咨询与建议

限定检索结果

文献类型

  • 598 篇 会议
  • 378 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 984 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 587 篇 工学
    • 456 篇 计算机科学与技术...
    • 370 篇 软件工程
    • 152 篇 信息与通信工程
    • 110 篇 控制科学与工程
    • 77 篇 电气工程
    • 62 篇 生物工程
    • 53 篇 网络空间安全
    • 48 篇 机械工程
    • 48 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 39 篇 安全科学与工程
    • 28 篇 仪器科学与技术
    • 26 篇 交通运输工程
    • 24 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 19 篇 光学工程
  • 235 篇 理学
    • 112 篇 数学
    • 68 篇 生物学
    • 62 篇 物理学
    • 42 篇 系统科学
    • 33 篇 统计学(可授理学、...
    • 20 篇 化学
  • 173 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 55 篇 医学
    • 46 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 26 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 40 篇 法学
    • 28 篇 社会学
  • 17 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 58 篇 deep learning
  • 55 篇 feature extracti...
  • 55 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 30 篇 security
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 artificial intel...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 measurement
  • 17 篇 reliability
  • 17 篇 real-time system...
  • 16 篇 information tech...
  • 16 篇 optimization
  • 16 篇 data mining

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 zarqa university...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 25 篇 ghazal taher m.
  • 24 篇 taher m. ghazal
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 16 篇 alauthman mohamm...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 11 篇 ahmad munir
  • 10 篇 sagheer abbas
  • 10 篇 muhammad adnan k...

语言

  • 760 篇 英文
  • 217 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
984 条 记 录,以下是111-120 订阅
排序:
Game Theory-Based IoT Efficient Power Control in Cognitive UAV
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1561-1578页
作者: Fadhil Mukhlif Norafida Ithnin Omar B.Abdulghafoor Faiz Alotaibi Nourah Saad Alotaibi Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi MalaysiaJohorMalaysia Electronic and Telecommunication Department College of EngineeringThe American University of KurdistanIraq Faculty of Computer Science and Information Technology Universiti Putra MalaysiaSelangorMalaysia Computer Department Faculty of Applied CollegeImam Abdulrahman Bin Faisal UniversityDammamSaudi Arabia
With the help of network densification,network coverage as well as the throughput can be improved via ultra-dense networks(UDNs).In tandem,Unmanned Aerial Vehicle(UAV)communications have recently garnered much attenti... 详细信息
来源: 评论
An Efficient Intrusion Detection Framework for Industrial Internet of Things security
收藏 引用
computer Systems Science & Engineering 2023年 第7期46卷 819-834页
作者: Samah Alshathri Ayman El-Sayed Walid El-Shafai Ezz El-Din Hemdan Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons... 详细信息
来源: 评论
Simulating a Finite-State Markov Chain for Rayleigh Block-Fading Channel based on its Mathematical Model, and Practical Representation  25
Simulating a Finite-State Markov Chain for Rayleigh Block-Fa...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Attar, Hani Ababneh, Jafar Al-Hihi, Mohammad Rachini, Ali Solyman, Ahmed Zarqa University Faculty of Engineering Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Erlangen Germany Department of Computer Science and Information Technology Jounieh Lebanon Glasgow Caledonian University School of Computing Engineering and Built Environment Glasgow United Kingdom
In the proposed paper, simulating the Finite State Markov Chain (FSMC) to be implemented as Rayleigh Block-fading channel. Indeed, FSMC is regarded as a practical fading channel because of its random choice for future... 详细信息
来源: 评论
The empirical study of tweet classification system for disaster response using shallow and deep learning models
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第9期15卷 3303-3316页
作者: Maswadi, Kholoud Alhazmi, Ali Alshanketi, Faisal Eke, Christopher Ifeanyi College of Business Administration Department of MIS Jazan University Jazan45142 Saudi Arabia Department of Information Technology and Security Jazan University Jazan45142 Saudi Arabia Department of Computer Science Faculty of Computing Federal University of Lafia P.M.B 146 Nasarawa State Lafia Nigeria
Disaster-based tweets during an emergency consist of a variety of information on people who have been hurt or killed, people who are lost or discovered, infrastructure and utilities destroyed;this information can assi... 详细信息
来源: 评论
LESaET: Low-Dimensional Embedding Method for Link Prediction Combining Self-Attention and Enhanced-TuckER
LESaET: Low-Dimensional Embedding Method for Link Prediction...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Ding, Lichao Zhao, Jing Lu, Kai Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts... 详细信息
来源: 评论
Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第14期16卷 123-135页
作者: Maabreh, Majdi Obeidat, Ibrahim Elsoud, Esraa Abu Alnajjai, Asma Alzyoud, Rahaf Darwish, Omar Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University P.O. Box 330127 Zarqa13133 Jordan Department of Computer Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Information Security and Applied Computing Department Eastern Michigan University MI United States
Cyber attacks have increased in tandem with the exponential expansion of computer networks and network applications throughout the world. Fortunately, various machine/deep learning models have demonstrated excellent a... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
Self-Evaluation of Large Language Model based on Glass-box F...
收藏 引用
2024 Findings of the Association for Computational Linguistics, EMNLP 2024
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
COVID-19 Classification from X-Ray Images:An Approach to Implement Federated Learning on Decentralized Dataset
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3883-3901页
作者: Ali Akbar Siddique S.M.Umar Talha M.Aamir Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai Department of Telecommunication Engineering Sir Syed University of Engineering&TechnologyKarachi75300Pakistan Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its *** to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big *** who test positive for Co... 详细信息
来源: 评论
MSIsensor-RNA:Microsatellite Instability Detection for Bulk and Single-cell Gene Expression Data
收藏 引用
Genomics, Proteomics & Bioinformatics 2024年 第3期22卷 85-90页
作者: Peng Jia Xuanhao Yang Xiaofei Yang Tingjie Wang Yu Xu Kai Ye Department of Gynecology and Obstetrics Center for Mathematical MedicalThe First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Genome Institute The First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China School of Life Science and Technology Xi’an Jiaotong UniversityXi’an 710049China
Microsatellite instability(MSI)is an indispensable biomarker in cancer ***,MSI scoring methods by high-throughput omics methods have gained popularity and demonstrated better performance than the gold standard method ... 详细信息
来源: 评论
Blockchain Solution For SMEs Cybersecurity Threats In E-Commerce  1
Blockchain Solution For SMEs Cybersecurity Threats In E-Comm...
收藏 引用
1st International Conference on computer Science and Emerging Technologies, CSET 2023
作者: Zawaideh, Firas H. Abu-Ulbeh, Waheeb Mjlae, Salameh A. El-Ebiary, Yousef A. Baker Al Moaiad, Yazeed Das, Sunanda Irbid National University Faculty of Science and Informaiton Technology Department of Cyber Security Irbid Jordan Al-Istiqlal University Faculty of Administrative Sciences and Informatics Cybersecurity Department Palestine Palestine Prince Abdullah Bin Ghazi Faculty of Information Technology Cs Department Jordan UniSZA Faculty of Informatics and Computing Malaysia Mediu Faculty of Computer and Information Technology Malaysia School of Computer Science and Engineering Jain University Bangalore India
The rapid growth of electronic commerce (e-commerce) has revolutionized the way Small and Medium-sized Enterprises (SMEs) conduct business, enabling them to reach global markets and unlock new growth opportunities. Ho... 详细信息
来源: 评论