咨询与建议

限定检索结果

文献类型

  • 61 篇 会议
  • 44 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 106 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 36 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 15 篇 信息与通信工程
    • 8 篇 电气工程
    • 7 篇 控制科学与工程
    • 7 篇 生物工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物医学工程(可授...
    • 4 篇 机械工程
    • 4 篇 仪器科学与技术
    • 3 篇 光学工程
    • 3 篇 化学工程与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 44 篇 理学
    • 19 篇 物理学
    • 15 篇 数学
    • 9 篇 生物学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
  • 22 篇 管理学
    • 15 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 10 篇 医学
    • 8 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 4 篇 法学
    • 4 篇 社会学
  • 2 篇 教育学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 农学

主题

  • 3 篇 deep learning
  • 3 篇 optical fiber se...
  • 3 篇 resource descrip...
  • 3 篇 semantics
  • 3 篇 feature extracti...
  • 3 篇 artificial intel...
  • 3 篇 smart cards
  • 3 篇 accuracy
  • 2 篇 conferences
  • 2 篇 polarization
  • 2 篇 support vector m...
  • 2 篇 networks integra...
  • 2 篇 fingerprint reco...
  • 2 篇 wimax
  • 2 篇 containers
  • 2 篇 ontologies
  • 2 篇 information tech...
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 light polarizati...

机构

  • 3 篇 masaryk universi...
  • 3 篇 department of co...
  • 3 篇 university of de...
  • 3 篇 brno university ...
  • 2 篇 department of op...
  • 2 篇 faculty of compu...
  • 2 篇 science and tech...
  • 2 篇 department of ci...
  • 2 篇 department of ar...
  • 2 篇 college of engin...
  • 2 篇 faculty of defen...
  • 2 篇 faculty of milit...
  • 2 篇 department. of c...
  • 2 篇 department of in...
  • 2 篇 firat university...
  • 2 篇 department of co...
  • 2 篇 universiti perta...
  • 2 篇 department of te...
  • 2 篇 department of el...
  • 2 篇 department of ma...

作者

  • 7 篇 grenar david
  • 7 篇 slavicek karel
  • 7 篇 kyselak martin
  • 6 篇 vavra jiri
  • 5 篇 pamucar dragan
  • 4 篇 deveci muhammet
  • 4 篇 sembok tengku mo...
  • 3 篇 david grenar
  • 3 篇 jiri vavra
  • 3 篇 gokasar ilgin
  • 3 篇 martin kyselak
  • 3 篇 yuhanim hani yah...
  • 3 篇 karel slavicek
  • 3 篇 tengku mohd teng...
  • 3 篇 azman azreen
  • 3 篇 kadir rabiah abd...
  • 3 篇 syarifah bahiyah...
  • 3 篇 ting mary
  • 2 篇 karthickeien ela...
  • 2 篇 kashif nazar

语言

  • 106 篇 英文
检索条件"机构=Computer Science Department. Faculty of Science and Defence Technology"
106 条 记 录,以下是1-10 订阅
排序:
Predicting Student Behavior Using a Neutrosophic Deep Learning Model
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 288-310页
作者: Shitaya, Ahmed Mohamed Wahed, Mohamed El Syed Abd El Khalek, Saied Helemy Ismail, Amr Shams, Mahmoud Y. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Computer Science Faculty of computer and information sciences Suez Canal University Egypt Department. of Communication and Computer Engineering Air Defense University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat... 详细信息
来源: 评论
A Novel Framework for Gauging Information Extracted from Smartphones Using Neutrosophic Logic
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 154-171页
作者: Abou Alzahab, R.M. Ismail, Amr Abd Elkhalik, S.H. Shams, M.Y. El-Bakry, H.M. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Department. of Communication and Computer Engineering Air Defense University Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Department of Information Systems. Faculty of Computer and Information Science Mansoura University Egypt
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and... 详细信息
来源: 评论
Long-Distance Fiber-Optic Polarization Sensors in Hazardous Areas
Long-Distance Fiber-Optic Polarization Sensors in Hazardous ...
收藏 引用
National Conference on Communications (NCC)
作者: Martin Kyselak Zdenek Vylezich Jiri Vavra David Grenar Karel Slavicek Department of Electrical Engineering Faculty of Military Technology University of Defence Brno Czech Republic Dept. of Telecommunications Faculty of Electrical Eng. and Communication University of Technology Brno Czech Republic IT Infrastructure Division Institute of Computer Science Masaryk University Brno Czech Republic
Due to their non-electrical characteristics, fiber-optic sensors are finding broad applications in high-risk environments. The safety of these sensors is ensured by the absence of potential differences and low detecta... 详细信息
来源: 评论
An intelligent ensemble EfficientNet prediction system for interpretations of cardiac magnetic resonance images in heart failure severity diagnosis
收藏 引用
Intelligence-Based Medicine 2025年 11卷 100218-100218页
作者: Muthulakshmi, Muthunayagam Venkatesan, Kotteswaran Prasanalakshmi, Balaji Syarifah Bahiyah, Rahayu Divya, Vijayakumar Department of Electronics and Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Chennai 601103 India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai 601103 India Department of Computer Science King Khalid University Abha Saudi Arabia Faculty of Defense Science and Technology National Defence University Malaysia Kuala Lumpur Malaysia
Ensemble models as part of federated learning leverage the ability of individual models to learn unique patterns from the training dataset to make more efficient predictions than single predicting systems. This study ... 详细信息
来源: 评论
Hybrid Machine Learning Approach for Enhanced Vulnerability Detection in Cloud Environments Using NIST and MITRE Frameworks
Hybrid Machine Learning Approach for Enhanced Vulnerability ...
收藏 引用
Advanced Research in Computing (ICARC), International Conference on
作者: N W Chanaka Lasantha M W P Maduranga Ruvan Abeysekara Valmik Tilwari Nilotpal Chakraborty Debashree Sharma Faculty of Graduate Studies IIC University of Technology Phnom Penh Cambodia Department of Electrical and Electronic Engineering University of Sri Jayewardenepura Nugegoda Sri Lanka Faculty of Computing BCAS Campus Colombo Sri Lanka Department. of Electronics & Communication Engineering Indian Institute of Information Technology Guwahati India Department of Computer Science Engineering Indian Institute of Information Technology Guwahati India Department of Electronics & Communication Engineering Indian Institute of Information Technology Guwahati India
Cloud security is challenged by constant adaptive cyber threats and traditional detection methods lack real time adaptability. In this paper, we propose a new hybrid ML approach stitching data from National Institute ... 详细信息
来源: 评论
Comparative analysis of resource-efficient YOLO models for rapid and accurate recognition of intestinal parasitic eggs in stool microscopy
收藏 引用
Intelligence-Based Medicine 2025年 11卷 100212-100212页
作者: Venkatesan, Kotteswaran Muthulakshmi, Muthunayagam Prasanalakshmi, Balaji Karthickeien, Elangovan Pabbisetty, Harshini Syarifah Bahiyah, Rahayu Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai 601103 India Department of Electronics and Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Chennai 601103 India Department of Computer Science King Khalid University Abha 61421 Saudi Arabia Faculty of Defense Science and Technology National Defence University Malaysia Kuala Lumpur 57000 Malaysia Cyber Security and Digital Industrial Revolution Centre National Defence University Malaysia Kuala Lumpur 57000 Malaysia
Faster and reliable recognition of the specific species of intestinal parasite eggs in stool microscopic images is required for targeted and quick intervention of soil transmitted helminths (STH) disease. The main obj... 详细信息
来源: 评论
Factors Influencing Users’ Satisfaction Towards Image Use in Social Media: A PLS-SEM Analysis
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第15期16卷 172-186页
作者: Ilias, Irma Syarlina Che Ramli, Suzaimah Wook, Muslihah Hasbullah, Nor Asiakin Department of Computer Science Faculty of Defense Science and Technology National Defence University of Malaysia Selangor Malaysia Computer Engineering Technology Section Malaysian Institute of Information Technology Universiti Kuala Lumpur Kuala Lumpur Malaysia
Images for social media are an essential component of any blog or social media post. As we now live in the age of the ‘camera in everyone’s pocket’, a new dynamic era of image creation and content has emerged. Howe... 详细信息
来源: 评论
Web Vulnerability Assessment: Outsource dilemmas
Web Vulnerability Assessment: Outsource dilemmas
收藏 引用
2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011
作者: Ahmad, Arniyati Ahmad, Siti Rohaidah Awang, Nor Fatimah Ali, Zulkarnain Md. Computer Science Department Faculty of Science and Defence Technology National Defence University of Malaysia 57000 Kuala Lumpur Malaysia Computer Science Department Faculty of Information Science and Technology National University of Malaysia 43600 Bangi Selangor Malaysia
Vulnerability Assessment (VAS) is a process to search for any potential loopholes contain in a system that lead to compromise it. It is important to do VAS on the system to make sure that it will be safely release and... 详细信息
来源: 评论
The design of fingerprint biometric authentication on smart card for pulapot main entrance system
The design of fingerprint biometric authentication on smart ...
收藏 引用
2010 International Symposium on Information technology, ITSim'10
作者: Isa, Mohd Rizal Mohd Yahaya, Yuhanim Hani Halip, Mohd Hazali Mohamed Khairuddin, Mohammad Adib Maskat, Kamaruzaman Department of Computer Science Faculty of Science and Defence Technology Universiti Pertahanan Nasional Malaysia Kuala Lumpur Malaysia
Biometrics personal authentication utilizing fingerprints have been thoroughly studied and applied. Exploiting the unique features of a fingerprint and the pleasant way of capturing the required information permits it... 详细信息
来源: 评论
Integrating Machine Learning Algorithms with EEG Signals to Identify Emotions Among University Students  7th
Integrating Machine Learning Algorithms with EEG Signals to ...
收藏 引用
7th Computational Methods in Systems and Software, CoMeSySo 2023
作者: Mohamad Amran, Mohd Fahmi Mohan, Venothanee Sundra Mohd Yusop, Nurhafizah Moziyana Yahaya, Yuhanim Hani Abd Rauf, Muhammad Fairuz Mat Razali, Noor Afiza Ali, Fazilatulaili Syed Ali, Sharifah Aishah Department of Computer Science Faculty of Defence Science and Technology Universiti Pertahanan Nasional Malaysia Kuala Lumpur Malaysia
Emotion level of the students during their academic sessions has a significant effect on their performance and overall academic grades. The most pre-eminent way of evaluating emotion levels is by analysing the EEG sig... 详细信息
来源: 评论