咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 370 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 574 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 19 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 16 篇 alauthman mohamm...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir
  • 10 篇 muhammad adnan k...

语言

  • 809 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
970 条 记 录,以下是91-100 订阅
排序:
Detection of Thyroid Disease Through Machine Learning Technique  25
Detection of Thyroid Disease Through Machine Learning Techni...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Almomani, Mutaz Al-Qerem, Ahmad Nashwan, Shadi Jebreen, Issam Rajab, Mohammed Alauthman, Mohammad Jeadi, Mohammad Elrashidi, Ali Zarqa University Faculty of Information Technology Computer Science Department Zarqa13110 Jordan Middle East University Faculty of Information Technology Cybersecurity Department Amman11831 Jordan University Headquarter University of Anbar Ramadi Iraq University of Petra Department of Information Security Amman11196 Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Thyroid disease, one of the most common endocrine disorders, requires prompt diagnosis to effectively treat it. To improve diagnostic precision and expedite medical procedures, this paper explores the use of Machine L... 详细信息
来源: 评论
Prediction of Hypertension Disease Using Machine Learning Techniques: Case Study from Jordan  25
Prediction of Hypertension Disease Using Machine Learning Te...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Alazaidah, Raed Samara, Ghassan Katrawi, Anwar Hadi, Wael Al-Safarini, Maram Y. Al-Mamoori, Farah Elrashidi, Ali Alqaraleh, Muhyeeddin Alzoubi, Haneen Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Zarqa University Faculty of It Department of Computer Science Zarqa Jordan Petra University Faculty of It Information Security Department Amman Jordan Zarqa University Faculty of Pharmacy Department of Pharmaceutical Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Zarqa University Faculty of It Department of Software Engineering Zarqa Jordan Applied Science Private University Facultty of Information Technology Department of Computer Science Amman Jordan
Hypertension is one of the most common diseases in Jordan. It is one of the main reasons of death among Jordanian adult citizens. Worldwide, nearly 13% of all deaths are due to Hypertension with nearly 8 million death... 详细信息
来源: 评论
Unveiling Deception: Different Strategies for Combatting Arabic Fake News  25
Unveiling Deception: Different Strategies for Combatting Ara...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Khattab, Nada Al-Qerem, Ahmad Nashwan, Shadi Jebreen, Issam Rajab, Mohammed Alauthman, Mohammad Jeadi, Mohammad Elrashidi, Ali Zarqa University Faculty of Information Technology Computer Science Department Zarqa13110 Jordan Middle East University Faculty of Information Technology Cybersecurity Department Amman11831 Jordan University Headquarter University of Anbar Ramadi Iraq University of Petra Department of Information Security Amman11196 Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
the proliferation of fake news has become a widespread problem in the contemporary era of information, posing possible harm to public discussions, political stability, and community confidence. To tackle this difficul... 详细信息
来源: 评论
Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3011-3026页
作者: Amjad Hussain Zahid Muhammad Junaid Arshad Musheer Ahmad Naglaa F.Soliman Walid El-Shafai School of Systems and Technology University of Management and TechnologyLahore54700Pakistan Department of Computer Science University of Engineering and TechnologyLahore54700Pakistan Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chao... 详细信息
来源: 评论
Optical Ciphering Scheme for Cancellable Speaker Identification System
收藏 引用
computer Systems Science & Engineering 2023年 第4期45卷 563-578页
作者: Walid El-Shafai Marwa A.Elsayed Mohsen A.Rashwan Moawad I.Dessouky Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi EAbd El-Samie Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Communications Faculty of EngineeringCairo UniversityCairoEgypt Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Most current security and authentication systems are based on personal *** security problem is a major issue in the field of biometric *** is due to the use in databases of the original *** biometrics will forever be ... 详细信息
来源: 评论
Applied Aspects of Polyharmonic Functions for security and Reliability of Data Transmission  8
Applied Aspects of Polyharmonic Functions for Security and R...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Laptiev, Oleksandr Sobchuk, Andrii Ryzhov, Anton Perehuda, Oleh Tsygansvska, Iryna Kopytko, Serhii Taras Shevchenko National University of Kyiv Faculty of information technology Department of Cyber Security and Information Protection Kyiv Ukraine State University of Information and Communication Technologies Department of Information and Cyber Security Kyiv Ukraine Taras Shevchenko National University of Kyiv Faculty of Mechanics and Mathematics Department of General Mathematics Kyiv Ukraine Taras Shevchenko National University of Kyiv Faculty of Mechanics and Mathematics Department of Algebra and Computer Mathematics Kyiv Ukraine Lviv Polytechnic National University Department of Information Systems and Networks Lviv Ukraine
At present, when armed conflicts have intensified, and especially against the background of Russia's armed aggression against Ukraine, a new era of development of high-precision means of protection and weapons has... 详细信息
来源: 评论
A Novel 3D Medical Image Segmentation Model Using Improved SAM
A Novel 3D Medical Image Segmentation Model Using Improved S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kuang, Yuansen Ma, Xitong Zhao, Jing Wang, Guangchen Zeng, Yijie Liu, Song Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
3D medical image segmentation is an essential task in the medical image field, which aims to segment organs or tumours into different labels. A number of issues exist with the current 3D medical image segmentation tas... 详细信息
来源: 评论
Age and Gender Classification Using Backpropagation and Bagging Algorithms
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3045-3062页
作者: Ammar Almomani Mohammed Alweshah Waleed Alomoush Mohammad Alauthman Aseel Jabai Anwar Abbass Ghufran Hamad Meral Abdalla Brij B.Gupta Research and Innovation Department Skyline University CollegeP.O.Box 1797SharjahUAE IT-department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan Prince Abdullah Ben Ghazi Faculty of Information and Communication Technology Al-Balqa Applied UniversityAl-SaltJordan School of Information Technology Skyline University CollegeSharjah P.O.Box 1797United Arab Emirates Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan Department of Computer Science and Information Engineering Asia UniversityTaizhongTaiwan Department of Computer Science King Abdulaziz UniversityJeddahSaudi Arabia
Voice classification is important in creating more intelligent systems that help with student exams,identifying criminals,and security *** main aim of the research is to develop a system able to predicate and classify... 详细信息
来源: 评论
Pindel-TD:A Tandem Duplication Detector Based on A Pattern Growth Approach
收藏 引用
Genomics, Proteomics & Bioinformatics 2024年 第1期22卷 99-104页
作者: Xiaofei Yang Gaoyang Zheng Peng Jia Songbo Wang Kai Ye School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Center for Mathematical Medical the First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China Genome Institute the First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Life Science and Technology Xi’an Jiaotong UniversityXi’an 710049China Faculty of Science Leiden UniversityLeiden 2311 EZNetherland
Tandem duplication(TD)is a major type of structural variations(SVs)that plays an important role in novel gene formation and human ***,TDs are often missed or incorrectly classified as insertions by most modern SV dete... 详细信息
来源: 评论
A deep learning fusion model for accurate classification of brain tumours in Magnetic Resonance images
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 790-804页
作者: Nechirvan Asaad Zebari Chira Nadheef Mohammed Dilovan Asaad Zebari Mazin Abed Mohammed Diyar Qader Zeebaree Haydar Abdulameer Marhoon Karrar Hameed Abdulkareem Seifedine Kadry Wattana Viriyasitavat Jan Nedoma Radek Martinek Department of Information Technology Lebanese French UniversityErbilIraq Department of Computer Science University of ZakhoZakhoKurdistan RegionIraq Department of Computer Science College of ScienceNawroz UniversityDuhokKurdistan RegionIraq Department of Artificial Intelligence College of Computer Science and Information TechnologyUniversity of AnbarRamadiIraq Department of Telecommunications VSB‐Technical University of OstravaOstravaCzech Republic Department of Cybernetics and Biomedical Engineering VSB‐Technical University of OstravaOstravaCzech Republic Department of Computer Network and Information Security Technical College of Informatics-AkreDuhok Polytechnic UniversityDuhokIraq Information and Communication Technology Research Group Scientific Research CenterAl‐Ayen UniversityThi‐QarIraq College of Computer Sciences and Information Technology University of KerbalaKarbalaIraq College of Agriculture Al‐Muthanna UniversitySamawahIraq Department of Applied Data Science Noroff University CollegeKristiansandNorway Faculty of Commerce and Accountancy Chulalongkorn Business SchoolChulalongkorn UniversityBangkokThailand
Detecting brain tumours is complex due to the natural variation in their location, shape, and intensity in images. While having accurate detection and segmentation of brain tumours would be beneficial, current methods... 详细信息
来源: 评论