咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,230 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,048 篇 工学
    • 1,620 篇 计算机科学与技术...
    • 1,363 篇 软件工程
    • 386 篇 信息与通信工程
    • 318 篇 控制科学与工程
    • 226 篇 生物工程
    • 180 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 157 篇 机械工程
    • 130 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 955 篇 理学
    • 530 篇 数学
    • 250 篇 生物学
    • 238 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 70 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 187 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 110 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 52 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 66 篇 software
  • 64 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 53 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,049 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3247 条 记 录,以下是211-220 订阅
排序:
An Efficient Intrusion Detection System using Advanced Machine Learning Techniques in SDN for Healthcare System
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Asif, Muhammad Waseem Aqdus, Aqsa Amin, Rashid Chaudhry, Shehzad Ashraf Alsubaei, Faisal S. Iqbal, Sajid Department of Computer Science and IT The University of Lahore Lahore54000 Pakistan Department of Computer Science University of Chakwal Chakwal48800 Pakistan Department of Computer Science and Information Technology College of Engineering Abu Dhabi University Abu Dhabi United Arab Emirates Department of Software Engineering Faculty of Engineering and Architecture Nisantasi University Istanbul Turkey The Department of Cybersecurity College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
The quick advancement of healthcare systems necessitates robust and efficient network security keys to defend sensitive patient records and guarantee uninterrupted service delivery. The current IDS has many challenges... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
Enhancing Diversity in Multi-Objective Feature Selection  13
Enhancing Diversity in Multi-Objective Feature Selection
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Miyandoab, Sevil Zanjani Rahnamayan, Shahryar Bidgoli, Azam Asilian Ebrahimi, Sevda Makrehchi, Masoud Lab Department of Electrical Computer and Software Engineering Ontario Tech University OshawaON Canada Brock University Department of Engineering St. CatharinesON Canada Wilfrid Laurier University Faculty of Science WaterlooON Canada
Feature selection plays a pivotal role in the data preprocessing and model-building pipeline, significantly en-hancing model performance, interpretability, and resource efficiency across diverse domains. In population... 详细信息
来源: 评论
Preliminary Exploration on Node-To-Node Fault Tolerance Coordination in Distributed System
Preliminary Exploration on Node-To-Node Fault Tolerance Coor...
收藏 引用
2023 IEEE International Conference on Computing, ICOCO 2023
作者: Saadoon, Muntadher Hamid, Siti Hafizah Ab. Sofian, Hazrina Altarturi, Hamza Nasuha, Nur Azizul, Zati Hakim Khalid, Haqi Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Artificial Intelligence Kuala Lumpur50603 Malaysia Universiti Putra Malaysia Faculty of Engineering Department of Computer and Communication Selangor 43400 Malaysia
Internet of Things, edge computing devices, the widespread use of artificial intelligence and machine learning applications, and the extensive adoption of cloud computing pose significant challenges to maintaining fau... 详细信息
来源: 评论
A secure IoT limited Devices by applying Multi-Round Lightweight Cryptography  25
A secure IoT limited Devices by applying Multi-Round Lightwe...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Al-Mousa, Mohammad Rasmi Abdulqawi, Mohammad Badarneh, Hazem Jihad Al-Shaikh, Ala'a Asassfeh, Mahmoud Al-Sherideh, Ala'a Saeb Samara, Ghassan Elrashidi, Ali Alazaidah, Raed Zarqa University Department of Cybersecurity Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Zarqa University Faculty of Information Technology Zarqa Jordan
The Internet of Things (IoT) is considered the base factor, that helps in developing many sectors. Additionally, IoT provides novel applications and services, i.e. smart homes, connected cars, and industrial automatio... 详细信息
来源: 评论
Multi-View Dynamic Kernelized Evidential Clustering
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第12期11卷 2435-2450页
作者: Jinyi Xu Zuowei Zhang Ze Lin Yixiang Chen Weiping Ding the Software Engineering Institute East China Normal UniversityShanghai 200062 Shanghai Key Laboratory of Trustworthy Computing East China Normal UniversityShanghai 200062China IEEE the School of Automation Northwestern Polytechnical UniversityXi’an 710072China the School of Artificial Intelligence and Computer Science Nantong UniversityNantong 226019 the Faculty of Data Science City University of MacaoMacao 999078China
It is challenging to cluster multi-view data in which the clusters have overlapping *** multi-view clustering methods often misclassify the indistinguishable objects in overlapping areas by forcing them into single cl... 详细信息
来源: 评论
Frilled Lizard Optimization: A Novel Bio-Inspired Optimizer for Solving engineering Applications
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 3631-3678页
作者: Ibraheem Abu Falahah Osama Al-Baik Saleh Alomari Gulnara Bektemyssova Saikat Gochhait Irina Leonova OmParkash Malik Frank Werner Mohammad Dehghani Department of Mathematics Faculty of ScienceThe Hashemite UniversityP.O.Box 330127Zarqa13133Jordan Department of Software Engineering Al-Ahliyya Amman UniversityAmman19328Jordan Faculty of Science and Information Technology Software EngineeringJadara UniversityIrbid21110Jordan Department of Computer Engineering International Information Technology UniversityAlmaty050000Kazakhstan Symbiosis Institute of Digital and Telecom Management Constituent of Symbiosis International Deemed UniversityPune412115India Neuroscience Research Institute Samara State Medical UniversitySamara443001Russia Faculty of Social Sciences Lobachevsky UniversityNizhny Novgorod603950Russia Department of Electrical and Software Engineering University of CalgaryCalgaryAB T2N 1N4Canada Faculty of Mathematics Otto-von-Guericke UniversityP.O.Box 4120Magdeburg39016Germany Department of Electrical and Electronics Engineering Shiraz University of TechnologyShiraz***Iran
This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization(FLO),which emulates the unique hunting behavior of frilled lizards in their natural *** draws its inspiration f... 详细信息
来源: 评论
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
computer Modeling in engineering & sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
A Novel Gooseneck Barnacle Optimizer Based Machine Learning Approach for Rainfall Prediction  5
A Novel Gooseneck Barnacle Optimizer Based Machine Learning ...
收藏 引用
5th International Conference on Sustainable Technologies for Industry 5.0, STI 2023
作者: Ahmed, Marzia Sulaiman, Mohd Herwan Rahman, Mostafijur Mohamad, Ahmad Johari Faculty of Electrical & Electronics Engineering Technology Pahang Malaysia Daffodil International University Department of Software Engineering Dhaka Bangladesh Green University of Bangladesh Department of Computer Science and Engineering Bangladesh
In dynamic meteorological prediction, accurate rainfall forecasting is a mystery. In a complex and dynamic natural environment with unpredictable sky movements, we propose an innovative methodology that forecasts week... 详细信息
来源: 评论
Enhancing Energy Efficiency in WSNs with Hybrid LEACH-D and ANN
Enhancing Energy Efficiency in WSNs with Hybrid LEACH-D and ...
收藏 引用
2024 Multimedia University engineering Conference, MECON 2024
作者: Qamar, Muhammad Salman Haq, Ihsan Ul Munir, Muhammad Fahad Roslee, Mardeni Bin Awan, Adnan Anwar Waseem, Athar International Islamic University Department of Electrical and Computer Engineering Islamabad Pakistan Multimedia University Centre for Wireless Technology Faculty of Engineering Cyberjaya63100 Malaysia School of Engineering California Polytechnic State University Department of Computer Science and Software Engineering San Luis ObispoCA United States
This paper explores strategies to improve the energy efficiency and operational longevity of Wireless Sensor Networks (WSNs) through the optimization of clustering techniques and energy efficient routing protocols. Th... 详细信息
来源: 评论