咨询与建议

限定检索结果

文献类型

  • 16,301 篇 会议
  • 9,164 篇 期刊文献
  • 331 册 图书

馆藏范围

  • 25,796 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,797 篇 工学
    • 10,934 篇 计算机科学与技术...
    • 8,958 篇 软件工程
    • 3,444 篇 信息与通信工程
    • 2,175 篇 控制科学与工程
    • 1,754 篇 生物工程
    • 1,559 篇 电气工程
    • 1,407 篇 电子科学与技术(可...
    • 1,385 篇 生物医学工程(可授...
    • 1,116 篇 机械工程
    • 898 篇 光学工程
    • 796 篇 仪器科学与技术
    • 701 篇 化学工程与技术
    • 623 篇 动力工程及工程热...
    • 565 篇 网络空间安全
    • 539 篇 安全科学与工程
  • 8,541 篇 理学
    • 4,120 篇 数学
    • 2,816 篇 物理学
    • 1,978 篇 生物学
    • 1,342 篇 统计学(可授理学、...
    • 964 篇 系统科学
    • 741 篇 化学
  • 4,796 篇 管理学
    • 2,777 篇 管理科学与工程(可...
    • 2,212 篇 图书情报与档案管...
    • 1,415 篇 工商管理
  • 1,465 篇 医学
    • 1,249 篇 临床医学
    • 1,064 篇 基础医学(可授医学...
    • 646 篇 药学(可授医学、理...
    • 588 篇 公共卫生与预防医...
  • 759 篇 法学
    • 626 篇 社会学
  • 495 篇 经济学
    • 494 篇 应用经济学
  • 436 篇 教育学
  • 351 篇 农学
  • 144 篇 文学
  • 58 篇 军事学
  • 57 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 665 篇 deep learning
  • 519 篇 accuracy
  • 507 篇 computer science
  • 480 篇 feature extracti...
  • 468 篇 information tech...
  • 418 篇 machine learning
  • 352 篇 internet of thin...
  • 345 篇 training
  • 343 篇 computational mo...
  • 341 篇 support vector m...
  • 310 篇 artificial intel...
  • 295 篇 data mining
  • 203 篇 image segmentati...
  • 200 篇 optimization
  • 199 篇 computer archite...
  • 192 篇 neural networks
  • 190 篇 covid-19
  • 187 篇 reliability
  • 184 篇 predictive model...
  • 184 篇 data models

机构

  • 289 篇 faculty of scien...
  • 287 篇 department for p...
  • 282 篇 department of ph...
  • 281 篇 departamento de ...
  • 274 篇 department of ph...
  • 268 篇 department of ph...
  • 265 篇 department of ph...
  • 258 篇 faculté des scie...
  • 243 篇 kirchhoff-instit...
  • 225 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 217 篇 physics division...
  • 213 篇 department of ph...
  • 212 篇 fakultät für phy...
  • 197 篇 department of ph...
  • 195 篇 institute of phy...
  • 186 篇 department of ph...
  • 181 篇 institut für ast...
  • 174 篇 centre de calcul...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 262 篇 r. ströhmer
  • 262 篇 m. rijssenbeek
  • 262 篇 s. jin
  • 262 篇 g. gaudio
  • 260 篇 s. mohapatra
  • 259 篇 h. a. gordon
  • 259 篇 h. sakamoto
  • 258 篇 y. nagasaka
  • 249 篇 d. guest
  • 242 篇 y. tayalati

语言

  • 24,487 篇 英文
  • 1,136 篇 其他
  • 165 篇 中文
  • 33 篇 日文
  • 6 篇 斯洛文尼亚文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 俄文
检索条件"机构=Faculty of Information and Computer Technology"
25796 条 记 录,以下是111-120 订阅
排序:
Fusion Strategy for Improving Medical Image Segmentation
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3627-3646页
作者: Fahad Alraddady E.A.Zanaty Aida HAbu bakr Walaa M.Abd-Elhafiez Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Information System Department Faculty of Computers and InformationSohag UniversitySohagEgypt Mathematical and Computer Science Department Faculty of ScienceAswan UniversityAswanEgypt College of Computer Science&Information Technology Jazan UniversityJazanKingdom of Saudi Arabia Computer Science Department Faculty of Computers and Artificial IntelligenceSohag UniversitySohagEgypt
In this paper,we combine decision fusion methods with four metaheuristic algorithms(Particle Swarm Optimization(PSO)algorithm,Cuckoo search algorithm,modification of Cuckoo Search(CS McCulloch)algorithm and Genetic al... 详细信息
来源: 评论
A survey on graph-based methods for Software Vulnerability Detection  1
A survey on graph-based methods for Software Vulnerability D...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Abu-Huliqah, Ebtsam N.A. Al Gaphari, Ghaleb H. Ghurab, Mossa Department of Computer Science Faculty of Computer and Information Technology Sana’a University Sana’a Yemen
In computer security, finding software vulnerabilities is essential since they provide serious security hazards to both individuals and companies. Known vulnerability variations or recently undiscovered vulnerabilitie... 详细信息
来源: 评论
A Robust Tuned Random Forest Classifier Using Randomized Grid Search to Predict Coronary Artery Diseases
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4633-4648页
作者: Sameh Abd El-Ghany A.A.Abd El-Aziz Department of Information Systems College of Computer and Information SciencesJouf UniversityKSA Department of Information Systems Faculty of Computers and InformationMansoura UniversityEgypt Department of Information Systems and Technology Faculty of Graduate Studies for Statistical ResearchCairo UniversityEgypt
Coronary artery disease(CAD)is one of themost authentic cardiovascular afflictions because it is an uncommonly overwhelming heart *** breakdown of coronary cardiovascular disease is one of the principal sources of dea... 详细信息
来源: 评论
Challenges of Extended Reality technology in Higher Education: A Review
International Journal of Emerging Technologies in Learning
收藏 引用
International Journal of Emerging Technologies in Learning 2023年 第14期18卷 39-50页
作者: Obeidallah, Randa Al Ahmad, Ayat Qutishat, Duha Department of Computer Information System Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Computer Science and Applications Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan
Extended reality is proposed as a means to deliver qualitative material to students in higher education institutions. The usage of this technology has increased due to Covid-19 lock down. This paper aims to categorize... 详细信息
来源: 评论
Fast anomalous traffic detection system for secure vehicular communications
收藏 引用
Intelligent and Converged Networks 2024年 第4期5卷 356-369页
作者: Qasem Abu Al-Haija Abdulaziz A.Alsulami Department of Cybersecurity Faculty of Computer&Information TechnologyJordan University of Science and TechnologyIrbid 22110Jordan Department of Information Systems King Abdulaziz UniversityJeddah 21589Saudi Arabia
In modern automotive systems,introducing multiple connectivity protocols has transformed in-vehicle network communication,resulting in the widely recognized Controller Area Network(CAN)*** its ubiquitous use,the CAN p... 详细信息
来源: 评论
Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4759-4776页
作者: Yawar Abbas Aisha Ahmed Alarfaj Ebtisam Abdullah Alabdulqader Asaad Algarni Ahmad Jalal Hui Liu Faculty of Computing and AI Air UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Department of Computer Sciences Faculty of Computing and Information TechnologyNorthern Border UniversityRafha91911Saudi Arabia Department of Computer Science and Engineering College of InformaticsKorea UniversitySeoul02841Republic of Korea Cognitive Systems Lab University of BremenBremen28359Germany
Human Activity Recognition(HAR)in drone-captured videos has become popular because of the interest in various fields such as video surveillance,sports analysis,and human-robot ***,recognizing actions from such videos ... 详细信息
来源: 评论
A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第5期139卷 2117-2137页
作者: Ahmed Barnawi Krishan Kumar Neeraj Kumar Bander Alzahrani Amal Almansour Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyDeemed to be UniversityPatialaIndia
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w... 详细信息
来源: 评论
Vehicle Detection in Challenging Scenes Using CenterNet Based Approach
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3647-3661页
作者: Ayesha Muhammad Javed Iqbal Iftikhar Ahmad Madini OAlassafi Ahmed SAlfakeeh Ahmed Alhomoud Department of Computer Science University of Engineering and Technology Taxila47050Pakistan Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589Saudi Arabia Faculty of Computing and Information Technology Northern Border UniversityRafhaSaudi Arabia
Contemporarily numerous analysts labored in the field of Vehicle detection which improves Intelligent Transport System(ITS)and reduces road *** major obstacles in automatic detection of tiny vehicles are due to occlus... 详细信息
来源: 评论
An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-Ⅱ
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5641-5661页
作者: Afia Zafar Muhammad Aamir Nazri Mohd Nawi Ali Arshad Saman Riaz Abdulrahman Alruban Ashit Kumar Dutta Badr Almutairi Sultan Almotairi Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn MalaysiaMalaysia School of Electronics Computing and MathematicsUniversity of DerbyUK Department of Computer Science National University of TechnologyIslamabadPakistan Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl Majmaah11952Saudi Arabia Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Kingdom of Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia Department of Information Systems Faculty of Computer and Information SciencesIslamic University of MadinahMadinah42351Saudi Arabia
In computer vision,convolutional neural networks have a wide range of *** representmost of today’s data,so it’s important to know how to handle these large amounts of data *** neural networks have been shown to solv... 详细信息
来源: 评论
Securing Hybrid Architecture of Cloudlet Computing in 5G Networks Enabling IoT and Mobile Wireless Devices
收藏 引用
Recent Advances in computer Science and Communications 2023年 第2期16卷 14-29页
作者: Sobh, Tarek S. Khalil, Awad H. The Higher Institute of Computer and Information Technology El Shorouk Academy Cairo Egypt Faculty of Computers & Information Technology Future University in Egypt Cairo Egypt
Aims: This research aims to secure and support mobile devices and IoTs enabled in WLAN and 5G Multi-Access Edge Computing (MEC) infrastructures. Background: Currently, wireless network access gains increasing potentia... 详细信息
来源: 评论