咨询与建议

限定检索结果

文献类型

  • 4,550 篇 会议
  • 2,885 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 7,493 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,435 篇 工学
    • 3,349 篇 计算机科学与技术...
    • 2,748 篇 软件工程
    • 889 篇 信息与通信工程
    • 666 篇 控制科学与工程
    • 566 篇 生物工程
    • 414 篇 生物医学工程(可授...
    • 385 篇 电气工程
    • 348 篇 机械工程
    • 320 篇 电子科学与技术(可...
    • 288 篇 光学工程
    • 211 篇 仪器科学与技术
    • 189 篇 动力工程及工程热...
    • 187 篇 网络空间安全
    • 172 篇 安全科学与工程
    • 157 篇 化学工程与技术
  • 2,262 篇 理学
    • 917 篇 数学
    • 764 篇 物理学
    • 660 篇 生物学
    • 306 篇 统计学(可授理学、...
    • 257 篇 系统科学
    • 154 篇 化学
  • 1,429 篇 管理学
    • 878 篇 管理科学与工程(可...
    • 607 篇 图书情报与档案管...
    • 434 篇 工商管理
  • 542 篇 医学
    • 467 篇 临床医学
    • 382 篇 基础医学(可授医学...
    • 238 篇 公共卫生与预防医...
    • 211 篇 药学(可授医学、理...
  • 254 篇 法学
    • 218 篇 社会学
  • 176 篇 经济学
    • 176 篇 应用经济学
  • 158 篇 教育学
  • 147 篇 农学
  • 31 篇 文学
  • 26 篇 艺术学
  • 15 篇 军事学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 309 篇 deep learning
  • 283 篇 machine learning
  • 172 篇 accuracy
  • 171 篇 internet of thin...
  • 164 篇 computational mo...
  • 162 篇 feature extracti...
  • 125 篇 training
  • 118 篇 predictive model...
  • 108 篇 security
  • 106 篇 artificial intel...
  • 100 篇 real-time system...
  • 94 篇 support vector m...
  • 93 篇 semantics
  • 91 篇 data models
  • 89 篇 visualization
  • 88 篇 neural networks
  • 86 篇 information tech...
  • 84 篇 convolutional ne...
  • 83 篇 students
  • 81 篇 cloud computing

机构

  • 225 篇 faculty of compu...
  • 167 篇 sri lanka instit...
  • 152 篇 faculty of compu...
  • 99 篇 university of sc...
  • 92 篇 tianfu cosmic ra...
  • 90 篇 department of ph...
  • 90 篇 hebei normal uni...
  • 89 篇 state key labora...
  • 88 篇 yunnan observato...
  • 84 篇 faculty of infor...
  • 78 篇 university of ch...
  • 73 篇 key laboratory f...
  • 70 篇 school of physic...
  • 69 篇 shandong provinc...
  • 67 篇 center for astro...
  • 60 篇 national astrono...
  • 57 篇 faculty of infor...
  • 57 篇 institute for nu...
  • 54 篇 school of physic...
  • 54 篇 institute of fro...

作者

  • 80 篇 axikegu
  • 76 篇 fang j.
  • 76 篇 feng c.f.
  • 75 篇 bastieri d.
  • 75 篇 jiang k.
  • 68 篇 kuleshov d.
  • 67 篇 li xin
  • 67 篇 liu d.
  • 66 篇 li cheng
  • 66 篇 chen m.j.
  • 65 篇 liu s.m.
  • 64 篇 huang d.h.
  • 63 篇 dai h.l.
  • 62 篇 min z.
  • 59 篇 guo y.q.
  • 59 篇 liu b.
  • 58 篇 bao y.w.
  • 58 篇 hu h.b.
  • 56 篇 heller m.
  • 56 篇 qin j.j.

语言

  • 7,185 篇 英文
  • 265 篇 其他
  • 38 篇 中文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computing and Information Technology"
7493 条 记 录,以下是101-110 订阅
排序:
Forecasting New Mobile Site Location Suitability Using Machine Learning  8
Forecasting New Mobile Site Location Suitability Using Machi...
收藏 引用
8th International Conference on Data Science and Machine Learning Applications, CDMA 2025
作者: Rabbani, Zeeshan Ebrahim Hosseini, Seyed Pervez Chattha, Shahbaz Alandjani, Gasim Abosaq, Nasser Abdul Majid, Mazlina School of Information Technology Whitecliffe College Auckland New Zealand School of Information Technology Whitecliffe College Christchurch New Zealand School of Information Technology Whitecliffe College Wellington New Zealand Yanbu Industrial College Computer Science and Engineering Yanbu Saudi Arabia Universi Malaysia Pahang Al-Sultan Faculty of Computing Abdullah Pekan Malaysia
The increasing density of mobile networks has made the identification of optimal new coverage sites a critical challenge for mobile operators. Traditional methods relying on manual inspections and council plans are la... 详细信息
来源: 评论
AI-driven intrusion prevention system: leveraging mathematical foundations for advanced threats detection
收藏 引用
International Journal of information technology (Singapore) 2025年 1-6页
作者: Vashistha, Avneesh Alghamdi, Tami Abdulrahman Almalki, Sultan Ahmed Ead, Waleed M. Kaur, Gaganpreet Department of Computer Science and Engineering SRM Institute of Science and Technology Delhi-NCR Campus Modinagar Ghaziabad India Computer Science Department Faculty of Computing and Information Al-Baha University Al-Baha Saudi Arabia Computer Department Applied College Najran University Najran Saudi Arabia Faculty of Computing and Information Al-Baha University Al-Baha Saudi Arabia Faculty of Computers and Artificial Intelligence Beni-Suef University Beni-Suef Egypt Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura India
The given paper introduces a multi-staged AI-driven intrusion prevention system (IPS) that utilizes mathematical foundations like statistical analysis, probabilistic models, and optimization techniques to design strat... 详细信息
来源: 评论
Unveiling Effective Heuristic Strategies: A Review of Cross-Domain Heuristic Search Challenge Algorithms
收藏 引用
Computer Modeling in Engineering & Sciences 2025年 第2期142卷 1233-1288页
作者: Mohamad Khairulamirin Md Razali MasriAyob Abdul Hadi Abd Rahman Razman Jarmin Chian Yong Liu Muhammad Maaya Azarinah Izaham Graham Kendall Faculty of Information Science and Technology Universiti Kebangsaan MalaysiaBangi43600SelangorMalaysia Center for Artificial Intelligence Technology Universiti Kebangsaan MalaysiaBangi43600SelangorMalaysia Faculty of Medicine Universiti Kebangsaan Malaysia Medical CentreCheras56000Kuala LumpurMalaysia School of Engineering and Computing MILA UniversityNilai71800Negeri SembilanMalaysia School of Computer Science University of Nottingham-Malaysia CampusSemenyih43500SelangorMalaysia
The Cross-domain Heuristic Search Challenge(CHeSC)is a competition focused on creating efficient search algorithms adaptable to diverse problem *** hyper-heuristics are a class of algorithms that dynamically choose he... 详细信息
来源: 评论
Enhancing single-lead electrocardiogram arrhythmia detection with empirical mode decomposition
收藏 引用
Neural computing and Applications 2025年 1-23页
作者: Issa, Mohamed F. Yousry, Ahmed Tuboly, Gergely Wang, Zeyu Zoltan, Juhasz Selim, Mazen M. AbuEl-Atta, Ahmed H. Department of Scientific Computing Faculty of Computers and Artificial Intelligence Benha University Benha13511 Egypt Department of Computer Science Faculty of Computers and Artificial Intelligence Benha University Benha13511 Egypt Department of Electrical Engineering and Information Systems University of Pannonia Veszprem8200 Hungary Department of Mechatronics Delta University for Science and Technology Gamasa35712 Egypt
Cardiac arrhythmias pose a significant challenge to health care, requiring accurate and reliable detection methods to enable early diagnosis and treatment. However, traditional ECG beat classification methods often la... 详细信息
来源: 评论
Perception-Centric Explainable AI: Bridging Cognitive Theories and HCI Design for Enhanced User Experience
收藏 引用
Procedia Computer Science 2025年 257卷 297-304页
作者: Sara Alhasan Reem Alnanih Computer Science Department Faculty of Computing and Information Technology King Abdulaziz University Jeddah 21589 Saudi Arabia
Artificial Intelligence (AI) systems increasingly influence high-stakes decision-making, necessitating explainability tailored to non-technical users. This research investigates integrating cognitive theories, Human-C... 详细信息
来源: 评论
AutoQ 2.0: From Verification of Quantum Circuits to Verification of Quantum Programs  31th
AutoQ 2.0: From Verification of Quantum Circuits to Verific...
收藏 引用
31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2025, which was held as part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2025
作者: Chen, Yu-Fang Chung, Kai-Min Hsieh, Min-Hsiu Huang, Wei-Jia Lengál, Ondřej Lin, Jyun-Ao Tsai, Wei-Lun Institute of Information Science Academia Sinica Taipei Taiwan Hon Hai Quantum Computing Research Center Taipei Taiwan Faculty of Information Technology Brno University of Technology Brno Czech Republic Innovation Frontier Institute of Research for Science and Technology & Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan
We present a verifier of quantum programs called AutoQ 2.0. Quantum programs extend quantum circuits (the domain of AutoQ 1.0) by classical control flow constructs, which enable users to describe advanc... 详细信息
来源: 评论
Android Malware Detection via Hybrid Lion-Bee Optimization with Bi-Directional Recurrent Neural Network  3
Android Malware Detection via Hybrid Lion-Bee Optimization w...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Rajeyyagari, Sivaram Elfaki, Mohamed Ahmed Rashid, Khan Asif Bala, B. Kiran Reyad, Omar College of Computing and Information Technology Shaqra University Department of Computer Science Shaqra Saudi Arabia K.Ramakrishnan College of Engineering Department of Ai and Ds Trichy India College of Computing and Information Technology Shaqra University Shaqra Saudi Arabia Faculty of Computers and Artificial Intelligence Sohag University Sohag Egypt
The number of malicious programs that target the Android OS has significantly expanded with the rise in mobile device usage. It is crucial to identify, prevent, and defeat Android malware assaults since they have long... 详细信息
来源: 评论
TOWARDS A ROBUST QUALITY ASSURANCE FRAMEWORK FOR CLOUD computing ENVIRONMENTS
arXiv
收藏 引用
arXiv 2025年
作者: Alharbi, Mohammed Ahmad Qureshi, Rizwan Department of Information Technology Faculty of Computing and Information Technology King Abdul-Aziz University Jeddah80213 Saudi Arabia
Trends such as cloud computing raise issues regarding stable and uniform quality assurance (QA) and validation of software requirements. Current QA frameworks are poorly defined, often not automated, and lack the flex... 详细信息
来源: 评论
Ransomware Defense Strategies Using Cyber Threat Intelligence: A Case Study of a Saudi Organization  43rd
Ransomware Defense Strategies Using Cyber Threat Intelligenc...
收藏 引用
43rd IBIMA Conference on Artificial intelligence and Machine Learning, IBIMA-AI 2024
作者: Wali, Arwa Alamri, Sharifah Alsharif, Sumayah Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
Despite businesses taking severe measures to maintain the highest security levels in their cyberspace, the possibility of a cyberattack still exists. Currently, ransomware attacks represent the most common type of cyb... 详细信息
来源: 评论
Analyzing Sentiments towards Performance of New Academic Programs in A Ghanaian University: A Case of Ghana Communication technology University
Research Square
收藏 引用
Research Square 2025年
作者: Susuassey, Wonder Kwaku Adjei, Daniel Agbeli, Deborah Esenam Asante, Emmanuel Frimpong Mensah, Dorinda Nyarko Faculty of Computing and Information Systems Ghana Communication Technology University Accra Ghana
Introduction of new programs in educational institutions in Ghana requires the introduction of a new curriculum. However, the performance of the new programs after the admission of students into the programs becomes q... 详细信息
来源: 评论