咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 4 篇 会议
  • 1 册 图书

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 7 篇 计算机科学与技术...
    • 4 篇 信息与通信工程
    • 4 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 sensor nodes
  • 1 篇 snapshot ensembl...
  • 1 篇 complex networks
  • 1 篇 linear discrimin...
  • 1 篇 naïve bayes (nb)
  • 1 篇 photonic technol...
  • 1 篇 internet of thin...
  • 1 篇 scalability
  • 1 篇 access control
  • 1 篇 resource replica...
  • 1 篇 c4.5
  • 1 篇 information syst...
  • 1 篇 medium access co...
  • 1 篇 state feedback
  • 1 篇 wireless sensor ...
  • 1 篇 deep learning(dl...
  • 1 篇 deep learning an...
  • 1 篇 c5.0
  • 1 篇 software algorit...
  • 1 篇 power system mod...

机构

  • 2 篇 department of in...
  • 2 篇 faculty of compu...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 institute of com...
  • 1 篇 institute of com...
  • 1 篇 department of co...
  • 1 篇 computer science...
  • 1 篇 commune d'akanda...
  • 1 篇 department of in...
  • 1 篇 cybersecurity de...
  • 1 篇 school of inform...
  • 1 篇 faculty of compu...
  • 1 篇 college of compu...
  • 1 篇 institute of com...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 faculty of compu...
  • 1 篇 department of in...

作者

  • 2 篇 manal abdullah
  • 2 篇 aiiad albeshri
  • 2 篇 iyad katib
  • 2 篇 rashid mehmood
  • 2 篇 a.k.bashir
  • 2 篇 alaa omran almag...
  • 2 篇 ahmad shakeel
  • 2 篇 asghar muhammad ...
  • 1 篇 morched derbali
  • 1 篇 hend nour eldin
  • 1 篇 ijaz muhammad
  • 1 篇 abdullah m.
  • 1 篇 inas al-anesi
  • 1 篇 houssem jerbi
  • 1 篇 simon see
  • 1 篇 muhammad shuaib ...
  • 1 篇 hassan a.alamri
  • 1 篇 vijey thayananth...
  • 1 篇 abdullah manal
  • 1 篇 hamam habib

语言

  • 15 篇 英文
检索条件"机构=Faculty of Computing and Information Technology FCIT"
15 条 记 录,以下是1-10 订阅
排序:
Predicting Energy Consumption Using Stacked LSTM Snapshot Ensemble
收藏 引用
Big Data Mining and Analytics 2024年 第2期7卷 247-270页
作者: Mona Ahamd Alghamdi Abdullah S.A.L-Malaise AL-Ghamdi Mahmoud Ragab Information Systems Department Faculty of Computing and Information Technology(FCIT)King Abdulaziz University(KAU)Jeddah 21589Kingdom of Saudi Arabia Information Systems Department FCITKAUJeddah 21589Kingdom of Saudi Arabiaand also with School of EngineeringComputing and DesignDar Al-Hekma UniversityJeddah 22246Kingdom of Saudi Arabia Information Technology Department FCITKAUJeddah 21589Kingdom of Saudi Arabiaand also with Mathematics DepartmentFaculty of ScienceAl-Azhar UniversityNaser City 11884Egypt
The ability to make accurate energy predictions while considering all related energy factors allows production plants,regulatory bodies,and governments to meet energy demand and assess the effects of energy-saving ***... 详细信息
来源: 评论
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 436-445页
作者: Alaa Omran Almagrabi A.K.Bashir Department of Information Systems Faculty of Computing and Information Technology(FCIT)King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computing and Mathematics Manchester Metropolitan UniversityManchesterUK
The introduction of the Internet of Things(IoT)paradigm serves as pervasive resource access and sharing platform for different real-time *** resource availability,access,and allocation provide a better quality of user... 详细信息
来源: 评论
A Survey on the Role of Complex Networks in IoT and Brain Communication
收藏 引用
Computers, Materials & Continua 2023年 第9期76卷 2573-2595页
作者: Vijey Thayananthan Aiiad Albeshri Hassan A.Alamri Muhammad Bilal Qureshi Muhammad Shuaib Qureshi Cybersecurity Department Faculty of ComputingEngineering and ScienceUniversity of SouthWalesWalesUK Department of Computer Science Faculty of Computing and Information Technology(FCIT)King Abdulaziz UniversityJeddah21589Saudi Arabia Computer Science Department Umm Al-Qura UniversityMakkah21955Saudi Arabia Department of Computer Science&IT University of Lakki MarwatLakki Marwat28420KPKPakistan Department of Computer Engineering Chungnam National UniversityDaejeon34134Republic of Korea
Complex networks on the Internet of Things(IoT)and brain communication are the main focus of this *** benefits of complex networks may be applicable in the future research directions of 6G,photonic,IoT,brain,etc.,comm... 详细信息
来源: 评论
Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications
收藏 引用
Computers, Materials & Continua 2021年 第6期67卷 3649-3667页
作者: Alaa Omran Almagrabi A.K.Bashir Department of Information Systems Faculty of Computing and Information Technology(FCIT)King Abdul Aziz University(KAU)JeddahKingdom of Saudi Arabia School of Information and Communication Engineering University of Electronic Science and Technology of China(UESTC)ChengduChina
The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and *** assimilation of blockchain systems lever... 详细信息
来源: 评论
A Framework for Handling Scalability in Requirements Prioritization Using IMPA Algorithm for Large Scale Projects
A Framework for Handling Scalability in Requirements Priorit...
收藏 引用
computing and Data Analytics (ICCDA), International Conference on
作者: Aisha Tanveer Noraini Binti Ibrahim Muhammad Zubair Rehman Nazri Mohd. Nawi Fakulti Sains Komputer dan Teknologi Maklumat (FSKTM) University Tun Hussein Onn Malaysia Parit Raja Malaysia Faculty of Computing & Information Technology (FCIT) Sohar University Sohar Sultanate of Oman Fakulti Sains Komputer dan Teknologi Maklumat (FSKTM) University Tun Hussein Onn Malaysia (UTHM) Parit Raja Malaysia
Requirements prioritization (RP) is the selection of the most important requirements for a particular software release. The importance of RP cannot be denied in software release planning. RP is comparatively easy when... 详细信息
来源: 评论
Retraction Note: Diagnosis of cardiovascular disease using deep learning technique
收藏 引用
Soft computing 2024年 第2期28卷 897-897页
作者: Ahmad, Shakeel Asghar, Muhammad Zubair Alotaibi, Fahad Mazaed Alotaibi, Yasir D. Department of Computer Science Faculty of Computing and Information Technology in Rabigh (FCITR) King Abdulaziz University Jeddah Saudi Arabia Institute of Computing and Information Technology Gomal University DIKHAN Pakistan Department of Information Systems Faculty of Computing and Information Technology (FCIT) King Abdulaziz University Jeddah Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology in Rabigh (FCITR) King Abdulaziz University Jeddah Saudi Arabia
来源: 评论
Exploring Issues of Story-Based Effort Estimation in Agile Software Development
SSRN
收藏 引用
SSRN 2023年
作者: Iqbal, Muhammad Ijaz, Muhammad Mazhar, Tehseen Shahzad, Tariq Abbas, Qamar Ghadi, Yazeed Yasin Ahmed, Waseem Hamam, Habib Institute of Computing and Information Technology Gomal University Dera Ismail Khan KP Pakistan Department of Computer Science Virtual University of Pakistan Lahore55150 Pakistan Department of Computer Sciences COMSATS University Islamabad Sahiwal Campus Sahiwal57000 Pakistan Department of Computer Science FCIT International Islamic University Islamabad Pakistan Department of computer science and software engineering Al Ain University Abu Dhabi15322 United Arab Emirates Department of Computer Science and Information Technology University of Malakand Pakistan Faculty of Engineering University of de Moncton MonctonNBE1A3E9 Canada Commune d'Akanda B.P. Libreville1989 Gabon School of Electrical Engineering Department of Electrical and Electronic Engineering. Science University of Johannesburg Johannesburg2006 South Africa Spectrum of Knowledge Production & Skills Development Sfax3027 Tunisia
Objctives This research delves into the domain of user story-based effort estimation in agile software development, aiming to explore the issues arising from inaccurate estimations. The primary goal is to uncover thes... 详细信息
来源: 评论
Correction to: Detection and classification of social media-based extremist affiliations using sentiment analysis techniques
收藏 引用
Human-centric computing and information Sciences 2019年 第1期9卷 1-1页
作者: Ahmad, Shakeel Asghar, Muhammad Zubair Alotaibi, Fahad M. Awan, Irfanullah Faculty of Computing and Information Technology at Rabigh (FCITR) King Abdulaziz University Jeddah Saudi Arabia Institute of Computing and Information Technology Gomal University Dera Ismail Khan (KP) Pakistan Department of Information Systems Faculty of Computing and Information Technology (FCIT) King Abdulaziz University Jeddah Saudi Arabia Department of Computing University of Bradford Bradford UK
In the original publication of this article [1], the Acknowledgements and Funding section in Declarations need to be revised.
来源: 评论
Energy efficient optimized routing algorithm (EEORA)
Energy efficient optimized routing algorithm (EEORA)
收藏 引用
International Conference on Communication, Management and information technology, ICCMIT 2016
作者: Alharbe, N. Abdullah, M. College of Computer Science and Engineering Taibah University Al Madinah al Munawwarah Saudi Arabia Faculty of Computing and Information Technology FCIT King Abdulaziz University KAU Jeddah Saudi Arabia
As a part from the great revolution that was occurred recently, a continuous improvement was and still achieved in communication and network field. Wireless Sensor Networks was emerged as a result for this development... 详细信息
来源: 评论
Cross-layer quality of service protocols for wireless multimedia sensor networks
Cross-layer quality of service protocols for wireless multim...
收藏 引用
International Conference on Communication, Management and information technology, ICCMIT 2016
作者: AlAmri, Ablah Abdullah, Manal Jeddah Community College JCC King Abdulaziz University KAU Jeddah Saudi Arabia Faculty of Computing and Information Technology FCIT King Abdulaziz University KAU Jeddah Saudi Arabia
Wireless Multimedia Sensor Networks (WMSNs) recently gained attention of many researchers, WMSNs have sensor nodes that are deployed to extract information from surrounding environment, processing information locally ... 详细信息
来源: 评论