咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 370 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 574 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 19 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 16 篇 alauthman mohamm...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir
  • 10 篇 muhammad adnan k...

语言

  • 809 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
970 条 记 录,以下是121-130 订阅
排序:
Video quality enhancement using different enhancement and dehazing techniques
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第12期14卷 16607-16635页
作者: Ayoub, Abeer Naeem, Ensherah A. El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. El-Rabaie, El-Sayed M. Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Electrical Department Faculty of Technology and Education Suez University Suez43527 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Video in an outdoor environment suffers from the haze problem due to smoke, dust, and other particles in the atmosphere. The quality of video under these atmospheric conditions is clearly/dramatically degraded, leadin... 详细信息
来源: 评论
Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection
收藏 引用
computer Systems Science & Engineering 2023年 第5期45卷 2235-2247页
作者: Mostafa Nassar Anas M.Ali Walid El-Shafai Adel Saleeb Fathi E.Abd El-Samie Naglaa F.Soliman Hussah Nasser AlEisa Hossam Eldin H.Ahmed Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Alexandria Higher Institute of Engineering&Technology(AIET) AlexandriaEgypt Department of Computer Science Security Engineering LaboratoryPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the *** techniques have been suggested for detecting attacks using machine learning... 详细信息
来源: 评论
Optimization Techniques in University Timetabling Problem:Constraints,Methodologies,Benchmarks,and Open Issues
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6461-6484页
作者: Abeer Bashab Ashraf Osman Ibrahim Ibrahim Abakar Tarigo Hashem Karan Aggarwal Fadhil Mukhlif Fuad A.Ghaleb Abdelzahir Abdelmaboud Faculty of Computer Science&Information Technology Alzaiem Alazhari University13311KhartoumSudan Faculty Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400SabahMalaysia Department of Computer Science University of SharjahSharjah27272United Arab Emirates Electronic and Communication Engineering Department Maharishi Markandeshwar Deemed to be UniversityMullanaAmbala133207HaryanaIndia Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi Malaysia81310JohorMalaysia Department of Information Systems King Khaled UniversityMuhayel61913AseerSaudi Arabia
University timetabling problems are a yearly challenging task and are faced repeatedly each *** problems are considered nonpolynomial time(NP)and combinatorial optimization problems(COP),which means that they can be s... 详细信息
来源: 评论
Features of A/B Testing of a Delivery App
Features of A/B Testing of a Delivery App
收藏 引用
International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA)
作者: Yuliya Khitskova Natalia Asnina Olga Efimova Katerina Makovy dept Faculty of Information Technology and Computer Security Voronezh State Technical University Voronezh Russia
Nowadays, the importance of adjusting products offered to consumers is growing. Many organizations conduct usability and/or A/B testing. The need for testing is to check the correctness of the product on a small amoun... 详细信息
来源: 评论
Greedy Overall-Relevancy (GOR): An Efficient Greedy Search for Feature Reduction  2
Greedy Overall-Relevancy (GOR): An Efficient Greedy Search f...
收藏 引用
2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Zamanian, Ayda Alqammaz, Abdullah Boostani, Reza Shiraz University Faculty of Electrical and Computer Engineering Cse and It Dept. Shiraz Iran Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia
Various feature selection strategies such as brute-force search, randomized and sequential search have been suggested to remove the redundant features, among which, sequential search strategy is computationally effici... 详细信息
来源: 评论
Bullyproof Sentinel: Fortifying Online Spaces Against Bullying using Machine Learning  7
Bullyproof Sentinel: Fortifying Online Spaces Against Bullyi...
收藏 引用
7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2023
作者: Dilshani, M.M.T. Vinoshan, T. Wijesinghe, W.A.S.D. Jathushan, V. Senarathne, Amila Gunasinghe, Amali Sri Lanka Institute of Information Technology Faculty of Computing Cyber Security Specialization Malabe Sri Lanka Sliit Cisco Academy Sri Lanka Institute of Information Technology Industry Engagement Unit Department of Computer Systems Engineering Manager Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka
In the current social media landscape, cyberbullying and online harassment remain pressing issues. Therefore, we planned a cyberbullying detection system for social media platforms. It can protect online communities f... 详细信息
来源: 评论
Reliability of Multipath Networks with Optimization of the Location of Inter-Path Communication Nodes
Reliability of Multipath Networks with Optimization of the L...
收藏 引用
2023 International Russian Smart Industry Conference, SmartIndustryCon 2023
作者: Bogatyrev, Vladimir A. Tu Le, Anh Abramova, Evgenia A. Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia University ITMO Faculty of Software Engineering and Computer Technology Saint Peterburg Russia
The article explores the possibility of improving the reliability of a network with multipath routing. A feature of the proposed study is the analysis of the influence of the placement of switching nodes that switch p... 详细信息
来源: 评论
Feature-Driven DDoS Detection in IoT with Machine Learning Approach  1
Feature-Driven DDoS Detection in IoT with Machine Learning A...
收藏 引用
1st International Conference on Cyber security and Computing, CyberComp 2024
作者: Jayasuri, Sandra Suriya AL Ramli, Sofia Najwa Foozy, Cik Feresa Mohd Yusof, Mohd Azahari Mohd Mahmoud, Aminu Abdulkadir Universiti Tun Hussein Onn Malaysia Faculty of Computer Science and Information Technology Batu Pahat Malaysia Universiti Tun Hussein Onn Malaysia Center of Information Security Research Batu Pahat Malaysia Universiti Teknologi Mara Jasin Melaka Campus Melaka Malaysia Yusuf Maitama Sule University Department of Cyber Security Kano Nigeria
This research focuses on strengthening Internet of Things (IoT) security against Distributed Denial-of-Service (DDoS) attacks by implementing a hybrid machine learning approach that integrates Naïve Bayes, K-Near... 详细信息
来源: 评论
Cluster Availability Model with information Update Following Node Recovery
Cluster Availability Model with Information Update Following...
收藏 引用
2023 Wave Electronics and its Application in information and Telecommunication Systems, WECONF 2023
作者: Bogatyrev, V.A. Bogatyrev, S.V. Sivov, V.V. Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia ITMO University Faculty of Software Engineering and Computer Technology Saint-Petersburg Russia
A model for evaluating the availability of a fault-tolerant cluster with a constraint on the maximum query service time is proposed. Node recovery in the cluster involves replacing the entire computational node with t... 详细信息
来源: 评论
Reliability of a Reconfigurable Network with Segment Switching
Reliability of a Reconfigurable Network with Segment Switchi...
收藏 引用
2023 Wave Electronics and its Application in information and Telecommunication Systems, WECONF 2023
作者: Tu, Le Anh Bogatyrev, V.A. Abramova, E.A. ITMO University Faculty of Software Engineering and Computer Technology Saint Peterburg Russia Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia
The article proposes models of the structural reliability of a multipath routing network with the possibility of its reconfiguration when switching path segments. The models are focused on optimizing the placement of ... 详细信息
来源: 评论