咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是411-420 订阅
排序:
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 64-78页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Jebreen, Issam Nabot, Ahmad Rajab, Mohammed Alauthman, Mohammad Aldweesh, Amjad Aburub, Faisal Alangari, Someah Alzgol, Musab Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan University Headquarter University of Anbar Ramadi31001 Iraq Department of Information Security University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan Computer Information Systems Department Faculty of Information Technology Isra University Amman11622 Jordan
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho... 详细信息
来源: 评论
An overview Scientific Cloud computing Web-based cloud services issues and challenges  5
An overview Scientific Cloud computing Web-based cloud servi...
收藏 引用
5th International Conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Majumder, Sayan Raju, Kommisetti Murthy Arya, Nancy Shaik, Nazeer Tiwari, Sanjay Singh, Akanksha Department of cyber security The Heritage Academy Kolkata India Department of Electronics and Communication Engineering Shri Vishnu Engineering College For Women Bhimavaram India Department of Computer Science and Engineering Shree Guru Gobind Singh Tricentenary University Gurugram India Department Of Computer Science and Engineering Srinivasa Ramanujan Institute Of Technology-Autonomous-Anantapur Andhra Pradesh India Department of Computer Science and Engineering ARYA Institute of Engineering Technology and Management Jaipur India Computer Science and Engineering Babu Banarasi Das University Lucknow India
This research investigates the crucial role of cloud computing services in web development for creating scalable applications. Our study explores the benefits, challenges, and best practices associated with leveraging... 详细信息
来源: 评论
A Comparative Market Research and Trend Analysis of Volatility in Decentralized and Regulated Markets  3
A Comparative Market Research and Trend Analysis of Volatili...
收藏 引用
3rd IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing, INCOS 2024
作者: Mittal, Anamika Hariharasitaraman, S. Subramanian, R. Raja School of Computing Science and Engineering Vit Bhopal University Division of Cyber Security and Digital Forensics Madhya Pradesh India School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu India
Decentralized markets like Bitcoin and Ethereum, which utilize blockchain technology, offer advantages such as increased transparency, lower transaction costs, and quicker settlement times when compared to regulated m... 详细信息
来源: 评论
Federated Learning with Blockchain for Privacy-Preserving Data Sharing in Internet of Vehicles
收藏 引用
China Communications 2023年 第3期20卷 69-85页
作者: Wenxian Jiang Mengjuan Chen Jun Tao School of Cyber Science and Engineering Southeast UniversityNanjing 211189China College of Computer Science and Technology Huaqiao UniversityXiamen 361021China Key Lab of CNII MOESoutheast UniversityNanjing 211189China Purple Mountain Laboratories:Networking Communications and Security Nanjing 211111China
Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic ***,the main concerns have been raised about the security an... 详细信息
来源: 评论
Low Resource Chinese Geological Text Named Entity Recognition Based on Prompt Learning
收藏 引用
Journal of Earth Science 2024年 第3期35卷 1035-1043页
作者: Hang He Chao Ma Shan Ye Wenqiang Tang Yuxuan Zhou Zhen Yu Jiaxin Yi Li Hou Mingcai Hou State Key Laboratory of Oil and Gas Reservoir Geology and Exploitation Institute of Sedimentary GeologyCollege of Computer Science and Cyber SecurityChengdu University of TechnologyChengdu 610059China Key Laboratory of Deep-Time Geography and Environment Reconstruction and Applications of Ministry of Natural Resources Chengdu University of TechnologyChengdu 610059China School of Information Engineering China University of Geosciences(Beijing)Beijing 100083China
Geological reports are a significant accomplishment for geologists involved in geological investigations and scientific research as they contain rich data and textual *** the rapid development of science and technolog... 详细信息
来源: 评论
Revolutionizing prostate cancer diagnosis: Unleashing the potential of an optimized deep belief network for accurate Gleason grading in histological images
收藏 引用
International Journal of Intelligent Networks 2024年 第1期5卷 241-254页
作者: Angel Latha Mary, S. Siva Subramanian, S. Priyanka, G. Vijayakumar, T. Alagumalai, Suganthi IT Department SNS College of Technology Coimbatore India Department of of BME Rathinam Technical Campus Coimbatore India Department of Computer Science and Business Systems Sri Eshwar College of Engineering Coimbatore India Department of AIDS Dr.Mahalingam College of Engineering and Technology Pollachi Coimbatore India Cyber Operations 3223 Hanover St Palo AltoCA94304 United States
PC (Prostate Cancer) is the second highest cause of death due to cancer in men globally. Proper detection and treatment are critical for halting or controlling the growth and spread of cancer cells within the human or... 详细信息
来源: 评论
A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning  20th
A Lossless Relational Data Watermarking Scheme Based on Une...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Xu, Wenhao Xian, Hequn College of Computer Science and Technology Qingdao University Qingdao266071 China Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing100085 China Cryptograph and Cyber Security Whampoa Institute Guangzhou510000 China
In modern relational databases, data security and integrity are crucial, particularly in large-scale, unevenly distributed big data environments. This paper proposes a lossless relational data watermarking scheme base... 详细信息
来源: 评论
A Robust Artificial Intelligence Enabled Methodology to Predict Online Consumers Behaviour Using Hybrid Deep Learning Strategy
A Robust Artificial Intelligence Enabled Methodology to Pred...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Sophia, P. Suresh, G.R. Kiruthika, B. Juliet, N. Chadge, R. Al Sherideh, Alaa Sri Sai Ram Institute of Technology Department of Cse Chennai India Dhanalakshmi Srinivasan College of Engineering and Technology Department of Ece Mamallapuram Chennai India Atharva College of Engineering Mumbai India S.A. Engineering College Department of Master of Computer Applications Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India College of Information Technology Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Marketing and consumer behavior predictions are two areas where Artificial Intelligence (AI) is finding widespread use. Evaluating the accuracy of AI -based consumer behavior prediction is the focus of this article. E... 详细信息
来源: 评论
Failed Yet Stored: A First Look at DNS Negative Caching
Failed Yet Stored: A First Look at DNS Negative Caching
收藏 引用
2024 IEEE International Performance, Computing, and Communications Conference, IPCCC 2024
作者: Zeng, Meng Zhu, Yujia Li, Baiyang Zhang, Yuedong Liu, Qingyun Fang, Binxing Chinese Academy of Sciences Institute of Information Engineering China University of Chinese Academy of Sciences School of Cyber Security China National Computer Network Emergency Response Technical Team/Coordination of China China School of Computer Science and Technology ShenZhen China
Caching is a critical method for enhancing the efficiency and the security of the Domain Name System (DNS). Initially, only successful domain name resolution results were cached. To mitigate failures in DNS transactio... 详细信息
来源: 评论
A Powerful Load Balancing Algorithm for Cloud Performance Evaluation  5
A Powerful Load Balancing Algorithm for Cloud Performance Ev...
收藏 引用
5th International Conference on Inventive Research in Computing Applications, ICIRCA 2023
作者: Chandar, J. Praveen Chidambaranathan, C.M. Anbarasan, Anbarasa Kumar Karthikram, A. Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Coimbatore India School of Computing Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India School of Information Technology and Engineering Vellore Institute of Technology Vellore India School of Computers Madanapalle Institute of Technology & Science Department of Cyber Security Madanapalle India
The energy consumption of data centers plays a significant role in the cost estimation of maintenance, performance evaluation, and environmental pollution in cloud computing. Carbon emissions are one of the major draw... 详细信息
来源: 评论