咨询与建议

限定检索结果

文献类型

  • 1,498 篇 期刊文献
  • 1,270 篇 会议
  • 60 册 图书

馆藏范围

  • 2,828 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,649 篇 工学
    • 1,166 篇 计算机科学与技术...
    • 931 篇 软件工程
    • 353 篇 信息与通信工程
    • 327 篇 控制科学与工程
    • 220 篇 电气工程
    • 192 篇 电子科学与技术(可...
    • 187 篇 生物工程
    • 158 篇 机械工程
    • 157 篇 生物医学工程(可授...
    • 114 篇 光学工程
    • 92 篇 仪器科学与技术
    • 79 篇 动力工程及工程热...
    • 77 篇 网络空间安全
    • 67 篇 化学工程与技术
    • 64 篇 交通运输工程
    • 55 篇 材料科学与工程(可...
  • 1,024 篇 理学
    • 445 篇 物理学
    • 384 篇 数学
    • 231 篇 生物学
    • 115 篇 统计学(可授理学、...
    • 99 篇 系统科学
    • 78 篇 化学
  • 512 篇 管理学
    • 347 篇 管理科学与工程(可...
    • 181 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 216 篇 医学
    • 174 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 78 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 70 篇 法学
    • 58 篇 社会学
  • 52 篇 经济学
  • 51 篇 农学
  • 37 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 116 篇 deep learning
  • 85 篇 machine learning
  • 66 篇 artificial intel...
  • 47 篇 proton-proton in...
  • 47 篇 information tech...
  • 47 篇 feature extracti...
  • 43 篇 internet of thin...
  • 40 篇 optimization
  • 40 篇 accuracy
  • 37 篇 computational mo...
  • 35 篇 computer science
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 35 篇 training
  • 33 篇 testing
  • 31 篇 predictive model...
  • 30 篇 convolutional ne...
  • 29 篇 covid-19
  • 29 篇 collisions (nucl...
  • 29 篇 nuclear counters

机构

  • 166 篇 faculty of scien...
  • 166 篇 departamento de ...
  • 165 篇 department for p...
  • 165 篇 department of ph...
  • 164 篇 department of ph...
  • 161 篇 faculté des scie...
  • 161 篇 yerevan physics ...
  • 158 篇 kirchhoff-instit...
  • 157 篇 department of ph...
  • 157 篇 department of ph...
  • 156 篇 department of ph...
  • 154 篇 institute of phy...
  • 152 篇 institute of phy...
  • 150 篇 fakultät für phy...
  • 150 篇 physikalisches i...
  • 147 篇 national scienti...
  • 147 篇 dsm/irfu cea sac...
  • 147 篇 instituto de fís...
  • 146 篇 physics departme...
  • 143 篇 institut für ast...

作者

  • 162 篇 c. alexa
  • 162 篇 j. m. izen
  • 162 篇 k. bos
  • 162 篇 g. bella
  • 162 篇 j. strandberg
  • 162 篇 d. calvet
  • 162 篇 c. amelung
  • 162 篇 h. a. gordon
  • 162 篇 g. spigo
  • 162 篇 e. hines
  • 162 篇 a. c. könig
  • 161 篇 f. siegert
  • 160 篇 m. klein
  • 159 篇 r. ströhmer
  • 158 篇 h. sakamoto
  • 158 篇 s. nektarijevic
  • 158 篇 m. rijssenbeek
  • 158 篇 f. marroquim
  • 158 篇 s. jin
  • 158 篇 g. gaudio

语言

  • 2,681 篇 英文
  • 132 篇 其他
  • 9 篇 日文
  • 9 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Information Technology and Systems Section of Computer Engineering"
2828 条 记 录,以下是61-70 订阅
排序:
A Lightweight Deep Learning-Based Model for Tomato Leaf Disease Classification
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3969-3992页
作者: Naeem Ullah Javed Ali Khan Sultan Almakdi Mohammed S.Alshehri Mimonah Al Qathrady Eman Abdullah Aldakheel Doaa Sami Khafaga Department of Software Engineering University of Engineering and TechnologyTaxila4400Pakistan Department of Computer Science Faculty of PhysicsEngineeringand Computer ScienceUniversity of HertfordshireHatfieldAL109ABUK Department of Computer Science College of Computer Science and Information SystemNajran UniversityNajran55461Saudi Arabia Departments of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable *** Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf ***,current DL me... 详细信息
来源: 评论
An integrated strategy of AEF attribute evaluation for reliable thunderstorm detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 234-245页
作者: Xu Yang Hongyan Xing Xinyuan Ji Xin Su Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of AlbertaEdmonton AB T6G 2R3Canada College of Internet of Things Engineering Hohai UniversityChangzhou 213022China Systems Research Institute Polish Academy of Sciences00-901 WarsawPoland Department of Computer Engineering Faculty of Engineering and Natural SciencesIstinye UniversitySariyer/IstanbulTurkey
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which... 详细信息
来源: 评论
Wind Power Prediction Based on Machine Learning and Deep Learning Models
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 715-732页
作者: Zahraa Tarek Mahmoud Y.Shams Ahmed M.Elshewey El-Sayed M.El-kenawy Abdelhameed Ibrahim Abdelaziz A.Abdelhamid Mohamed A.El-dosuky Faculty of Computers and Information Computer Science DepartmentMansoura UniversityMansoura35561Egypt Faculty of Artificial Intelligence Kafrelsheikh UniversityKafrelsheikh33511Egypt Faculty of Computers and Information Computer Science DepartmentSuez UniversitySuezEgypt Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Arab East CollegesRiyadh13544Saudi Arabia
Wind power is one of the sustainable ways to generate renewable *** recent years,some countries have set renewables to meet future energy needs,with the primary goal of reducing emissions and promoting sustainable gro... 详细信息
来源: 评论
A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 379-397页
作者: Hameed, Mohamed Abdel Hassaballah, M. Abdelazim, Riem Sahu, Aditya Kumar Department of Computer Science Faculty of Computers and Information Luxor University Luxor85951 Egypt Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University AlKharj16278 Saudi Arabia Department of Computer Science Faculty of Computers and Information South Valley University Qena Egypt Department of Information Systems College of Information Technology Misr University for Science and Technology Giza Egypt Amrita School of Computing Amrita Vishwa Vidyapeetham Andhra Pradesh Amaravati522503 India
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv... 详细信息
来源: 评论
Distance Matrix and Markov Chain Based Sensor Localization in WSN
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 4051-4068页
作者: Omaima Bamasaq Daniyal Alghazzawi Surbhi Bhatia Pankaj Dadheech Farrukh Arslan Sudhakar Sengan Syed Hamid Hassan Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Information Systems College of Computer Science and Information TechnologyKing Faisal UniversitySaudi Arabia Department of Computer Science and Engineering Swami Keshvanand Institute of TechnologyManagement&GramothanJaipurRajasthanIndia University of Engineering and Technology LahorePakistan Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveliTamilnaduIndia
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN ... 详细信息
来源: 评论
Dynamic Evolutionary Game-based Modeling,Analysis and Performance Enhancement of Blockchain Channels
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第1期10卷 188-202页
作者: PeiYun Zhang MengChu Zhou ChenXi Li Abdullah Abusorrah IEEE the School of Computer Science Nanjing University of Information Science&TechnologyNanjing 210044China the Helen and John C.Hartmann Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA the School of Computer and Information Anhui Normal UniversityWuhu 241003China the Department of Electrical and Computer Engineering Faculty of Engineeringand Center of Research Excellence in Renewable Energy and Power SystemsKing Abdulaziz UniversityJeddah 21481Saudi Arabia
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi... 详细信息
来源: 评论
TCIP: Transformed Colour Intensity Profiles analysis for fault detection in power line insulators
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 4503-4534页
作者: Tomaszewski, Michal Gasz, Rafal Kasana, Singara Singh Osuchowski, Jakub Singh, Simranjit Zator, Slawomir Department of Computer Science Faculty of Electrical Engineering Automatic Control and Informatics Opole University of Technology Prószkowska 76 Opole45-758 Poland Department of Computer Science and Information Technology Central University of Haryana Haryana Mahendergarh123031 India Department of Information Technology Dr B. R. Ambedkar National Institute of Technology Punjab Jalandhar India Department of Safety Engineering and Technical Systems Faculty of Production Engineering and Logistics Opole University of Technology Prószkowska 76 Opole45-758 Poland
In response to the escalating demand for electricity, the aging process and inherent failures in power lines have become unavoidable challenges in their operational integrity. This research addresses the imperative ne... 详细信息
来源: 评论
Optimizing Clustering Approaches in Cloud Environments
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2023年 第19期17卷 70-94页
作者: Al-Ghuwairi, Abdel-Rahman Al-Fraihat, Dimah Sharrab, Yousef Kreishan, Yazeed Alsarhan, Ayoub Idhaim, Hasan Qahmash, Ayman Department of Software Engineering Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman Jordan Department of Data Science and Artificial Intelligence Faculty of Information Technology Isra University Amman Jordan Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Information Systems Computer Science College King Khalid University Abha Saudi Arabia
This study focuses on the challenge of developing abstract models to differentiate various cloud resources. It explores the advancements in cloud products that offer specialized services to meet specific external need... 详细信息
来源: 评论
A novel U-net model for brain tumor segmentation from MRI images
收藏 引用
Alexandria engineering Journal 2025年 126卷 220-230页
作者: Obayya, Marwa Alshuhail, Asma Mahmood, Khalid Alanazi, Meshari H. Alqahtani, Mohammed Aljehane, Nojood O. Almansour, Hamad Al-Hagery, Mohammed Abdullah Department of Biomedical Engineering College of Engineering Princess Nourah bint Abdulrahman University PO Box 84428 Riyadh11671 Saudi Arabia Department of Information Systems College of Computer Sciences & Information Technology King Faisal university Saudi Arabia Department of Information Systems Applied College at Mahayil King Khalid University Saudi Arabia Department of Computer Science College of Sciences Northern Border University Arar Saudi Arabia Department of Information System and Cyber Security College of Computing and Information Technology University of Bisha Bisha61922 Saudi Arabia Department of Computer Science Faculty of Computers and Information Technology University of Tabuk Tabuk Saudi Arabia Applied Collage Najran University Najran Saudi Arabia Department of Computer Science College of Computer Qassim University Saudi Arabia
Segmentation of brain tumors aids in diagnosing the disease early, planning treatment, and monitoring its progression in medical image analysis. Automation is necessary to eliminate the time and variability associated... 详细信息
来源: 评论
Predicting software vulnerability based on software metrics: a deep learning approach
收藏 引用
Iran Journal of computer Science 2024年 第4期7卷 801-812页
作者: Agbenyegah, Francis Kwadzo Asante, Micheal Chen, Jinfu Akpaku, Ernest Department of Computer Science Kwame Nkrumah University of Science and Technology Kumasi Ghana School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Department of Information Technology Faculty of Computing and Information Systems Ghana Communication Technology University Accra Ghana
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit... 详细信息
来源: 评论