咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 20 篇 会议

馆藏范围

  • 56 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46 篇 工学
    • 34 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 11 篇 信息与通信工程
    • 8 篇 机械工程
    • 7 篇 电气工程
    • 7 篇 控制科学与工程
    • 7 篇 生物工程
    • 4 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 20 篇 理学
    • 9 篇 数学
    • 7 篇 生物学
    • 4 篇 物理学
    • 2 篇 大气科学
    • 2 篇 统计学(可授理学、...
  • 15 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学

主题

  • 4 篇 deep learning
  • 2 篇 cyber security
  • 2 篇 object detection
  • 2 篇 support vector m...
  • 2 篇 ensemble learnin...
  • 2 篇 transfer learnin...
  • 2 篇 recommender syst...
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 machine learning
  • 2 篇 5g mobile commun...
  • 2 篇 artificial intel...
  • 2 篇 quantum cryptogr...
  • 2 篇 cloud storage
  • 2 篇 visual attention
  • 2 篇 digital forensic...
  • 1 篇 internet of thin...
  • 1 篇 weak consensus m...
  • 1 篇 graph neural net...
  • 1 篇 cyber attacks

机构

  • 11 篇 eias data scienc...
  • 6 篇 school of comput...
  • 5 篇 eias data scienc...
  • 5 篇 key lab of educa...
  • 5 篇 school of comput...
  • 4 篇 department of ma...
  • 3 篇 prince sultan un...
  • 3 篇 department of el...
  • 3 篇 department of ma...
  • 3 篇 eias:data scienc...
  • 3 篇 school of comput...
  • 3 篇 eias data scienc...
  • 3 篇 department of in...
  • 3 篇 eias data scienc...
  • 3 篇 eias data scienc...
  • 2 篇 department of in...
  • 2 篇 the famlir group...
  • 2 篇 zhejiang univers...
  • 2 篇 guangxi key lab ...
  • 2 篇 guangxi key lab ...

作者

  • 7 篇 asim muhammad
  • 7 篇 el-latif ahmed a...
  • 6 篇 muhammad asim
  • 6 篇 mohammed elaffen...
  • 5 篇 hammad mohamed
  • 5 篇 abd el-latif ahm...
  • 5 篇 ateya abdelhamie...
  • 3 篇 zhang zuping
  • 3 篇 mohamed hammad
  • 3 篇 koucheryavy andr...
  • 3 篇 gauhar ali
  • 3 篇 sajid shah
  • 3 篇 sadique ahmad
  • 3 篇 ahmed a. abd el-...
  • 2 篇 alaa thobhani
  • 2 篇 amr abdussalam
  • 2 篇 xiaoyan kui
  • 2 篇 naveed ahmad
  • 2 篇 abdelhamied a. a...
  • 2 篇 chen nan

语言

  • 48 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=EIAS Data Science and BlockChain Lab College of Computer and Information Science"
56 条 记 录,以下是21-30 订阅
排序:
VPFL:A verifiable privacy-preserving federated learning scheme for edge computing systems
收藏 引用
Digital Communications and Networks 2023年 第4期9卷 981-989页
作者: Jiale Zhang Yue Liu Di Wu Shuai Lou Bing Chen Shui Yu School of Information Engineering Yangzhou UniversityYangzhou225009China Water Conservancy and Civil Engineering College Inner Mongolia Agricultural UniversityHohhot010018China Deakin Blockchain Innovation Lab School of Information TechnologyDeakin UniversityMelbourneVIC3125Australia College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing211106China School of Computer Science University of Technology SydneySydney2007Australia
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra... 详细信息
来源: 评论
Microservice-Based Fog Testbed for 6G Applications  26
Microservice-Based Fog Testbed for 6G Applications
收藏 引用
26th International Conference on Advanced Communications Technology, ICACT 2024
作者: Kuzmina, Ekaterina Tefikova, Meriem Volkov, Artem Muthanna, Ammar Ateya, Abdelhamied A. Koucheryavy, Andrey Saint-Petersburg State University of Telecommunications Department of Telecommunication Networks and Data Transmission Saint Petersburg Russia Zagazig University Department of Electronics and Communications Engineering Zagazig44519 Egypt College of Computer and Information Sciences Prince Sultan University Eias Data Science Lab Riyadh11586 Saudi Arabia
This paper provides a real-time fog computing model based on a microservice architecture that enables testing and modeling of eventual implementations of ultra-reliable low-latency communications (uRLLC) services. The... 详细信息
来源: 评论
Content Based Email Spam Filtering and Detection using Hybrid Supervised Learning Approach
Content Based Email Spam Filtering and Detection using Hybri...
收藏 引用
World Congress on Computing and Communication Technologies (WCCCT)
作者: Najam U Saquib Waqar Khalid Sahibzadi Annum Shaheen Muhammad Asim Naveed Ahmad Department of Computer Science Abasyn University Islamabad Pakistan Department of Computer Science Institute of Management Sciences Peshawar Pakistan Department of Computer Science Capital University of Science & Technology Islamabad Pakistan EIAS Data Science and BlockChain Lab College of Computer and Information Science Prince Sultan University Riyadh Saudi Arabia College of Computer and Information Science Prince Sultan University Riyadh Saudi Arabia
In today’s world, email is used widely for communication purposes globally. Email spam are unwanted emails that are sent to many recipients receivers. It is usually used for commercial purposes More likely spam enail... 详细信息
来源: 评论
Predicting Timely Diagnosis of Metastatic Breast Cancer: A Stack Ensemble Classification Approach
Predicting Timely Diagnosis of Metastatic Breast Cancer: A S...
收藏 引用
Women in data science at Prince Sultan University (WiDS PSU), International Conference of
作者: Saima Jabeen Sajid Shah Mohamed A. Bahloul Ishrat Khan Mohammed ELAffendi College of Engineering Alfaisal University Riyadh Saudi Arabia EIAS Data Science and Blockchain lab CCIS Prince Sultan University Riyadh Saudi Arabia College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia
Healthcare inequity is a global issue that affects women's health significantly. The WiDS datathon 2024 Challenge #1 focused on predicting a timely diagnosis of metastatic Triple Negative Breast Cancer (TNBC), a c... 详细信息
来源: 评论
Efficient Transmission of Holographic Images: A Novel Approach Toward 6G Telepresence Services  1
收藏 引用
26th International Conference on Distributed computer and Communication Networks: Control, Computation, Communications, DCCN 2023
作者: Svechnikov, Daniil Pankov, Bogdan Nesterova, Yana Volkov, Artem Ateya, Abdelhamied A. Koucheryavy, Andrey The Bonch-Bruevich Saint-Petersburg State University of Telecommunications St. Petersburg193232 Russia EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh11586 Saudi Arabia Department of Electronics and Communications Engineering Zagazig University Sharqia Zagazig44519 Egypt
In recent years, advancements in technology have brought forth a new frontier in visual communication. Holography is a technique that captures and reproduces three-dimensional (3D) images with an unprecedented level o... 详细信息
来源: 评论
Revolutionizing H2M Interaction: Telepresence System Enabling Sign Language Expansion for Individuals with Disabilities  1
收藏 引用
26th International Conference on Distributed computer and Communication Networks: Control, Computation, Communications, DCCN 2023
作者: Kuznetsov, Konstantin Muthanna, Ammar Ateya, Abdelhamied A. Koucheryavy, Andrey The Bonch-Bruevich Saint-Petersburg State University of Telecommunications St. Petersburg193232 Russia EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh11586 Saudi Arabia Department of Electronics and Communications Engineering Zagazig University Sharqia Zagazig44519 Egypt
The modern network technology ecosystem is expanding rapidly in multiple dimensions. Due to the demands of the Tactile Internet and fifth-generation (5G) networks, conventional approaches are no longer producing signi... 详细信息
来源: 评论
Two-Way Approach for Improved Real-Time Transmission in Fog-IoT-Based Health Monitoring System for Critical Patients
收藏 引用
computer Systems science & Engineering 2023年 第9期46卷 3815-3829页
作者: Abeera Ilyas Saeed Mahfooz Zahid Mehmood Gauhar Ali Muhammad ElAffendi Department of Computer Science University of PeshawarPeshawar25120Pakistan Department of Computer Engineering University of Engineering and TechnologyTaxila47050Pakistan The FAMLIR Group The University of LahoreLahore54000Pakistan EIAS Data Science and Blockchain Lab College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Health monitoring systems are now required,particularly for essential patients,following the COVID-19 pandemic,which was followed by its variants and other epidemics of a similar *** procedures and strategies are requ... 详细信息
来源: 评论
A multiple sensitive attributes data publishing method with guaranteed information utility
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 288-296页
作者: Haibin Zhu Tong Yi Songtao Shang Minyong Shi Zhucheng Li Wenqian Shang Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilinChina Guangxi Key Lab of Multi‐Source Information Mining and Security Guangxi Normal UniversityGuilinChina School of Computer and Communication Engineering Zhengzhou University of Light IndustryZhengzhouChina School of Computer Science Communication University of ChinaBeijingChina Business College Beijing Union UniversityBeijingChina
data publishing methods can provide available information for analysis while preserving *** multiple sensitive attributes data publishing,which preserves the relationship between sensitive attributes,may keep many rec... 详细信息
来源: 评论
Criteria and Tips for Choosing Suitable Journal for Your Paper
arXiv
收藏 引用
arXiv 2023年
作者: Hammad, Mohamed EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh11586 Saudi Arabia Information Technology Department Faculty of Computers and Information Menoufia University Egypt
Selecting the right journal for your research paper is a pivotal decision in the academic publishing journey. This paper aims to guide researchers through the process of choosing a suitable journal for their work by d...
来源: 评论
A Novel Image Encryption and Decoding Approach Based on DNA Coding and Arnold's Transformation for IoT Applications
A Novel Image Encryption and Decoding Approach Based on DNA ...
收藏 引用
Telecommunications Conference (ITC-Egypt), International
作者: Nawal Shaltout Ahmed A. Abd El-Latif Waleed Al-Adrousy Mohamed Hammad Abdelhamied A. Ateya Samir Elmougy Department of Computer Science Faculty of Computers and Information Mansoura University Mansoura Egypt EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia Department of Mathematics and Computer Science Faculty of Science Menoufia University Egypt Department of Information Technology Faculty of Computers and Information Menoufia University Shibin El Kom Egypt Department of Electronics and Communications Engineering Zagazig University Zagazig Egypt
Nowadays, the Internet of Things (IoT) is significantly utilized by an extensive range of applications that lead to the enhancement of different aspects of defense and military capabilities. In IoT, a wide range of sm... 详细信息
来源: 评论