咨询与建议

限定检索结果

文献类型

  • 5,127 篇 会议
  • 4,083 篇 期刊文献
  • 163 册 图书

馆藏范围

  • 9,373 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,494 篇 工学
    • 3,962 篇 计算机科学与技术...
    • 3,210 篇 软件工程
    • 1,087 篇 信息与通信工程
    • 846 篇 控制科学与工程
    • 625 篇 生物工程
    • 566 篇 电气工程
    • 524 篇 生物医学工程(可授...
    • 482 篇 电子科学与技术(可...
    • 405 篇 机械工程
    • 355 篇 光学工程
    • 271 篇 仪器科学与技术
    • 256 篇 化学工程与技术
    • 220 篇 动力工程及工程热...
    • 177 篇 网络空间安全
    • 166 篇 安全科学与工程
  • 3,328 篇 理学
    • 1,489 篇 数学
    • 1,161 篇 物理学
    • 757 篇 生物学
    • 501 篇 统计学(可授理学、...
    • 371 篇 系统科学
    • 291 篇 化学
  • 1,753 篇 管理学
    • 1,082 篇 管理科学与工程(可...
    • 748 篇 图书情报与档案管...
    • 580 篇 工商管理
  • 606 篇 医学
    • 520 篇 临床医学
    • 393 篇 基础医学(可授医学...
    • 242 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 272 篇 法学
    • 222 篇 社会学
  • 203 篇 经济学
    • 199 篇 应用经济学
  • 153 篇 教育学
  • 123 篇 农学
  • 49 篇 文学
  • 34 篇 艺术学
  • 11 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 311 篇 deep learning
  • 250 篇 machine learning
  • 230 篇 computer science
  • 175 篇 artificial intel...
  • 174 篇 feature extracti...
  • 166 篇 computational mo...
  • 153 篇 information syst...
  • 144 篇 accuracy
  • 119 篇 data mining
  • 110 篇 neural networks
  • 108 篇 internet of thin...
  • 104 篇 semantics
  • 98 篇 information tech...
  • 94 篇 security
  • 93 篇 covid-19
  • 91 篇 predictive model...
  • 90 篇 optimization
  • 87 篇 support vector m...
  • 81 篇 training
  • 75 篇 decision making

机构

  • 289 篇 faculty of scien...
  • 289 篇 department for p...
  • 283 篇 department of ph...
  • 281 篇 departamento de ...
  • 274 篇 department of ph...
  • 266 篇 department of ph...
  • 263 篇 department of ph...
  • 263 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 254 篇 institute of phy...
  • 239 篇 fakultät für phy...
  • 229 篇 institute of phy...
  • 228 篇 yerevan physics ...
  • 227 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 204 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 259 篇 h. a. gordon
  • 258 篇 r. ströhmer
  • 255 篇 h. sakamoto
  • 255 篇 m. rijssenbeek
  • 254 篇 s. jin
  • 254 篇 g. gaudio
  • 254 篇 s. mohapatra
  • 253 篇 y. nagasaka
  • 247 篇 s. guindon
  • 242 篇 y. tayalati

语言

  • 8,898 篇 英文
  • 423 篇 其他
  • 36 篇 中文
  • 17 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Systems and Applied Computer Science"
9373 条 记 录,以下是531-540 订阅
排序:
MuSeRAN: Multimodal Sentiment Analysis with Recurrent Attention Networks
MuSeRAN: Multimodal Sentiment Analysis with Recurrent Attent...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Al-Omari, Omaia Omari, Asem Othman, Esam Alrashed, Atheer Ahmed Prince Sultan University College of Computer and Information Sciences Information Systems Department Riyadh Saudi Arabia Higher Colleges of Technology Higher Colleges of Technology Higher Colleges of Technology Higher Colleges of Technology Computer Information Science Al Ain United Arab Emirates Applied Science University Department of Business Administration East Al-Ekir Bahrain
This paper introduces a novel Multimodal Aspect-Based Sentiment Analysis (MABSA) methodology by creating a Multimodal Sentiment Analysis model utilizing Recurrent Attention Networks (MuSeRAN). The proposed framework u... 详细信息
来源: 评论
Vehicle Management System: Fuel, Mileage, Cost, and Maintenance Tracker
Vehicle Management System: Fuel, Mileage, Cost, and Maintena...
收藏 引用
2023 International Conference on Cyber Management and Engineering, CyMaEn 2023
作者: Kamolsin, Chiranun Rungkul, Woramet Limpalasuk, Chananon Pensiri, Fuangfar Ratanavilisagul, Chiabwoot Visutsak, Porawat Chaopraya University Faculty of Science and Technology Nakhon Sawan Thailand King Mongkut's University of Technology North Bangkok Faculty of Applied Science Department of Computer and Information Science Bangkok Thailand Kasetsart University Faculty of Science at Sriracha Chonburi Thailand
According to the supply chain disruptions induced by the COVID-19 pandemic and the situation between NATO and Russia that led to the rising of fuel costs. Rising fuel costs are a massive problem for business and consu... 详细信息
来源: 评论
An integrated strategy of AEF attribute evaluation for reliable thunderstorm detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 234-245页
作者: Xu Yang Hongyan Xing Xinyuan Ji Xin Su Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of AlbertaEdmonton AB T6G 2R3Canada College of Internet of Things Engineering Hohai UniversityChangzhou 213022China Systems Research Institute Polish Academy of Sciences00-901 WarsawPoland Department of Computer Engineering Faculty of Engineering and Natural SciencesIstinye UniversitySariyer/IstanbulTurkey
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which... 详细信息
来源: 评论
Utilizing Machine Learning Algorithms for Effectively Detection IoT DDoS Attacks  1st
Utilizing Machine Learning Algorithms for Effectively Detect...
收藏 引用
1st International Conference on Advances in Computing Research, ACR’23
作者: Mughaid, Ala Alqahtani, Ali AlZu’bi, Shadi Obaidat, Ibrahim Alqura’n, Rabee AlJamal, Mahmoud AL-Marayah, Raid Department of Information Technology Faculty of Prince Al-Hussien Bin Abdullah for IT The Hashemite University Zarqa Jordan Department of Networks and Communication Engineering College of Computer Science and Information Systems Najran University Najran Saudi Arabia Computer Science Department Faculty of Science and Information Technology Al Zaytoonah University of Jordan Amman Jordan
One of the most critical features of the Internet of Things (IoT) is that it allows a massive number of devices to communicate with each other at the same time, for example (cars, smoke alarms, watches, glasses, web c... 详细信息
来源: 评论
Designing a hybrid neural network framework for real-time anomaly detection in cybersecurity applications
收藏 引用
International Journal of information Technology (Singapore) 2025年 1-7页
作者: Jain, Aaditya Ead, Waleed M. Alshahrani, Mohammed Altamimi, Jawaher Suliman Aklan, Fawaz Rihan, Shaza Dawood College of Computing Sciences and Information Technology Teerthanker Mahaveer University Uttar Pradesh Moradabad India Faculty of Computing and Information Al-Baha University Al-Baha Saudi Arabia Faculty of Computers and Artificial Intelligence Beni-Suef University Beni-Suef Egypt Computers Department Applied College Najran University Najran Saudi Arabia Applied College Najran University Najran Saudi Arabia Department of Computer Science Faculty of Applied Science Taiz University Taiz P.O. Box 6803 Taiz Yemen
As cybersecurity is becoming a prominent domain, it is an imperative to provide real-time anomaly detection for early threat detection and to keep networks safe. In this paper, an optimized hybrid neural network-frame... 详细信息
来源: 评论
On Understanding Sports-HAR: Hierarchical, Mobile, Multi-Sensor based Classification of Table-Tennis Strokes  1
On Understanding Sports-HAR: Hierarchical, Mobile, Multi-Sen...
收藏 引用
1st International Conference of Intelligent Methods, systems and Applications, IMSA 2023
作者: Ezzeldin, Mustafa Ghoneim, Amr S. Abdelhamid, Laila Atia, Ayman Helwan University Faculty of Computers AI Software Engineering Cairo Egypt Helwan University Faculty of Computers and AI Computer Science Cairo Egypt Helwan University Faculty of Computers and AI Information Systems Cairo Egypt Helwan Univeristy HCI-LAB Faculty of Computers and AI Computer Science Cairo Egypt Faculty of Computer Science Giza Egypt
Table Tennis is a renowned competitive and recreational sport. An Olympic sport since 1988, table tennis in-cludes several movements, shots (i.e., strokes), and positions. Consequently, many factors can affect the str... 详细信息
来源: 评论
Incremental Learning Framework for Mining Big Data Stream
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2901-2921页
作者: Alaa Eisa Nora E.L-Rashidy Mohammad Dahman Alshehri Hazem M.El-bakry Samir Abdelrazek Information Systems Department Faculty of Computers and InformationMansoura UniversityMansoura35516Egypt Machine Learning and Information Retrieval Department Faculty of Artificial IntelligenceKafrelsheikh UniversityKafr El-SheikhEgypt Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
At this current time,data stream classification plays a key role in big data analytics due to its enormous *** of the existing classification methods used ensemble learning,which is trustworthy but these methods are n... 详细信息
来源: 评论
Comparative Study between KNN and CNN's Techniques for Kidney Stone Detection
Comparative Study between KNN and CNN's Techniques for Kidne...
收藏 引用
2023 International Conference on Smart Computing and Application, ICSCA 2023
作者: Al-Tbenawey, Fahdah M. Alotaibi, Shoayee Salem, Marwa Mir, Shamaila Mir, Zahida Computer Science and Engineering College University of Ha'il Department of Computer Science and Information Hail Saudi Arabia Faculty of Engineering Department of Electrical Communication and Electronics Systems Engineering Cairo Egypt
This paper aims to determine the better technique for kidney stone detection between K-Nearest Neighbor (KNN) and Convolutional Neural Networks (CNNs). As well known, the presence of kidney stones is an important topi... 详细信息
来源: 评论
Statistical Investigation of Scientific Journals Impact Factors in Relation to Benford's Law  6
Statistical Investigation of Scientific Journals Impact Fact...
收藏 引用
6th IEEE Novel Intelligent and Leading Emerging sciences Conference, NILES 2024
作者: Sorour, Marwa A. Marey, Yassmine A. Halim, Islam Tharwat Abdel Kasem, Mohamed Mahran School of Information Technology and Computer Science Nile University Giza Egypt Nile University Giza Egypt Alexandria University Faculty of Engineering Egypt School of Engineering and Applied Science Nile University Giza Egypt
Benford's law (BL) has been used as a tool for the detection of possible data manipulation in datasets. The statistics of the first digit(s) of the observed values are compared to a set of expected values given by... 详细信息
来源: 评论
Beyond Traditional Motion Planning: A Proximal Policy Optimization Reinforcement Learning Approach for Robotics  5th
Beyond Traditional Motion Planning: A Proximal Policy Optimi...
收藏 引用
5th Joint International Conference on AI, Big Data and Blockchain, ABB 2024
作者: Rjoub, Gaith Drawel, Nagat Dssouli, Rachida Bentahar, Jamal Kassaymeh, Sofian Alweshah, Mohammed Faculty of Information Technology Aqaba University of Technology Aqaba Jordan Concordia Institute for Information Systems Engineering Concordia University Montreal Canada Department of Computer Science 6G Research Center Khalifa University Abu Dhabi United Arab Emirates Prince Abdullah Bin Ghazi Faculty of Information and Communication Technology Al-Balqa Applied University Salt Jordan
In today’s technologically-driven era, robotic systems have been integrated into various aspects of our daily lives, handling tasks from household chores to complex industrial applications. With these robotic systems... 详细信息
来源: 评论