咨询与建议

限定检索结果

文献类型

  • 13,531 篇 会议
  • 8,311 篇 期刊文献
  • 304 册 图书

馆藏范围

  • 22,146 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,764 篇 工学
    • 9,472 篇 计算机科学与技术...
    • 7,731 篇 软件工程
    • 2,914 篇 信息与通信工程
    • 1,912 篇 控制科学与工程
    • 1,506 篇 生物工程
    • 1,332 篇 电气工程
    • 1,171 篇 生物医学工程(可授...
    • 1,167 篇 电子科学与技术(可...
    • 953 篇 机械工程
    • 759 篇 光学工程
    • 677 篇 仪器科学与技术
    • 614 篇 化学工程与技术
    • 533 篇 动力工程及工程热...
    • 505 篇 网络空间安全
    • 456 篇 安全科学与工程
  • 7,480 篇 理学
    • 3,581 篇 数学
    • 2,478 篇 物理学
    • 1,713 篇 生物学
    • 1,167 篇 统计学(可授理学、...
    • 838 篇 系统科学
    • 646 篇 化学
  • 4,212 篇 管理学
    • 2,440 篇 管理科学与工程(可...
    • 1,941 篇 图书情报与档案管...
    • 1,243 篇 工商管理
  • 1,295 篇 医学
    • 1,097 篇 临床医学
    • 928 篇 基础医学(可授医学...
    • 559 篇 药学(可授医学、理...
    • 519 篇 公共卫生与预防医...
  • 659 篇 法学
    • 546 篇 社会学
  • 441 篇 经济学
    • 440 篇 应用经济学
  • 381 篇 教育学
  • 308 篇 农学
  • 132 篇 文学
  • 54 篇 军事学
  • 50 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 616 篇 deep learning
  • 498 篇 computer science
  • 422 篇 accuracy
  • 392 篇 information tech...
  • 389 篇 feature extracti...
  • 374 篇 machine learning
  • 304 篇 computational mo...
  • 300 篇 support vector m...
  • 290 篇 internet of thin...
  • 284 篇 data mining
  • 249 篇 artificial intel...
  • 244 篇 training
  • 204 篇 optimization
  • 186 篇 neural networks
  • 179 篇 image segmentati...
  • 167 篇 covid-19
  • 158 篇 predictive model...
  • 153 篇 reliability
  • 152 篇 computer archite...
  • 148 篇 data models

机构

  • 289 篇 faculty of scien...
  • 288 篇 department for p...
  • 283 篇 department of ph...
  • 280 篇 departamento de ...
  • 274 篇 department of ph...
  • 267 篇 department of ph...
  • 265 篇 department of ph...
  • 258 篇 faculté des scie...
  • 257 篇 kirchhoff-instit...
  • 229 篇 fakultät für phy...
  • 227 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 217 篇 physics division...
  • 213 篇 department of ph...
  • 212 篇 institute of phy...
  • 204 篇 institut für ast...
  • 202 篇 department of ph...
  • 197 篇 department of ph...
  • 179 篇 institute of phy...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 262 篇 r. ströhmer
  • 262 篇 m. rijssenbeek
  • 262 篇 s. jin
  • 261 篇 g. gaudio
  • 261 篇 s. mohapatra
  • 259 篇 h. a. gordon
  • 259 篇 h. sakamoto
  • 257 篇 y. nagasaka
  • 249 篇 d. guest
  • 245 篇 s. guindon

语言

  • 21,013 篇 英文
  • 998 篇 其他
  • 122 篇 中文
  • 31 篇 日文
  • 6 篇 斯洛文尼亚文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 俄文
检索条件"机构=Faculty of Science Computer and Information Technology"
22146 条 记 录,以下是61-70 订阅
排序:
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 183-211页
作者: Murad Njoum Rossilawati Sulaiman Zarina Shukur Faizan Qamar Center of Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia Computer Science and Cyber Security Faculty of Engineering and Information TechnologyBirZeit UniversityBirZeitRamallahP.O.Box 14Palestine
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction t... 详细信息
来源: 评论
Enhancing Drone Security Through Multi-Sensor Anomaly Detection and Machine Learning
收藏 引用
SN computer science 2024年 第5期5卷 651页
作者: Alzahrani, Mohammed Y. Department of Information Technology Faculty of Computer Science & amp Information Technology AlBaha University AlBaha Saudi Arabia
Unmanned Aerial Vehicles (UAVs), commonly referred to as drones, have determined numerous applications across industries, ranging from aerial surveillance to package shipping. As drones are used in vital operations, e... 详细信息
来源: 评论
A three-step SEM-Bayesian network approach for predicting the determinants of CloudIoT-based healthcare adoption
收藏 引用
International Journal of information technology (Singapore) 2024年 1-21页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
Adopting the CloudIoT-based healthcare paradigm provides various prospects for medical IT and considerably enhances healthcare services. However, compared to the advanced development of CloudIoT-based healthcare syste... 详细信息
来源: 评论
Assessing and prioritizing crucial drivers for CloudIoT-based healthcare adoption: an analytic hierarchy process approach
收藏 引用
International Journal of information technology (Singapore) 2024年 1-18页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
The CloudIoT paradigm has profoundly transformed the healthcare industry, providing outstanding innovation and practical applications. However, despite its many advantages, the adoption of this paradigm in healthcare ... 详细信息
来源: 评论
Machine Learning and Deep Learning Approaches for Fake News Detection: A Systematic Review of Techniques, Challenges, and Advancements
收藏 引用
IEEE Access 2025年 13卷 90433-90466页
作者: Bashaddadh, Omar Omar, Nazlia Mohd, Masnizah Khalid, Mohd Nor Akmal Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Centre for Artificial Intelligence Technology Bangi43600 Malaysia Seiyun University College of Computers Department of Computer Science Hadhramout Yemen Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Centre for Cyber Security Bangi43600 Malaysia
In response to the escalating threat of fake news on social media, this systematic literature review analyzes recent advancements in machine learning and deep learning approaches for its automated detection. Following... 详细信息
来源: 评论
Transfer function adaptation for effective feature selection with the side-blotched lizard algorithm
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Eisa, Mohamed Abdel-lah, Marwa Farouk, Fifi Abdel-aal, Amr System and Information Technology Department Faculty of Management Technology and Information System Port Said University Port Said Egypt Department of Computer Science Faculty of Computer and Informatics Zagazig University Zagazig Egypt
Feature selection is a crucial preprocessing step in data mining and machine learning, enhancing model performance and computational efficiency. This paper investigates the effectiveness of the Side-Blotched Lizard Op... 详细信息
来源: 评论
Towards the Development of a Copyright Risk Checker Tool for Generative Artificial Intelligence Systems
收藏 引用
Digital Government: Research and Practice 2024年 第4期5卷 1-21页
作者: Billiris, Grace Gill, Asif Oppermann, Ian Niazi, Mahmood Faculty of Engineering and Information Technology University of Technology SydneyNSW Australia Computer Science University of Technology SydneyNSW Australia University of Technology SydneyNSW Australia King Fahd University of Petroleum and Minerals Department of Information and Computer Science Dhahran Saudi Arabia
Generative Artificial Intelligence (GAI) is fundamentally changing the ways of working and blurring the boundaries between human and machine-generated contents. While there is an increasing interest in the adoption of... 详细信息
来源: 评论
MCBAN: A Small Object Detection Multi-Convolutional Block Attention Network
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2243-2259页
作者: Hina Bhanbhro Yew Kwang Hooi Mohammad Nordin Bin Zakaria Worapan Kusakunniran Zaira Hassan Amur Computer and Information Science Department Universiti Teknologi PETRONASSeri Iskandar31750Malaysia Faculty of Information and Communication Technology Mahidol UniversityNakhon Pathom73170Thailand
Object detection has made a significant leap forward in recent ***,the detection of small objects continues to be a great difficulty for various reasons,such as they have a very small size and they are susceptible to ... 详细信息
来源: 评论
Text Line Segmentation on Myanmar Handwritten Documents Using Directional Gaussian Filter  21
Text Line Segmentation on Myanmar Handwritten Documents Usin...
收藏 引用
21st IEEE International Conference on computer Applications, ICCA 2024
作者: Wai, Nilar Phyo War, Nu University of Computer Studies Faculty of Computer Science Mandalay Myanmar Myanmar Institute of Information Technology Faculty of Information Technology Mandalay Myanmar
Text line segmentation is a crucial step in document processing. Although text line segmentation techniques for handwritten documents in other languages (English, Chinese, Arabic) have developed, there is still room f... 详细信息
来源: 评论
Performance Analysis of Boosting Algorithms on DDoS Attack Detection with Data Balancing Techniques  5
Performance Analysis of Boosting Algorithms on DDoS Attack D...
收藏 引用
5th International Conference on Advanced information Technologies, ICAIT 2024
作者: Naing, Soe Kalayar Thwel, Tin Thein University of Information Technology Faculty of Computer Science Yangon Myanmar University of Computer Studies Yangon Faculty of Information Science Yangon Myanmar
Today, a lot of people use the Internet of Things (IoT) in organizations, businesses, and daily life. Attackers have taken advantage of this potential for IoT devices to expose the integrity and security of user data.... 详细信息
来源: 评论