咨询与建议

限定检索结果

文献类型

  • 8,576 篇 会议
  • 5,838 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 14,420 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,674 篇 工学
    • 6,094 篇 计算机科学与技术...
    • 4,937 篇 软件工程
    • 2,199 篇 信息与通信工程
    • 1,413 篇 控制科学与工程
    • 1,149 篇 电气工程
    • 1,121 篇 生物工程
    • 1,057 篇 电子科学与技术(可...
    • 874 篇 生物医学工程(可授...
    • 736 篇 机械工程
    • 624 篇 光学工程
    • 556 篇 仪器科学与技术
    • 449 篇 动力工程及工程热...
    • 421 篇 化学工程与技术
    • 385 篇 网络空间安全
    • 332 篇 安全科学与工程
    • 297 篇 交通运输工程
  • 5,084 篇 理学
    • 2,413 篇 数学
    • 1,767 篇 物理学
    • 1,251 篇 生物学
    • 802 篇 统计学(可授理学、...
    • 564 篇 系统科学
    • 474 篇 化学
  • 2,547 篇 管理学
    • 1,575 篇 管理科学与工程(可...
    • 1,046 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 936 篇 医学
    • 789 篇 临床医学
    • 674 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 380 篇 公共卫生与预防医...
  • 400 篇 法学
    • 326 篇 社会学
  • 282 篇 经济学
  • 214 篇 农学
  • 200 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 444 篇 deep learning
  • 275 篇 machine learning
  • 264 篇 feature extracti...
  • 244 篇 accuracy
  • 239 篇 computational mo...
  • 215 篇 information tech...
  • 214 篇 internet of thin...
  • 206 篇 optimization
  • 187 篇 support vector m...
  • 181 篇 computer science
  • 178 篇 predictive model...
  • 170 篇 data mining
  • 146 篇 training
  • 134 篇 neural networks
  • 123 篇 covid-19
  • 123 篇 real-time system...
  • 110 篇 image segmentati...
  • 110 篇 wireless communi...
  • 109 篇 quality of servi...
  • 106 篇 security

机构

  • 287 篇 faculty of scien...
  • 287 篇 department for p...
  • 286 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 246 篇 institute of phy...
  • 244 篇 fakultät für phy...
  • 232 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 211 篇 department of ph...
  • 199 篇 institute of phy...
  • 197 篇 department of ph...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 253 篇 s. guindon
  • 251 篇 d. guest

语言

  • 13,834 篇 英文
  • 481 篇 其他
  • 96 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer and Information Technology Engineering"
14420 条 记 录,以下是131-140 订阅
排序:
Hybrid lightweight encryption for IoT: integrating chaotic key generators with Feistel and substitution-permutation networks for secure 3DV transmission
收藏 引用
Multimedia Tools and Applications 2025年 1-47页
作者: El-Shafai, Walid Mesrega, Ahmed K. Ahmed, Hossam Eldin H. Elbahnasawy, Nirmeen A. El-Samie, Fathi E. Abd Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Deptartment of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Computer Science and Engineering Faculty of Electronic Engineering Menoufia University Menouf Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o... 详细信息
来源: 评论
Optimization of Electrocardiogram Classification Using Dipper Throated Algorithm and Differential Evolution
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2379-2395页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Sameer Alshetewi Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt General Information Technology Department Ministry of DefenseThe Executive AffairsExcellence Services DirectorateRiyadh11564Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Electrocardiogram(ECG)signal is a measure of the heart’s electrical ***,ECG detection and classification have benefited from the use of computer-aided systems by *** goal of this paper is to improve the accuracy of E... 详细信息
来源: 评论
Proposed intelligence systems based on digital Forensics: Review paper
收藏 引用
Materials Today: Proceedings 2023年 80卷 2647-2651页
作者: Ismael Sahib, Hussein Qahatan AlSudani, Mustafa Hasan Ali, Mohammed Qassim Abbas, Haydar Moorthy, Kohbalan Mundher Adnan, Myasar Faculty of Computer Science and Information Technology UniversitiTun Hussein Onn Malaysia Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia 81310 Johor Bahru Malaysia
The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on t... 详细信息
来源: 评论
Improving the review classification of Google apps using combined feature embedding and deep convolutional neural network model
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第4期14卷 4257-4272页
作者: Aslam, Naila Alzamzami, Ohoud Xia, Kewen Sadiq, Saima Umer, Muhammad Bisogni, Carmen Ashraf, Imran School of Electronics and Information Engineering Hebei University of Technology Tianjin China Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Computer Science Khwaja Fareed University of Engineering and Information Technology Rahim Yar Khan Pakistan Department of Computer Science Information Technology The Islamia University of Bahawalpur Bahawalpur Pakistan Department of Computer Science University of Salerno Fisciano Italy Information and Communication Engineering Yeungnam University Gyeongsan Korea Republic of
Online reviews play an integral part in making mobile applications stand out from the large number of applications available on the Google Play store. Predominantly, users consider posted reviews for appropriate app s... 详细信息
来源: 评论
Analysis of energy consumption for SPI and I2C communications in ultra-low power embedded systems  46
Analysis of energy consumption for SPI and I2C communication...
收藏 引用
46th ICT and Electronics Convention, MIPRO 2023
作者: Zidar, Josip Aleksi, Ivan Matic, Tomislav Faculty of Electrical Engineering Computer Science and Information Technology Osijek Croatia
Developing ultra-low-power devices requires low-power components, algorithms, and communication protocols. For environmental monitoring along the supply chain, products may travel a long way from the distributor to th... 详细信息
来源: 评论
Safeguarding Fuel Resources for BTS Generator Sets: An Arduino-Based Monitoring System with Fuel Theft Detection Prototype  2
Safeguarding Fuel Resources for BTS Generator Sets: An Ardui...
收藏 引用
2nd International Conference on information technology Research and Innovation, ICITRI 2023
作者: Erlina, Tati Aisuwarya, Ratna Alwizar Universitas Andalas Computer Engineering Faculty of Information Technology Padang Indonesia
Fuel theft from Base Transceiver Station (BTS) generator sets (Gensets) is a prevalent issue that poses financial losses and operational disruptions for telecommunication companies. Traditional security measures have ... 详细信息
来源: 评论
A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2299-2316页
作者: Bassam Mohammad Elzaghmouri Yosef Hasan Fayez Jbara Said Elaiwat Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Farah H.Zawaideh Mouiad Fadeil Alawneh Asef Al-Khateeb Marwan Abu-Zanona Department of Computer Science Faculty of Computer Science and Information TechnologyJerash UniversityJerash26150Jordan Computer Engineering Department College of Engineering&Information Technology Buraydah CollegesBuraydah51418Saudi Arabia Faculty of Architecture and Design Al-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityDiriyahRiyadh13713Saudi Arabia Applied College King Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Business Intelligence and Data Analysis Faculty of Financial Sciences and BusinessIrbid National UniversityIrbid21110Jordan Faculty of Information Technology Ajloun National UniversityAjlun26810Jordan Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense *** paper presents an innovative h... 详细信息
来源: 评论
Helmet Detection Recognition Algorithm Based on Improved Yolov5
Helmet Detection Recognition Algorithm Based on Improved Yol...
收藏 引用
2023 International Conference on Image Processing and computer Vision, IPCV 2023
作者: Lin, Shuo Li, Zongmei Xiamen University of Technology Faculty of Computer and Information Engineering Xiamen China
The existing helmet detection algorithm is mainly based on a single-stage object detection algorithm, which has high detection speed and can achieve the requirement of real-time detection. Still, the accuracy of detec... 详细信息
来源: 评论
An Improved Hybrid Deep Learning Approach for Security Requirements Classification
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4041-4067页
作者: Shoaib Hassan QianmuLi Muhammad Zubair Rakan AAlsowail Muhammad Umair School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing210094China Faculty of Information Technology and Computer Science University of Central PunjabLahore5400Pakistan Computer Skills Self-Development Skills DevelopmentDeanship of Common First YearKing Saud UniversityRiyadh11362Saudia Arabia
As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering ... 详细信息
来源: 评论
A routing method with the approach of reducing energy consumption in WSNs with the Jellyfish Search (JS) optimizer algorithm and unequal clustering  13
A routing method with the approach of reducing energy consum...
收藏 引用
13th International Conference on computer and Knowledge engineering, ICCKE 2023
作者: Gholami, Ehsan Hamidzadeh, Javad Sadjad University Faculty of Computer Engineering and Information Technology Mashhad Iran
Wireless sensor networks are among the most common communication tools used in military and civilian fields. These networks consist of many tiny devices called sensor nodes. Each node has processing capability and dif... 详细信息
来源: 评论