41 篇 software
  • 41 篇 cloud computing
  • 40 篇 covid-19
  • 38 篇 support vector m...

机构

  • 42 篇 department of co...
  • 36 篇 department of in...
  • 24 篇 department of in...
  • 24 篇 department of in...
  • 23 篇 faculty of infor...
  • 22 篇 school of inform...
  • 20 篇 faculty of busin...
  • 20 篇 research team on...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 19 篇 computer enginee...
  • 19 篇 faculty of infor...
  • 19 篇 college of compu...
  • 15 篇 department of co...
  • 15 篇 rt-rk institute ...
  • 14 篇 department of co...
  • 14 篇 ieee
  • 14 篇 faculty of compu...

作者

  • 27 篇 abdelwahed motwa...
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 tao dacheng
  • 23 篇 abdelhameed ibra...
  • 21 篇 ishfaq yaseen
  • 21 篇 manar ahmed hamz...
  • 20 篇 mesfer al duhayy...
  • 18 篇 abdelaziz a.abde...
  • 17 篇 pedrycz witold
  • 16 篇 hayashi eiji
  • 16 篇 salabun wojciech
  • 15 篇 wojciech sałabun
  • 15 篇 doaa sami khafag...
  • 15 篇 fahd n.al-wesabi
  • 15 篇 barik lalbihari
  • 14 篇 radwa marzouk
  • 14 篇 patra sudhansu s...
  • 13 篇 abu sarwar zaman...
  • 13 篇 mohamed k.nour
  • 13 篇 kizielewicz bart...

语言

  • 3,466 篇 英文
  • 555 篇 其他
  • 23 篇 中文
  • 11 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Computer Systems and Information Technology"
4043 条 记 录,以下是31-40 订阅
排序:
An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-Ⅱ
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5641-5661页
作者: Afia Zafar Muhammad Aamir Nazri Mohd Nawi Ali Arshad Saman Riaz Abdulrahman Alruban Ashit Kumar Dutta Badr Almutairi Sultan Almotairi Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn MalaysiaMalaysia School of Electronics Computing and MathematicsUniversity of DerbyUK Department of Computer Science National University of TechnologyIslamabadPakistan Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl Majmaah11952Saudi Arabia Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Kingdom of Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia Department of Information Systems Faculty of Computer and Information SciencesIslamic University of MadinahMadinah42351Saudi Arabia
In computer vision,convolutional neural networks have a wide range of *** representmost of today’s data,so it’s important to know how to handle these large amounts of data *** neural networks have been shown to solv... 详细信息
来源: 评论
Enhancing Anomaly Detection in Agriculture by Considering the Impact of Concept Drift: An Exploratory Study Using Digital Replica  23
Enhancing Anomaly Detection in Agriculture by Considering th...
收藏 引用
5th World Symposium on Software Engineering, WSSE 2023
作者: Huo, Dongyang Malik, Asad Waqar Ravana, Sri Devi Ur Rahman, Anis Ahmedy, Ismail Department of Information Systems Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Islamabad Pakistan Department of Computer Systems and Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia
The advent of precision agriculture is disrupting traditional farming practices, leading to a significant increase in the data flow. However, current anomaly detection methods overlook the impact of concept drift. The... 详细信息
来源: 评论
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 64-78页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Jebreen, Issam Nabot, Ahmad Rajab, Mohammed Alauthman, Mohammad Aldweesh, Amjad Aburub, Faisal Alangari, Someah Alzgol, Musab Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan University Headquarter University of Anbar Ramadi31001 Iraq Department of Information Security University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan Computer Information Systems Department Faculty of Information Technology Isra University Amman11622 Jordan
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho... 详细信息
来源: 评论
A Novel Framework for Gauging information Extracted from Smartphones Using Neutrosophic Logic
收藏 引用
Neutrosophic Sets and systems 2025年 76卷 154-171页
作者: Abou Alzahab, R.M. Ismail, Amr Abd Elkhalik, S.H. Shams, M.Y. El-Bakry, H.M. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Department. of Communication and Computer Engineering Air Defense University Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Department of Information Systems. Faculty of Computer and Information Science Mansoura University Egypt
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and... 详细信息
来源: 评论
CNN-Based Multi-Output and Multi-Task Regression for Supershape Reconstruction from 3D Point Clouds
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第5期49卷 37-48页
作者: Remmach, Hassnae Razak, Siti Fatimah Abdul Ullah, Arif Yogarayan, Sumendra Sayeed, Md Shohel Mrhari, Amine Computer Systems Engineering Laboratory Cadi Ayyad University Marrakesh40000 Morocco Faculty of Information Science and Technology Multimedia University Ayer Keroh75450 Malaysia Research in Computer Science Laboratory Faculty of Sciences Ibn Tofail University Kenitra Morocco
In a number of industries, including computer graphics, robotics, and medical imaging, three-dimensional reconstruction is essential. In this research, a CNN-based Multi-output and Multi-Task Regressor with deep learn... 详细信息
来源: 评论
Detection of Guns and Knives Images Based on YOLO v7  3
Detection of Guns and Knives Images Based on YOLO v7
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Aung, Yi Yi Oo, Kyi Zar University of Computer Studies Mandalay Faculty of Computer Systems and Technologies Mandalay Myanmar Faculty of Information and Communication Technology Pyin Oo Lwin Myanmar
The threat of violence involving guns and knives presents a persistent challenge to global public safety, necessitating effective detection systems despite the small size and potential ambiguity of these weapons. This... 详细信息
来源: 评论
A Content-Based Medical Image Retrieval Method Using Relative Difference-Based Similarity Measure
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2355-2370页
作者: Ali Ahmed Alaa Omran Almagrabi Omar MBarukab Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz University–RabighRabigh21589Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz University-RabighRabigh21589Saudi Arabia
Content-based medical image retrieval(CBMIR)is a technique for retrieving medical images based on automatically derived image *** are many applications of CBMIR,such as teaching,research,diagnosis and electronic patie... 详细信息
来源: 评论
Enhancing Image Security with Rossler Attractor-Based Encryption  2
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia University Of Petra Faculty Of Information Technology Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
Enhancing Automated Android Application Security through Hybrid Static and Dynamic Analysis Techniques  6
Enhancing Automated Android Application Security through Hyb...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Manukulasooriya, G.E. Munasingha, R.S.I. Fernando, Harinda Uthpali, H.K.I. Yeshani, A.V.S.H. Siriwardana, Deemantha Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The rapid growth of mobile applications has led to serious security challenges, resulting in vulnerabilities. Automation in security testing methods is becoming popular, with the Automated Vulnerability Detection meth... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论