咨询与建议

限定检索结果

文献类型

  • 5,127 篇 会议
  • 4,083 篇 期刊文献
  • 163 册 图书

馆藏范围

  • 9,373 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,494 篇 工学
    • 3,962 篇 计算机科学与技术...
    • 3,210 篇 软件工程
    • 1,087 篇 信息与通信工程
    • 846 篇 控制科学与工程
    • 625 篇 生物工程
    • 566 篇 电气工程
    • 524 篇 生物医学工程(可授...
    • 482 篇 电子科学与技术(可...
    • 405 篇 机械工程
    • 355 篇 光学工程
    • 271 篇 仪器科学与技术
    • 256 篇 化学工程与技术
    • 220 篇 动力工程及工程热...
    • 177 篇 网络空间安全
    • 166 篇 安全科学与工程
  • 3,328 篇 理学
    • 1,489 篇 数学
    • 1,161 篇 物理学
    • 757 篇 生物学
    • 501 篇 统计学(可授理学、...
    • 371 篇 系统科学
    • 291 篇 化学
  • 1,753 篇 管理学
    • 1,082 篇 管理科学与工程(可...
    • 748 篇 图书情报与档案管...
    • 580 篇 工商管理
  • 606 篇 医学
    • 520 篇 临床医学
    • 393 篇 基础医学(可授医学...
    • 242 篇 公共卫生与预防医...
    • 210 篇 药学(可授医学、理...
  • 272 篇 法学
    • 222 篇 社会学
  • 203 篇 经济学
    • 199 篇 应用经济学
  • 153 篇 教育学
  • 123 篇 农学
  • 49 篇 文学
  • 34 篇 艺术学
  • 11 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 311 篇 deep learning
  • 250 篇 machine learning
  • 230 篇 computer science
  • 175 篇 artificial intel...
  • 174 篇 feature extracti...
  • 166 篇 computational mo...
  • 153 篇 information syst...
  • 144 篇 accuracy
  • 119 篇 data mining
  • 110 篇 neural networks
  • 108 篇 internet of thin...
  • 104 篇 semantics
  • 98 篇 information tech...
  • 94 篇 security
  • 93 篇 covid-19
  • 91 篇 predictive model...
  • 90 篇 optimization
  • 87 篇 support vector m...
  • 81 篇 training
  • 75 篇 decision making

机构

  • 289 篇 faculty of scien...
  • 289 篇 department for p...
  • 283 篇 department of ph...
  • 281 篇 departamento de ...
  • 274 篇 department of ph...
  • 266 篇 department of ph...
  • 263 篇 department of ph...
  • 263 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 254 篇 institute of phy...
  • 239 篇 fakultät für phy...
  • 229 篇 institute of phy...
  • 228 篇 yerevan physics ...
  • 227 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 204 篇 department of ph...
  • 197 篇 department of ph...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 259 篇 h. a. gordon
  • 258 篇 r. ströhmer
  • 255 篇 h. sakamoto
  • 255 篇 m. rijssenbeek
  • 254 篇 s. jin
  • 254 篇 g. gaudio
  • 254 篇 s. mohapatra
  • 253 篇 y. nagasaka
  • 247 篇 s. guindon
  • 242 篇 y. tayalati

语言

  • 8,898 篇 英文
  • 423 篇 其他
  • 36 篇 中文
  • 17 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Systems and Applied Computer Science"
9373 条 记 录,以下是691-700 订阅
排序:
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Mahdi, Ali Jafer Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq AI-Zahraa University for Women Department of Scientific Affairs Bangi43600 Malaysia College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Innovative grid technology leverages information and Communication Technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a 'novel three-tier hierarchical framework for smart home... 详细信息
来源: 评论
Eliciting Requirements from Stakeholders’ Responses Using Natural Language Processing
收藏 引用
computer Modeling in Engineering & sciences 2021年 第4期127卷 99-116页
作者: Mohammed Lafi Bilal Hawashin Shadi AlZu’bi Department of Software Engineering Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Information Systems Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan
Most software systems have different stakeholders with a variety of *** process of collecting requirements from a large number of stakeholders is vital but *** propose an efficient,automatic approach to collecting req... 详细信息
来源: 评论
Metaheuristic Based Data Gathering Scheme for Clustered UAVs in 6G Communication Network
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 5311-5325页
作者: Ahmed S.Almasoud Siwar Ben Haj Hassine Nadhem NEMRI Fahd N.Al-Wesabi Manar Ahmed Hamza Anwer Mustafa Hilal Abdelwahed Motwakel Mesfer Al Duhayyim Department of Information Systems College of Computer and Information SciencesPrince Sultan UniversitySaudi Arabia Department of Computer Science College of Science&Arts at MahayilKing Khalid UniversitySaudi Arabia Faculty of Computer and IT Sana’a UniversitySana’aYemen Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Natural and Applied Sciences College of Community-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
The sixth-generation(6G)wireless communication networks are anticipated in integrating aerial,terrestrial,and maritime communication into a robust system to accomplish trustworthy,quick,and low latency *** enables to ... 详细信息
来源: 评论
Towards Differentiating Between Failures and Domain Shifts in Industrial Data Streams
Towards Differentiating Between Failures and Domain Shifts i...
收藏 引用
2024 Workshop on Embracing Human-Aware AI in Industry 5.0, HAII5.0 2024
作者: Wojak-Strzelecka, Natalia Bobek, Szymon Nalepa, Grzegorz J. Stefanowski, Jerzy Jagiellonian Human-Centered AI Lab Mark Kac Center for Complex Systems Research Institute of Applied Computer Science Faculty of Physics Astronomy and Applied Computer Science Jagiellonian University ul. prof. Stanislawa Lojasiewicza 11 Krakow30-348 Poland Institute of Computing Science Poznań University of Technology Poznań60-965 Poland
Anomaly and failure detection methods are crucial in identifying deviations from normal system operational conditions, which allows for actions to be taken in advance, usually preventing more serious damages. Long-las... 详细信息
来源: 评论
Modeling Hot Rolling Process Forces Using Bio-Inspired Metaheuristic Search Algorithm  2
Modeling Hot Rolling Process Forces Using Bio-Inspired Metah...
收藏 引用
2nd International Conference of Intelligent Methods, systems and Applications, IMSA 2024
作者: Sheta, Alaa Braik, Malik Oznergiz, Ertan Elashmawi, Walaa H. Rausch, Peter Othman, Emad S. Southern Connecticut State University Department of Computer Science New HavenCT United States Al-Balqa Applied University Computer Science Department Salt Jordan Istanbul Technical University Mechanical Engineering Faculty Istanbul Turkey Misr International University Dept of Computer Science Cairo Egypt George Simon Ohm Univ. of Applied Sciences Computer Science Department Nuremberg Germany AL-Shorouk Academy Management Information System Dept. Cairo Egypt
This research introduces the application of an innovative bio-inspired metaheuristic technique, termed the Crow Search Algorithm (CSA), to model a crucial industrial process - hot rolling manufacturing. Inspired by th... 详细信息
来源: 评论
Cybersecurity Revolution via Large Language Models and Explainable AI  17
Cybersecurity Revolution via Large Language Models and Expla...
收藏 引用
17th International Conference on Security of information and Networks, SIN 2024
作者: Ghazal, Taher M. Janjua, Jamshaid Iqbal Abushiba, Walid Ahmad, Munir Ihsan, Anuam Al-Dmour, Nidal A. College of Arts & Science Applied Science University Manama Bahrain Center for Cyber Security Faculty of Information Science and Technology Selangor Malaysia Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul02841 Korea Republic of College of Engineering Mutah University Department of Computer Engineering Jordan
Integrating Groundbreaking advancements in AI, like language models, interpretable AI, and machine learning, opens up a world of exciting new possibilities. The Evolving face of cybersecurity and Modern cyber threats ... 详细信息
来源: 评论
Blockchain and Edge Computing Integration Boosts Scalability and Reduces Latency  2
Blockchain and Edge Computing Integration Boosts Scalability...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Mahfuri, Mahmoud Alnawaiseh, Ahmad Enad Asad, Umber Yousif, Muhammad Aslam, Shoukat Chabani, Zakariya Fiaz, Muhammad International University for Science and Technolgy Faculty of Engineering - Computer and Information Technolgy Department Syria Orange-Jordan Telecom Company Jordan NCBA&E Lahore School of Computer Computer Pakistan Canadian University Dubai Faculty of Management Dubai United Arab Emirates NCBA&E Lahore School of Computer Science Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan
Nowadays, the integration of blockchain and edge computing has become important in computer science due to the significant advantages it can bring to a range of real-world applications. By combining the strengths of b... 详细信息
来源: 评论
3D Visualization of Femoral Shaft Fractures  4
3D Visualization of Femoral Shaft Fractures
收藏 引用
4th International Conference on Artificial Intelligence and Data sciences, AiDAS 2023
作者: Mi, Lam Xin Hoon, Saw Seow Wang, Khor Siak Hui, Saw Seow Utar Faculty of Information and Communication Technology Dept. of Information Systems Perak Malaysia Utar Dr. WLT-CRCD Utar Sg. Long Faculty of Science Dept. of Allied Health Sciences Perak Malaysia Utar Faculty of Information and Communication Technology Department of Computer Science Perak Malaysia
The absence of an independent learning platform to address femoral shaft fractures poses challenges in understanding and classifying these fractures. The existing anatomy platforms, such as 3D interactive anatomical a... 详细信息
来源: 评论
A Comparative Study of Recent 2D Human Pose Estimation Methods  6
A Comparative Study of Recent 2D Human Pose Estimation Metho...
收藏 引用
6th International Conference on Computing and Informatics, ICCI 2024
作者: Elshami, Nada E. Salah, Ahmad Mohsen, Heba Department of Computer Science Faculty of Computers and Information Technology Future University in Egypt New Cairo Egypt College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Oman College of Computers and Informatics Zagazig University Zagazig Egypt
Human Pose Estimation is a computer vision technique utilized in various fields such as healthcare, security, and sports to detect the pose of single or multi-person utilizing various machine learning and deep learnin... 详细信息
来源: 评论
Bug Prioritization Using Average One Dependence Estimator
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3517-3533页
作者: Kashif Saleem Rashid Naseem Khalil Khan Siraj Muhammad Ikram Syed Jaehyuk Choi Department of IT and Computer Science Institute of Applied Sciences and TechnologyPakAustriaFochhshuleHaripurPakistan Faculty of Computer Sciences and Information Technology Superior UniversityLahore54660Pakistan Department of Computer Science Shaheed Benazir Bhutto UniversitySheringalUpper DirKhyber PakhtunkhwaPakitan School of Computing Gachon University1342Seongnam-daeroSujeong-guSeongnam-si13120Korea
Automation software need to be continuously updated by addressing software bugs contained in their ***,bugs have different levels of importance;hence,it is essential to prioritize bug reports based on their sever-ity ... 详细信息
来源: 评论