咨询与建议

限定检索结果

文献类型

  • 5,178 篇 会议
  • 4,125 篇 期刊文献
  • 163 册 图书

馆藏范围

  • 9,466 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,558 篇 工学
    • 4,016 篇 计算机科学与技术...
    • 3,228 篇 软件工程
    • 1,125 篇 信息与通信工程
    • 883 篇 控制科学与工程
    • 627 篇 生物工程
    • 581 篇 电气工程
    • 527 篇 生物医学工程(可授...
    • 489 篇 电子科学与技术(可...
    • 420 篇 机械工程
    • 355 篇 光学工程
    • 279 篇 仪器科学与技术
    • 261 篇 化学工程与技术
    • 221 篇 动力工程及工程热...
    • 200 篇 网络空间安全
    • 171 篇 安全科学与工程
  • 3,354 篇 理学
    • 1,498 篇 数学
    • 1,170 篇 物理学
    • 766 篇 生物学
    • 502 篇 统计学(可授理学、...
    • 370 篇 系统科学
    • 302 篇 化学
  • 1,777 篇 管理学
    • 1,100 篇 管理科学与工程(可...
    • 765 篇 图书情报与档案管...
    • 582 篇 工商管理
  • 620 篇 医学
    • 520 篇 临床医学
    • 394 篇 基础医学(可授医学...
    • 253 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 276 篇 法学
    • 227 篇 社会学
  • 200 篇 经济学
    • 196 篇 应用经济学
  • 159 篇 教育学
  • 125 篇 农学
  • 49 篇 文学
  • 34 篇 艺术学
  • 11 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 319 篇 deep learning
  • 260 篇 machine learning
  • 229 篇 computer science
  • 178 篇 feature extracti...
  • 176 篇 artificial intel...
  • 170 篇 computational mo...
  • 153 篇 information syst...
  • 152 篇 accuracy
  • 119 篇 data mining
  • 111 篇 internet of thin...
  • 111 篇 neural networks
  • 106 篇 semantics
  • 100 篇 security
  • 98 篇 information tech...
  • 93 篇 covid-19
  • 92 篇 optimization
  • 91 篇 predictive model...
  • 87 篇 support vector m...
  • 81 篇 training
  • 76 篇 decision making

机构

  • 291 篇 faculty of scien...
  • 291 篇 department for p...
  • 285 篇 department of ph...
  • 283 篇 departamento de ...
  • 276 篇 department of ph...
  • 266 篇 department of ph...
  • 266 篇 kirchhoff-instit...
  • 263 篇 department of ph...
  • 259 篇 faculté des scie...
  • 254 篇 institute of phy...
  • 241 篇 fakultät für phy...
  • 230 篇 yerevan physics ...
  • 229 篇 institut für ast...
  • 228 篇 institute of phy...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 213 篇 department of ph...
  • 205 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 260 篇 h. a. gordon
  • 259 篇 r. ströhmer
  • 256 篇 h. sakamoto
  • 256 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 255 篇 g. gaudio
  • 255 篇 s. mohapatra
  • 254 篇 y. nagasaka
  • 248 篇 s. guindon
  • 243 篇 y. tayalati

语言

  • 8,098 篇 英文
  • 1,323 篇 其他
  • 40 篇 中文
  • 17 篇 日文
  • 7 篇 德文
  • 4 篇 法文
  • 3 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Systems and Applied Computer Science"
9466 条 记 录,以下是1241-1250 订阅
排序:
Intrusion Detection in 5G Cellular Network Using Machine Learning
收藏 引用
computer systems science & Engineering 2023年 第11期47卷 2439-2453页
作者: Ishtiaque Mahmood Tahir Alyas Sagheer Abbas Tariq Shahzad Qaiser Abbas Khmaies Ouahada Knowledge Unit of Systems and Technology UMT Sialkot CampusSialkot51040Pakistan Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan Faculty of Computer Science National College of Business Administration and EconomicsLahore54660Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadSahiwal CampusSahiwal57000Pakistan Faculty of Computer and Information Systems Islamic University of Madinah Madinah42351Saudi Arabia Department of Computer Science&IT University of SargodhaSargodha40100Pakistan Department of Electrical and Electronic Engineering Science University of JohannesburgP.O Box 524Auckland ParkJohannesburg2006South Africa
Attacks on fully integrated servers,apps,and communication networks via the Internet of Things(IoT)are growing *** devices’effectiveness harms end users,increases cyber threats and identity theft,raises costs,and neg... 详细信息
来源: 评论
Evolutionary Algorithsm with Machine Learning Based Epileptic Seizure Detection Model
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4541-4555页
作者: Manar Ahmed Hamza Noha Negm Shaha Al-Otaibi Amel AAlhussan Mesfer Al Duhayyim Fuad Ali Mohammed Al-Yarimi Mohammed Rizwanullah Ishfaq Yaseen Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz University16278AlKharjSaudi Arabia Department of Computer Science College of Science and ArtsKing Khalid UniversityMahayilAsir62529Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Natural and Applied Sciences College of Community-AflajPrince Sattam bin Abdulaziz University16278Saudi Arabia
Machine learning (ML) becomes a familiar topic among decisionmakers in several domains, particularly healthcare. Effective design of MLmodels assists to detect and classify the occurrence of diseases using healthcared... 详细信息
来源: 评论
Machine Learning Models with Neutrosophic Numbers for Network Anomaly Detection and Security Defense Technology
收藏 引用
Neutrosophic Sets and systems 2025年 83卷 50-64页
作者: Al-Khazraji, Hussein S. Alkhamees, Ahmed M. Al-Doori, Humam M. Metwaly, Ahmed A. Eassa, Mohamed Abdelhafeez, Ahmed Salama, Ahmed S. Nagm, Ahmad M. Department of Electrical Power Engineering Technologies Al-Hussein University College Karbala Iraq College of Health and Medical Technologies Department of Anesthesia Technologies Ahl Al Bayt University Karbala Iraq Department of Computer Engineering Techniques Al-Yarmok University College Diyala Iraq Department of Computer Science Faculty of Computers and Informatics Zagazig University Zagazig44519 Egypt Computer Science Department Faculty of Information Systems and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Engineering and Electronics Cairo Higher Institute for Engineering Computer Science and Management New Cairo Egypt
In the dynamic world of cybersecurity, strong solutions are necessary to safeguard intricate network systems. By looking at network anomaly detection and security protection, this study investigates how machine learni... 详细信息
来源: 评论
Reference Tracking Control of a Nonlinear Epidemiological Model with State Estimation  9
Reference Tracking Control of a Nonlinear Epidemiological Mo...
收藏 引用
9th International Conference on Control, Decision and information Technologies, CoDIT 2023
作者: Csutak, Balázs Szederkényi, Gábor Pazmany Peter Catholic University Faculty of Information Technology and Bionics Budapest Hungary Institute for Computer Science and Control Systems and Control Laboratory Kende u. 13-17 BudapestH-1111 Hungary
In this paper, a reference tracking controller for an 8-compartment epidemic model is proposed. The dynamical model describing the disease spread and progression is given in nonlinear input-affine form. The manipulabl... 详细信息
来源: 评论
Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 6425-6441页
作者: Hadil Shaiba Jaber S.Alzahrani Majdy M.Eltahir Radwa Marzouk Heba Mohsen Manar Ahmed Hamza Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords,account identifiers,bank details,*** general,these kinds of cyberattacks are made at users through phone calls,em... 详细信息
来源: 评论
GastroFuse-Net: an ensemble deep learning framework designed for gastrointestinal abnormality detection in endoscopic images
收藏 引用
Mathematical Biosciences and Engineering 2024年 第8期21卷 6847-6869页
作者: Aggarwal, Sonam Gupta, Isha Kumar, Ashok Kautish, Sandeep Almazyad, Abdulaziz S. Mohamed, Ali Wagdy Werner, Frank Shokouhifar, Mohammad Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Model Institute of Engineering and Technology J&K Jammu India Chandigarh University Punjab Mohali140413 India Department of Computer Engineering College of Computer and Information Sciences King Saud University P.O. Box 51178 Riyadh11543 Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical Research Cairo University Giza12613 Egypt Applied Science Research Center Applied Science Private University Amman11931 Jordan Faculty of Mathematics Otto-von-Guericke University Magdeburg39016 Germany Institute of Research and Development Duy Tan University Da Nang550000 Viet Nam
Convolutional Neural Networks (CNNs) have received substantial attention as a highly effective tool for analyzing medical images, notably in interpreting endoscopic images, due to their capacity to provide results equ... 详细信息
来源: 评论
Aspect-Based Sentiment Analysis on Amharic Text for Evaluating Ethio-Telecom Services  2
Aspect-Based Sentiment Analysis on Amharic Text for Evaluati...
收藏 引用
2nd International Conference on Emerging Trends in information Technology and Engineering, ic-ETITE 2024
作者: Tesfa, Tarikwa Belete, Befikadu Abera, Samuel Mohapatra, Sudhir Kumar Das, Tapan Kumar Addis Ababa Science and Technology University Department of Software Engineering Addis Ababa Ethiopia Ethio Telecom Services Addis Ababa Ethiopia Sri Sri University Faculty of Emerging Technologies Cuttack India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
People are increasingly expressing their views and opinions about a company's goods or service on social media these days. For all types of businesses and organizations, sentiment analysis in text can be used to f... 详细信息
来源: 评论
Abstractive Arabic Text Summarization Using Hyperparameter Tuned Denoising Deep Neural Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第11期38卷 153-168页
作者: Ibrahim M.Alwayle Hala J.Alshahrani Saud S.Alotaibi Khaled M.Alalayah Amira Sayed A.Aziz Khadija M.Alaidarous Ibrahim Abdulrab Ahmed Manar Ahmed Hamza Department of Computer Science College of Science and ArtsSharurahNajran UniversitySharurahSaudi Arabia Department of Applied Linguistics College of LanguagesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Systems College of Computing and Information SystemUmm Al-Qura UniversityMakkahSaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Computer Department Applied CollegeNajran UniversityNajran66462Saudi Arabia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
ive Arabic Text Summarization using Hyperparameter Tuned Denoising Deep Neural Network(AATS-HTDDNN)*** presented AATS-HTDDNN technique aims to generate summaries of Arabic *** the presented AATS-HTDDNN technique,the D... 详细信息
来源: 评论
Cyberbullying Detection and Recognition with Type Determination Based on Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5307-5319页
作者: Khalid M.O.Nahar Mohammad Alauthman Saud Yonbawi Ammar Almomani Computer Science Department Yarmouk UniversityIrbidJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan Software Engineering Department University of JeddahJeddahKSA Research and Innovation Department Skyline University CollegeP.O.Box 1797SharjahUAE IT Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan
Social media networks are becoming essential to our daily activities,and many issues are due to this great involvement in our *** is a social media network issue,a global crisis affecting the victims and society as a ... 详细信息
来源: 评论
An Improved Deep Learning Framework Based on Multi-Scale Convolutional Architecture for Road Crack Detection  2nd
An Improved Deep Learning Framework Based on Multi-Scale Con...
收藏 引用
2nd International Conference on Data science and Network Engineering, ICDSNE 2024
作者: Idris, Idris Ya’u Ya’u, Badamasi Imam Ali, Usman Gulzar, Yonis Department of Computer Science School of Science and Technology Federal Polytechnic Bauchi Bauchi743001 Nigeria Department of Mathematical Sciences Faculty of Science Abubakar Tafawa Balewa University Bauchi740272 Nigeria Gombe760253 Nigeria Department of Management Information Systems College of Business Administration King Faisal University Al Ahsa31982 Saudi Arabia
In addition to serving as a means of transportation, a highway connects the local economy. But as the pavement ages, several flaws including cracks, potholes, and deformation gradually show up on the surfaces of the r... 详细信息
来源: 评论