咨询与建议

限定检索结果

文献类型

  • 1,487 篇 期刊文献
  • 1,268 篇 会议
  • 60 册 图书

馆藏范围

  • 2,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,630 篇 工学
    • 1,156 篇 计算机科学与技术...
    • 921 篇 软件工程
    • 350 篇 信息与通信工程
    • 323 篇 控制科学与工程
    • 216 篇 电气工程
    • 189 篇 电子科学与技术(可...
    • 185 篇 生物工程
    • 156 篇 机械工程
    • 153 篇 生物医学工程(可授...
    • 110 篇 光学工程
    • 91 篇 仪器科学与技术
    • 79 篇 动力工程及工程热...
    • 75 篇 网络空间安全
    • 65 篇 化学工程与技术
    • 64 篇 交通运输工程
  • 1,016 篇 理学
    • 443 篇 物理学
    • 382 篇 数学
    • 230 篇 生物学
    • 114 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 75 篇 化学
  • 513 篇 管理学
    • 349 篇 管理科学与工程(可...
    • 180 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 216 篇 医学
    • 174 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 77 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 70 篇 法学
    • 57 篇 社会学
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 51 篇 农学
  • 38 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 112 篇 deep learning
  • 84 篇 machine learning
  • 67 篇 artificial intel...
  • 48 篇 feature extracti...
  • 47 篇 proton-proton in...
  • 47 篇 information tech...
  • 43 篇 internet of thin...
  • 41 篇 optimization
  • 40 篇 accuracy
  • 37 篇 computational mo...
  • 36 篇 training
  • 35 篇 computer science
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 33 篇 testing
  • 31 篇 predictive model...
  • 30 篇 convolutional ne...
  • 29 篇 covid-19
  • 29 篇 collisions (nucl...
  • 29 篇 nuclear counters

机构

  • 166 篇 faculty of scien...
  • 166 篇 departamento de ...
  • 165 篇 department for p...
  • 165 篇 department of ph...
  • 164 篇 department of ph...
  • 161 篇 faculté des scie...
  • 161 篇 yerevan physics ...
  • 158 篇 kirchhoff-instit...
  • 157 篇 department of ph...
  • 157 篇 department of ph...
  • 156 篇 department of ph...
  • 154 篇 institute of phy...
  • 152 篇 institute of phy...
  • 150 篇 fakultät für phy...
  • 150 篇 physikalisches i...
  • 148 篇 instituto de fís...
  • 147 篇 national scienti...
  • 147 篇 dsm/irfu cea sac...
  • 147 篇 physics departme...
  • 143 篇 institut für ast...

作者

  • 162 篇 c. alexa
  • 162 篇 j. m. izen
  • 162 篇 k. bos
  • 162 篇 g. bella
  • 162 篇 j. strandberg
  • 162 篇 d. calvet
  • 162 篇 c. amelung
  • 162 篇 h. a. gordon
  • 162 篇 g. spigo
  • 162 篇 e. hines
  • 162 篇 a. c. könig
  • 161 篇 f. siegert
  • 160 篇 m. klein
  • 159 篇 r. ströhmer
  • 158 篇 h. sakamoto
  • 158 篇 s. nektarijevic
  • 158 篇 m. rijssenbeek
  • 158 篇 f. marroquim
  • 158 篇 s. jin
  • 158 篇 g. gaudio

语言

  • 2,717 篇 英文
  • 84 篇 其他
  • 9 篇 日文
  • 9 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Section Computer Engineering Faculty of Information Technology and Systems"
2815 条 记 录,以下是1-10 订阅
排序:
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Performance *** Comparative Analysis of Multimodal Bilinear Pooling Fusion Approaches for Deep Learning-Based Visual Arabic-Question Answering systems
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 373-411页
作者: Sarah M.Kamel Mai A.Fadel Lamiaa Elrefaei Shimaa I.Hassan Electrical Engineering Department Faculty of Engineering at ShoubraBenha UniversityCairo11629Egypt Computer Science Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer and Systems Engineering Faculty of Engineering and TechnologyBadr University in Cairo(BUC)Cairo11829Egypt Communication Systems Engineering Department Faculty of EngineeringBenha National UniversityObour11846QalyubiaEgypt
Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
Bidirectional attentional mechanism for Arabic chatbot
收藏 引用
International Journal of information technology (Singapore) 2024年 第5期16卷 3109-3120页
作者: Youness, Farida Elshenawy, Ayman Makour, Mohamed Ashraf Systems and Computer Engineering Department Faculty of Engineering Al-Azhar University Cairo Egypt Software Engineering and Information Technology Department Faculty of Engineering and Technology Egyptian Chinees University Cairo Egypt
A chatbot is an intelligent agent that developed based on Natural language processing (NLP) to interact with people in a natural language. The development of multiple deep NLP models has allowed for the creation ... 详细信息
来源: 评论
Enhancing Image Security with Rossler Attractor-Based Encryption  2
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia University Of Petra Faculty Of Information Technology Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
A three-step SEM-Bayesian network approach for predicting the determinants of CloudIoT-based healthcare adoption
收藏 引用
International Journal of information technology (Singapore) 2024年 1-21页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
Adopting the CloudIoT-based healthcare paradigm provides various prospects for medical IT and considerably enhances healthcare services. However, compared to the advanced development of CloudIoT-based healthcare syste... 详细信息
来源: 评论
Assessing and prioritizing crucial drivers for CloudIoT-based healthcare adoption: an analytic hierarchy process approach
收藏 引用
International Journal of information technology (Singapore) 2024年 1-18页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
The CloudIoT paradigm has profoundly transformed the healthcare industry, providing outstanding innovation and practical applications. However, despite its many advantages, the adoption of this paradigm in healthcare ... 详细信息
来源: 评论