咨询与建议

限定检索结果

文献类型

  • 36 篇 期刊文献
  • 20 篇 会议

馆藏范围

  • 56 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 46 篇 工学
    • 34 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 11 篇 信息与通信工程
    • 8 篇 机械工程
    • 7 篇 电气工程
    • 7 篇 控制科学与工程
    • 7 篇 生物工程
    • 4 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 20 篇 理学
    • 9 篇 数学
    • 7 篇 生物学
    • 4 篇 物理学
    • 2 篇 大气科学
    • 2 篇 统计学(可授理学、...
  • 15 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学

主题

  • 4 篇 deep learning
  • 2 篇 cyber security
  • 2 篇 object detection
  • 2 篇 support vector m...
  • 2 篇 ensemble learnin...
  • 2 篇 transfer learnin...
  • 2 篇 recommender syst...
  • 2 篇 authentication
  • 2 篇 iot
  • 2 篇 machine learning
  • 2 篇 5g mobile commun...
  • 2 篇 artificial intel...
  • 2 篇 quantum cryptogr...
  • 2 篇 cloud storage
  • 2 篇 visual attention
  • 2 篇 digital forensic...
  • 1 篇 internet of thin...
  • 1 篇 weak consensus m...
  • 1 篇 graph neural net...
  • 1 篇 cyber attacks

机构

  • 11 篇 eias data scienc...
  • 6 篇 school of comput...
  • 5 篇 eias data scienc...
  • 5 篇 key lab of educa...
  • 5 篇 school of comput...
  • 4 篇 department of ma...
  • 3 篇 prince sultan un...
  • 3 篇 department of el...
  • 3 篇 department of ma...
  • 3 篇 eias:data scienc...
  • 3 篇 school of comput...
  • 3 篇 eias data scienc...
  • 3 篇 department of in...
  • 3 篇 eias data scienc...
  • 3 篇 eias data scienc...
  • 2 篇 department of in...
  • 2 篇 the famlir group...
  • 2 篇 zhejiang univers...
  • 2 篇 guangxi key lab ...
  • 2 篇 guangxi key lab ...

作者

  • 7 篇 asim muhammad
  • 7 篇 el-latif ahmed a...
  • 6 篇 muhammad asim
  • 6 篇 mohammed elaffen...
  • 5 篇 hammad mohamed
  • 5 篇 abd el-latif ahm...
  • 5 篇 ateya abdelhamie...
  • 3 篇 zhang zuping
  • 3 篇 mohamed hammad
  • 3 篇 koucheryavy andr...
  • 3 篇 gauhar ali
  • 3 篇 sajid shah
  • 3 篇 sadique ahmad
  • 3 篇 ahmed a. abd el-...
  • 2 篇 alaa thobhani
  • 2 篇 amr abdussalam
  • 2 篇 xiaoyan kui
  • 2 篇 naveed ahmad
  • 2 篇 abdelhamied a. a...
  • 2 篇 chen nan

语言

  • 48 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=EIAS Data Science and BlockChain Lab College of Computer and Information Science"
56 条 记 录,以下是51-60 订阅
排序:
SODU2-NET: a novel deep learning-based approach for salient object detection utilizing U-NET
收藏 引用
PeerJ computer science 2025年 11卷
作者: Abbas, Hyder Ren, Shen Bing Asim, Muhammad Hassan, Syeda Iqra El-Latif, Ahmed A. Abd State Key Laboratory of Public Big Data College of Computer Science and Technology Institute for Artificial Intelligence Guizhou University Guizhou Guiyang China School of Computer Science and Engineering Central South University Changsha China EIAS Data Science and Blockchain Laboratory College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia School of Computer Science and Technology Guangdong University of Technology Guangzhou China Department of Electrical and Electronic Engineering British Malaysian Institute Universiti of Kuala Lumpur Kuala Lumpur Malaysia Software Engineering Department Sir Syed University of Engineering and Technology Karachi Pakistan Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom Egypt
Detecting and segmenting salient objects from natural scenes, often referred to as salient object detection, has attracted great interest in computer vision. To address this challenge posed by complex backgrounds in s... 详细信息
来源: 评论
Optimizing Multi-Hop Quantum Communication using Bidirectional Quantum Teleportation Protocol
arXiv
收藏 引用
arXiv 2025年
作者: Ikken, N. Kumar, P. Slaoui, A. Kar, B. Laamara, R. Ahl Almousa, M. El-Latif, A.A. Abd LPHE-Modeling and Simulation Faculty of Sciences Mohammed V University Rabat Morocco Department of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan Centre of Physics and Mathematics CPM Faculty of Sciences Mohammed V University in Rabat Rabat Morocco EIAS Data Science Lab College of Computer and Information Sciences Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh11671 Saudi Arabia Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom32511 Egypt
In this paper, we introduce a new method for Bidirectional Quantum Teleportation called Bidirectional Quantum Teleportation using the Modified Dijkstra Algorithm and Quantum Walk (BQT-MDQW). This method uses different... 详细信息
来源: 评论
Closed-Loop Safe Correction for Reinforcement Learning Policy  4th
Closed-Loop Safe Correction for Reinforcement Learning Poli...
收藏 引用
4th International Conference on Ubiquitous Security, UbiSec 2024
作者: Yi, Zhi Lv, Qi Chen, Shuhong Liang, Ying Dai, Yinglong Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Normal University Changsha410081 China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China Blockchain Innovation Lab Swinburne University of Technology MelbourneVIC3122 Australia Molecular Nutrition Branch National Engineering Research Center of Rice and By-product Deep Processing College of Food Science and Engineering Central South University of Forestry and Technology Hunan Changsha410004 China
Trial and error learning is an approach with uncertain consequences. How to maintain policy security, stability, and efficiency under controlled circumstances, posing a significant academic challenge. Such as Reinforc... 详细信息
来源: 评论
DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets
收藏 引用
Scientific reports 2024年 第1期14卷 13839页
作者: Sehrish Aqeel Sajid Ullah Khan Adnan Shahid Khan Meshal Alharbi Sajid Shah Mohammed El Affendi Naveed Ahmad Faculty of Computer Science and Information Technology Universiti Malaysia Sarawak 94300 Kota Samarahan Malaysia. Department of Information Systems College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University AlKharj Kingdom of Saudi Arabia. sk.khan@psau.edu.sa. Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj Saudi Arabia. sk.khan@psau.edu.sa. Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj Saudi Arabia. EIAS Lab CCIS Prince Sultan University Riyadh Saudi Arabia. College of Computer Information Sciences CCIS Prince Sultan University Riyadh Saudi Arabia.
With the urge to secure and protect digital assets, there is a need to emphasize the immediacy of taking measures to ensure robust security due to the enhancement of cyber security. Different advanced methods, like en... 详细信息
来源: 评论
A data Replication Placement Strategy for the Distributed Storage System in Cloud-Edge-Terminal Orchestrated Computing Environments
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Chen, Peng Zheng, Mengke Du, Xin Bilal, Muhammad Lu, Zhihui Duan, Qiang Xu, Xiaolong Nanjing University of Information Science and Technology School of Software and Technology Nanjing210044 China Fudan University School of Computer Science Shanghai200433 China Zhejiang University School of Software Technology Zhejiang 310027 China Zhejiang University State Key Lab of Brain-Machine Intelligence Zhejiang 310027 China Lancaster University School of Computing and Communications LancasterLA1 4WA United Kingdom Shanghai Blockchain Engineering Research Center Shanghai200433 China Pennsylvania State University School of Information Sciences and Technology State CollegePA16802 United States
Cloud-edge-terminal orchestrated computing, as an expansion of cloud computing, has sunk resources to the edge nodes and terminal equipment, which can provide high-quality services for delay-sensitive applications and... 详细信息
来源: 评论
A Double Auction for Charging Scheduling among Vehicles Using DAG-blockchains
arXiv
收藏 引用
arXiv 2020年
作者: Guo, Jianxiong Ding, Xingjian Wu, Weili Du, Ding-Zhu Advanced Institute of Natural Sciences Beijing Normal University Zhuhai519087 China Guangdong Key Lab of AI and Multi-Modal Data Processing BNU-HKBU United International College Zhuhai519087 China Faculty of Information Technology Beijing University of Technology Beijing100124 China Department of Computer Science Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas RichardsonTX75080 United States
Electric Vehicles (EVs) are becoming more and more popular in our daily life, which replaces traditional fuel vehicles to reduce carbon emissions and protect the environment. EVs need to be charged, but the number of ... 详细信息
来源: 评论