咨询与建议

限定检索结果

文献类型

  • 24,314 篇 会议
  • 11,156 篇 期刊文献
  • 21 册 图书
  • 11 篇 学位论文

馆藏范围

  • 35,502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,331 篇 工学
    • 16,181 篇 计算机科学与技术...
    • 12,865 篇 软件工程
    • 4,699 篇 信息与通信工程
    • 3,163 篇 控制科学与工程
    • 2,041 篇 电气工程
    • 2,030 篇 生物工程
    • 1,673 篇 电子科学与技术(可...
    • 1,490 篇 生物医学工程(可授...
    • 1,348 篇 机械工程
    • 947 篇 光学工程
    • 906 篇 仪器科学与技术
    • 735 篇 动力工程及工程热...
    • 724 篇 安全科学与工程
    • 707 篇 化学工程与技术
  • 10,049 篇 理学
    • 5,571 篇 数学
    • 2,310 篇 生物学
    • 2,223 篇 物理学
    • 1,793 篇 统计学(可授理学、...
    • 1,422 篇 系统科学
    • 773 篇 化学
  • 7,282 篇 管理学
    • 4,249 篇 管理科学与工程(可...
    • 3,511 篇 图书情报与档案管...
    • 2,585 篇 工商管理
  • 1,645 篇 医学
    • 1,406 篇 临床医学
    • 1,199 篇 基础医学(可授医学...
    • 699 篇 公共卫生与预防医...
    • 674 篇 药学(可授医学、理...
  • 1,266 篇 法学
    • 1,043 篇 社会学
  • 977 篇 经济学
    • 967 篇 应用经济学
  • 938 篇 教育学
    • 896 篇 教育学
  • 407 篇 农学
  • 188 篇 文学
  • 87 篇 军事学
  • 76 篇 艺术学
  • 23 篇 哲学
  • 10 篇 历史学

主题

  • 1,361 篇 information syst...
  • 1,324 篇 computer science
  • 587 篇 computational mo...
  • 560 篇 deep learning
  • 494 篇 machine learning
  • 471 篇 data mining
  • 443 篇 feature extracti...
  • 390 篇 training
  • 363 篇 accuracy
  • 357 篇 internet of thin...
  • 355 篇 application soft...
  • 341 篇 computer archite...
  • 290 篇 support vector m...
  • 269 篇 educational inst...
  • 268 篇 routing
  • 261 篇 neural networks
  • 259 篇 information tech...
  • 259 篇 semantics
  • 245 篇 testing
  • 238 篇 protocols

机构

  • 168 篇 school of inform...
  • 164 篇 department of in...
  • 150 篇 school of comput...
  • 78 篇 institute of inf...
  • 74 篇 information syst...
  • 73 篇 school of comput...
  • 72 篇 school of comput...
  • 66 篇 department of in...
  • 63 篇 department of co...
  • 54 篇 department of sy...
  • 53 篇 faculty of compu...
  • 43 篇 department of la...
  • 43 篇 school of comput...
  • 42 篇 department of sy...
  • 39 篇 school of comput...
  • 35 篇 department of in...
  • 34 篇 computer science...
  • 34 篇 faculty of compu...
  • 33 篇 department of in...
  • 31 篇 school of comput...

作者

  • 114 篇 niyato dusit
  • 65 篇 abdelwahed motwa...
  • 43 篇 xiong zehui
  • 40 篇 sun maosong
  • 39 篇 guo hong
  • 38 篇 prabowo harjanto
  • 38 篇 radwa marzouk
  • 34 篇 liu yang
  • 33 篇 abu sarwar zaman...
  • 31 篇 qiangfu zhao
  • 31 篇 shen xuemin
  • 29 篇 bernhard schölko...
  • 28 篇 mohammed rizwanu...
  • 27 篇 jie li
  • 26 篇 dina fitria mura...
  • 26 篇 xi zhang
  • 25 篇 li li
  • 25 篇 el-bakry hazem m...
  • 24 篇 mastorakis nikos
  • 24 篇 warnars harco le...

语言

  • 34,331 篇 英文
  • 904 篇 其他
  • 253 篇 中文
  • 24 篇 日文
  • 9 篇 德文
  • 6 篇 斯洛文尼亚文
  • 2 篇 西班牙文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 土耳其文
检索条件"机构=Information and Computer Systems in Systems in"
35502 条 记 录,以下是41-50 订阅
排序:
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
An intrusion attack classification using bio-inspired optimization technique and ensemble learning model for edge computing environments
收藏 引用
Multimedia Tools and Applications 2024年 1-28页
作者: Rahamathulla, Mohemmed Yousuf Ramaiah, Mangayarkarasi School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamilnadu Vellore India
The phenomenal rise in network traffic across various sectors, driven by advancements in network communication, has led to an explosion of connected devices. While internet-based service providers have enhanced smart ... 详细信息
来源: 评论
Designing and Analyzing Green Networking Solutions in Data Centers Using AI for Energy Optimization  2
Designing and Analyzing Green Networking Solutions in Data C...
收藏 引用
2nd International Conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Ebadinezhad, Sahar Shaalan Shaalan, Alwaled Khalid Omar Algailani, Noor Khattab Al-Hussein, Mohammed Yonmah, Charles Zulu Department of Computer Information Systems Nicosia99138 Cyprus Near East University Department of Computer Information Systems Nicosia99138 Cyprus
A significant obstacle in the world of information IT, especially in terms of energy efficiency, is the increasing demand for energy from data centers. These massive plants currently consume nearly 1% of the world'... 详细信息
来源: 评论
Teaching How to Select an Optimal Agile, Plan-Driven, or Hybrid Software Development Approach: Lessons from Enterprise Software Development Leaders
收藏 引用
Journal of information systems Education 2023年 第2期34卷 148-178页
作者: Spurrier, Gary Topi, Heikki Department of Computer Information Systems Bentley University WalthamMA02452 United States
Over 20 years after introducing and popularizing agile software development methods, those methods have proven effective in delivering projects that meet agile assumptions. Those assumptions require that projects be s... 详细信息
来源: 评论
Acoustic modelling using deep learning for Quran recitation assistance
收藏 引用
International Journal of Speech Technology 2023年 第1期26卷 113-121页
作者: Ghori, Ammar Farid Waheed, Aisha Waqas, Maria Mehmood, Aqsa Ali, Syed Abbas Department of Computer and Information Systems Engineering NED University of Engineering and Technology Karachi Pakistan
Recent advancements in computer science and engineering have significantly boosted interest in and success rate of speech recognition systems. Sophisticated speech recognition systems are being developed for a variety... 详细信息
来源: 评论
Dragonfly Optimization with Deep Learning Enabled Sentiment Analysis for Arabic Tweets
收藏 引用
computer systems Science & Engineering 2023年 第8期46卷 2555-2570页
作者: Aisha M.Mashraqi Hanan T.Halawani College of Computer Science and Information Systems Najran UniversityNajran61441Saudi Arabia
Sentiment Analysis(SA)is one of the Machine Learning(ML)techniques that has been investigated by several researchers in recent years,especially due to the evolution of novel data collection methods focused on social *... 详细信息
来源: 评论
Prognostic Survival Analysis for AD Diagnosis and Progression Using MRI Data: An AI-Based Approach
收藏 引用
IEEE Access 2025年 13卷 89059-89078页
作者: Deenadayalan, T. Shantharajah, S.P. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Alzheimer’s Disease is a progressive neuro-degenerative disorder and a leading cause of dementia, marked by cognitive decline, memory loss, and behavioral changes. Despite advancements in medical imaging and Artifici... 详细信息
来源: 评论
Forework: A Real-Time, Distributed Digital Forensic Analysis Framework  32
Forework: A Real-Time, Distributed Digital Forensic Analysis...
收藏 引用
32nd National Conference with International Participation, TELECOM 2024
作者: Penmetsa, Sahil Varma University of Central Missouri Computer Information Systems and Information Technology United States
The increasing volume of data in digital forensic investigations has outpaced the capabilities of existing forensic systems. Traditional systems such as The Sleuth Kit Hadoop, OCFA, and Hansken, though capable of hand... 详细信息
来源: 评论
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 857-873页
作者: Amardeep Singh Hamad Ali Abosaq Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa School of Computer Information Sciences University of CumberlandsWilliamsburgKentucky40769USA Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Electrical Electronics and Computer SystemsCollege of Engineering and TechnologyUniversity of SargodhaSargodha40100Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Department of Electrical Engineering The University of LahoreLahore54000Pakistan Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Models for Real-Time Network Threat Detection  2
Comparative Analysis of Machine Learning Models for Real-Tim...
收藏 引用
2nd International Conference on Artificial Intelligence and Automation Control, AIAC 2024
作者: Penmetsa, Sahil Varma University of Central Missouri Computer Information Systems & Information Technology United States
This research explores the efficacy of various machine learning models in detecting network threats, focusing on their performance across known, similar, and new attack datasets. I evaluated models including Random Fo... 详细信息
来源: 评论