咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 10 篇 artificial intel...
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 543 篇 英文
  • 21 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是241-250 订阅
排序:
Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency
Automatic Seed Generation based Hybrid Fuzzing for Code Cove...
收藏 引用
2020 ACM International Conference on Intelligent Computing and its Emerging Applications, ICEA 2020
作者: Kwon, Soonhong Choi, Yangseo Lee, Jong-Hyouk Dept. of Computer and Information Security and Covergence Engineering for Intelligent Drone Sejong University Seoul Korea Republic of Electronics and Telecommunication Research Institute Daejeon Korea Republic of
Based on the 4th Industrial Revolution, numerous ICT technologies are developing, and for this reason, IoT devices are formed around us. Accordingly, hackers are inflicting financial and physical damage to our lives b... 详细信息
来源: 评论
Evolutionary Interest Representation network for Click-Through Rate Prediction
Evolutionary Interest Representation Network for Click-Throu...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Renjie Zhou Zhenming Jin Jian Wan Jilin Zhang Xingyu Guo Qiang Liu Key Laboratory of Complex Systems Modeling and Simulation of the Ministry of Education School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Key Laboratory of Complex Systems Modeling and Simulation of the Ministry of Education ITMO Joint Institute Hangzhou Dianzi University Hangzhou China School of Information and Electronic Engineering Zhejiang University of Science and Technology Hangzhou China Dept. of Computer and Information Technology Zhejiang Police College Hangzhou China
The rapid development of the Internet has revo-lutionized our lives, providing us with an array of convenient services. However, this revolution has also led to the problem of data overload. Personalized recommendatio...
来源: 评论
Queuing Theory Model of Expected Waiting Time for Fast Diagnosis nCovid-19: A Case Study  3
Queuing Theory Model of Expected Waiting Time for Fast Diagn...
收藏 引用
3rd International Conference on Advanced Science and engineering, ICOASE 2020
作者: Majedkan, Naji A. Idrees, Barzan A. Ahmed, Omar M. Haji, Lailan M. Dino, Hivi Ismat Technical College of Informatics - Akre Duhok Polytechnic University Dept. of Network and Information Security Duhok Iraq College of Physical Education and Sport Sciences University of Duhok Duhok Iraq Zakho Technical Iust Duhok Polytechnic University Zakho Iraq University of Zakho Computer Science Dept. Zakho Iraq University of Zakho Dept. of Computer Science Duhok Iraq
This Queuing theory analysis has been used in hospitals and other healthcare settings;its use in this sector is not widespread. Consequently, the queue waiting line is an effective scientific tool in the performance o... 详细信息
来源: 评论
Twenty Years of Personality Computing: Threats, Challenges and Future Directions
arXiv
收藏 引用
arXiv 2025年
作者: Celli, Fabio Kartelj, Aleksandar Ðorðević, Miljan Suhartono, Derwin Filipović, Vladimir Milutinović, Veljko Spathoulas, Georgios Vinciarelli, Alessandro Kosinski, Michal Lepri, Bruno Maggioli SpA Italy Faculty of Mathematics University of Belgrade Serbia School of Electrical Engineering University of Belgrade Serbia School of Computer Science Bina Nusantara University Indonesia Dept. of Information Security Norwegian University of Science and Technology Norway School of Computing Science University of Glasgow United Kingdom Graduate School of Business Stanford University United States Center for Augmented Intelligence Fondazione Bruno Kessler Italy
Personality Computing is a field at the intersection of Personality Psychology and computer Science. Started in 2005, research in the field utilizes computational methods to understand and predict human personality tr...
来源: 评论
Ransomware: A framework for security challenges in internet of things  2
Ransomware: A framework for security challenges in internet ...
收藏 引用
2nd International Conference on computer and information Sciences, ICCIS 2020
作者: Saeed, Soobia Jhanjhi, N.Z. Naqvi, Mehmood Humayun, Mamoona Ahmed, Shakeel Universiti Teknologi Malaysia Dept. of Software Engineering Malaysia Taylor's University Selangor Malaysia Faculty of Engineering Technology Mohawk College Canada Jouf University Dept. of Information Systems Al-Jouf Saudi Arabia King Faisal University Dept. of Computer Science Al-Hofuf Saudi Arabia
With the increasing volume of smartphones, computers, and sensors in the Internet of Things (IoT) model, enhancing security and preventing ransom attacks have become a major concern. Traditional security mechanisms ar... 详细信息
来源: 评论
LSTM networks for Improved Environmental Monitoring and Biodiversity Conservation
LSTM Networks for Improved Environmental Monitoring and Biod...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Dara Raju Omaia Al-Omari Ganesh Kumar Anbazhagan Kuttimarks Muthu Selladurai Malik Bader Alazzam M. Karthik Dept. of CSE Vignana Bharathi Institute and Technology Ghatkesar India Information Systems Department College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia Department of Microbiology Saveetha Medical College and Hospital Saveetha Institute of Medical and Technical Sciences (SIMATS) Chennai Tamil Nadu India Shivajirao S. Jondhle College of Engineering and Technology Maharastra India Faculty of Information Technology Jadara University Irbid Jordan Department of AI & DS K.Ramakrishnan College of Engineering Trichy India
Understanding and managing the effects of climate change and loss of biodiversity are crucial. However, traditional approaches are largely ineffective in dealing with these challenges because environmental data is com... 详细信息
来源: 评论
Big Data against security Threats: The SPEAR Intrusion Detection System  3
Big Data against Security Threats: The SPEAR Intrusion Detec...
收藏 引用
3rd World Symposium on Communication engineering, WSCE 2020
作者: Pliatsios, Dimitrios Sarigiannidis, Panagiotis Psannis, Konstantinos Goudos, Sotirios K. Vitsas, Vasileios Moscholios, Ioannis University of Western Macedonia Dept. of Electrical and Computer Engineering Kozani50100 Greece University of Macedonia Dept. of Applied Informatics Thessalonikii54636 Greece Aristotle University of Thessaloniki School of Physics Thessaloniki54124 Greece International Hellenic University Dept. of Information and Electronic Systems Engineering Thessaloniki57400 Greece University of Peloponnese Dept. of Informatics and Telecommunications Tripolis22100 Greece
The environmental concerns, the limited availability of conventional energy sources, the integration of alternative energy sources and the increasing number of power-demanding appliances change the way electricity is ... 详细信息
来源: 评论
Modeling and Analysis the Impact of Wastewater Sludge Co-Digestion with Thermo-Alkaline Pretreated Wheat Straw on Biogas Production and Digestate Characteristics at Al-Jouf Region, Saudi Arabia
SSRN
收藏 引用
SSRN 2023年
作者: Alrowais, Raid Said, Noha Mahmoud-Aly, Mohamed Helmi, Ahmed M. Nasef, Basheer M. Mohareb, Mohamed Abdel daiem, Mahmoud M. Department of Civil Engineering College of Engineering Jouf University Sakakah72388 Saudi Arabia Environmental Engineering Department Faculty of Engineering Zagazig University Zagazig44519 Egypt Plant Physiology Division Department of Agricultural Botany Faculty of Agriculture Cairo University Giza12613 Egypt Computer Engineering Dept. Engineering and Information Technology College Buraydah Private Colleges Buraydah51418 Saudi Arabia Computer and Systems Engineering Dept. Faculty of Engineering Zagazig University Zagazig44519 Egypt Civil Engineering Department College of Engineering Shaqra University Al-Duwadmi Ar Riyadh11911 Saudi Arabia Alwatania Contracting Company Operation and Maintenance of Sewage Stations and Networks Sakakah Saudi Arabia
Anaerobic digestion is one of the best options for producing valuable end products (biogas and bio-fertilizer). In this study, the impact of co-digestion of waste activated sludge with pretreated wheat straw on biogas... 详细信息
来源: 评论
Improving performance of federated learning based medical image analysis in non-IID settings using image augmentation
arXiv
收藏 引用
arXiv 2021年
作者: Cetinkaya, Alper Emin Akin, Murat Sagiroglu, Seref Information Security Program Gazi University Ankara Turkey Gazi AI Center of Gazi University Basarsoft Information Systems Inc Ankara Turkey Computer Engineering Dept. Gazi AI Center Gazi University Ankara Turkey
Federated Learning (FL) is a suitable solution for making use of sensitive data belonging to patients, people, companies, or industries that are obligatory to work under rigid privacy constraints. FL mainly or partial... 详细信息
来源: 评论
In-dept. review of integration of AI in cloud computing
In-depth review of integration of AI in cloud computing
收藏 引用
Advance Computing and Innovative Technologies in engineering (ICACITE), International Conference on
作者: Nachaat Mohamed L. Sridhara Rao Manju Sharma SureshBabuRajasekaranl BadriaSulaimanAlfurhood Surendra Kumar Shukla Rabdan Academy UAE Homeland Security Universiti Sains Malaysia Abu Dhabi Dept. of Information Technology J.B. Institute of Engineering and Technology Hyderabad Lecturer Jazan University Jazan Saudi Arabia Group Product Manager NVIDIA Corporation US Department of Computer Sciences College of Computer and Information Sciences Princess Nourahbint Abdulrahman University Saudi Arabia Department of CSE Graphic Era Deemed to be University Dehradun Uttarakhand India
The successful distribution of computer services, including software, storage needs, analytics, intelligence, and many others, is reflected in cloud computing. Additionally, it provides quicker innovation while simult...
来源: 评论