咨询与建议

限定检索结果

文献类型

  • 1,316 篇 期刊文献
  • 1,110 篇 会议
  • 15 册 图书

馆藏范围

  • 2,441 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,583 篇 工学
    • 1,029 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 353 篇 信息与通信工程
    • 239 篇 控制科学与工程
    • 206 篇 电气工程
    • 202 篇 电子科学与技术(可...
    • 157 篇 生物工程
    • 148 篇 生物医学工程(可授...
    • 120 篇 机械工程
    • 113 篇 光学工程
    • 93 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 68 篇 化学工程与技术
    • 66 篇 网络空间安全
    • 56 篇 土木工程
    • 52 篇 材料科学与工程(可...
  • 837 篇 理学
    • 410 篇 数学
    • 230 篇 物理学
    • 191 篇 生物学
    • 122 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 72 篇 化学
  • 438 篇 管理学
    • 302 篇 管理科学与工程(可...
    • 133 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 204 篇 医学
    • 168 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 76 篇 公共卫生与预防医...
    • 70 篇 药学(可授医学、理...
  • 67 篇 法学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 42 篇 农学
  • 21 篇 教育学
  • 8 篇 军事学
  • 6 篇 文学
  • 5 篇 艺术学

主题

  • 100 篇 deep learning
  • 88 篇 machine learning
  • 48 篇 educational inst...
  • 46 篇 accuracy
  • 45 篇 feature extracti...
  • 43 篇 computer science
  • 43 篇 artificial intel...
  • 33 篇 internet of thin...
  • 33 篇 training
  • 30 篇 computational mo...
  • 29 篇 optimization
  • 28 篇 data mining
  • 26 篇 security
  • 25 篇 data models
  • 24 篇 cloud computing
  • 24 篇 energy efficienc...
  • 23 篇 support vector m...
  • 23 篇 real-time system...
  • 23 篇 protocols
  • 22 篇 neural networks

机构

  • 50 篇 department of co...
  • 50 篇 univ. system of ...
  • 34 篇 college of compu...
  • 28 篇 national enginee...
  • 25 篇 department of in...
  • 21 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 frontiers scienc...
  • 17 篇 peng cheng labor...
  • 16 篇 department of in...
  • 16 篇 department of co...
  • 14 篇 department of co...
  • 13 篇 research centre ...
  • 13 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of el...
  • 12 篇 department of co...
  • 12 篇 college of compu...
  • 11 篇 department of co...
  • 11 篇 department of ap...

作者

  • 52 篇 john g. meinke
  • 39 篇 abdelwahed motwa...
  • 30 篇 mesfer al duhayy...
  • 25 篇 ishfaq yaseen
  • 25 篇 manar ahmed hamz...
  • 22 篇 mohamed k.nour
  • 21 篇 abu sarwar zaman...
  • 18 篇 anwer mustafa hi...
  • 18 篇 saud s.alotaibi
  • 17 篇 wang xingjun
  • 16 篇 abdullah mohamed
  • 14 篇 radwa marzouk
  • 14 篇 mohamed i.eldeso...
  • 14 篇 shu haowen
  • 13 篇 bowers john e.
  • 12 篇 ahmad almadhor
  • 12 篇 chang lin
  • 12 篇 huang chongwen
  • 11 篇 mohammed rizwanu...
  • 11 篇 yuen chau

语言

  • 2,263 篇 英文
  • 135 篇 其他
  • 40 篇 中文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer System and Networks College of Computer Science"
2441 条 记 录,以下是31-40 订阅
排序:
Using the data mining technique to predict successful customer engagement of marketing campaigns in social media
收藏 引用
International Journal of Business Intelligence and Data Mining 2023年 第2期23卷 166-183页
作者: Al Rabaani, Fatema Salim Said, Aiman Moyaid Fageeri, Sallam Osman AlAbdulsalam, Abdul Rahman Khalifa Department of Information System College of Economics Management and Information System University of Nizwa Nizwa Oman Department of Computer Science Sultan Qaboos University Muscat Oman
Marketing in social media platforms plays a vital role in enhancing the return of investment for start-up companies in the fashion industry. Predicting the level of customer engagement of the marketing campaign in soc... 详细信息
来源: 评论
Parameter Tuned Deep Learning Based Traffic Critical Prediction Model on Remote Sensing Imaging
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3993-4008页
作者: Sarkar Hasan Ahmed Adel Al-Zebari Rizgar R.Zebari Subhi R.M.Zeebaree Computer Networks Department Sulaimani Polytechnic UniversitySulaimaniIraq Information Technology Department Technical College of Informatics-AkreDuhok Polytechnic UniversityIraq Computer Science Department College of ScienceNawroz UniversityDuhokIraq Energy Eng.Department Technical College of EngineeringDuhok Polytechnic UniversityDuhokIraq
Remote sensing(RS)presents laser scanning measurements,aerial photos,and high-resolution satellite images,which are utilized for extracting a range of traffic-related and road-related *** has a weakness,such as traffi... 详细信息
来源: 评论
Developing an Attack Model for compromising Privacy over Secure Connection Protocols  6
Developing an Attack Model for compromising Privacy over Sec...
收藏 引用
6th IEEE International Conference on computer and Communication Engineering Technology, CCET 2023
作者: Almakdi, Sultan Alshehri, Mohammed S. College of Computer Science and Information System Najran University Department of Computer Science Najran Saudi Arabia
Nowadays with the advancement in the IoT, Man-In-The-Middle (MITM) attack is classified as one of the major concerns for network security experts since it is very hard to detect. It directly affects the data being tra... 详细信息
来源: 评论
LCEFL: A Lightweight Contribution Evaluation Approach for Federated Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6643-6657页
作者: Guo, Jingjing Li, Jiaxing Liu, Zhiquan Xiong, Yupeng Ma, Yong Vasilakos, Athanasios V. Li, Xinghua Ma, Jianfeng Xidian University School of Cyber Engineering Xi’an710071 China Jinan University College of Cyber Security Guangzhou510632 China Jiangxi Normal University Department of Computer Science and Technology Nanchang330022 China Department of Networks and Communications College of Computer Science and Information Technology Dammam31441 Saudi Arabia Grimstad4879 Norway
The prerequisite for implementing incentive mechanisms and reliable participant selection schemes in federated learning is to obtain the contribution of each participant. Available evaluation methods for participant c... 详细信息
来源: 评论
Query Optimization Framework for Graph Database in Cloud Dew Environment
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 2317-2330页
作者: Tahir Alyas Ali Alzahrani Yazed Alsaawy Khalid Alissa Qaiser Abbas Nadia Tabassum Department of Computer Science Lahore Garrison UniversityLahorePakistan Faculty of Computer Science and Information Systems Islamic University Madinah Madinah42351Saudi Arabia Networks and Communications Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Science Virtual University of PakistanLahorePakistan
The query optimizer uses cost-based optimization to create an execution plan with the least cost,which also consumes the least amount of *** challenge of query optimization for relational database systems is a combina... 详细信息
来源: 评论
Enhancing Secure Development in Globally Distributed Software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 5031-5049页
作者: Marya Iqbal Yaser Hafeez Nabil Almashfi Amjad Alsirhani Faeiz Alserhani Sadia Ali Mamoona Humayun Muhammad Jamal University Institute of Information Technology PMAS-Arid Agriculture UniversityRawalpindiPakistan Department of Software Engineering College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Science College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Engineering&Networks College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Information Systems College of Computer and Information SciencesJouf UniversitySakakaAl Jouf72388Saudi Arabia Department of Mathematics Pir Mehr Ali Shah Arid Agriculture UniversityRawalpindiPakistan
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL var... 详细信息
来源: 评论
Fusion Strategy for Improving Medical Image Segmentation
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3627-3646页
作者: Fahad Alraddady E.A.Zanaty Aida HAbu bakr Walaa M.Abd-Elhafiez Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Information System Department Faculty of Computers and InformationSohag UniversitySohagEgypt Mathematical and Computer Science Department Faculty of ScienceAswan UniversityAswanEgypt College of Computer Science&Information Technology Jazan UniversityJazanKingdom of Saudi Arabia Computer Science Department Faculty of Computers and Artificial IntelligenceSohag UniversitySohagEgypt
In this paper,we combine decision fusion methods with four metaheuristic algorithms(Particle Swarm Optimization(PSO)algorithm,Cuckoo search algorithm,modification of Cuckoo Search(CS McCulloch)algorithm and Genetic al... 详细信息
来源: 评论
Enhanced Neutrosophic Set and Machine Learning Approach for Kidney Disease Prediction
收藏 引用
Neutrosophic Sets and systems 2025年 80卷 465-477页
作者: Al-Doori, Humam M. Alkellezli, Tareef S. Abdelhafeez, Ahmed Eassaa, Mohamed Sawah, Mohamed S. El-Douh, Ahmed A. Cybersecurity Sciences Department College of Science Ashur University Baghdad Iraq Cybersecurity Engineering Department College of Engineering Ashur University Baghdad Iraq Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan Cybersecurity Technology Engineering Department College of Engineering Technology Ashur University Baghdad Iraq
Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and... 详细信息
来源: 评论
Multi-agent QoS-aware autonomic resource provisioning framework for elastic BPM in containerized multi-cloud environment
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12895-12920页
作者: Saif, Mufeed Ahmed Naji Niranjan, S.K. Murshed, Belal Abdullah Hezam Al-ariki, Hasib Daowd Esmail Abdulwahab, Hudhaifa Mohammed Department of Computer Applications Sri Jayachamarajendra College of Engineering VTU Mysore India Department of Studies in Computer Science University of Mysore Karnataka Mysore India Department of Computer Science College of Eng. &IT University of Amran Amran Yemen Department of Information Technology Faculty of Engineering and Information Technology Al-ata’a University for Science and Technology Taiz Yemen Department of Computer Networks Engineering and Technologies Sana’a Community College Sana’a Yemen Department of Computer Application Ramaiah Institute of Technology VTU Bangalore India
Cloud computing enables businesses to improve their market competitiveness, enabling instant and easy access to a pool of virtualized and distributed resources such as virtual machines (VM) and containers for executin... 详细信息
来源: 评论
Public Key Infrastructure Approaches Based on Blockchain  21
Public Key Infrastructure Approaches Based on Blockchain
收藏 引用
21st International Multi-Conference on systems, Signals and Devices, SSD 2024
作者: Alani, Dena S. Sagheer, Ali M College of Education for Women University of Anbar Anbar Iraq College of Computer Science and Information Technology University of Anbar Department of Computer Networks Systems Anbar Iraq
Public-key infrastructure or PKI, is the fundamental technology that makes safe online information sharing possible. But PKI is vulnerable to failures of Certificate Authorities (CAs), which could allow illegal certif... 详细信息
来源: 评论