咨询与建议

限定检索结果

文献类型

  • 1,498 篇 期刊文献
  • 1,270 篇 会议
  • 60 册 图书

馆藏范围

  • 2,828 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,649 篇 工学
    • 1,166 篇 计算机科学与技术...
    • 931 篇 软件工程
    • 353 篇 信息与通信工程
    • 327 篇 控制科学与工程
    • 220 篇 电气工程
    • 192 篇 电子科学与技术(可...
    • 187 篇 生物工程
    • 158 篇 机械工程
    • 157 篇 生物医学工程(可授...
    • 114 篇 光学工程
    • 92 篇 仪器科学与技术
    • 79 篇 动力工程及工程热...
    • 77 篇 网络空间安全
    • 67 篇 化学工程与技术
    • 64 篇 交通运输工程
    • 55 篇 材料科学与工程(可...
  • 1,024 篇 理学
    • 445 篇 物理学
    • 384 篇 数学
    • 231 篇 生物学
    • 115 篇 统计学(可授理学、...
    • 99 篇 系统科学
    • 78 篇 化学
  • 512 篇 管理学
    • 347 篇 管理科学与工程(可...
    • 181 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 216 篇 医学
    • 174 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 78 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 70 篇 法学
    • 58 篇 社会学
  • 52 篇 经济学
  • 51 篇 农学
  • 37 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 116 篇 deep learning
  • 85 篇 machine learning
  • 66 篇 artificial intel...
  • 47 篇 proton-proton in...
  • 47 篇 information tech...
  • 47 篇 feature extracti...
  • 43 篇 internet of thin...
  • 40 篇 optimization
  • 40 篇 accuracy
  • 37 篇 computational mo...
  • 35 篇 computer science
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 35 篇 training
  • 33 篇 testing
  • 31 篇 predictive model...
  • 30 篇 convolutional ne...
  • 29 篇 covid-19
  • 29 篇 collisions (nucl...
  • 29 篇 nuclear counters

机构

  • 166 篇 faculty of scien...
  • 166 篇 departamento de ...
  • 165 篇 department for p...
  • 165 篇 department of ph...
  • 164 篇 department of ph...
  • 161 篇 faculté des scie...
  • 161 篇 yerevan physics ...
  • 158 篇 kirchhoff-instit...
  • 157 篇 department of ph...
  • 157 篇 department of ph...
  • 156 篇 department of ph...
  • 154 篇 institute of phy...
  • 152 篇 institute of phy...
  • 150 篇 fakultät für phy...
  • 150 篇 physikalisches i...
  • 147 篇 national scienti...
  • 147 篇 dsm/irfu cea sac...
  • 147 篇 instituto de fís...
  • 146 篇 physics departme...
  • 143 篇 institut für ast...

作者

  • 162 篇 c. alexa
  • 162 篇 j. m. izen
  • 162 篇 k. bos
  • 162 篇 g. bella
  • 162 篇 j. strandberg
  • 162 篇 d. calvet
  • 162 篇 c. amelung
  • 162 篇 h. a. gordon
  • 162 篇 g. spigo
  • 162 篇 e. hines
  • 162 篇 a. c. könig
  • 161 篇 f. siegert
  • 160 篇 m. klein
  • 159 篇 r. ströhmer
  • 158 篇 h. sakamoto
  • 158 篇 s. nektarijevic
  • 158 篇 m. rijssenbeek
  • 158 篇 f. marroquim
  • 158 篇 s. jin
  • 158 篇 g. gaudio

语言

  • 2,681 篇 英文
  • 132 篇 其他
  • 9 篇 日文
  • 9 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Section Computer Engineering Faculty of Information Technology and Systems"
2828 条 记 录,以下是291-300 订阅
排序:
Monkeypox Detection with Deep-Learning and Ensemble of Features: A Study  4
Monkeypox Detection with Deep-Learning and Ensemble of Featu...
收藏 引用
4th International Conference on Technological Advancements in Computational Sciences, ICTACS 2024
作者: Rajinikanth, Venkatesan Taniar, David Damaševičius, Robertas Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Division of Research and Innovation Department of Computer Science and Engineering TN Chennai602105 India Monash University Faculty of Information Technology MelbourneVIC3800 Australia Centre of Real Time Computer Systems Kaunas University of Technology Kaunas44249 Lithuania
There is a growing global prevalence of infectious diseases in the human population and it is imperative to have precise diagnosis and therapy in order to effectively cure these diseases. Monkeypox (Mpox) is an infect... 详细信息
来源: 评论
Enhancing Image Security with Rossler Attractor-Based Encryption
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Hazem Al-Najjar Nadia Al-Rousan Department of Computer science Faculty of information technology University of Petra Amman Jordan Department of Computer Engineering Faculty of electrical Engineering and information systems German Jordanian University
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
Analysis and Assessment of Wind Energy Potential of Socotra Archipelago in Yemen
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 1177-1193页
作者: Murad A.Almekhlafi Fahd N.Al-Wesabi Imran Khan Nadhem Nemri Khalid Mahmood Hany Mahgoub Noha Negm Amin M.El-Kustaban Ammar Zahary Department of Electrical Engineering–Communication Engineering Sana’a UniversityYemen Department of Computer Science King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Faculty of Computer and IT Sana’a UniversitySana’aYemen Department of Electrical Engineering University of Engineering and TechnologyPeshawarP.O.B 814Pakistan Department of Information Systems King Khalid UniversityMayahel AseerKSA Computer Science Department King Khaled UniversityKSA&Faculty of Computers and InformationComputer Science DepartmentMenoufia UniversityEgypt Computer Science Department King Khaled UniversityKSA&Faculty of ScienceDepartment of Mathematics and Computer ScienceMenoufia UniversityEgypt Electronics Department Faculty of EngineeringUSTSana’aYemen Faculty of Computer and IT Sana’a UniversityYemen
The increasing use of fossil fuels has a significant impact on the environment and ecosystem,which increases the rate of *** the high potential of renewable energy sources inYemen and the absence of similar studies in... 详细信息
来源: 评论
Robust speech perception and classification-driven deep convolutional neural network with natural language processing
收藏 引用
Alexandria engineering Journal 2025年 123卷 358-368页
作者: Alshammari, Alya Alzaidi, Muhammad Swaileh A. Alrusaini, Othman Alshuhail, Asma Allafi, Randa Yafoz, Ayman Alsini, Raed Khadidos, Alaa O. Department of Applied Linguistics College of Languages Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of English Language College of Language Sciences King Saud University P. O. Box 145111 Riyadh Saudi Arabia Department of Engineering and Applied Sciences Applied College Umm Al-Qura University Makkah Saudi Arabia Department of Information Systems College of Computer Sciences & Information Technology King Faisal University Saudi Arabia Department of Computer Science College of Sciences Northern Border University Arar Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
Speech recognition systems use computer algorithms to interpret and process spoken words and translate them into text. Speech-to-text, or Speech detection, is the proficiency of a program or machine to find spoken wor... 详细信息
来源: 评论
An Optimal Scheme for WSN Based on Compressed Sensing
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1053-1069页
作者: Firas Ibrahim AlZobi Ahmad Ali AlZubi Kulakov Yurii Abdullah Alharbi Jazem Mutared Alanazi Sami Smadi Department of Information Systems and Networks Faculty of Information TechnologyThe World Islamic Sciences&Education UniversityJordan Computer Science Department Community CollegeKing Saud UniversitySaudi Arabia Department of Computer Engineering National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic InstituteUkraine
Wireless sensor networks(WSNs)is one of the renowned ad hoc network technology that has vast varieties of applications such as in computer networks,bio-medical engineering,agriculture,industry and many *** has been us... 详细信息
来源: 评论
An Optimized Algorithm for Resource Allocation for D2D in Heterogeneous Networks
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2923-2936页
作者: Abdul Kadir Hamid Fahd N.Al-Wesabi Nadhem Nemri Ammar Zahary Imran Khan Department of Electrical&Computer Engineering University of SharjahSharjahUnited Arab Emirates Department of Computer Science King Khalid UniversityMuhayel AseerKSA Faculty of Computer and IT Sana’a UniversitySanaaYemen Department of Information Systems King Khalid UniversityMayahel AseerKSA Department of Electrical Engineering University of Engineering and TechnologyPeshawarPaki
With the emergence of 5G mobile multimedia services,end users’demand for high-speed,low-latency mobile communication network access is *** them,the device-to-device(D2D)communication is one of the considerable *** D2... 详细信息
来源: 评论
SpamVis: A Visual Interactive System for Spam Review Detection  28th
SpamVis: A Visual Interactive System for Spam Review Detecti...
收藏 引用
28th International Conference on Knowledge Based and Intelligent information and engineering systems, KES 2024
作者: Lam, Nguyen Thanh Thao Le, Nu Uyen Phuong Islam, Md Rafiqul Sakib, Md KowsarHossain Prome, Shanjita Akter Sanin, Cesar Szczerbicki, Edward Zhou, Jianlong College of Business & Management VinUniversity Hanoi12426 Viet Nam Faculty of Engineering Architecture and Information Technology University of Queensland BrisbaneQLD4072 Australia Business Information Systems Australian Institute of Higher Education SydneyNSW Australia School of Computer Science Taylor's University Malaysia Faculty of Management and Economics Gdansk University of Technology Gdansk Poland School of Computer Science University of Technology Sydney Australia
In recent times, the number of spam reviews through various online platforms has emerged as a prime challenge, profoundly impacting businesses and consumers. These fake reviews not only distort clients' perception... 详细信息
来源: 评论
A Dynamic Resource-Aware Routing Protocol in Resource-Constrained Opportunistic Networks
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 4147-4167页
作者: Aref Hassan Kurd Ali Halikul Lenando Slim Chaoui Mohamad Alrfaay Medhat A.Tawfeek Department of Computer Systems and Communication Technologies Faculty of Computer Science and Information TechnologyUniversiti Malaysia Sarawak(UNIMAS)Kota Samarahan94300Malaysia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka2014KSA Unit-Lab of Sciences of Electronics Technologies of Information and TelecommunicationsSfax UniversitySfaxTunisia Department of Basic Sciences First Common Year DeanshipJouf UniversitySakaka2014KSA Department of Computer Sciences College of Computer and Information SciencesJouf UniversitySakaka2014KSA Department of Computer Sciences Faculty of Computers and InformationMenoufia UniversityEgypt
Recently,Opportunistic Networks(OppNets)are considered to be one of the most attractive developments of Mobile Ad Hoc Networks that have arisen thanks to the development of intelligent *** are characterized by a rough... 详细信息
来源: 评论
Historical Arabic Images Classification and Retrieval Using Siamese Deep Learning Model
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 2109-2125页
作者: Manal M.Khayyat Lamiaa A.Elrefaei Mashael M.Khayyat Computer Science Department Umm Al-Qura UniversityMakkahSaudi Arabia Computer Science Department King Abdulaziz UniversityJeddahSaudi Arabia Electrical Engineering Department Faculty of Engineering at ShoubraBenha UniversityCairoEgypt Department of Information Systems and Technology College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia
Classifying the visual features in images to retrieve a specific image is a significant problem within the computer vision field especially when dealing with historical faded colored ***,there were lots of efforts try... 详细信息
来源: 评论
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5607-5623页
作者: Abdallah Elhigazi Abdallah Mosab Hamdan Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih Faculty of Engineering Future UniversityKhartoum 10553Sudan Faculty of Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400Malaysia Information Assurance and Security Research School of ComputingUniversiti Teknologi MalaysiaJohor81310Malaysia School of Psychology and Computer Science University of Central LancashirePreston PR12HEUK Deaptement of Management Information Systems College of Administrative ScienceApplied Science UniversityAl Eker623Bahrain Deaptement of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh11461Saudi Arabia
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 *** to the data transmission nature of the wireless local area netw... 详细信息
来源: 评论