咨询与建议

限定检索结果

文献类型

  • 30,099 篇 会议
  • 15,249 篇 期刊文献
  • 424 册 图书

馆藏范围

  • 45,772 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,053 篇 工学
    • 19,677 篇 计算机科学与技术...
    • 15,871 篇 软件工程
    • 6,594 篇 信息与通信工程
    • 4,787 篇 控制科学与工程
    • 3,258 篇 电气工程
    • 3,079 篇 生物工程
    • 2,875 篇 电子科学与技术(可...
    • 2,528 篇 生物医学工程(可授...
    • 2,125 篇 机械工程
    • 1,597 篇 仪器科学与技术
    • 1,560 篇 光学工程
    • 1,439 篇 动力工程及工程热...
    • 1,288 篇 安全科学与工程
    • 1,183 篇 化学工程与技术
    • 1,139 篇 网络空间安全
    • 1,102 篇 交通运输工程
  • 14,867 篇 理学
    • 7,110 篇 数学
    • 4,649 篇 物理学
    • 3,544 篇 生物学
    • 2,302 篇 统计学(可授理学、...
    • 2,011 篇 系统科学
    • 1,307 篇 化学
  • 8,421 篇 管理学
    • 5,250 篇 管理科学与工程(可...
    • 3,604 篇 图书情报与档案管...
    • 2,645 篇 工商管理
  • 2,862 篇 医学
    • 2,427 篇 临床医学
    • 2,137 篇 基础医学(可授医学...
    • 1,276 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,439 篇 法学
    • 1,154 篇 社会学
  • 954 篇 经济学
  • 722 篇 农学
  • 712 篇 教育学
  • 226 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,374 篇 computer science
  • 1,088 篇 deep learning
  • 1,042 篇 accuracy
  • 928 篇 machine learning
  • 888 篇 feature extracti...
  • 844 篇 internet of thin...
  • 795 篇 computational mo...
  • 667 篇 training
  • 564 篇 information tech...
  • 560 篇 artificial intel...
  • 535 篇 support vector m...
  • 524 篇 real-time system...
  • 497 篇 data mining
  • 479 篇 security
  • 444 篇 predictive model...
  • 402 篇 monitoring
  • 379 篇 cloud computing
  • 352 篇 optimization
  • 340 篇 data models
  • 339 篇 databases

机构

  • 297 篇 faculty of scien...
  • 287 篇 department for p...
  • 284 篇 department of ph...
  • 282 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 256 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 192 篇 cavendish labora...
  • 174 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 institute of phy...
  • 168 篇 school of physic...
  • 164 篇 department of ph...
  • 163 篇 kirchhoff-instit...

作者

  • 275 篇 c. alexa
  • 273 篇 j. m. izen
  • 273 篇 c. amelung
  • 271 篇 g. bella
  • 271 篇 j. strandberg
  • 271 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 253 篇 h. a. gordon
  • 253 篇 g. gaudio
  • 251 篇 a. c. könig
  • 247 篇 y. tayalati
  • 243 篇 h. sakamoto
  • 241 篇 s. mohapatra
  • 236 篇 d. guest
  • 214 篇 y. nagasaka

语言

  • 43,894 篇 英文
  • 1,399 篇 其他
  • 452 篇 中文
  • 61 篇 日文
  • 11 篇 法文
  • 8 篇 德文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45772 条 记 录,以下是11-20 订阅
排序:
Hybrid Deep Learning Approach for Automating App Review Classification:Advancing Usability Metrics Classification with an Aspect-Based Sentiment Analysis Framework
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 949-976页
作者: Nahed Alsaleh Reem Alnanih Nahed Alowidi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computer Science and EngineeringUniversity of HailHail81451Saudi Arabia
App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their *** the analysis of these reviews is vital for efficient review *** traditional machine learning(M... 详细信息
来源: 评论
Central Tendency Feature Selection (CTFS): a novel approach for efficient and effective feature selection in intrusion detection systems
收藏 引用
Multimedia Tools and Applications 2025年 1-22页
作者: Bouke, Mohamed Aly Abdullah, Azizol Udzir, Nur Izura Samian, Normalia Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia 43400 Serdang Malaysia
In the digital era, the escalation of data generation and cyber threats has heightened the importance of network security. Machine Learning-based Intrusion Detection systems (IDS) play a crucial role in combating thes... 详细信息
来源: 评论
FL-Jaya scheduler: an optimized Jaya algorithm for effective independent task scheduling in cloud systems
收藏 引用
Computing 2025年 第6期107卷 1-38页
作者: Mashaqbeh, Husam S. Mjlae, Salameh A. Department of Computer Science Faculty of Information Technology Isra University Amman Jordan Department of Information Security and Cyberspace Faculty of Information Technology Isra University Amman Jordan Salt Jordan
Efficient task scheduling in Cloud Computing remains an NP-hard challenge due to combinatorial search spaces and resource heterogeneity, often leading to premature convergence in existing metaheuristics. This paper pr... 详细信息
来源: 评论
Investigating the Impact of Hyper Parameters on Intrusion Detection system Using Deep Learning Based Data Augmentation
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第4期16卷 523-532页
作者: Iftikhar, Umar Ali, Syed Abbas Department of Computer & Information System Engineering NED University of Engineering & Technology Karachi Pakistan
The effects of changing learning rates, data augmentation percentage and numbers of epochs on the performance of Wasserstein Generative Adversarial Networks with Gradient Penalties (WGAN-GP) are evaluated in this stud... 详细信息
来源: 评论
Stylometry-driven framework for Urdu intrinsic plagiarism detection: a comprehensive analysis using machine learning, deep learning, and large language models
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6479-6513页
作者: Manzoor, Muhammad Faraz Farooq, Muhammad Shoaib Abid, Adnan Department of Computer Science University of Management and Technology Lahore Pakistan Department of Data Science Faculty of Computing and Information Technology University of the Punjab Lahore Pakistan
Detecting plagiarism in documents is a well-established task in natural language processing (NLP). Broadly, plagiarism detection is categorized into two types (1) intrinsic: to check the whole document or all the pass... 详细信息
来源: 评论
A fusion of CNN And SIFT For multicultural facial expression recognition
收藏 引用
Multimedia Tools and Applications 2025年 1-19页
作者: Qadir, Inam Iqbal, Muhammad Amjad Ashraf, Samman Akram, Sheeraz Department of Computer Science University of Central Punjab Lahore Pakistan Faculty of Computer Science and Information Technology The Superior University Lahore Pakistan Lahore Pakistan
The most generic and understandable way of communication is by observing facial expressions;Facial Expression Recognition(FER) performance was affected by the differences in ethnicity, culture, and geography. This res... 详细信息
来源: 评论
A new CNN-based watermarking method for color medical images in a fusion domain
收藏 引用
Neural Computing and Applications 2025年 1-19页
作者: Hosny, Khalid M. Abdel-Aziz, Mostafa M. Lashin, Nabil A. Hamza, Hanaa M. Department of Information Technology Faculty of Computers and Informatics Zagazig University Zagazig44519 Egypt Department of Information Technology Faculty of Information Technology and Computer Science Sinai University Arish Campus Al-Arish45518 Egypt
The transmission of medical images via medical agencies raises security concerns, necessitating increased security measures to ensure integrity and security. However, many watermarking algorithms overlook equipoise;th... 详细信息
来源: 评论
Abnormal Data Detection Model Based on Autoencoder and Random Forest Algorithm: Camera Sensor Data in Autonomous Driving systems
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第3期16卷 222-231页
作者: Shengwen, Geng Osman, Mohd Hafeez Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 Malaysia
This project develops an AI-based anomaly detection system. In the field of autonomous driving, abnormal data will directly affect the safety of autonomous driving systems, especially in terms of abnormal camera senso... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Enhanced Federated Learning Framework based on Deep Learning and Neutrosophic Set for Android Malware Classification
收藏 引用
Neutrosophic Sets and systems 2025年 82卷 781-799页
作者: Abdellah, Mohamed Refaat Oudah, Hasan H. Badawy, Ahmed Mohamed Ahmed Mohamed, Abdelfattah Abdelfattah M. Bedier, Shady Ahmed Metwaly, Ahmed A. Eassa, Mohamed Abdelhafeez, Ahmed The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt College of Arts Department of Journalism Ahl Al Bayt University Karbala Iraq Cybersecurity Department Faculty of Computers and Artificial Intelligence Helwan University Egypt Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Department of Computer Science Faculty of Computers and Informatics Zagazig University Zagazig44519 Egypt Applied Science Research Center Applied Science Private University Amman Jordan
Malware detection is one of the critical tasks of cybersecurity, especially considering the growing popularity of mobile devices. The integrity and security of mobile ecosystems rely on the capacity to identify malwar... 详细信息
来源: 评论