咨询与建议

限定检索结果

文献类型

  • 1,982 篇 会议
  • 1,260 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 3,301 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,104 篇 工学
    • 1,664 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 402 篇 信息与通信工程
    • 326 篇 控制科学与工程
    • 228 篇 生物工程
    • 192 篇 电气工程
    • 172 篇 生物医学工程(可授...
    • 163 篇 机械工程
    • 128 篇 光学工程
    • 128 篇 电子科学与技术(可...
    • 86 篇 安全科学与工程
    • 80 篇 交通运输工程
    • 79 篇 网络空间安全
    • 77 篇 仪器科学与技术
    • 75 篇 化学工程与技术
  • 972 篇 理学
    • 539 篇 数学
    • 257 篇 生物学
    • 237 篇 物理学
    • 167 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 72 篇 化学
  • 683 篇 管理学
    • 416 篇 管理科学与工程(可...
    • 291 篇 图书情报与档案管...
    • 192 篇 工商管理
  • 187 篇 医学
    • 154 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 87 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 116 篇 法学
    • 91 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 54 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 7 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 103 篇 computer science
  • 97 篇 deep learning
  • 95 篇 machine learning
  • 75 篇 accuracy
  • 71 篇 artificial intel...
  • 67 篇 software
  • 62 篇 computational mo...
  • 60 篇 feature extracti...
  • 57 篇 training
  • 55 篇 internet of thin...
  • 51 篇 information tech...
  • 49 篇 predictive model...
  • 46 篇 optimization
  • 46 篇 semantics
  • 46 篇 security
  • 43 篇 data mining
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 50 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 14 篇 school of comput...
  • 14 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 susilo willy
  • 12 篇 ahmed bestoun s.
  • 12 篇 ghassan samara

语言

  • 2,963 篇 英文
  • 311 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 罗马尼亚文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3301 条 记 录,以下是1-10 订阅
排序:
Enhanced Neutrosophic Set and Machine Learning Approach for Kidney Disease Prediction
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 465-477页
作者: Al-Doori, Humam M. Alkellezli, Tareef S. Abdelhafeez, Ahmed Eassaa, Mohamed Sawah, Mohamed S. El-Douh, Ahmed A. Cybersecurity Sciences Department College of Science Ashur University Baghdad Iraq Cybersecurity Engineering Department College of Engineering Ashur University Baghdad Iraq Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan Cybersecurity Technology Engineering Department College of Engineering Technology Ashur University Baghdad Iraq
Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and... 详细信息
来源: 评论
Optimization Task Scheduling Using Cooperation Search Algorithm for Heterogeneous Cloud Computing Systems
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 2133-2148页
作者: Ahmed Y.Hamed M.Kh.Elnahary Faisal S.Alsubaei Hamdy H.El-Sayed Department of Computer Science Faculty of Computers and Artificial IntelligenceSohag UniversitySohag82524Egypt Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia
Cloud computing has taken over the high-performance distributed computing area,and it currently provides on-demand services and resource polling over the *** a result of constantly changing user service demand,the tas... 详细信息
来源: 评论
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 2217-2234页
作者: Abdur Rashid Sangi Satish Anamalamudi Mohammed SAlkatheiri Murali Krishna Enduri Anil Carie Mohammed AAlqarni Department of Computer Science College of Science and TechnologyWenzhou-Kean UniversityWenzhou325060China Department of Computer Science Engineering SRM University APAmaravati522502India Department of Cybersecurity College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina... 详细信息
来源: 评论
Topological Evaluation of Certain computer Networks by Contraharmonic-Quadratic Indices
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3795-3810页
作者: Ahmed M.Alghamdi Khalid Hamid Muhammad Waseem Iqbal M.Usman Ashraf Abdullah Alshahrani Adel Alshamrani Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and Engineering at University of JeddahJeddah21493Saudi Arabia
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P... 详细信息
来源: 评论
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3655-3683页
作者: Abdullah Alabdulatif Navod Neranjan Thilakarathne Mohamed Aashiq Department of Cybersecurity College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of ICT Faculty of TechnologyUniversity of ColomboColombo00700Sri Lanka Department of Computer Science and Engineering Faculty of EngineeringSouth Eastern University of Sri LankaOluvil32360Sri Lanka
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber *** the myriad of potential attacks,D... 详细信息
来源: 评论
Optimized COVID-19 detection using sparse deep learning models from multimodal imaging data
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 11451-11474页
作者: Moradi, MohammadMahdi Hassanzadeh, Alireza Haghanifar, Arman Ko, Seok Bum Faculty of Computer Science and Software Engineering Concordia University MontrealQC Canada Faculty of Electrical Engineering Shahid Beheshti University Tehran Tehran Iran Department of Electrical & Computer Engineering University of Saskatchewan SaskatoonSK Canada
This paper explores the global spread of the COVID-19 virus since 2019, impacting 219 countries worldwide. Despite the absence of a definitive cure, the utilization of artificial intelligence (AI) methods for disease ... 详细信息
来源: 评论
ACOCA-G: scenario-based context query generation for evaluating performance of context management platforms
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-28页
作者: De Silva, Ravindi Zaslavsky, Arkady Loke, Seng W. Jayaraman, Prem Prakash Faculty of Information Technology Deakin University Melbourne Australia Department of Computer Science and Software Engineering Swinburne University Melbourne Australia
Context-awareness is a pivotal trend within the Internet of Things research area, facilitating the near real-time processing and interpretation of relevant sensor data to enhance data processing efficiency. Context Ma... 详细信息
来源: 评论
Predicting Student Behavior Using a Neutrosophic Deep Learning Model
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 288-310页
作者: Shitaya, Ahmed Mohamed Wahed, Mohamed El Syed Abd El Khalek, Saied Helemy Ismail, Amr Shams, Mahmoud Y. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Computer Science Faculty of computer and information sciences Suez Canal University Egypt Department. of Communication and Computer Engineering Air Defense University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat... 详细信息
来源: 评论
Two-Factor Authentication Protocol with Zero-Knowledge over an Extended Field of Elliptic Curves  6
Two-Factor Authentication Protocol with Zero-Knowledge over ...
收藏 引用
6th IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics, UkrMiCo 2023
作者: Strelkovska, Iryna Onatskiy, Oleksiy Yona, Larysa International Humanitarian University Dept. Cybersecurity Software Engineering and Computer Science Odesa Ukraine
The paper proposes a cryptographic protocol two-factor authentication with the zero-knowledge over the extended field GF(2m) on elliptic curves using biometric data and private key of the user. The implementation of a... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论