咨询与建议

限定检索结果

文献类型

  • 5,140 篇 会议
  • 4,080 篇 期刊文献
  • 163 册 图书

馆藏范围

  • 9,383 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,616 篇 工学
    • 3,950 篇 计算机科学与技术...
    • 3,196 篇 软件工程
    • 1,084 篇 信息与通信工程
    • 841 篇 控制科学与工程
    • 621 篇 生物工程
    • 565 篇 电气工程
    • 523 篇 生物医学工程(可授...
    • 483 篇 电子科学与技术(可...
    • 405 篇 机械工程
    • 340 篇 光学工程
    • 270 篇 仪器科学与技术
    • 255 篇 化学工程与技术
    • 218 篇 动力工程及工程热...
    • 203 篇 核科学与技术
    • 179 篇 网络空间安全
  • 3,312 篇 理学
    • 1,499 篇 数学
    • 1,156 篇 物理学
    • 757 篇 生物学
    • 518 篇 统计学(可授理学、...
    • 368 篇 系统科学
    • 291 篇 化学
  • 1,746 篇 管理学
    • 1,076 篇 管理科学与工程(可...
    • 747 篇 图书情报与档案管...
    • 580 篇 工商管理
  • 600 篇 医学
    • 513 篇 临床医学
    • 392 篇 基础医学(可授医学...
    • 241 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 270 篇 法学
    • 221 篇 社会学
  • 202 篇 经济学
    • 198 篇 应用经济学
  • 154 篇 教育学
  • 120 篇 农学
  • 49 篇 文学
  • 34 篇 艺术学
  • 11 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 309 篇 deep learning
  • 255 篇 machine learning
  • 229 篇 computer science
  • 179 篇 feature extracti...
  • 177 篇 artificial intel...
  • 171 篇 computational mo...
  • 153 篇 information syst...
  • 149 篇 accuracy
  • 119 篇 data mining
  • 110 篇 internet of thin...
  • 110 篇 neural networks
  • 107 篇 semantics
  • 101 篇 security
  • 98 篇 information tech...
  • 93 篇 covid-19
  • 91 篇 optimization
  • 90 篇 predictive model...
  • 88 篇 training
  • 87 篇 support vector m...
  • 76 篇 decision making

机构

  • 290 篇 faculty of scien...
  • 290 篇 department for p...
  • 284 篇 department of ph...
  • 282 篇 departamento de ...
  • 275 篇 department of ph...
  • 268 篇 department of ph...
  • 265 篇 department of ph...
  • 264 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 255 篇 institute of phy...
  • 239 篇 fakultät für phy...
  • 228 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 227 篇 institute of phy...
  • 225 篇 department of ph...
  • 224 篇 department of ph...
  • 220 篇 physics division...
  • 215 篇 department of ph...
  • 206 篇 department of ph...
  • 199 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 260 篇 h. a. gordon
  • 259 篇 r. ströhmer
  • 256 篇 h. sakamoto
  • 256 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 255 篇 g. gaudio
  • 255 篇 s. mohapatra
  • 254 篇 y. nagasaka
  • 248 篇 s. guindon
  • 243 篇 y. tayalati

语言

  • 8,357 篇 英文
  • 974 篇 其他
  • 39 篇 中文
  • 17 篇 日文
  • 6 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Systems and Applied Computer Science"
9383 条 记 录,以下是1181-1190 订阅
排序:
Decision Tree-Based IoT Botnet Attack Detection
Decision Tree-Based IoT Botnet Attack Detection
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Hazem Al-Najjar Nadia Al-Rousan Department of Computer Science College of Information Technology University of Petra Amman Jordan Department of Computer Engineering Faculty of Electrical Engineering and Information Systems German Jordanian University
This paper investigated the predictive capabilities of three decision tree models for IoT botnet attack prediction using packet information while minimizing the number of predictors. The study employed three decision ... 详细信息
来源: 评论
Sociotechnical Transformation in the Decade of Healthy Ageing to empower the Silver Economy: Bridging the Silver Divide through Social and Digital Inclusion  24
Sociotechnical Transformation in the Decade of Healthy Agein...
收藏 引用
25th Annual International Conference on Digital Government Research, DGO 2024
作者: Nikiforova, Anastasija Tseng, Hsien-Lee Butt, Sidra Azmat Daheim, Dirk Liu, Li-Chuan University of Tartu Faculty of Science and Technology Institute of Computer Science Tartu Estonia National University of Tainan Department of Public Administration and Management Tainan Taiwan Tallinn University of Technology Information Systems Group Tallinn Estonia National Taitung University Department of Public and Cultural Affairs Taitung Taiwan
The current decade has been marked as the Decade of Healthy Ageing, where increased participation, social and digital inclusion for the silver population within and for the Silver Economy has become imperative. This p... 详细信息
来源: 评论
SSCM: Self-Supervised Critical Model for Reducing Hallucinations in Chinese Financial Text Generation
SSCM: Self-Supervised Critical Model for Reducing Hallucinat...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jin, Keyan Wang, Yapeng Santos, Leonel Fang, Tao Yang, Xu Im, Sio Kei Faculty of Applied Sciences Macao Polytechnic University China Computer Science and Communication Research Centre Polytechnic of Leiria Leiria Portugal Hithink RoyalFlush Information Network Co. Ltd. Hangzhou China Macao Polytechnic University China
Large Language Models (LLMs) show strong performance in natural language processing tasks, but their application in the financial domain is limited. Current methods rely on large datasets and manual prompt engineering... 详细信息
来源: 评论
Maize Crop Yield Prediction Using Machine Learning Regression Approach  5th
Maize Crop Yield Prediction Using Machine Learning Regressio...
收藏 引用
5th International Conference on Advances in Distributed Computing and Machine Learning, ICADCML 2024
作者: Bedane, Tarikwa Tesfa Kebede, Kidistie Bizuneh Mohapatra, Sudhir Kumar Das, Tapan Kumar Tripathy, Asis Kumar Department of Software Engineering Addis Ababa Science and Technology University Addis Ababa Ethiopia Agricultural Transformation Institute Addis Ababa Ethiopia Faculty of Emerging Technologies Sri Sri University Cuttack India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Given maize’s significant role as a staple crop, it becomes imperative to carry out precise crop yield prediction to ensure food security. This research employs machine learning algorithms to analyze historical data ... 详细信息
来源: 评论
Reference Tracking Control of a Nonlinear Epidemiological Model with State Estimation  9
Reference Tracking Control of a Nonlinear Epidemiological Mo...
收藏 引用
9th International Conference on Control, Decision and information Technologies, CoDIT 2023
作者: Csutak, Balázs Szederkényi, Gábor Pazmany Peter Catholic University Faculty of Information Technology and Bionics Budapest Hungary Institute for Computer Science and Control Systems and Control Laboratory Kende u. 13-17 BudapestH-1111 Hungary
In this paper, a reference tracking controller for an 8-compartment epidemic model is proposed. The dynamical model describing the disease spread and progression is given in nonlinear input-affine form. The manipulabl... 详细信息
来源: 评论
An Automated Platform for Gathering and Managing Open-Source Cyber Threat Intelligence  2
An Automated Platform for Gathering and Managing Open-Source...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Al-Dmour, Nidal A. Kamrul Hasan, Mohammad Ajmal, Masood Ali, Muhammad Naseer, Iftikhar Ali, Atif Hamadi, Hussam Al Ali, Nasir Mutah University College of Engineering Department of Computer Engineering Jordan Center for Cyber Security Malaysia Riphah International University Islamabad Pakistan University of Central Punjab Pakistan The Superior University Faculty of Computer Science & Information Technology Lahore Pakistan Cyberjaya Malaysia College of Engineering and IT University of Dubai United Arab Emirates School of Computer Science NCBA&E Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan
The community has begun paying more attention to source OSCTI Cyber Threat Intelligence to stay informed about the rapidly changing cyber threat landscape. Numerous reports from the OSCTI frequently provide Informatio... 详细信息
来源: 评论
Intrusion Detection in 5G Cellular Network Using Machine Learning
收藏 引用
computer systems science & Engineering 2023年 第11期47卷 2439-2453页
作者: Ishtiaque Mahmood Tahir Alyas Sagheer Abbas Tariq Shahzad Qaiser Abbas Khmaies Ouahada Knowledge Unit of Systems and Technology UMT Sialkot CampusSialkot51040Pakistan Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan Faculty of Computer Science National College of Business Administration and EconomicsLahore54660Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadSahiwal CampusSahiwal57000Pakistan Faculty of Computer and Information Systems Islamic University of Madinah Madinah42351Saudi Arabia Department of Computer Science&IT University of SargodhaSargodha40100Pakistan Department of Electrical and Electronic Engineering Science University of JohannesburgP.O Box 524Auckland ParkJohannesburg2006South Africa
Attacks on fully integrated servers,apps,and communication networks via the Internet of Things(IoT)are growing *** devices’effectiveness harms end users,increases cyber threats and identity theft,raises costs,and neg... 详细信息
来源: 评论
Evolutionary Algorithsm with Machine Learning Based Epileptic Seizure Detection Model
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4541-4555页
作者: Manar Ahmed Hamza Noha Negm Shaha Al-Otaibi Amel AAlhussan Mesfer Al Duhayyim Fuad Ali Mohammed Al-Yarimi Mohammed Rizwanullah Ishfaq Yaseen Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz University16278AlKharjSaudi Arabia Department of Computer Science College of Science and ArtsKing Khalid UniversityMahayilAsir62529Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Natural and Applied Sciences College of Community-AflajPrince Sattam bin Abdulaziz University16278Saudi Arabia
Machine learning (ML) becomes a familiar topic among decisionmakers in several domains, particularly healthcare. Effective design of MLmodels assists to detect and classify the occurrence of diseases using healthcared... 详细信息
来源: 评论
Exploring Auditory Hand Guidance for Eyes-free 3D Path Tracing
Exploring Auditory Hand Guidance for Eyes-free 3D Path Traci...
收藏 引用
2025 CHI Conference on Human Factors in Computing systems, CHI EA 2025
作者: Abe, Yuki Hara, Kotaro Sakamoto, Daisuke Ono, Tetsuo Human-Computer Interaction Lab. Hokkaido University Hokkaido Sapporo Japan School of Computing and Information Systems Singapore Management University Singapore Singapore Division of Computer Science and Information Technology Hokkaido University Hokkaido Sapporo Japan Faculty of Engineering Kyoto Tachibana University Kyoto Japan
Guiding a user’s hand along a 3D path can help individuals avoid obstacles and manipulate everyday items with eyes-free. While prior work focused on haptic approaches using robots, auditory approaches for 3D path gui... 详细信息
来源: 评论
Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 6425-6441页
作者: Hadil Shaiba Jaber S.Alzahrani Majdy M.Eltahir Radwa Marzouk Heba Mohsen Manar Ahmed Hamza Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords,account identifiers,bank details,*** general,these kinds of cyberattacks are made at users through phone calls,em... 详细信息
来源: 评论