咨询与建议

限定检索结果

文献类型

  • 30,264 篇 会议
  • 15,058 篇 期刊文献
  • 429 册 图书

馆藏范围

  • 45,751 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 26,971 篇 工学
    • 19,614 篇 计算机科学与技术...
    • 15,873 篇 软件工程
    • 6,532 篇 信息与通信工程
    • 4,779 篇 控制科学与工程
    • 3,160 篇 电气工程
    • 3,080 篇 生物工程
    • 2,841 篇 电子科学与技术(可...
    • 2,537 篇 生物医学工程(可授...
    • 2,107 篇 机械工程
    • 1,599 篇 仪器科学与技术
    • 1,567 篇 光学工程
    • 1,427 篇 动力工程及工程热...
    • 1,272 篇 安全科学与工程
    • 1,166 篇 化学工程与技术
    • 1,116 篇 网络空间安全
    • 1,086 篇 交通运输工程
  • 14,807 篇 理学
    • 7,084 篇 数学
    • 4,630 篇 物理学
    • 3,529 篇 生物学
    • 2,296 篇 统计学(可授理学、...
    • 2,001 篇 系统科学
    • 1,294 篇 化学
  • 8,402 篇 管理学
    • 5,235 篇 管理科学与工程(可...
    • 3,596 篇 图书情报与档案管...
    • 2,647 篇 工商管理
  • 2,848 篇 医学
    • 2,431 篇 临床医学
    • 2,130 篇 基础医学(可授医学...
    • 1,280 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,438 篇 法学
    • 1,153 篇 社会学
  • 947 篇 经济学
  • 726 篇 农学
  • 715 篇 教育学
  • 224 篇 文学
  • 117 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,085 篇 deep learning
  • 1,057 篇 accuracy
  • 906 篇 machine learning
  • 896 篇 feature extracti...
  • 838 篇 internet of thin...
  • 797 篇 computational mo...
  • 677 篇 training
  • 567 篇 information tech...
  • 548 篇 artificial intel...
  • 545 篇 support vector m...
  • 535 篇 real-time system...
  • 498 篇 data mining
  • 480 篇 security
  • 448 篇 predictive model...
  • 405 篇 monitoring
  • 382 篇 cloud computing
  • 349 篇 optimization
  • 343 篇 data models
  • 343 篇 convolutional ne...

机构

  • 296 篇 faculty of scien...
  • 287 篇 department for p...
  • 280 篇 department of ph...
  • 280 篇 departamento de ...
  • 276 篇 department of ph...
  • 273 篇 department of ph...
  • 270 篇 department of ph...
  • 266 篇 department of ph...
  • 253 篇 faculté des scie...
  • 232 篇 department of ph...
  • 228 篇 department of ph...
  • 226 篇 department of co...
  • 216 篇 physics division...
  • 195 篇 cavendish labora...
  • 171 篇 school of physic...
  • 169 篇 yerevan physics ...
  • 168 篇 institute of phy...
  • 168 篇 institute of phy...
  • 162 篇 kirchhoff-instit...
  • 161 篇 department of ph...

作者

  • 274 篇 c. alexa
  • 272 篇 j. m. izen
  • 272 篇 c. amelung
  • 270 篇 g. bella
  • 270 篇 j. strandberg
  • 270 篇 d. calvet
  • 269 篇 g. spigo
  • 267 篇 f. siegert
  • 261 篇 m. klein
  • 260 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 254 篇 g. gaudio
  • 252 篇 h. a. gordon
  • 250 篇 a. c. könig
  • 246 篇 y. tayalati
  • 245 篇 s. mohapatra
  • 242 篇 h. sakamoto
  • 235 篇 d. guest
  • 216 篇 y. nagasaka

语言

  • 43,086 篇 英文
  • 2,174 篇 其他
  • 462 篇 中文
  • 61 篇 日文
  • 9 篇 德文
  • 8 篇 法文
  • 7 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45751 条 记 录,以下是261-270 订阅
Optimizing Connections:Applied Shortest Path Algorithms for MANETs
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 787-807页
作者: Ibrahim Alameri Jitka Komarkova Tawfik Al-Hadhrami Abdulsamad Ebrahim Yahya Atef Gharbi Faculty of Medical Sciences Jabir Ibn Hayyan Medical UniversityAlkufaNajaf54001Iraq Faculty of Economics and Administration University of PardubiceStudentskaPardubice53210Czech Republic Computer Science Department School of Science and TechnologyNottingham Trent UniversityNottinghamNG118NSUK Department of Information Technology College of Computing and Information TechnologyNorthern Border UniversityArar91431Saudi Arabia Department of Information System College of Computing and Information TechnologyNorthern Border UniversityArar91431Saudi Arabia
This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of *** objective was to delve into an... 详细信息
来源: 评论
M2auth: A multimodal behavioral biometric authentication using feature-level fusion
收藏 引用
Neural Computing and Applications 2024年 第34期36卷 21781-21799页
作者: Mahfouz, Ahmed Mostafa, Hebatollah Mahmoud, Tarek M. Sharaf Eldin, Ahmed Faculty of Computer Studies Arab Open University Muscat Oman Computer Science Department Minia University Minya Egypt Faculty of Computers and Information Minia University Minya Egypt Faculty of Computers and Artificial Intelligence Sadat City University Sadat City Egypt Faculty of Information Technology and Computer Science Sinai University Arish Egypt Information Systems Department Helwan University Helwan Egypt
Conventional authentication methods, such as passwords and PINs, are vulnerable to multiple threats, from sophisticated hacking attempts to the inherent weaknesses of human memory. This highlights a critical need for ... 详细信息
来源: 评论
Super-Resolution Based on Curvelet Transform and Sparse Representation
收藏 引用
computer systems science & Engineering 2023年 第4期45卷 167-181页
作者: Israa Ismail Mohamed Meselhy Eltoukhy Ghada Eltaweel Department of Computer Science Faculty of Computers and InformaticsSuez Canal UniversityIsmailia51422Egypt Department of Information Technology University of JeddahCollege of Computing and Information Technology at KhulaisJeddahSaudi Arabia
Super-resolution techniques are used to reconstruct an image with a high resolution from one or more low-resolution image(s).In this paper,we proposed a single image super-resolution *** uses the nonlocal mean filter ... 详细信息
来源: 评论
Detecting Fake Reviews in E-Commerce using Deep Learning Techniques  1
Detecting Fake Reviews in E-Commerce using Deep Learning Tec...
收藏 引用
1st International Conference on Intelligent systems and Computational Networks, ICISCN 2025
作者: Abd, Maysam Jalal Hussein, Mohsin Hasan University of Kerbala College of Computer Science and Information Technology Department of Computer Science Karbala Iraq
Users may now create and use large amounts of data saved online thanks to e-commerce systems. Modern shoppers examine online reviews before making purchases. Evaluations are essential for both people and organizations... 详细信息
来源: 评论
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3397-3416页
作者: Umi Salma Basha Shashi Kant Gupta Wedad Alawad SeongKi Kim Salil Bharany Computer Science and Information Technology Jazan UniversityJazanSaudi Arabia CSE Eudoxia Research UniversityNew CastleUSA Department of Information Technology College of Computer ScienceQassim UniversityBuraydahSaudi Arabia National Center of Excellence in Software Sangmyung UniversitySeoulKorea Department of Computer Science and Engineering Lovely Professional UniversityPhagwaraPunjabIndia
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc... 详细信息
来源: 评论
Data Augmentation and Random Multi-Model Deep Learning for Data Classification
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5191-5207页
作者: Fatma Harby Adel Thaljaoui Durre Nayab Suliman Aladhadh Salim EL Khediri Rehan Ullah Khan Computer Science Department Future Academy-Higher Future Institute for Specialized Technological StudiesEgypt Department of Computer Systems Engineering Faculty of Electrical and Computer EngineeringUniversity of Engineering and TechnologyPeshawar25120Pakistan Department of Information Technology College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Computer Sciences Faculty of Sciences of GafsaUniversity of GafsaGafsaTunisia
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhance... 详细信息
来源: 评论
BotSward: Centrality Measures for Graph-Based Bot Detection Using Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 693-714页
作者: Khlood Shinan Khalid Alsubhi M.Usman Ashraf Department of Computer Science College Computer Science in Al-LeithUmm Al-Qura UniversityMecca 21421Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah 21589Saudi Arabia Department of Computer Science GC Women University SialkotPakistan
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the *** detection using machine learning(ML)with flow-based features has... 详细信息
来源: 评论
Evolutionary optimization of Yagi–Uda antenna design using grey wolf optimizer
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4155-4183页
作者: Braik, Malik Sheta, Alaa Aljahdali, Sultan El-Hefnawi, Fatma Al-Hiary, Heba Elashmawi, Walaa H. Computer Science Department Al-Balqa Applied University Salt Jordan Department of Computer Science Southern Connecticut State University New HavenCT United States Computer Science Department Taif University Taif Saudi Arabia Microwave Department Electronics Research Institute Giza Egypt Department of Computer Information System Al-Balqa Applied University Salt Jordan Department of Computer Science Faculty of Computers & Informatics Suez Canal University Ismailia Egypt Department of Computer Science Faculty of Computer Science Misr International University Cairo Egypt
Meta-heuristic optimization algorithms have become widely used due to their outstanding features, such as gradient-free mechanisms, high flexibility, and great potential for avoiding local optimal solutions. This rese... 详细信息
来源: 评论
Neutrosophic Sets and systems: A Decade of Scientific Contribution and Growth
收藏 引用
Neutrosophic Sets and systems 2025年 81卷 438-465页
作者: Saqlain, Muhammad Merigó, José M. Kumam, Poom Department of Mathematics King Mongkut’s University of Technology Thonburi Bangkok10140 Thailand School of Computer Science Faculty of Engineering and Information Technology University of Technology Sydney 81 Broadway UltimoNSW2007 Australia
Neutrosophic Sets and systems (NSS) has become an important Journal for neutrosophic theory and its applications in uncertainty modeling and decision sciences. In 2023, NSS celebrated its 10th anniversary, marking a d... 详细信息
来源: 评论
Machine Learning Techniques for Identifying Tajweed Rules: A Case Study on Noon Saakin and Tanween  1
Machine Learning Techniques for Identifying Tajweed Rules: A...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Al-Hagree, Salah Alawdi, Ala'a Alsayadi, Hamzah A. Alsurori, Muneer Abdo Al Sabri, Muaadh Computer Science Department Faculty of Computer and Information Technology Sana’a University Yemen Computer Science Department Faculty of Sciences Ibb University Yemen Aljazeera University Yemen Faculty of Computer and Information Sciences Ain Shams University Egypt
This study focuses on the classification of Tajweed rules from audio data and evaluates the effectiveness of various machine learning (ML) algorithms in emotion classification from speech. The dataset was created usin... 详细信息
来源: 评论