咨询与建议

限定检索结果

文献类型

  • 24,323 篇 会议
  • 11,182 篇 期刊文献
  • 526 册 图书
  • 11 篇 学位论文

馆藏范围

  • 36,042 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,355 篇 工学
    • 16,201 篇 计算机科学与技术...
    • 12,869 篇 软件工程
    • 4,702 篇 信息与通信工程
    • 3,163 篇 控制科学与工程
    • 2,047 篇 电气工程
    • 2,030 篇 生物工程
    • 1,679 篇 电子科学与技术(可...
    • 1,490 篇 生物医学工程(可授...
    • 1,348 篇 机械工程
    • 947 篇 光学工程
    • 906 篇 仪器科学与技术
    • 736 篇 动力工程及工程热...
    • 724 篇 安全科学与工程
    • 708 篇 化学工程与技术
  • 10,056 篇 理学
    • 5,574 篇 数学
    • 2,310 篇 生物学
    • 2,229 篇 物理学
    • 1,793 篇 统计学(可授理学、...
    • 1,423 篇 系统科学
    • 774 篇 化学
  • 7,285 篇 管理学
    • 4,250 篇 管理科学与工程(可...
    • 3,513 篇 图书情报与档案管...
    • 2,586 篇 工商管理
  • 1,645 篇 医学
    • 1,406 篇 临床医学
    • 1,199 篇 基础医学(可授医学...
    • 699 篇 公共卫生与预防医...
    • 674 篇 药学(可授医学、理...
  • 1,266 篇 法学
    • 1,043 篇 社会学
  • 978 篇 经济学
    • 968 篇 应用经济学
  • 938 篇 教育学
    • 896 篇 教育学
  • 407 篇 农学
  • 188 篇 文学
  • 87 篇 军事学
  • 76 篇 艺术学
  • 23 篇 哲学
  • 10 篇 历史学

主题

  • 1,361 篇 information syst...
  • 1,324 篇 computer science
  • 587 篇 computational mo...
  • 560 篇 deep learning
  • 511 篇 machine learning
  • 473 篇 artificial intel...
  • 470 篇 data mining
  • 443 篇 feature extracti...
  • 390 篇 training
  • 363 篇 accuracy
  • 358 篇 internet of thin...
  • 350 篇 application soft...
  • 335 篇 computer archite...
  • 289 篇 support vector m...
  • 269 篇 educational inst...
  • 267 篇 routing
  • 260 篇 neural networks
  • 259 篇 information tech...
  • 259 篇 semantics
  • 245 篇 testing

机构

  • 177 篇 school of inform...
  • 164 篇 department of in...
  • 152 篇 school of comput...
  • 77 篇 institute of inf...
  • 74 篇 information syst...
  • 73 篇 school of comput...
  • 72 篇 school of comput...
  • 66 篇 department of in...
  • 60 篇 department of co...
  • 54 篇 department of sy...
  • 53 篇 faculty of compu...
  • 45 篇 school of comput...
  • 43 篇 department of la...
  • 43 篇 school of comput...
  • 42 篇 department of sy...
  • 35 篇 department of in...
  • 34 篇 computer science...
  • 34 篇 faculty of compu...
  • 32 篇 school of comput...
  • 31 篇 department of co...

作者

  • 114 篇 niyato dusit
  • 65 篇 abdelwahed motwa...
  • 43 篇 xiong zehui
  • 40 篇 sun maosong
  • 39 篇 guo hong
  • 38 篇 prabowo harjanto
  • 38 篇 radwa marzouk
  • 33 篇 abu sarwar zaman...
  • 33 篇 liu yang
  • 31 篇 qiangfu zhao
  • 30 篇 shen xuemin
  • 29 篇 bernhard schölko...
  • 28 篇 mohammed rizwanu...
  • 27 篇 jie li
  • 26 篇 dina fitria mura...
  • 26 篇 xi zhang
  • 25 篇 li li
  • 25 篇 el-bakry hazem m...
  • 24 篇 mastorakis nikos
  • 23 篇 el-sayed m.el-ke...

语言

  • 34,871 篇 英文
  • 904 篇 其他
  • 253 篇 中文
  • 24 篇 日文
  • 9 篇 德文
  • 6 篇 斯洛文尼亚文
  • 2 篇 西班牙文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 土耳其文
检索条件"机构=Information and Computer Systems in Systems in"
36042 条 记 录,以下是81-90 订阅
排序:
Novel Feature Extractor Framework in Conjunction with Supervised Three Class-XGBoost Algorithm for Osteosarcoma Detection from Whole Slide Medical Histopathology Images
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3337-3353页
作者: Tanzila Saba Muhammad Mujahid Shaha Al-Otaibi Noor Ayesha Amjad Rehman Khan Artificial Intelligence&Data Analytics Lab College of Computer&Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Center of Excellence in Cyber Security(CYBEX) Prince Sultan UniversityRiyadh11586Saudi Arabia
Osteosarcomas are malignant neoplasms derived from undifferentiated osteogenic mesenchymal cells. It causes severe and permanent damage to human tissue and has a high mortality rate. The condition has the capacity to ... 详细信息
来源: 评论
Velocity control of a Stephenson III six-bar linkage-based gait rehabilitation robot using deep reinforcement learning
收藏 引用
Neural Computing and Applications 2025年 第7期37卷 5671-5682页
作者: Kapsalyamov, Akim Brown, Nicholas A. T. Goecke, Roland Jamwal, Prashant K. Hussain, Shahid School of Information Technology and Systems University of Canberra CanberraACT2617 Australia School of Clinical Sciences Queensland University of Technology BrisbaneQLD Australia School of Systems and Computing UNSW CanberraACT Australia Department of Electrical and Computer Engineering Nazarbayev University Nur-Sultan City Kazakhstan
Lower limb rehabilitation robots can help to improve the locomotor capabilities of patients experiencing gait impairments and help medical workers by reducing strain on them. However, since commercially available exos... 详细信息
来源: 评论
LLM-Driven Cross-Platform Code Generation for Polyhedral Optimized NPDP Codes  15th
LLM-Driven Cross-Platform Code Generation for Polyhedral Op...
收藏 引用
15th International Conference on Parallel Processing and Applied Mathematics, PPAM 2024
作者: Palkowski, Marek Faculty of Computer Science and Information Systems West Pomeranian University of Technology in Szczecin Zolnierska 49 Szczecin71210 Poland
This paper explores using large language models (LLM) for automatic and source-to-source programming across various cross-platform languages and libraries, including generating CUDA code for high performance computing... 详细信息
来源: 评论
Utilizing TOGAF 10 to Design an Enterprise Architecture for BPRBCo SME Digital Transformation
Utilizing TOGAF 10 to Design an Enterprise Architecture for ...
收藏 引用
2025 International Conference on Advancement in Data Science, E-learning and information System, ICADEIS 2025
作者: Mumtaza, Farisa Fikri Mulyana, Rahmat Mukti, Iqbal Yulizar Telkom University Information Systems Department Bandung Indonesia Stockholm University Department of Computer and System Sciences Stockholm Sweden
Digital Transformation (DT) has become a strategic imperative for Small and Medium Enterprise (SME) banks, including for Bank Perekonomian Rakyat (BPRBCo) in Indonesia, which often face constraints in infrastructure, ... 详细信息
来源: 评论
Enhancing Performance of Machine Learning Models in Healthcare: An Analytical Framework for Assessing and Improving Data Quality  5th
Enhancing Performance of Machine Learning Models in Healthca...
收藏 引用
5th International Conference on Advances in information Communication Technology and Computing, AICTC 2024
作者: Al-Hgaish, Areen Atan, Rodziah Yaakob, Razali Osman, Mohd Hafeez Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang44330 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang44330 Malaysia
The utilization of Data-Driven Machine Learning (DDML) models in the healthcare sector poses unique challenges due to the crucial nature of clinical decision-making and its impact on patient outcomes. A primary concer... 详细信息
来源: 评论
History of Artificial Lighting, From Fire to LED [History]
收藏 引用
IEEE INDUSTRY APPLICATIONS MAGAZINE 2025年 第2期31卷 10-25页
作者: Canale, Laurent Hamady, Mohamad S & C Electric Company Chicago Illinois USA Research Engineer CNRS LAPLACE Laboratory UMR 5213 Paul Sabatier University Toulouse Cedex 9 France Computer Systems Department Faculty of Computer and Information Sciences Ain Shams University Cairo Cairo Egypt
Having become so present and accessible, artificial light has been forgotten in the same way as the air we breathe. It is obvious and is only noticed by its often-exceptional absence. Its omnipresence is such that it ... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
A Framework for Identifying Influential Spreaders of Drug Use in Online Social Networks
A Framework for Identifying Influential Spreaders of Drug Us...
收藏 引用
2025 International Conference on Intelligent Control, Computing and Communications, IC3 2025
作者: Al-Ghannam, Reem Ykhlef, Mourad Al-Dossari, Hmood College of Computer and Information Sciences King Saud University Information Systems Department Riyadh Saudi Arabia
Online social networks have become key platforms for spreading drug-related content, which presents a risk to the public, especially for people who are more susceptible to drug use and addiction. Generating vast amoun... 详细信息
来源: 评论
A Neutrosophic Approach to Robust Web Security: Mitigating XSS Attacks
收藏 引用
Neutrosophic Sets and systems 2025年 79卷 1-22页
作者: Salama, A.A. Aboelfotoh, El-Said F. El-Bakry, Hazem M. Khalid, Huda E. Essa, Ahmed K. Sabbagh, Ramiz El-Morshedy, Doaa S. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Information Systems Faculty of Computers and Information Mansoura University Mansoura Egypt Telafer University Telafer Iraq Department of the Scientific Affairs Telafer University Mosul Iraq
Cross-Site Scripting (XSS) is one of the most grievous vulnerabilities-a pitfall through which web applications are affected. These types of attacks are complex, and the available threat landscape is always changing, ... 详细信息
来源: 评论
Exploring The Role of Interpretability in Adversarial Defense Mechanisms based Malware Classification  6
Exploring The Role of Interpretability in Adversarial Defens...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Alhawari, Assem Ebadinezhad, Sahar Department of Computer Information Systems Near East University Nicosia99138 Cyprus Near East University Nicosia99138 Cyprus
This systematic literature review (SLR) presents a comprehensive overview of the current state of interpretability techniques in malware classification based on adversarial defense mechanisms, challenges, and future d... 详细信息
来源: 评论