咨询与建议

限定检索结果

文献类型

  • 248 篇 会议
  • 140 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 226 篇 工学
    • 97 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 72 篇 信息与通信工程
    • 65 篇 电子科学与技术(可...
    • 34 篇 光学工程
    • 33 篇 电气工程
    • 29 篇 控制科学与工程
    • 19 篇 生物工程
    • 17 篇 机械工程
    • 17 篇 仪器科学与技术
    • 17 篇 航空宇航科学与技...
    • 15 篇 材料科学与工程(可...
    • 15 篇 冶金工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 动力工程及工程热...
    • 11 篇 网络空间安全
    • 9 篇 船舶与海洋工程
    • 8 篇 土木工程
  • 128 篇 理学
    • 57 篇 数学
    • 46 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 21 篇 生物学
    • 18 篇 系统科学
    • 8 篇 化学
    • 7 篇 海洋科学
  • 45 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 14 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 14 篇 医学
    • 13 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 7 篇 法学
  • 5 篇 经济学
  • 3 篇 军事学
  • 1 篇 农学

主题

  • 14 篇 neural networks
  • 13 篇 throughput
  • 11 篇 control systems
  • 9 篇 state estimation
  • 9 篇 optimal control
  • 9 篇 cost function
  • 8 篇 bandwidth
  • 8 篇 quality of servi...
  • 8 篇 interference
  • 8 篇 communication sy...
  • 8 篇 silicon photonic...
  • 8 篇 hardware
  • 7 篇 testing
  • 7 篇 wireless network...
  • 6 篇 deep learning
  • 6 篇 noise measuremen...
  • 6 篇 traffic control
  • 6 篇 computer archite...
  • 6 篇 signal to noise ...
  • 6 篇 switches

机构

  • 20 篇 frontiers scienc...
  • 18 篇 department of co...
  • 15 篇 department of el...
  • 14 篇 peng cheng labor...
  • 12 篇 national mobile ...
  • 12 篇 department of sy...
  • 10 篇 state key labora...
  • 10 篇 state key labora...
  • 9 篇 department of el...
  • 7 篇 department of el...
  • 7 篇 state key labora...
  • 7 篇 the national mob...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 peking universit...
  • 6 篇 signal and media...
  • 6 篇 school of engine...
  • 5 篇 centre for commu...
  • 5 篇 department of sy...
  • 5 篇 the department o...

作者

  • 19 篇 wang xingjun
  • 19 篇 a. alessandri
  • 19 篇 shu haowen
  • 18 篇 t. parisini
  • 17 篇 bowers john e.
  • 15 篇 chang lin
  • 14 篇 xingjun wang
  • 13 篇 xie weiqiang
  • 12 篇 r. zoppoli
  • 12 篇 haowen shu
  • 12 篇 shen bitao
  • 11 篇 m. baglietto
  • 11 篇 han zhu
  • 10 篇 yu shaohua
  • 9 篇 mostafa abotaleb
  • 9 篇 boes andreas
  • 9 篇 xu xingyuan
  • 9 篇 moss david j.
  • 9 篇 morandotti rober...
  • 9 篇 corcoran bill

语言

  • 369 篇 英文
  • 15 篇 其他
  • 4 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Computer and Communications System Engineering"
389 条 记 录,以下是1-10 订阅
Face image authentication scheme based on MTCNN and SLT
收藏 引用
Multimedia Tools and Applications 2025年 1-43页
作者: Thabit, Rasha Al-Askari, Mohanad A. Mohammed, Dunya Zeki Anaam, Elham Abdulwahab Mahmood, Zainab H. Jabbar, Dina Jamal Salih, Zahraa Aqeel Information System Department College of Computer Sciences and Information Technology University of Al-Anbar Al-Anbar Iraq Computer Engineering Department College of Engineering Al-Iraqia University Baghdad Iraq Electronic and Communications Engineering Department College of Engineering Gilgamesh University Baghdad Iraq Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia Department of Cybersecurity Engineering College of Information Engineering Al-Nahrain University Baghdad Iraq Electrical Engineering Technical Collage Middle Technical University Baghdad Iraq Department of Business Administration Alamaal University College Baghdad Iraq
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists... 详细信息
来源: 评论
R3 - Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic systems
收藏 引用
IEEE Access 2023年 11卷 119284-119312页
作者: Gabr, Mohamed Korayem, Yousef Chen, Yen-Lin Yee, Por Lip Ku, Chin Soon Alexan, Wassim Faculty of Media Engineering and Technology Computer Science Department Cairo11835 Egypt National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia Faculty of Information Engineering and Technology Communications Department Cairo11835 Egypt New Administrative Capital Mathematics Department Cairo13507 Egypt
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Ch... 详细信息
来源: 评论
Comparator Design Resistance Mitigation by using Cadence Virtuoso Tools in 45 Nanometer Process Technology
Comparator Design Resistance Mitigation by using Cadence Vir...
收藏 引用
2023 IEEE International Conference on Sensors and Nanotechnology, SENNANO 2023
作者: Syn Yi, Michelle Ang Hussin, Razaidi Rokhani, Fakhrul Zaman University Malaysia Perlis Faculty of Electronic Engineering Technology Arau Malaysia University Putra Malaysia UPM Department of Computer and Communications System Engineering Serdang Malaysia
This paper presents the resistance mitigation techniques for comparator design. Resistance plays an important role to semiconductor field. If resistance value higher than the design specification value, this might cau... 详细信息
来源: 评论
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2695-2709页
作者: Reem Alkanhel Doaa Sami Khafaga El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science University of Engineering and TechnologyTaxilaPakistan Department of System Programming South Ural State UniversityChelyabinsk454080Russia
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw... 详细信息
来源: 评论
Al-Biruni Earth Radius Optimization for COVID-19 Forecasting
收藏 引用
computer systems Science & engineering 2023年 第7期46卷 883-896页
作者: El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Tatiana Makarovskikh Amal H.Alharbi Doaa Sami Khafaga Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura University35516MansouraEgypt Department of System Programming South Ural State University454080ChelyabinskRussia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve... 详细信息
来源: 评论
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4531-4545页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论
Al-Biruni Based Optimization of Rainfall Forecasting in Ethiopia
收藏 引用
computer systems Science & engineering 2023年 第6期45卷 2885-2899页
作者: El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Fadwa Alrowais Mostafa Abotaleb Abdelhameed Ibrahim Doaa Sami Khafaga Department of Communications and Elecronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science F aculty of Computer and Infomation SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Progamming South Ual State UniversityChelyabinsk454080Russia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt
Rainfall plays a significant role in managing the water level in the *** unpredictable amount of rainfall due to the climate change can cause either overflow or dry in the *** individuals,especially those in the agric... 详细信息
来源: 评论
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论
QUBO Matrix Distorting Method for Consumer Applications
QUBO Matrix Distorting Method for Consumer Applications
收藏 引用
2022 IEEE International Conference on Consumer Electronics, ICCE 2022
作者: Yoshimura, Tomokazu Shirai, Tatsuhiko Tawada, Masashi Togawa, Nozomu Waseda University Department of Computer Science and Communications Engineering Japan Green Computing System Research Organization Waseda University Japan
We propose a Quadratic Unconstrained Binary Optimization (QUBO) matrix distorting method to solve combinatorial optimization problems, which are very often seen in consumer applications, with high speed and high accur... 详细信息
来源: 评论