咨询与建议

限定检索结果

文献类型

  • 5,104 篇 会议
  • 4,076 篇 期刊文献

馆藏范围

  • 9,180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,452 篇 工学
    • 3,937 篇 计算机科学与技术...
    • 3,189 篇 软件工程
    • 1,082 篇 信息与通信工程
    • 839 篇 控制科学与工程
    • 623 篇 生物工程
    • 563 篇 电气工程
    • 519 篇 生物医学工程(可授...
    • 485 篇 电子科学与技术(可...
    • 402 篇 机械工程
    • 347 篇 光学工程
    • 266 篇 仪器科学与技术
    • 254 篇 化学工程与技术
    • 220 篇 动力工程及工程热...
    • 176 篇 网络空间安全
    • 163 篇 安全科学与工程
  • 3,322 篇 理学
    • 1,490 篇 数学
    • 1,162 篇 物理学
    • 755 篇 生物学
    • 500 篇 统计学(可授理学、...
    • 370 篇 系统科学
    • 287 篇 化学
  • 1,744 篇 管理学
    • 1,073 篇 管理科学与工程(可...
    • 746 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 601 篇 医学
    • 512 篇 临床医学
    • 387 篇 基础医学(可授医学...
    • 236 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 272 篇 法学
    • 223 篇 社会学
  • 205 篇 经济学
    • 201 篇 应用经济学
  • 153 篇 教育学
  • 123 篇 农学
  • 51 篇 文学
  • 34 篇 艺术学
  • 12 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 307 篇 deep learning
  • 241 篇 machine learning
  • 230 篇 computer science
  • 176 篇 feature extracti...
  • 167 篇 computational mo...
  • 153 篇 information syst...
  • 146 篇 accuracy
  • 118 篇 data mining
  • 110 篇 neural networks
  • 108 篇 internet of thin...
  • 107 篇 semantics
  • 98 篇 information tech...
  • 96 篇 covid-19
  • 96 篇 security
  • 96 篇 artificial intel...
  • 90 篇 optimization
  • 90 篇 predictive model...
  • 86 篇 support vector m...
  • 86 篇 training
  • 74 篇 decision making

机构

  • 291 篇 department for p...
  • 290 篇 faculty of scien...
  • 285 篇 department of ph...
  • 282 篇 departamento de ...
  • 276 篇 department of ph...
  • 265 篇 kirchhoff-instit...
  • 264 篇 department of ph...
  • 263 篇 department of ph...
  • 259 篇 faculté des scie...
  • 256 篇 institute of phy...
  • 237 篇 fakultät für phy...
  • 234 篇 institute of phy...
  • 230 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 209 篇 department of ph...
  • 202 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 257 篇 r. ströhmer
  • 255 篇 m. rijssenbeek
  • 254 篇 h. sakamoto
  • 254 篇 s. jin
  • 254 篇 g. gaudio
  • 254 篇 s. mohapatra
  • 253 篇 y. nagasaka
  • 248 篇 s. guindon
  • 243 篇 y. tayalati

语言

  • 8,878 篇 英文
  • 254 篇 其他
  • 34 篇 中文
  • 17 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Systems and Applied Computer Science"
9180 条 记 录,以下是11-20 订阅
排序:
Deepfake detection using convolutional vision transformers and convolutional neural networks
收藏 引用
Neural Computing and Applications 2024年 第31期36卷 19759-19775页
作者: Soudy, Ahmed Hatem Sayed, Omnia Tag-Elser, Hala Ragab, Rewaa Mohsen, Sohaila Mostafa, Tarek Abohany, Amr A. Slim, Salwa O. Department of Computer Science Faculty of Computers and Artificial Intelligence Helwan University Cairo Egypt Department of Information Systems Faculty of Computers and Information Kafrelsheikh University Kafrelsheikh Egypt
Deepfake technology has rapidly advanced in recent years, creating highly realistic fake videos that can be difficult to distinguish from real ones. The rise of social media platforms and online forums has exacerbated... 详细信息
来源: 评论
A decentralized and privacy-preserving framework for electronic health records using blockchain
收藏 引用
Alexandria Engineering Journal 2025年 126卷 196-203页
作者: Alahmari, Saad Alshardan, Amal Al-Wesabi, Fahd N. Sorour, Shaymaa Alghushairy, Omar Alsini, Raed Khadidos, Alaa O. Duhayyim, Mesfer Al Department of Computer Science Applied College Northern Border University Arar Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Computer Science Applied College at Mahayil King Khalid University Saudi Arabia Department of Management Information Systems College of Business Administration King Faisal University Al-Ahsa31982 Saudi Arabia Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj16273 Saudi Arabia
As healthcare services have become increasingly digitized, Electronic Health Records (EHRs) have become widely adopted, providing seamless data exchange among providers. Conventional EHRs, however, are extremely vulne... 详细信息
来源: 评论
Gamifying Python: Enhancing Learning Outcomes and Motivation through a Game-Based Approach  8
Gamifying Python: Enhancing Learning Outcomes and Motivation...
收藏 引用
8th International Conference on information Technology, InCIT 2024
作者: Sirikong, Nicha Visutsak, Porawat Kmutnb Faculty of Applied Science Department of Computer and Information Science Bangkok Thailand
This work aimed to enhance Python programming education by developing a learning game that utilizes gamification techniques. The study focused on Mathayom Suksa 1 (7th grade in the U.S. education system) students who ... 详细信息
来源: 评论
Modified Feature Selection with BPSO to Apply PSO for Solving Handwritten Digits  12
Modified Feature Selection with BPSO to Apply PSO for Solvin...
收藏 引用
12th International Electrical Engineering Congress, iEECON 2024
作者: Ratanavilisagul, Chiabwoot Faculty Of Applied Science Department Of Computer And Information Sciences Bangkok Thailand
The task of Handwriting Digits Recognition represents a classification challenge involving the interpretation of handwritten digits sourced from diverse mediums such as paper, photos, touch screens, and other devices.... 详细信息
来源: 评论
Dynamic Resource Utilization Prediction Model for Cloud Datacenter
收藏 引用
IAENG International Journal of applied Mathematics 2025年 第2期55卷 307-331页
作者: Bliedy, Doaa Khafagy, Mohamed H. Badry, Rasha M. Department of Information Systems Faculty of Computers and Artificial Intelligence Fayoum University Egypt Department of Computer Science Faculty of Computers and Artificial Intelligence Fayoum University Egypt
Much research has been done on predicting resource utilization in the cloud to avoid over- and under-provisioning resources. Most existing systems focus on estimating the utilization of one or two resources at most, i... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2299-2316页
作者: Bassam Mohammad Elzaghmouri Yosef Hasan Fayez Jbara Said Elaiwat Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Farah H.Zawaideh Mouiad Fadeil Alawneh Asef Al-Khateeb Marwan Abu-Zanona Department of Computer Science Faculty of Computer Science and Information TechnologyJerash UniversityJerash26150Jordan Computer Engineering Department College of Engineering&Information Technology Buraydah CollegesBuraydah51418Saudi Arabia Faculty of Architecture and Design Al-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityDiriyahRiyadh13713Saudi Arabia Applied College King Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Business Intelligence and Data Analysis Faculty of Financial Sciences and BusinessIrbid National UniversityIrbid21110Jordan Faculty of Information Technology Ajloun National UniversityAjlun26810Jordan Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense *** paper presents an innovative h... 详细信息
来源: 评论
Enhanced Federated Learning Framework based on Deep Learning and Neutrosophic Set for Android Malware Classification
收藏 引用
Neutrosophic Sets and systems 2025年 82卷 781-799页
作者: Abdellah, Mohamed Refaat Oudah, Hasan H. Badawy, Ahmed Mohamed Ahmed Mohamed, Abdelfattah Abdelfattah M. Bedier, Shady Ahmed Metwaly, Ahmed A. Eassa, Mohamed Abdelhafeez, Ahmed The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt College of Arts Department of Journalism Ahl Al Bayt University Karbala Iraq Cybersecurity Department Faculty of Computers and Artificial Intelligence Helwan University Egypt Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Department of Computer Science Faculty of Computers and Informatics Zagazig University Zagazig44519 Egypt Applied Science Research Center Applied Science Private University Amman Jordan
Malware detection is one of the critical tasks of cybersecurity, especially considering the growing popularity of mobile devices. The integrity and security of mobile ecosystems rely on the capacity to identify malwar... 详细信息
来源: 评论
Accurate Phase Detection for ZigBee Using Artificial Neural Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2505-2518页
作者: Ali Alqahtani Abdulaziz A.Alsulami Saeed Alahmari Mesfer Alrizq Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(... 详细信息
来源: 评论