咨询与建议

限定检索结果

文献类型

  • 5,107 篇 会议
  • 4,105 篇 期刊文献
  • 162 册 图书

馆藏范围

  • 9,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,474 篇 工学
    • 3,946 篇 计算机科学与技术...
    • 3,190 篇 软件工程
    • 1,083 篇 信息与通信工程
    • 841 篇 控制科学与工程
    • 623 篇 生物工程
    • 564 篇 电气工程
    • 519 篇 生物医学工程(可授...
    • 485 篇 电子科学与技术(可...
    • 403 篇 机械工程
    • 347 篇 光学工程
    • 266 篇 仪器科学与技术
    • 254 篇 化学工程与技术
    • 223 篇 动力工程及工程热...
    • 176 篇 网络空间安全
    • 163 篇 安全科学与工程
  • 3,327 篇 理学
    • 1,492 篇 数学
    • 1,162 篇 物理学
    • 757 篇 生物学
    • 500 篇 统计学(可授理学、...
    • 371 篇 系统科学
    • 287 篇 化学
  • 1,749 篇 管理学
    • 1,078 篇 管理科学与工程(可...
    • 746 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 603 篇 医学
    • 514 篇 临床医学
    • 388 篇 基础医学(可授医学...
    • 236 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 273 篇 法学
    • 224 篇 社会学
  • 205 篇 经济学
    • 201 篇 应用经济学
  • 155 篇 教育学
  • 123 篇 农学
  • 51 篇 文学
  • 34 篇 艺术学
  • 12 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 311 篇 deep learning
  • 247 篇 machine learning
  • 230 篇 computer science
  • 179 篇 feature extracti...
  • 176 篇 artificial intel...
  • 169 篇 computational mo...
  • 153 篇 information syst...
  • 145 篇 accuracy
  • 118 篇 data mining
  • 110 篇 internet of thin...
  • 110 篇 neural networks
  • 106 篇 semantics
  • 98 篇 information tech...
  • 96 篇 covid-19
  • 94 篇 optimization
  • 94 篇 security
  • 90 篇 predictive model...
  • 86 篇 support vector m...
  • 83 篇 training
  • 74 篇 decision making

机构

  • 289 篇 department for p...
  • 288 篇 faculty of scien...
  • 283 篇 department of ph...
  • 280 篇 departamento de ...
  • 274 篇 department of ph...
  • 266 篇 department of ph...
  • 263 篇 department of ph...
  • 263 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 253 篇 institute of phy...
  • 239 篇 fakultät für phy...
  • 231 篇 institute of phy...
  • 228 篇 yerevan physics ...
  • 225 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 211 篇 department of ph...
  • 204 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 260 篇 m. klein
  • 259 篇 h. a. gordon
  • 256 篇 r. ströhmer
  • 254 篇 m. rijssenbeek
  • 253 篇 h. sakamoto
  • 253 篇 s. jin
  • 253 篇 g. gaudio
  • 253 篇 s. mohapatra
  • 252 篇 y. nagasaka
  • 247 篇 s. guindon
  • 242 篇 y. tayalati

语言

  • 9,072 篇 英文
  • 254 篇 其他
  • 34 篇 中文
  • 17 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Systems and Applied Computer Science"
9374 条 记 录,以下是11-20 订阅
排序:
Enhanced MADM Strategy with Heptapartitioned Neutrosophic Distance Metrics
收藏 引用
Neutrosophic Sets and systems 2025年 78卷 74-96页
作者: Eassa, Mohamed Myvizhi, M. Elkholy, Mohamed Abdelhafeez, Ahmed Elbehiery, Hussam Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Mathematics KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Faculty of Computer Science& Engineering Alamein International University Egypt
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent... 详细信息
来源: 评论
Deepfake detection using convolutional vision transformers and convolutional neural networks
收藏 引用
Neural Computing and Applications 2024年 第31期36卷 19759-19775页
作者: Soudy, Ahmed Hatem Sayed, Omnia Tag-Elser, Hala Ragab, Rewaa Mohsen, Sohaila Mostafa, Tarek Abohany, Amr A. Slim, Salwa O. Department of Computer Science Faculty of Computers and Artificial Intelligence Helwan University Cairo Egypt Department of Information Systems Faculty of Computers and Information Kafrelsheikh University Kafrelsheikh Egypt
Deepfake technology has rapidly advanced in recent years, creating highly realistic fake videos that can be difficult to distinguish from real ones. The rise of social media platforms and online forums has exacerbated... 详细信息
来源: 评论
A decentralized and privacy-preserving framework for electronic health records using blockchain
收藏 引用
Alexandria Engineering Journal 2025年 126卷 196-203页
作者: Alahmari, Saad Alshardan, Amal Al-Wesabi, Fahd N. Sorour, Shaymaa Alghushairy, Omar Alsini, Raed Khadidos, Alaa O. Duhayyim, Mesfer Al Department of Computer Science Applied College Northern Border University Arar Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Computer Science Applied College at Mahayil King Khalid University Saudi Arabia Department of Management Information Systems College of Business Administration King Faisal University Al-Ahsa31982 Saudi Arabia Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj16273 Saudi Arabia
As healthcare services have become increasingly digitized, Electronic Health Records (EHRs) have become widely adopted, providing seamless data exchange among providers. Conventional EHRs, however, are extremely vulne... 详细信息
来源: 评论
Gamifying Python: Enhancing Learning Outcomes and Motivation through a Game-Based Approach  8
Gamifying Python: Enhancing Learning Outcomes and Motivation...
收藏 引用
8th International Conference on information Technology, InCIT 2024
作者: Sirikong, Nicha Visutsak, Porawat Kmutnb Faculty of Applied Science Department of Computer and Information Science Bangkok Thailand
This work aimed to enhance Python programming education by developing a learning game that utilizes gamification techniques. The study focused on Mathayom Suksa 1 (7th grade in the U.S. education system) students who ... 详细信息
来源: 评论
Modified Feature Selection with BPSO to Apply PSO for Solving Handwritten Digits  12
Modified Feature Selection with BPSO to Apply PSO for Solvin...
收藏 引用
12th International Electrical Engineering Congress, iEECON 2024
作者: Ratanavilisagul, Chiabwoot Faculty Of Applied Science Department Of Computer And Information Sciences Bangkok Thailand
The task of Handwriting Digits Recognition represents a classification challenge involving the interpretation of handwritten digits sourced from diverse mediums such as paper, photos, touch screens, and other devices.... 详细信息
来源: 评论
Dynamic Resource Utilization Prediction Model for Cloud Datacenter
收藏 引用
IAENG International Journal of applied Mathematics 2025年 第2期55卷 307-331页
作者: Bliedy, Doaa Khafagy, Mohamed H. Badry, Rasha M. Department of Information Systems Faculty of Computers and Artificial Intelligence Fayoum University Egypt Department of Computer Science Faculty of Computers and Artificial Intelligence Fayoum University Egypt
Much research has been done on predicting resource utilization in the cloud to avoid over- and under-provisioning resources. Most existing systems focus on estimating the utilization of one or two resources at most, i... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2299-2316页
作者: Bassam Mohammad Elzaghmouri Yosef Hasan Fayez Jbara Said Elaiwat Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Farah H.Zawaideh Mouiad Fadeil Alawneh Asef Al-Khateeb Marwan Abu-Zanona Department of Computer Science Faculty of Computer Science and Information TechnologyJerash UniversityJerash26150Jordan Computer Engineering Department College of Engineering&Information Technology Buraydah CollegesBuraydah51418Saudi Arabia Faculty of Architecture and Design Al-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityDiriyahRiyadh13713Saudi Arabia Applied College King Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Business Intelligence and Data Analysis Faculty of Financial Sciences and BusinessIrbid National UniversityIrbid21110Jordan Faculty of Information Technology Ajloun National UniversityAjlun26810Jordan Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense *** paper presents an innovative h... 详细信息
来源: 评论
Accurate Phase Detection for ZigBee Using Artificial Neural Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2505-2518页
作者: Ali Alqahtani Abdulaziz A.Alsulami Saeed Alahmari Mesfer Alrizq Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(... 详细信息
来源: 评论