咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,240 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,056 篇 工学
    • 1,629 篇 计算机科学与技术...
    • 1,368 篇 软件工程
    • 391 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 226 篇 生物工程
    • 183 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 158 篇 机械工程
    • 133 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 化学工程与技术
    • 74 篇 仪器科学与技术
    • 73 篇 网络空间安全
  • 957 篇 理学
    • 531 篇 数学
    • 250 篇 生物学
    • 240 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 70 篇 化学
  • 661 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 84 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 109 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 51 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 95 篇 deep learning
  • 90 篇 machine learning
  • 73 篇 accuracy
  • 66 篇 software
  • 65 篇 artificial intel...
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 54 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,060 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3257 条 记 录,以下是1-10 订阅
排序:
Enhanced Neutrosophic Set and Machine Learning Approach for Kidney Disease Prediction
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 465-477页
作者: Al-Doori, Humam M. Alkellezli, Tareef S. Abdelhafeez, Ahmed Eassaa, Mohamed Sawah, Mohamed S. El-Douh, Ahmed A. Cybersecurity Sciences Department College of Science Ashur University Baghdad Iraq Cybersecurity Engineering Department College of Engineering Ashur University Baghdad Iraq Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan Cybersecurity Technology Engineering Department College of Engineering Technology Ashur University Baghdad Iraq
Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and... 详细信息
来源: 评论
An Experimental Study on Dynamic Lifelong Learning with GPT for Mitigating Catastrophic Forgetting in Aspect-Based Sentiment Analysis
收藏 引用
IEEE Access 2025年 13卷 90316-90332页
作者: Huang, Huang Mustafa, Mumtaz Begum Asemi, Adeleh University of Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Branch Faculty of Engineering Department of Computer Engineering Isfahan81551-39998 Iran
GPT is widely recognized as one of the most versatile and powerful large language models, excelling across diverse domains. However, its significant computational demands often render it economically unfeasible for in... 详细信息
来源: 评论
Optimization Task Scheduling Using Cooperation Search Algorithm for Heterogeneous Cloud Computing Systems
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 2133-2148页
作者: Ahmed Y.Hamed M.Kh.Elnahary Faisal S.Alsubaei Hamdy H.El-Sayed Department of Computer Science Faculty of Computers and Artificial IntelligenceSohag UniversitySohag82524Egypt Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia
Cloud computing has taken over the high-performance distributed computing area,and it currently provides on-demand services and resource polling over the *** a result of constantly changing user service demand,the tas... 详细信息
来源: 评论
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 2217-2234页
作者: Abdur Rashid Sangi Satish Anamalamudi Mohammed SAlkatheiri Murali Krishna Enduri Anil Carie Mohammed AAlqarni Department of Computer Science College of Science and TechnologyWenzhou-Kean UniversityWenzhou325060China Department of Computer Science Engineering SRM University APAmaravati522502India Department of Cybersecurity College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina... 详细信息
来源: 评论
Topological Evaluation of Certain computer Networks by Contraharmonic-Quadratic Indices
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3795-3810页
作者: Ahmed M.Alghamdi Khalid Hamid Muhammad Waseem Iqbal M.Usman Ashraf Abdullah Alshahrani Adel Alshamrani Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and Engineering at University of JeddahJeddah21493Saudi Arabia
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P... 详细信息
来源: 评论
Deepfake Audio Detection for Urdu Language Using Deep Neural Networks
收藏 引用
IEEE Access 2025年 13卷 97765-97778页
作者: Ahmad, Omair Khan, Muhammad Sohail Jan, Salman Khan, Inayat University of Engineering and Technology Department of Computer Software Engineering Mardan Pakistan Arab Open University Faculty of Computer Studies A’Ali732 Bahrain University of Engineering and Technology Department of Computer Science Mardan Pakistan
Audio Deepfakes, which are highly realistic fake audio recordings driven by AI tools that clone human voices, With Advancements in Text-Based Speech Generation (TTS) and Vocal Conversion (VC) technologies have enabled... 详细信息
来源: 评论
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3655-3683页
作者: Abdullah Alabdulatif Navod Neranjan Thilakarathne Mohamed Aashiq Department of Cybersecurity College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of ICT Faculty of TechnologyUniversity of ColomboColombo00700Sri Lanka Department of Computer Science and Engineering Faculty of EngineeringSouth Eastern University of Sri LankaOluvil32360Sri Lanka
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber *** the myriad of potential attacks,D... 详细信息
来源: 评论
Optimized COVID-19 detection using sparse deep learning models from multimodal imaging data
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 11451-11474页
作者: Moradi, MohammadMahdi Hassanzadeh, Alireza Haghanifar, Arman Ko, Seok Bum Faculty of Computer Science and Software Engineering Concordia University MontrealQC Canada Faculty of Electrical Engineering Shahid Beheshti University Tehran Tehran Iran Department of Electrical & Computer Engineering University of Saskatchewan SaskatoonSK Canada
This paper explores the global spread of the COVID-19 virus since 2019, impacting 219 countries worldwide. Despite the absence of a definitive cure, the utilization of artificial intelligence (AI) methods for disease ... 详细信息
来源: 评论
Predicting Student Behavior Using a Neutrosophic Deep Learning Model
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 288-310页
作者: Shitaya, Ahmed Mohamed Wahed, Mohamed El Syed Abd El Khalek, Saied Helemy Ismail, Amr Shams, Mahmoud Y. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Computer Science Faculty of computer and information sciences Suez Canal University Egypt Department. of Communication and Computer Engineering Air Defense University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat... 详细信息
来源: 评论
Two-Factor Authentication Protocol with Zero-Knowledge over an Extended Field of Elliptic Curves  6
Two-Factor Authentication Protocol with Zero-Knowledge over ...
收藏 引用
6th IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics, UkrMiCo 2023
作者: Strelkovska, Iryna Onatskiy, Oleksiy Yona, Larysa International Humanitarian University Dept. Cybersecurity Software Engineering and Computer Science Odesa Ukraine
The paper proposes a cryptographic protocol two-factor authentication with the zero-knowledge over the extended field GF(2m) on elliptic curves using biometric data and private key of the user. The implementation of a... 详细信息
来源: 评论