咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,240 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,056 篇 工学
    • 1,629 篇 计算机科学与技术...
    • 1,368 篇 软件工程
    • 391 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 226 篇 生物工程
    • 183 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 158 篇 机械工程
    • 133 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 化学工程与技术
    • 74 篇 仪器科学与技术
    • 73 篇 网络空间安全
  • 957 篇 理学
    • 531 篇 数学
    • 250 篇 生物学
    • 240 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 70 篇 化学
  • 661 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 84 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 109 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 51 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 95 篇 deep learning
  • 90 篇 machine learning
  • 73 篇 accuracy
  • 66 篇 software
  • 65 篇 artificial intel...
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 54 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,060 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3257 条 记 录,以下是121-130 订阅
排序:
Comparative Study for Identifying and Categorizing DDoS Attacks  21
Comparative Study for Identifying and Categorizing DDoS Atta...
收藏 引用
21st International Learning and Technology Conference, L and T 2024
作者: Saad, Asaad B. Hossny, Eman Omara, Fatma A. Cairo University Faculty of Computers and Artificial Intelligence Software Engineering Department Cairo Egypt Cairo University Faculty of Computers and Artificial Intelligence Computer Science Department Cairo Egypt
Distributed Denial of Service, known as DDoS attacks, significantly compromise network security and availability. Certain DDoS detection methods utilize machine learning techniques, whereas others are based on statist... 详细信息
来源: 评论
Integration of Metaverse Recordings in Multimedia Information Retrieval  24
Integration of Metaverse Recordings in Multimedia Informatio...
收藏 引用
13th International Conference on software and computer Applications, ICSCA 2024
作者: Steinert, Patrick Wagenpfeil, Stefan Frommholz, Ingo Hemmje, Matthias L. University Of Hagen Faculty Of Mathematics And Computer Science Hagen Germany Pfh Private University Of Applied Sciences Faculty Of Business Computing And Software Engineering Göttingen Germany University Of Wolverhampton School Of Mathematics And Computer Science Wolverhampton United Kingdom
This paper addresses the challenges in integrating Metaverse Recordings in Multimedia Information Retrieval as a new type of multimedia. Specifically, we describe the characteristics of video content and explain the k... 详细信息
来源: 评论
IP SafeGuard-An AI-Driven Malicious IP Detection Framework
收藏 引用
IEEE Access 2025年 13卷 90249-90261页
作者: Siam, Abdullah Al Alazab, Moutaz Awajan, Albara Hasan, Md Rakibul Obeidat, Areej Faruqui, Nuruzzaman Daffodil International University Department of Software Engineering Dhaka Daffodil Smart City1216 Bangladesh Liverpool John Moores University School of Computing and Data Sciences Oryx Universal College Cybersecurity Department Doha Qatar Al-Balqa Applied University Faculty of Artificial Intelligence Department of Intelligent Systems As-Salt19385 Jordan Department of Computer Science and Engineering Dhaka1216 Bangladesh Independent Researcher As-Salt19385 Jordan
The rising frequency and sophistication of cyberattacks have made real-time malicious IP detection a critical challenge for modern Security Operations Center (SOC). Traditional solutions, such as static blacklists and... 详细信息
来源: 评论
Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4791-4812页
作者: Ahmad Yahiya Ahmad Bani Ahmad Jafar Alzubi Sophers James Vincent Omollo Nyangaresi Chanthirasekaran Kutralakani Anguraju Krishnan Department of Accounting and Finance Faculty of BusinessMiddle East UniversityAmman11831Jordan Faculty of Engineering Al-Balqa Applied UniversitySalt19117Jordan Department of Mathematics Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo210-40601Kenya Department of Electronics and Communication Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India Department of Electronics and Communication Engineering Saveetha Engineering College(Autonomous)Chennai602105India Department of Computer Science and Engineering Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basi... 详细信息
来源: 评论
Behavior Trees and State Machines in Robotics Applications
收藏 引用
IEEE Transactions on software engineering 2023年 第9期49卷 4243-4267页
作者: Ghzouli, Razan Berger, Thorsten Johnsen, Einar Broch Wasowski, Andrzej Dragule, Swaib Chalmers University of Technology Department of Computer Science and Engineering Gothenburg40530 Sweden Ruhr University Bochum Faculty of Computer Science Bochum44801 Germany Chalmers University of Gothenburg Department of Computer Science and Engineering Gothenburg40530 Sweden University of Oslo Department of Informatics Oslo0316 Norway IT University of Copenhagen Software Development Group Copenhagen2300 Denmark
Autonomous robots combine skills to form increasingly complex behaviors, called missions. While skills are often programmed at a relatively low abstraction level, their coordination is architecturally separated and of... 详细信息
来源: 评论
IOT Based Smart Parking System Using Ensemble Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3637-3656页
作者: Walaa H.Elashmawi Ahmad Akram Mohammed Yasser Menna Hisham Manar Mohammed Noha Ihab Ahmed Ali Department of Computer Science Faculty of Computers and InformaticsSuez Canal University4.5 Km the Ring RoadIsmailiaIsmailia41522Egypt Department of Computer Engineering and Software Systems Faculty of EngineeringAin Shams UniversityAl-Abbaseya4543070Egypt Department of Computer Science Faculty of Computer ScienceMisr International University28 KM Cairo–Ismailia RoadCairo44971Egypt College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Higher Future Institute for Specialized Technological Studies Cairo3044Egypt
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver *** car parking systems tend to tackle parking issues in a non-digitized *** systems requir... 详细信息
来源: 评论
Augmenting Internet of Medical Things Security:Deep Ensemble Integration and Methodological Fusion
收藏 引用
computer Modeling in engineering & sciences 2024年 第12期141卷 2185-2223页
作者: Hamad Naeem Amjad Alsirhani Faeiz MAlserhani Farhan Ullah Ondrej Krejcar Faculty of Informatics and Management Center for Basic and Applied ResearchUniversity of Hradec KraloveHradec Kralove50003Czech Republic Department of Computer Science College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Engineering&Networks College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Cybersecurity Center Prince Mohammad Bin Fahd UniversityAl JawharahKhobarDhahran34754Saudi Arabia
When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network *** protect IoMT devices and networks in healt... 详细信息
来源: 评论
Intelligent-Based Extraction of Business Capabilities from Company Descriptions  7
Intelligent-Based Extraction of Business Capabilities from C...
收藏 引用
7th International Conference on Information Technology, Information Systems and Electrical engineering, ICITISEE 2023
作者: Fahmi, Faisal Hamid, Siti Hafizah Ab Yuadi, Imam Airlangga University Faculty of Political and Social Science Department of Library and Information Science Indonesia Universiti Malaya Faculty of Computer Science & Information Technology Department of Software Engineering Malaysia
In the era of Big Data, Information can be generated, extracted, and utilized in diverse ways. In business, information about business capabilities can be a crucial aspect in understanding the strengths and competenci... 详细信息
来源: 评论
Improved Ingredients-based Recipe Recommendation software using Machine Learning  11
Improved Ingredients-based Recipe Recommendation Software us...
收藏 引用
11th IEEE International Conference on Intelligent Computing and Information Systems, ICICIS 2023
作者: Ashraf, Mariam Tarek, Khadija Fathy, Naglaa Mahmoud, Mariam Emad, Rana Khaled, Khadija Amr, Noran Ain Shams University Faculty of Computer and Information Science Software Engineering Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Information Systems Department Cairo Egypt
In this paper we propose an improved recipe recommendation system that employs image recognition of food ingredients. The system is currently a mobile application that performs image recognition on uploaded or camera-... 详细信息
来源: 评论
Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 4173-4184页
作者: Ala’A.Eshmawi Suliman A.Alsuhibany Sayed Abdel-Khalek Romany F.Mansour Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Mathematics College of ScienceTaif UniversityTaif21944Saudi Arabia Department of Mathematics Faculty of ScienceNew Valley UniversityEl-Kharga72511Egypt
Digital image security is a fundamental and tedious process on shared communication *** methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography,and *** sten... 详细信息
来源: 评论