咨询与建议

限定检索结果

文献类型

  • 24,449 篇 会议
  • 11,327 篇 期刊文献
  • 526 册 图书
  • 11 篇 学位论文

馆藏范围

  • 36,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,572 篇 工学
    • 16,360 篇 计算机科学与技术...
    • 12,967 篇 软件工程
    • 4,741 篇 信息与通信工程
    • 3,241 篇 控制科学与工程
    • 2,079 篇 电气工程
    • 2,042 篇 生物工程
    • 1,709 篇 电子科学与技术(可...
    • 1,501 篇 生物医学工程(可授...
    • 1,361 篇 机械工程
    • 962 篇 光学工程
    • 912 篇 仪器科学与技术
    • 747 篇 动力工程及工程热...
    • 734 篇 安全科学与工程
    • 714 篇 化学工程与技术
  • 10,126 篇 理学
    • 5,599 篇 数学
    • 2,320 篇 生物学
    • 2,250 篇 物理学
    • 1,802 篇 统计学(可授理学、...
    • 1,427 篇 系统科学
    • 786 篇 化学
  • 7,306 篇 管理学
    • 4,267 篇 管理科学与工程(可...
    • 3,520 篇 图书情报与档案管...
    • 2,588 篇 工商管理
  • 1,658 篇 医学
    • 1,415 篇 临床医学
    • 1,203 篇 基础医学(可授医学...
    • 705 篇 公共卫生与预防医...
    • 675 篇 药学(可授医学、理...
  • 1,265 篇 法学
    • 1,044 篇 社会学
  • 978 篇 经济学
    • 968 篇 应用经济学
  • 943 篇 教育学
    • 902 篇 教育学
  • 409 篇 农学
  • 187 篇 文学
  • 88 篇 军事学
  • 76 篇 艺术学
  • 23 篇 哲学
  • 10 篇 历史学

主题

  • 1,362 篇 information syst...
  • 1,324 篇 computer science
  • 597 篇 computational mo...
  • 574 篇 deep learning
  • 517 篇 machine learning
  • 480 篇 artificial intel...
  • 471 篇 data mining
  • 449 篇 feature extracti...
  • 395 篇 training
  • 378 篇 accuracy
  • 362 篇 internet of thin...
  • 347 篇 application soft...
  • 334 篇 computer archite...
  • 291 篇 support vector m...
  • 270 篇 educational inst...
  • 267 篇 routing
  • 264 篇 semantics
  • 260 篇 neural networks
  • 260 篇 information tech...
  • 245 篇 testing

机构

  • 177 篇 school of inform...
  • 164 篇 department of in...
  • 161 篇 school of comput...
  • 76 篇 school of comput...
  • 75 篇 school of comput...
  • 75 篇 information syst...
  • 74 篇 institute of inf...
  • 67 篇 department of in...
  • 62 篇 department of co...
  • 54 篇 department of sy...
  • 53 篇 faculty of compu...
  • 45 篇 school of comput...
  • 43 篇 department of la...
  • 42 篇 department of sy...
  • 41 篇 school of comput...
  • 35 篇 department of in...
  • 34 篇 computer science...
  • 34 篇 faculty of compu...
  • 32 篇 school of comput...
  • 31 篇 department of co...

作者

  • 115 篇 niyato dusit
  • 64 篇 abdelwahed motwa...
  • 43 篇 xiong zehui
  • 40 篇 sun maosong
  • 39 篇 guo hong
  • 38 篇 prabowo harjanto
  • 37 篇 radwa marzouk
  • 33 篇 abu sarwar zaman...
  • 33 篇 liu yang
  • 31 篇 qiangfu zhao
  • 30 篇 shen xuemin
  • 29 篇 bernhard schölko...
  • 28 篇 mohammed rizwanu...
  • 27 篇 jie li
  • 26 篇 xi zhang
  • 25 篇 soni mukesh
  • 25 篇 li li
  • 24 篇 mastorakis nikos
  • 24 篇 dina fitria mura...
  • 23 篇 el-sayed m.el-ke...

语言

  • 34,582 篇 英文
  • 1,458 篇 其他
  • 264 篇 中文
  • 24 篇 日文
  • 11 篇 德文
  • 7 篇 斯洛文尼亚文
  • 3 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 土耳其文
  • 1 篇 俄文
检索条件"机构=Information and Computer Systems in Systems in"
36313 条 记 录,以下是411-420 订阅
排序:
ArCapsNet for Audio Splicing Forgery Detection  47
ArCapsNet for Audio Splicing Forgery Detection
收藏 引用
47th International Conference on Telecommunications and Signal Processing, TSP 2024
作者: Ustubioglu, Beste Dincer, Samet Ustubioglu, Arda Ulutas, Guzin Karadeniz Technical University Computer Engineering Trabzon Turkey Trabzon University Management Information Systems Trabzon Turkey
Complex forgeries such as deepfakes, which are very popular today, as well as very simple but effective manipulation techniques, the production of which does not require the use of deep networks such as GAN, are still... 详细信息
来源: 评论
Hybrid Fuzzy Data Aggregation and Optimization-Based Routing for Energy Efficiency in Heterogeneous Wireless Sensor Networks
收藏 引用
Informatica (Slovenia) 2024年 第20期48卷 95-106页
作者: Alhijaj, Asaad A. Marzook, Ali K. Hussein, Dheyaa Mezaal Alkenani, Jawad Department of Computer Information Systems College of Computer Science and Information Technology University of Basrah Basrah Iraq University of Basrah College of Engineering Department of Electrical Engineering Basrah Iraq University of Technology Office of the President of the University Baghdad Iraq Department of Computer Science Shatt Al-Arab University College Basra Iraq
Wireless sensor networks (WSNs) are networks with many sensor nodes that are utilized for various purposes, including the military and medical. In hazardous circumstances, precise data aggregation and routing are esse... 详细信息
来源: 评论
Transparent Machine Vision Techniques for Facial Emotion Detection  5
Transparent Machine Vision Techniques for Facial Emotion Det...
收藏 引用
5th International Conference on Electronics and Sustainable Communication systems, ICESC 2024
作者: Onanyang, Isaac Katamba, Harun Arnold Kasozi, Carlos Mark Gahwera, Tumusiime Andrew Nakibuule, Rose Hellen, Nakayiza Marvin, Ggaliwango Makerere University Department of Computer Science Kampala Uganda Makerere University Department of Information Systems Kampala Uganda Muni University Department of Computer and Information Science Arua Uganda
Emotions are very important when it comes to collective understanding among people. In recent times, emotion recognition has emerged as a crucial facet within the realm of effective computing. Many physiological signa... 详细信息
来源: 评论
Phishing Attacks Detection Using EnsembleMachine Learning Algorithms
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1325-1345页
作者: Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Marwan Abu-Zanona Bassam Mohammad Elzaghmouri Farah H.Zawaideh Mouiad Fadeil Alawneh Department of Computer Science and Information Systems College of Applied SciencesAlmaarefa UniversityDiriyahRiyadh13713Saudi Arabia Applied College King Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Computer Science Faculty of Computer Science and Information TechnologyJerash UniversityJerash26110Jordan Department of Business Intelligence and Data Analysis Faculty of Financial Sciences and BusinessIrbid National UniversityIrbid21110Jordan Faculty of Information Technology Ajloun National UniversityAjloun26767Jordan
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based *** indicates a persistent rise in phishing **... 详细信息
来源: 评论
Improving the Efficiency of Smart Grid Scheduling: A Linear Regression Model with Meta Job information  2
Improving the Efficiency of Smart Grid Scheduling: A Linear ...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia College Of Information Technology University Of Petra Department Of Computer Science Amman Jordan German Jordianian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
In order to forecast the run time of the jobs that were submitted, this research provides two linear regression prediction models that include continuous and categorical factors. A continuous predictor is built using ... 详细信息
来源: 评论
Development of Key Performance Indicators in e-Learning Implementation in Higher Education Institutions  8
Development of Key Performance Indicators in e-Learning Impl...
收藏 引用
8th International Conference on information Management and Technology, ICIMTech 2023
作者: Sardjono, Wahyu Kristin, Desi Maya Putra, Gustian Rama Binus Graduate Program - Master of Information Systems Management Bina Nusantara University Information Systems Management Department Jakarta11480 Indonesia School of Information Systems Bina Nusantara University Information Systems Department Jakarta11480 Indonesia Pakuan University Computer Science Study Program Faculty of Mathematics & Natural Sciences Bogor Indonesia
Companies or organizations usually use key performance indicators (KPI) as indicators to determine their performance. The company's performance achievements are reflected in the set indicators that will describe t... 详细信息
来源: 评论
Enhanced In-Flight Connectivity for Urban Air Mobility via LEO Satellite Networks  30
Enhanced In-Flight Connectivity for Urban Air Mobility via L...
收藏 引用
30th IEEE International Conference on Telecommunications, ICT 2024
作者: Biswas, Karnika Ghazzai, Hakim Khanfor, Abdullah Sboui, Lokman CEMSE Division Thuwal Saudi Arabia College of Computer Science and Information Systems Najran University Computer Science Department Najran Saudi Arabia University of Québec Systems Engineering Department Montréal Canada
Urban Air Mobility (UAM) is the envisioned future of inter-city aerial transportation. This paper presents a novel, in-flight connectivity link allocation method for UAM, which dynamically switches between terrestrial... 详细信息
来源: 评论
Enhancing Secure Development in Globally Distributed Software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 5031-5049页
作者: Marya Iqbal Yaser Hafeez Nabil Almashfi Amjad Alsirhani Faeiz Alserhani Sadia Ali Mamoona Humayun Muhammad Jamal University Institute of Information Technology PMAS-Arid Agriculture UniversityRawalpindiPakistan Department of Software Engineering College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Science College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Engineering&Networks College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Information Systems College of Computer and Information SciencesJouf UniversitySakakaAl Jouf72388Saudi Arabia Department of Mathematics Pir Mehr Ali Shah Arid Agriculture UniversityRawalpindiPakistan
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL var... 详细信息
来源: 评论
Enhancing Image Security with Rossler Attractor-Based Encryption  2
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia University Of Petra Faculty Of Information Technology Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
History of Artificial Lighting, From Fire to LED [History]
收藏 引用
IEEE INDUSTRY APPLICATIONS MAGAZINE 2025年 第2期31卷 10-25页
作者: Canale, Laurent Hamady, Mohamad S & C Electric Company Chicago Illinois USA Research Engineer CNRS LAPLACE Laboratory UMR 5213 Paul Sabatier University Toulouse Cedex 9 France Computer Systems Department Faculty of Computer and Information Sciences Ain Shams University Cairo Cairo Egypt
Having become so present and accessible, artificial light has been forgotten in the same way as the air we breathe. It is obvious and is only noticed by its often-exceptional absence. Its omnipresence is such that it ... 详细信息
来源: 评论