咨询与建议

限定检索结果

文献类型

  • 16,301 篇 会议
  • 9,164 篇 期刊文献
  • 331 册 图书

馆藏范围

  • 25,796 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,797 篇 工学
    • 10,934 篇 计算机科学与技术...
    • 8,958 篇 软件工程
    • 3,444 篇 信息与通信工程
    • 2,175 篇 控制科学与工程
    • 1,754 篇 生物工程
    • 1,559 篇 电气工程
    • 1,407 篇 电子科学与技术(可...
    • 1,385 篇 生物医学工程(可授...
    • 1,116 篇 机械工程
    • 898 篇 光学工程
    • 796 篇 仪器科学与技术
    • 701 篇 化学工程与技术
    • 623 篇 动力工程及工程热...
    • 565 篇 网络空间安全
    • 539 篇 安全科学与工程
  • 8,541 篇 理学
    • 4,120 篇 数学
    • 2,816 篇 物理学
    • 1,978 篇 生物学
    • 1,342 篇 统计学(可授理学、...
    • 964 篇 系统科学
    • 741 篇 化学
  • 4,796 篇 管理学
    • 2,777 篇 管理科学与工程(可...
    • 2,212 篇 图书情报与档案管...
    • 1,415 篇 工商管理
  • 1,465 篇 医学
    • 1,249 篇 临床医学
    • 1,064 篇 基础医学(可授医学...
    • 646 篇 药学(可授医学、理...
    • 588 篇 公共卫生与预防医...
  • 759 篇 法学
    • 626 篇 社会学
  • 495 篇 经济学
    • 494 篇 应用经济学
  • 436 篇 教育学
  • 351 篇 农学
  • 144 篇 文学
  • 58 篇 军事学
  • 57 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 665 篇 deep learning
  • 519 篇 accuracy
  • 507 篇 computer science
  • 480 篇 feature extracti...
  • 468 篇 information tech...
  • 418 篇 machine learning
  • 352 篇 internet of thin...
  • 345 篇 training
  • 343 篇 computational mo...
  • 341 篇 support vector m...
  • 310 篇 artificial intel...
  • 295 篇 data mining
  • 203 篇 image segmentati...
  • 200 篇 optimization
  • 199 篇 computer archite...
  • 192 篇 neural networks
  • 190 篇 covid-19
  • 187 篇 reliability
  • 184 篇 predictive model...
  • 184 篇 data models

机构

  • 289 篇 faculty of scien...
  • 287 篇 department for p...
  • 282 篇 department of ph...
  • 281 篇 departamento de ...
  • 274 篇 department of ph...
  • 268 篇 department of ph...
  • 265 篇 department of ph...
  • 258 篇 faculté des scie...
  • 243 篇 kirchhoff-instit...
  • 225 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 217 篇 physics division...
  • 213 篇 department of ph...
  • 212 篇 fakultät für phy...
  • 197 篇 department of ph...
  • 195 篇 institute of phy...
  • 186 篇 department of ph...
  • 181 篇 institut für ast...
  • 174 篇 centre de calcul...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 262 篇 r. ströhmer
  • 262 篇 m. rijssenbeek
  • 262 篇 s. jin
  • 262 篇 g. gaudio
  • 260 篇 s. mohapatra
  • 259 篇 h. a. gordon
  • 259 篇 h. sakamoto
  • 258 篇 y. nagasaka
  • 249 篇 d. guest
  • 242 篇 y. tayalati

语言

  • 24,487 篇 英文
  • 1,136 篇 其他
  • 165 篇 中文
  • 33 篇 日文
  • 6 篇 斯洛文尼亚文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 俄文
检索条件"机构=Faculty of Information and Computer Technology"
25796 条 记 录,以下是31-40 订阅
排序:
Research Progress in Solar Flare Prediction Methods
收藏 引用
Research in Astronomy and Astrophysics 2025年 第3期25卷 280-309页
作者: Ke Han Zhen Liu Xian-Yi Zhao Yi-Fei Li De-Quan Zheng Jie Wan School of Computer and Information Engineering Harbin University of Commerce Faculty of Computing Harbin Institute of Technology School of Energy Science and Engineering Harbin Institute of Technology
Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar... 详细信息
来源: 评论
Transfer function adaptation for effective feature selection with the side-blotched lizard algorithm
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Eisa, Mohamed Abdel-lah, Marwa Farouk, Fifi Abdel-aal, Amr System and Information Technology Department Faculty of Management Technology and Information System Port Said University Port Said Egypt Department of Computer Science Faculty of Computer and Informatics Zagazig University Zagazig Egypt
Feature selection is a crucial preprocessing step in data mining and machine learning, enhancing model performance and computational efficiency. This paper investigates the effectiveness of the Side-Blotched Lizard Op... 详细信息
来源: 评论
Gender and age-evolution detection based on audio forensic analysis using light deep neural network
收藏 引用
International Journal of Speech technology 2023年 第4期26卷 1091-1098页
作者: AL-Shakarchy, Noor D. Rageb, Huda Safoq, Mais Saad Department of Computer Science Faculty of Computer Science and Information Technology Kerbala University Kerbala Iraq
Forensic audio analysis is a foundation stone of many crime investigations. In forensic evidence;the audio file of the human voice is analyzed to extract much information in addition to the content of the speech, such... 详细信息
来源: 评论
Knowledge Discovery of the Internet of Things (IoT) Using Large Language Model
收藏 引用
International Journal of Advanced computer Science and Applications 2025年 第4期16卷 993-998页
作者: Alsulami, Bassma Saleh Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Internet of Things (IoT) technology quickly transformed traditional management and engagement techniques in several sectors. This work explores the trends and applications of the Internet of Things in industries, incl... 详细信息
来源: 评论
Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1723-1734页
作者: Awny Sayed Maha Mahrous Enas Elgeldawi Computer Science Department Faculty of ScienceMinia UniversityMinia61519Egypt Faculty of Computing and Information Technology Information Technology DepartmentKing Abdulaziz UniversityJeddah21589Saudi Arabia Computer Science Department Faculty of Computers and InformationMinia UniversityMinia61519Egypt
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern.A robust data security system should protect the information assets of any organization against cybercr... 详细信息
来源: 评论
VeriFace:Defending against Adversarial Attacks in Face Verification Systems
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3151-3166页
作者: Awny Sayed Sohair Kinlany Alaa Zaki Ahmed Mahfouz Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Computer Science Department Faculty of ScienceMinia UniversityAl MinyaEgypt Faculty of Computer Studies Arab Open UniversityMuscatOman
Face verification systems are critical in a wide range of applications,such as security systems and biometric ***,these systems are vulnerable to adversarial attacks,which can significantly compromise their accuracy a... 详细信息
来源: 评论
Text Line Segmentation on Myanmar Handwritten Documents Using Directional Gaussian Filter  21
Text Line Segmentation on Myanmar Handwritten Documents Usin...
收藏 引用
21st IEEE International Conference on computer Applications, ICCA 2024
作者: Wai, Nilar Phyo War, Nu University of Computer Studies Faculty of Computer Science Mandalay Myanmar Myanmar Institute of Information Technology Faculty of Information Technology Mandalay Myanmar
Text line segmentation is a crucial step in document processing. Although text line segmentation techniques for handwritten documents in other languages (English, Chinese, Arabic) have developed, there is still room f... 详细信息
来源: 评论
A new four-tier technique for efficient multiple images encryption
收藏 引用
Multimedia Tools and Applications 2024年 1-19页
作者: Hosny, Khalid M. Kamal, Sara T. Department of Information Technology Faculty of Computers and Information Zagazig University Zagazig Egypt Department of Computer Sciences Faculty of Computers and Information Assiut University Assiut Egypt
People transmit millions of digital images daily over various networks, where securing these images is a big challenge. Image encryption is a successful approach widely used in securing digital images while transmitti... 详细信息
来源: 评论
Modern Standard Arabic speech disorders corpus for digital speech processing applications
收藏 引用
International Journal of Speech technology 2024年 第1期27卷 157-170页
作者: Alqudah, Assal A. M. Alshraideh, Mohammad A. M. Abushariah, Mohammad A. M. Sharieh, Ahmad A. S. Department of Computer Science King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan
Digital speech processing applications including automatic speech recognition (ASR), speaker recognition, speech translation, and others, essentially require large volumes of speech data for training and testing purpo... 详细信息
来源: 评论
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Bouke, Mohamed Aly El Atigh, Hayate Abdullah, Azizol Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 Malaysia Departement of Computer Engineering Faculty of Computer Engineering Bandirma Onyedi Eylul University Balikesir10200 Turkey
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io... 详细信息
来源: 评论