咨询与建议

限定检索结果

文献类型

  • 30,090 篇 会议
  • 14,989 篇 期刊文献
  • 424 册 图书

馆藏范围

  • 45,503 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 26,820 篇 工学
    • 19,519 篇 计算机科学与技术...
    • 15,793 篇 软件工程
    • 6,503 篇 信息与通信工程
    • 4,733 篇 控制科学与工程
    • 3,145 篇 电气工程
    • 3,070 篇 生物工程
    • 2,829 篇 电子科学与技术(可...
    • 2,519 篇 生物医学工程(可授...
    • 2,096 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,543 篇 光学工程
    • 1,426 篇 动力工程及工程热...
    • 1,276 篇 安全科学与工程
    • 1,170 篇 化学工程与技术
    • 1,110 篇 网络空间安全
    • 1,087 篇 交通运输工程
  • 14,740 篇 理学
    • 7,062 篇 数学
    • 4,604 篇 物理学
    • 3,518 篇 生物学
    • 2,288 篇 统计学(可授理学、...
    • 2,003 篇 系统科学
    • 1,294 篇 化学
  • 8,378 篇 管理学
    • 5,227 篇 管理科学与工程(可...
    • 3,580 篇 图书情报与档案管...
    • 2,639 篇 工商管理
  • 2,827 篇 医学
    • 2,411 篇 临床医学
    • 2,116 篇 基础医学(可授医学...
    • 1,260 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,435 篇 法学
    • 1,152 篇 社会学
  • 951 篇 经济学
  • 718 篇 农学
  • 708 篇 教育学
  • 225 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,373 篇 computer science
  • 1,060 篇 deep learning
  • 1,036 篇 accuracy
  • 900 篇 machine learning
  • 882 篇 feature extracti...
  • 840 篇 internet of thin...
  • 790 篇 computational mo...
  • 666 篇 training
  • 564 篇 information tech...
  • 548 篇 artificial intel...
  • 537 篇 support vector m...
  • 524 篇 real-time system...
  • 497 篇 data mining
  • 476 篇 security
  • 438 篇 predictive model...
  • 400 篇 monitoring
  • 381 篇 cloud computing
  • 349 篇 optimization
  • 339 篇 databases
  • 339 篇 data models

机构

  • 297 篇 faculty of scien...
  • 288 篇 department for p...
  • 284 篇 department of ph...
  • 283 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 256 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 192 篇 cavendish labora...
  • 175 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 institute of phy...
  • 168 篇 school of physic...
  • 165 篇 department of ph...
  • 164 篇 kirchhoff-instit...

作者

  • 275 篇 c. alexa
  • 273 篇 j. m. izen
  • 273 篇 c. amelung
  • 271 篇 g. bella
  • 271 篇 j. strandberg
  • 271 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 253 篇 h. a. gordon
  • 253 篇 g. gaudio
  • 251 篇 a. c. könig
  • 247 篇 y. tayalati
  • 243 篇 h. sakamoto
  • 243 篇 s. mohapatra
  • 236 篇 d. guest
  • 213 篇 y. nagasaka

语言

  • 43,683 篇 英文
  • 1,346 篇 其他
  • 449 篇 中文
  • 61 篇 日文
  • 8 篇 德文
  • 8 篇 法文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45503 条 记 录,以下是221-230 订阅
排序:
TL-IDS: A Transfer Learning Technique for Botnet Detection in IoT  6
TL-IDS: A Transfer Learning Technique for Botnet Detection i...
收藏 引用
6th International Conference on Computing and Informatics, ICCI 2024
作者: Abdelhamid, Salma Hegazy, Islam Aref, Mostafa Roushdy, Mohamed Computer Science Department Faculty of Computers and Information Technology Future University in Egypt Cairo Egypt Computer Science Department Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt
With the exponential rise of Internet of Things (IoT) devices in our modern-day lifestyle, the potential danger of botnet intrusions has become inevitable. These botnet attacks cause extensive damage to both individua... 详细信息
来源: 评论
Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2139-2159页
作者: Zaed Mahdi Nada Abdalhussien Naba Mahmood Rana Zaki Information Technology Center University of TechnologyBaghdad00964Iraq Continuous Education Center University of TechnologyBaghdad00964Iraq Computer Science Department University of TechnologyBaghdad00964Iraq
The primary concern of modern technology is cyber attacks targeting the Internet of *** it is one of the most widely used networks today and vulnerable to ***-time threats pose with modern cyber attacks that pose a gr... 详细信息
来源: 评论
Text Augmentation-Based Model for Emotion Recognition Using Transformers
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3523-3547页
作者: Fida Mohammad Mukhtaj Khan Safdar Nawaz Khan Marwat Naveed Jan Neelam Gohar Muhammad Bilal Amal Al-Rasheed Department of Computer Science The University of HaripurHaripur22620Pakistan Department of Computer Systems Engineering Faculty of Electrical and Computer EngineeringUniversity of Engineering and Technology PeshawarPeshawar25120Pakistan Department of Electronics Engineering Technology University of TechnologyNowshera24100Pakistan Department of Computer Science Shaheed Benazir BhuttoWomen UniversityPeshawar25000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Emotion Recognition in Conversations(ERC)is fundamental in creating emotionally ***-BasedNetwork(GBN)models have gained popularity in detecting conversational contexts for ERC ***,their limited ability to collect and ... 详细信息
来源: 评论
A Parallel Hybrid Testing Technique for Tri-Programming Model-Based Software systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4501-4530页
作者: Huda Basloom Mohamed Dahab Abdullah Saad AL-Ghamdi Fathy Eassa Ahmed Mohammed Alghamdi Seif Haridi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia KTH Royal Institute of Technology StockholmSweden
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ... 详细信息
来源: 评论
Improved Hybrid Deep Collaborative Filtering Approach for True Recommendations
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5301-5317页
作者: Muhammad Ibrahim Imran Sarwar Bajwa Nadeem Sarwar Haroon Abdul Waheed Muhammad Zulkifl Hasan Muhammad Zunnurain Hussain Department of Computer Science The Islamia University of BahawalpurBahawalpurPakistan Department of Computer Science Bahria University Lahore CampusLahorePakistan Software Engineering Department Faculty of ITUniversity of Central PunjabLahorePakistan Faculty of Computer Science and Information Technology Universiti Putra MalaysiaSelangorMalaysia
Recommendation services become an essential and hot research topic for researchers *** data such asReviews play an important role in the recommendation of the *** was achieved by deep learning approaches for capturing... 详细信息
来源: 评论
Improving Route-Finding Performance of Dijkstra Algorithm and Maintaining Path Visual Cue Using Douglas-Peucker Algorithm  23
Improving Route-Finding Performance of Dijkstra Algorithm an...
收藏 引用
8th International Conference on Sustainable information Engineering and technology, SIET 2023
作者: Pinandito, Aryo Kharisma, Agi Putra Akbar, Muhammad Aminul Information System Department Faculty of Computer Science Universitas Brawijaya Malang Indonesia Media Game and Mobile Technology Laboratory Information System Department Faculty of Computer Science Universitas Brawijaya Malang Indonesia
Smartphones and their mobile applications have become an inseparable part of modern daily life. One of them is a public transportation app that helps people commute with public transportation. Many public transportati... 详细信息
来源: 评论
Predicting software vulnerability based on software metrics: a deep learning approach
收藏 引用
Iran Journal of computer science 2024年 第4期7卷 801-812页
作者: Agbenyegah, Francis Kwadzo Asante, Micheal Chen, Jinfu Akpaku, Ernest Department of Computer Science Kwame Nkrumah University of Science and Technology Kumasi Ghana School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Department of Information Technology Faculty of Computing and Information Systems Ghana Communication Technology University Accra Ghana
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit... 详细信息
来源: 评论
OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 1267-1289页
作者: M.Muzaffar Hameed Rodina Ahmad Laiha Mat Kiah Ghulam Murtaza Noman Mazhar Faculty of Computer Science and Information Technology University of MalayaKuala Lumpur46400Malaysia Department of Computer Science Bahauddin Zakariya UniversityMultan60000Pakistan Department of Computer Science Sukkur Institute of Business Administration UniversitySukkur65200Pakistan
Offline signature verification(OfSV)is essential in preventing the falsification of *** learning(DL)based OfSVs require a high number of signature images to attain acceptable ***,a limited number of signature samples ... 详细信息
来源: 评论
A Binary and Multi Classification Model on Tax Evasion:A Comparative Study  1
A Binary and Multi Classification Model on Tax Evasion:A Com...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Shujaaddeen, Abeer Abdullah Ba-Alwi, Fadl Mutaher Zahary, Ammar T. Alhegami, Ahmed Sultan Alsabry, Ayman Al-Badani, Abdulkader M. Faculty of Computer and Information Technology Sana’a University Sana’a Yemen International University of Technology Twintech Malaysia Department of Computer Science Faculty of Computing and Information Technology University of Science and Technology Sana’a University Sana’a Yemen Department of Computer Science International University of Technology Twintech Sana’a Yemen Faculty of Science and Engineering Department of Computers Aljazeera University Ibb Yemen
In this paper, a model was built to compare the performance of the following machine learning (ML) models: DT, RF, SVM, and MLP, using two types of classification: binary classification and multi classification. The r... 详细信息
来源: 评论
Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4759-4776页
作者: Yawar Abbas Aisha Ahmed Alarfaj Ebtisam Abdullah Alabdulqader Asaad Algarni Ahmad Jalal Hui Liu Faculty of Computing and AI Air UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Department of Computer Sciences Faculty of Computing and Information TechnologyNorthern Border UniversityRafha91911Saudi Arabia Department of Computer Science and Engineering College of InformaticsKorea UniversitySeoul02841Republic of Korea Cognitive Systems Lab University of BremenBremen28359Germany
Human Activity Recognition(HAR)in drone-captured videos has become popular because of the interest in various fields such as video surveillance,sports analysis,and human-robot ***,recognizing actions from such videos ... 详细信息
来源: 评论