咨询与建议

限定检索结果

文献类型

  • 5,107 篇 会议
  • 4,073 篇 期刊文献
  • 162 册 图书

馆藏范围

  • 9,342 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,458 篇 工学
    • 3,934 篇 计算机科学与技术...
    • 3,184 篇 软件工程
    • 1,081 篇 信息与通信工程
    • 838 篇 控制科学与工程
    • 623 篇 生物工程
    • 561 篇 电气工程
    • 519 篇 生物医学工程(可授...
    • 483 篇 电子科学与技术(可...
    • 401 篇 机械工程
    • 348 篇 光学工程
    • 267 篇 仪器科学与技术
    • 254 篇 化学工程与技术
    • 221 篇 动力工程及工程热...
    • 175 篇 网络空间安全
    • 163 篇 安全科学与工程
  • 3,320 篇 理学
    • 1,490 篇 数学
    • 1,160 篇 物理学
    • 754 篇 生物学
    • 500 篇 统计学(可授理学、...
    • 370 篇 系统科学
    • 286 篇 化学
  • 1,741 篇 管理学
    • 1,073 篇 管理科学与工程(可...
    • 744 篇 图书情报与档案管...
    • 575 篇 工商管理
  • 597 篇 医学
    • 510 篇 临床医学
    • 385 篇 基础医学(可授医学...
    • 233 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 269 篇 法学
    • 221 篇 社会学
  • 203 篇 经济学
    • 199 篇 应用经济学
  • 150 篇 教育学
  • 123 篇 农学
  • 50 篇 文学
  • 34 篇 艺术学
  • 12 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 308 篇 deep learning
  • 250 篇 machine learning
  • 230 篇 computer science
  • 177 篇 feature extracti...
  • 176 篇 artificial intel...
  • 169 篇 computational mo...
  • 153 篇 information syst...
  • 144 篇 accuracy
  • 118 篇 data mining
  • 110 篇 neural networks
  • 109 篇 internet of thin...
  • 105 篇 semantics
  • 98 篇 information tech...
  • 94 篇 covid-19
  • 94 篇 security
  • 92 篇 optimization
  • 90 篇 predictive model...
  • 86 篇 support vector m...
  • 83 篇 training
  • 75 篇 decision making

机构

  • 289 篇 department for p...
  • 288 篇 faculty of scien...
  • 283 篇 department of ph...
  • 280 篇 departamento de ...
  • 274 篇 department of ph...
  • 266 篇 department of ph...
  • 263 篇 department of ph...
  • 263 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 254 篇 institute of phy...
  • 239 篇 fakultät für phy...
  • 231 篇 institute of phy...
  • 228 篇 yerevan physics ...
  • 226 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 211 篇 department of ph...
  • 204 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 260 篇 m. klein
  • 259 篇 h. a. gordon
  • 256 篇 r. ströhmer
  • 254 篇 m. rijssenbeek
  • 253 篇 h. sakamoto
  • 253 篇 s. jin
  • 253 篇 g. gaudio
  • 253 篇 s. mohapatra
  • 252 篇 y. nagasaka
  • 247 篇 s. guindon
  • 242 篇 y. tayalati

语言

  • 9,045 篇 英文
  • 250 篇 其他
  • 34 篇 中文
  • 17 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Systems and Applied Computer Science"
9342 条 记 录,以下是281-290 订阅
排序:
Deep Learning and SVM-Based Approach for Indian Licence Plate Character Recognition
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 881-895页
作者: Nitin Sharma Mohd Anul Haq Pawan Kumar Dahiya B.R.Marwah Reema Lalit Nitin Mittal Ismail Keshta Department of Electronics&Communication Engineering Chandigarh UniversityMohali140413India Department of Computer Science College of Computer and Information SciencesMajmaah University11952Al-MajmaahSaudi Arabia Department of Electronics&Communication Engineering DCRUST Murthal131039India Department of Transportation Engineering IITKanpur208016Uttar PradeshIndia Department of Computer Science Applications PIETSmalkha132102India Skill Faculty of Science and Technology Shri Vishwakarma Skill UniversityPalwal121102India Computer Science and Information Systems Department College of Applied SciencesAlMaarefa UniversityRiyadhSaudi Arabia
Every developing country relies on transportation,and there has been an exponential expansion in the development of various sorts of vehicles with various configurations,which is a major component strengthening the au... 详细信息
来源: 评论
Possibility of Profit Gain in Futures Cryptocurrency Trading Plans Using a Patterned Dataset Model under Moon Conditions  10
Possibility of Profit Gain in Futures Cryptocurrency Trading...
收藏 引用
10th IEEE information Technology International Seminar, ITIS 2024
作者: Parlika, Rizky Isnanto, R. Rizal Rahmat, Basuki Universitas Diponegoro Doctoral Programe of Information Systems Semarang Indonesia University of Pembangunan Nasional "Veteran"Jawa Timur Faculty of Computer Science Department of Information System Surabaya Indonesia
Among the various components of cryptocurrency trading are futures (2-way trading based on short or long contracts) and spot schemes (which operate in the same direction as buying and selling crypto assets). The futur... 详细信息
来源: 评论
Enhancing handwritten text feature extraction through key point detection and graph representation
收藏 引用
Soft Computing 2024年 第21期28卷 12977-12990页
作者: Rahman, Atta Ur Alahmadi, Tahani Jaser Alsenani, Yousef S. Ali, Sania Faculty of Computer Science and Engineering Ghulam Ishaq Khan Institute of Engineering Sciences and Technologies P.O. Box 23460 Topi Pakistan P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Computer Science University of Science and Technology Bannu P.O. Box 28100 Khyber Pakhtunkhwa Bannu Pakistan
Handwriting typically consists of a wide range of writing forms with substantial differences in the placements and size of those writing shapes. The arrangement, organization, and spatial association of individual let... 详细信息
来源: 评论
Comprehensive Rubrics for Evaluating computer-Related Capstones  2
Comprehensive Rubrics for Evaluating Computer-Related Capsto...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Atoum, Ibrahim Innab, Nisreen Alghayadh, Faisal Alahmari, Mona Alrowili, Reem Alshehri, Afnan College Of Applied Sciences AlMaarefa University Computer Science And Information Systems Department Riyadh Saudi Arabia Arab East Colleges For Graduate Studies Arab East Colleges Computer Science Department Riyadh Saudi Arabia
The capstone projects for computing primary students require the embodiment of the skills and ideas learned by developing specific solutions to some existing challenges. This project must follow an organized and elabo... 详细信息
来源: 评论
Modified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection System
收藏 引用
Multimedia Tools and Applications 2024年 第21期83卷 59887-59913页
作者: Abualigah, Laith Ahmed, Saba Hussein Almomani, Mohammad H. Zitar, Raed Abu Alsoud, Anas Ratib Abuhaija, Belal Hanandeh, Essam Said Jia, Heming Elminaam, Diaa Salama Abd Elaziz, Mohamed Abd Computer Science Department Al Al-Bayt University Mafraq25113 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan MEU Research Unit Middle East University Amman11831 Jordan Applied Science Research Center Applied Science Private University Amman11931 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang11800 Malaysia School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia Department of Mathematics Facility of Science The Hashemite University P.O box 330127 Zarqa13133 Jordan Sorbonne Center of Artificial Intelligence Sorbonne University-Abu Dhabi Abu Dhabi United Arab Emirates Department of Computer Science Wenzhou-Kean University Wenzhou China Department of Computer Information System Zarqa University P.O. Box 13132 Zarqa Jordan School of Information Engineering Sanming University Sanming365004 China Information Systems Department Faculty of Computers and Artificial Intelligence Benha University Benha12311 Egypt Computer Science Department Faculty of Computer Science Misr International University Cairo12585 Egypt Faculty of Computer Science & Engineering Galala University Suze435611 Egypt Ajman University Ajman346 United Arab Emirates Department of Mathematics Faculty of Science Zagazig University Zagazig44519 Egypt
With the ever-expanding ubiquity of the Internet, wireless networks have permeated every facet of modern life, escalating concerns surrounding network security for users. Consequently, the demand for a robust Intrusio... 详细信息
来源: 评论
Towards Eco-Sustainability and Green Analytics Model to Measure the Performance of Big Data systems  9
Towards Eco-Sustainability and Green Analytics Model to Meas...
收藏 引用
9th International Conference on information Management, ICIM 2023
作者: Jusoh, Yusmadi Yah Abdullah, Rusli Nor, Rozi Nor Haizan Yahaya, Jamaiah Hj. Muhammad, Shireen Arunachalam, Aishwharya Raani Universiti Putra Malaysia Faculty of Computer Science and Information Technology Dept. of Software Engineering and Information Systems Serdang Malaysia Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Faculty of Communication Selangor Malaysia
Many BDS is doomed to failure because of the missing knowledge on measuring the performance of BDS. The failure to identify the performance measurement and correct will make the problems worsen. This will complicate t... 详细信息
来源: 评论
Deep learning on medical image analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2025年 第1期10卷 1-35页
作者: Jiaji Wang Shuihua Wang Yudong Zhang School of Computing and Mathematical Sciences University of LeicesterLeicesterUK Department of Biological Sciences Xi'an Jiaotong-Liverpool UniversitySuzhouJiangsuChina Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia School of Computer Science and Engineering Southeast UniversityNanjingJiangsuChina
Medical image analysis plays an irreplaceable role in diagnosing,treating,and monitoring various *** neural networks(CNNs)have become popular as they can extract intricate features and patterns from extensive *** pape... 详细信息
来源: 评论
A Cost-Effective Approach for NDN-Based Internet of Medical Things Deployment
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 233-249页
作者: Syed Sajid Ullah Saddam Hussain Abdu Gumaei Mohsin SAlhilal Bader Fahad Alkhamees Mueen Uddin Mabrook Al-Rakhami Department of Information Technology Hazara University MansehraKPK21120Pakistan Research Chair of Pervasive and Mobile Computing Department of Information SystemsKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science Faculty of Applied SciencesTaiz UniversityTaiz6803Yemen Department of Information Systems College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Digital Science Faculty of ScienceUniversiti Brunei DarussalamJln Tungku linkGadongBruneiBE1410Darussalam
Nowadays,healthcare has become an important area for the Internet of Things(IoT)to automate healthcare facilities to share and use patient data anytime and anywhere with Internet *** present,the host-based Internet pa... 详细信息
来源: 评论
No More Binge Learning - Using Gamification Elements to Support Distributed Practice in Engineering Education
No More Binge Learning - Using Gamification Elements to Supp...
收藏 引用
IEEE Education Engineering (EDUCON)
作者: Isabel John Anne Hess Tobias Fertig Faculty of Computer Science and Business Information Systems Technical University of Applied Sciences Würzburg-Schweinfurt
An effective technique to support sustainable learning is distributed practice, a method shown to enhance long-term knowledge retention. As part of our research agenda, we aim to investigate suitable design strategies... 详细信息
来源: 评论
Security model to identify block withholding attack in blockchain
Security model to identify block withholding attack in block...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Keshta, Ismail Reegu, Faheem Ahmad Ahmad, Adeel Saxena, Archana Chandan, Radha Raman Mahalakshmi, V. Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia Department of Computer Applications Invertis University UP Bareilly India Department of Computer Science and Engineering Shambhunath Institute of Engineering and Technology College Jhalwa Prayagraj India Department of Computer Science College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia
Block interception attack, also known as block withholding attack, is an attack method in the blockchain. The attacker penetrates the target mining pool for passive mining to destroy the target mining pool. This paper... 详细信息
来源: 评论