咨询与建议

限定检索结果

文献类型

  • 8,582 篇 会议
  • 5,884 篇 期刊文献
  • 231 册 图书

馆藏范围

  • 14,697 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,710 篇 工学
    • 6,112 篇 计算机科学与技术...
    • 4,939 篇 软件工程
    • 2,201 篇 信息与通信工程
    • 1,415 篇 控制科学与工程
    • 1,153 篇 电气工程
    • 1,121 篇 生物工程
    • 1,060 篇 电子科学与技术(可...
    • 874 篇 生物医学工程(可授...
    • 738 篇 机械工程
    • 626 篇 光学工程
    • 556 篇 仪器科学与技术
    • 452 篇 动力工程及工程热...
    • 421 篇 化学工程与技术
    • 384 篇 网络空间安全
    • 332 篇 安全科学与工程
    • 297 篇 交通运输工程
  • 5,093 篇 理学
    • 2,416 篇 数学
    • 1,772 篇 物理学
    • 1,252 篇 生物学
    • 802 篇 统计学(可授理学、...
    • 565 篇 系统科学
    • 474 篇 化学
  • 2,549 篇 管理学
    • 1,577 篇 管理科学与工程(可...
    • 1,046 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 942 篇 医学
    • 793 篇 临床医学
    • 675 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 380 篇 公共卫生与预防医...
  • 401 篇 法学
    • 327 篇 社会学
  • 282 篇 经济学
  • 214 篇 农学
  • 201 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 446 篇 deep learning
  • 287 篇 machine learning
  • 261 篇 feature extracti...
  • 246 篇 accuracy
  • 238 篇 computational mo...
  • 215 篇 information tech...
  • 214 篇 internet of thin...
  • 208 篇 optimization
  • 187 篇 support vector m...
  • 184 篇 artificial intel...
  • 182 篇 computer science
  • 171 篇 predictive model...
  • 169 篇 data mining
  • 148 篇 training
  • 134 篇 neural networks
  • 123 篇 covid-19
  • 120 篇 real-time system...
  • 116 篇 computational in...
  • 111 篇 image segmentati...
  • 110 篇 wireless communi...

机构

  • 285 篇 faculty of scien...
  • 285 篇 department for p...
  • 284 篇 department of ph...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 271 篇 kirchhoff-instit...
  • 268 篇 department of ph...
  • 265 篇 department of ph...
  • 259 篇 faculté des scie...
  • 244 篇 fakultät für phy...
  • 241 篇 institute of phy...
  • 229 篇 yerevan physics ...
  • 225 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 214 篇 department of ph...
  • 212 篇 department of ph...
  • 197 篇 department of ph...
  • 194 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 261 篇 y. nagasaka
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 252 篇 s. guindon
  • 250 篇 d. guest

语言

  • 14,112 篇 英文
  • 481 篇 其他
  • 95 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer and Information Technology Engineering"
14697 条 记 录,以下是471-480 订阅
排序:
Enhanced Feature Selection for Superior Ensemble DDoS Detection in Software-Defined Networks
Enhanced Feature Selection for Superior Ensemble DDoS Detect...
收藏 引用
2024 IEEE International Conference on Future Machine Learning and Data Science, FMLDS 2024
作者: Alashhab, Abdussalam Ahmed Edrah, Aisha Abbas, Maythem K. Alashhab, Mohamed Alngib, Mohamed Daha, Muhammad Yunis Alasmarya Islamic University Faculty of Information Technology Department of Computer Science Zliten Libya Western University Faculty of Engineering Department of Electrical and Computer Engineering London Canada Asia Pacific University of Technology and Innovation School of Computing Kuala Lumpur Malaysia Universiti Sultan Azlan Shah Faculty of Management and Information Technology Kuala Kangsar Malaysia School of Engineering Ulster University Belfast United Kingdom
Distributed Denial-of-Service (DDoS) attacks disrupt networks by flooding systems with traffic from multiple sources, making real-time detection essential. Integrating Machine Learning (ML) with Software-Defined Netwo... 详细信息
来源: 评论
Statistical Comparison ARIMA Order Performance In Stock Market  7
Statistical Comparison ARIMA Order Performance In Stock Mark...
收藏 引用
7th International Conference on information technology, InCIT 2023
作者: Deemee, Chanatip Ngampis, Kirati Noraset, Thanapon Thaipisutikul, Tipajin Sun, Min-Te Kitchat, Kotcharat Mahidol University Faculty of Information and Communication Technology Thailand National Central University Department of Computer Science and Information Engineering Taiwan
Stock market forecasting is important for financial decision-making and risk management. Among the various time series models, the Autoregressive (p) Integrated (d) Moving Average (q) (ARIMA) model has been widely ado... 详细信息
来源: 评论
Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model
收藏 引用
Chinese Physics B 2024年 第4期33卷 418-433页
作者: 周新卫 蒋东华 Jean De Dieu Nkapkop Musheer Ahmad Jules Tagne Fossi Nestor Tsafack 吴建华 Department of Information Engineering Gongqing CollegeNanchang UniversityJiujiang 332020China School of Computer Science and Engineering Sun Yat-Sen UniversityGuangzhou 511400China Department of Electrical Engineering and Industrial Computing University Institute of TechnologyDoualaCameroon Department of Computer Engineering Jamia Millia IslamiaNew Delhi 110025India Department of Physics Faculty of ScienceUniversity of YaoundeCameroon Electrical Engineering Department and Industrial Computing of ISTAMA University of DoualaDoualaCameroon
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop... 详细信息
来源: 评论
Current and Voltage Calculations of the 400 kV Transmission Line Using Laboratory Measurements and computer Simulation  33rd
Current and Voltage Calculations of the 400 kV Transmission...
收藏 引用
33rd International Conference on Organization and technology of Maintenance, OTO 2024
作者: Torma, Matej Fekete, Krešimir Kljajić, Ružica Čvek, Kristijan Faculty of Electrical Engineering Computer Science and Information Technology Osijek University of Osijek Kneza Trpimira 2b Osijek31000 Croatia
In this paper, the current, voltages, as well as active and reactive power of the 400 kV transmission line are calculated using three different methods. The objective of the paper is to demonstrate and compare th... 详细信息
来源: 评论
Fractal Measurement of Images Human Brain from MRI
Fractal Measurement of Images Human Brain from MRI
收藏 引用
2024 Cognitive Models and Artificial Intelligence Conference, AICCONF 2024
作者: Anarova, Shahzoda Jabbarov, Jamoliddin Uralova, Iroda Tashkent University of Information Technologies Department of Convergence of digital technologies Computer Engineering Faculty Tashkent Uzbekistan Department of Computer science and technology Intelligent systems and computer technologies Faculty Samarkand State University Samarkand Uzbekistan
This article is devoted to the determination of the fractal size of the damaged part of the human brain on the basis of images obtained from MRI (magnetic resonance imaging). There are various mathematical methods for... 详细信息
来源: 评论
The Role of ERNIE Model in Analyzing Hotel Reviews using Chinese Sentiment Analysis
The Role of ERNIE Model in Analyzing Hotel Reviews using Chi...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Jie, Lee Hao Ayyasamy, Ramesh Kumar Sangodiah, Anbuselvan Jalil, Norazira Binti A Krishnan, Kesavan Chinnasamy, P. University Tunku Abdul RahmanKampar Faculty of Information and Communication Technology Malaysia Faculty of Computing and Engineering Quest International University Ipoh Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Kuala Lumpur Malaysia MLR Institute of Technology Department of Computer Science and Engineering Hyderabad India
This research aims to find the best deep learning model to do Chinese sentimental analysis. BERT's model may work well in the English language but not work in the Chinese language. English is easier to encode in e... 详细信息
来源: 评论
Sustainable-Security Assessment Through a Multi Perspective Benchmarking Framework
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 6011-6037页
作者: Ahmed Saeed Alfakeeh Abdulmohsen Almalawi Fawaz Jaber Alsolami Yoosef B.Abushark Asif Irshad Khan Adel Aboud SBahaddad Md Mottahir Alam Alka Agrawal Rajeev Kumar Raees Ahmad Khan Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Electrical and Computer Engineering Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow-226025Uttar PradeshIndia Department of Computer Science and Engineering Babu Banarasi Das UniversityLucknow-226028Uttar PradeshIndia
The current cyber-attack environment has put even the most protected systems at risk as the hackers are nowmodifying technologies to exploit even the tiniest of weaknesses and infiltrate *** this situation,it’s criti... 详细信息
来源: 评论
Uncertainty propagation in the internet of things
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-20页
作者: Pal, Shantanu Khalifa, Sara Miller, Dimity Dedeoglu, Volkan Dorri, Ali Ramachandran, Gowri Moghadam, Peyman Kusy, Brano Jurdak, Raja The School of Information Technology Faculty of Science Engineering and Built Environment Deakin University MelbourneVIC 3125 Australia The School of Information Systems Faculty of Science Queensland University of Technology BrisbaneQLD4000 Australia The School of Electrical Engineering and Robotics Faculty of Engineering Queensland University of Technology BrisbaneQLD4000 Australia The Distributed Sensing Systems Group Data61 CSIRO PullenvaleQLD 4069 Australia The School of Computer Science Faculty of Science Queensland University of Technology BrisbaneQLD 4000 Australia The CSIRO Robotics Data61 CSIRO PullenvaleQLD 4069 Australia
The Internet of Things (IoT) detects context through sensors capturing data from dynamic physical environments, in order to inform automation decisions within cyber physical systems (CPS). Diverse types of uncertainty... 详细信息
来源: 评论
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3827-3845页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyaKuwait
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... 详细信息
来源: 评论
Face image authentication scheme based on MTCNN and SLT
收藏 引用
Multimedia Tools and Applications 2025年 1-43页
作者: Thabit, Rasha Al-Askari, Mohanad A. Mohammed, Dunya Zeki Anaam, Elham Abdulwahab Mahmood, Zainab H. Jabbar, Dina Jamal Salih, Zahraa Aqeel Information System Department College of Computer Sciences and Information Technology University of Al-Anbar Al-Anbar Iraq Computer Engineering Department College of Engineering Al-Iraqia University Baghdad Iraq Electronic and Communications Engineering Department College of Engineering Gilgamesh University Baghdad Iraq Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia Department of Cybersecurity Engineering College of Information Engineering Al-Nahrain University Baghdad Iraq Electrical Engineering Technical Collage Middle Technical University Baghdad Iraq Department of Business Administration Alamaal University College Baghdad Iraq
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists... 详细信息
来源: 评论