咨询与建议

限定检索结果

文献类型

  • 5,458 篇 会议
  • 1,036 篇 期刊文献
  • 98 册 图书

馆藏范围

  • 6,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,078 篇 工学
    • 2,726 篇 计算机科学与技术...
    • 2,296 篇 软件工程
    • 951 篇 信息与通信工程
    • 762 篇 控制科学与工程
    • 585 篇 电气工程
    • 552 篇 电子科学与技术(可...
    • 351 篇 生物工程
    • 274 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 249 篇 光学工程
    • 238 篇 动力工程及工程热...
    • 190 篇 仪器科学与技术
    • 165 篇 化学工程与技术
    • 144 篇 安全科学与工程
    • 137 篇 交通运输工程
    • 123 篇 建筑学
    • 119 篇 材料科学与工程(可...
  • 2,005 篇 理学
    • 1,149 篇 数学
    • 479 篇 物理学
    • 384 篇 生物学
    • 345 篇 统计学(可授理学、...
    • 317 篇 系统科学
    • 157 篇 化学
  • 987 篇 管理学
    • 634 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 390 篇 工商管理
  • 219 篇 医学
    • 198 篇 临床医学
    • 184 篇 基础医学(可授医学...
  • 185 篇 法学
    • 148 篇 社会学
  • 138 篇 经济学
    • 137 篇 应用经济学
  • 111 篇 教育学
  • 64 篇 农学
  • 17 篇 文学
  • 17 篇 军事学
  • 6 篇 艺术学

主题

  • 144 篇 accuracy
  • 124 篇 computational mo...
  • 114 篇 machine learning
  • 111 篇 feature extracti...
  • 108 篇 software
  • 106 篇 training
  • 96 篇 software enginee...
  • 93 篇 optimization
  • 87 篇 predictive model...
  • 87 篇 artificial intel...
  • 83 篇 deep learning
  • 76 篇 real-time system...
  • 73 篇 data models
  • 68 篇 computer science
  • 68 篇 computer archite...
  • 62 篇 data mining
  • 61 篇 internet of thin...
  • 61 篇 monitoring
  • 61 篇 mathematical mod...
  • 58 篇 neural networks

机构

  • 56 篇 dept. of systems...
  • 32 篇 dept. of systems...
  • 23 篇 optical sciences...
  • 20 篇 dept. of electri...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 16 篇 dept. of electri...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of systems...
  • 12 篇 dept. of softwar...
  • 12 篇 networking and i...
  • 12 篇 ieee
  • 12 篇 bcmaterials basq...
  • 12 篇 dept. of compute...

作者

  • 35 篇 wainer gabriel
  • 21 篇 ali raja hashim
  • 20 篇 tan mengxi
  • 20 篇 moss david j.
  • 19 篇 xu xingyuan
  • 18 篇 gabriel wainer
  • 18 篇 usama arshad
  • 18 篇 ku wei-shinn
  • 18 篇 arshad usama
  • 16 篇 zain ul abideen
  • 15 篇 yangquan chen
  • 14 篇 baldwin timothy
  • 13 篇 shabtai asaf
  • 13 篇 ali zeeshan ijaz
  • 13 篇 xi zhang
  • 12 篇 reiner lisa
  • 12 篇 hyunseung choo
  • 12 篇 sakamoto makoto
  • 12 篇 min dong
  • 12 篇 nisar ali

语言

  • 5,982 篇 英文
  • 533 篇 其他
  • 59 篇 中文
  • 9 篇 朝鲜文
  • 8 篇 日文
  • 1 篇 德文
  • 1 篇 俄文
检索条件"机构=Dept. of Computer Systems and Software Engineering"
6592 条 记 录,以下是931-940 订阅
排序:
Automatic Network Intrusion Detection System Using Machine Learning and Deep Learning
Automatic Network Intrusion Detection System Using Machine L...
收藏 引用
Artificial Intelligence and Mechatronics systems (AIMS), International Conference on
作者: Mohammed Mynuddin Sultan Uddin Khan Zayed Uddin Chowdhury Foredul Islam Md Jahidul Islam Mohammad Iqbal Hossain Dewan Mohammed Abdul Ahad Dept. of Electrical Engineering North Carolina A & T State University Data Scientist Data Bid Machine Inc. Associate Power Systems Engineer-II Open Systems International Inc. Dept. of Electrical Engineering Tuskegee University Dept. of Electrical and Computer Engineering University of North Carolina at Charlotte
In recent years, the popularity of network intrusion detection systems (NIDS) has surged, driven by the widespread adoption of cloud technologies. Given the escalating network traffic and the continuous evolution of c...
来源: 评论
A Study on Traceable Group Signature Scheme for Blockchain
A Study on Traceable Group Signature Scheme for Blockchain
收藏 引用
Information and Network Technologies (ICINT), International Conference on
作者: Hyo-Jin Song Im-Yeong Lee Dept. of Software Convergence Soonchunhyang Univ. Asan-si 31538 Republic of Korea Dept. of Computer Software Engineering Soonchunhyang Univ. Asan-si 31538 Republic of Korea
A blockchain is a decentralized database system in which a ledger containing transactions is stored and maintained identically by all through consensus among network participants without a central server. Instead of h...
来源: 评论
Trusted Access to 6G Testbeds Through a Security Intent-Driven software-Defined Perimeter Framework  29
Trusted Access to 6G Testbeds Through a Security Intent-Driv...
收藏 引用
29th IEEE International Workshop on computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2024
作者: Fernandez-Martinez, Carolina Bikos, Anastasios Verikoukis, Christos Siddiqui, Shuaib i2CAT Foundation Barcelona08034 Spain Universitat Pompeu Fabra Dept. of Information and Communication Technologies Barcelona08018 Spain Iquadrat Informatica Sl Barcelona08006 Spain Universitat Politècnica de Catalunya Dept. of Signal Theory and Communications Barcelona08034 Spain Industrial Systems Institute Athena Research Center Patras26504 Greece University of Patras Dept. of Computer Engineering and Informatics Patras26504 Greece
Parallel to the evolution of recent trends in the cybersecurity industry and the increase of cyberattacks in the last few years, there is renovated interest on the application of software-defined techniques to enforce... 详细信息
来源: 评论
Data Security Enhancement in Cloud Computing by Proposing A DKE Encryption Protocol  23
Data Security Enhancement in Cloud Computing by Proposing A ...
收藏 引用
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications
作者: Sahar Ebadinezhad Halmat Ayub Abdulmajed Department of Computer Information Systems Near East University North Cyprus and Computer Information Systems Research and Technology Center (CISRT) Near East University North Cyprus Dept. Engineering and Computer Systems Lebanese French University (LFU) Iraq
This study uses cryptography to tackle the important problem of data security in cloud computing. Two keys are used in the Dual Key Encryption (DKE) method for both encryption and decryption. DKE employs a public key ... 详细信息
来源: 评论
CONV1D-GRU: A Hybrid Model for Short-Term Electrical Load Forecasting
CONV1D-GRU: A Hybrid Model for Short-Term Electrical Load Fo...
收藏 引用
Telecommunications Conference (ITC-Egypt), International
作者: Karim S. Farid A.A. Ali Sameh A. Salem Amr E. Mohamed dept. Information Systems & Communications Egyptian Electricity Holding Company Cairo Egypt dept. Electrical Power Helwan University - Faculty of Engineering Cairo Egypt dept. Computer & Systems Engineering Helwan University - Faculty of Engineering Cairo Egypt
With the development of plans to replace conventional meters with smart meters to enhance the functionality and performance of power system, forecasting power consumption is still a challenge due to nonlinearity patte...
来源: 评论
Automated Recipe Creation & Verification of Single Wafer Wet Etching: Ensemble Learning with Backcasting & Forecasting AIs using Scarce Data
Automated Recipe Creation & Verification of Single Wafer Wet...
收藏 引用
IEEE Silicon Nanoelectronics Workshop (SNW)
作者: Koki Shibata Hiroshi Horiguchi Chihiro Matsui Ken Takeuchi Dept. of Electrical Engineering and Information Systems The University of Tokyo Tokyo Japan Application Software Engineering Operations SCREEN Semiconductor Solutions Co. Ltd. Japan
Towards smart semiconductor fabrication, the automated process recipe determination with AI is required under scarce data (NOT big data) conditions. This paper proposes precise recipe determination by ensemble learnin... 详细信息
来源: 评论
Security and Threat Detection through Cloud-Based Wazuh Deployment
Security and Threat Detection through Cloud-Based Wazuh Depl...
收藏 引用
Humanitarian Technology Conference (KHI-HTC), IEEE Karachi Section
作者: Syed Moiz Abdul Majid Abdul Basit Mansoor Ebrahim Abdul Ahad Abro Mehwish Naeem Dept. of Computer Science Iqra University Karachi Pakistan Dept. of Cyber Security Institute of Business Administration (IBA-CICT) Karachi Pakistan Dept. of Computer Science Indus University Karachi Pakistan Dept. of Software Engineering Iqra University Karachi Pakistan University Libre de Bruxelles Brussels Belgium
In today's interconnected business landscape, security is the cornerstone of all organizations, irrespective of their size or industry. This research emphasizes the critical need to safeguard organizational assets...
来源: 评论
TCN-MLP: A Hybrid Model for Short-Term Electrical Load Forecasting
TCN-MLP: A Hybrid Model for Short-Term Electrical Load Forec...
收藏 引用
Intelligent Methods, systems, and Applications (IMSA)
作者: Karim S. Farid A. A. Ali Sameh A. Salem Amr E. Mohamed Dept. Information Systems & Communications Egyptian Electricity Holding Company Cairo Egypt Dept. Electrical Power Helwan University - Faculty of Engineering Cairo Egypt Dept. Computer & Systems Engineering Helwan University - Faculty of Engineering Cairo Egypt
Using artificial intelligence (AI) to anticipate electrical consumption is one of the used applications of this technology. The analysis and training of AI models are done using data related to electricity consumption...
来源: 评论
DDoS Detection Using Active and Idle Features of Revised CICFlowMeter and Statistical Approaches  4
DDoS Detection Using Active and Idle Features of Revised CIC...
收藏 引用
4th International Conference on Advanced Science and engineering, ICOASE 2022
作者: Ali, Basheer Husham Sulaiman, Nasri Al-Haddad, S.A.R. Atan, Rodziah Hassan, Siti Lailatul Mohd Department of Electrical and Electronic Engineering Serdang Malaysia Faculty of Engineering Department of Electrical and Electronic Engineering Serdang Malaysia Department of Computer and Communication Systems Engineering Serdang Malaysia Software Eng. and Information Systems Dept Serdang Malaysia School of Electrical Engineering Universiti Teknologi Mara Shah Alam Malaysia
Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down ... 详细信息
来源: 评论
On Prescription or Off Prescription? An Empirical Study of Community-Prescribed Security Configurations for Kubernetes
On Prescription or Off Prescription? An Empirical Study of C...
收藏 引用
International Conference on software engineering (ICSE)
作者: Shazibul Islam Shamim Hanyang Hu Akond Rahman Dept of SWEGD Kennesaw State University Marietta GA USA Company-A CA USA Dept. of Computer Science and Software Engineering Auburn University Auburn AL USA
Despite being beneficial for rapid delivery of software, Kubernetes deployments can be susceptible to security attacks, which can cause serious consequences. A systematic characterization of how community-prescribed s... 详细信息
来源: 评论