咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 370 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 574 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 19 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 16 篇 alauthman mohamm...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir
  • 10 篇 muhammad adnan k...

语言

  • 809 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
970 条 记 录,以下是151-160 订阅
排序:
Smart Energy Management System Using Machine Learning
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 959-973页
作者: Ali Sheraz Akram Sagheer Abbas Muhammad Adnan Khan Atifa Athar Taher M.Ghazal Hussam Al Hamadi School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnamGyeonggido13120Korea Department of Computer Science COMSATS University IslamabadLahore CampusLahore54000Pakistan School of Information Technology Skyline University CollegeSharjah1797United Arab Emirates Network and Communication Technology Lab Center for Cyber SecurityFaculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
Energy management is an inspiring domain in developing of renewable energy ***,the growth of decentralized energy production is revealing an increased complexity for power grid managers,inferring more quality and reli... 详细信息
来源: 评论
An Efficient Classifier: Kernel SVM-LDA  1
An Efficient Classifier: Kernel SVM-LDA
收藏 引用
1st International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2022
作者: Tehrani, Fahimeh Jamshidian Nasihatkon, Behrooz Al-Qawasmi, Khaled Al-Mousa, Mohammad Rasmi Boostani, Reza School of Computer Engineering Khajeh Nasir University of Technology Tehran Iran Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan Shiraz University Shiraz Faculty of Electrical and Computer Engineering Iran
This study aims at designing an efficient combinatorial classifier, which fuses linear discriminant analysis (LDA) and kernel support vector machine (SVM) classifiers. The proposed method is called kernel SVM-LDA whic... 详细信息
来源: 评论
Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
Efficient Segmentation Approach for Different Medical Image Modalities
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3119-3135页
作者: Walid El-Shafai Amira A.Mahmoud El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi E.Abd El-Samie Department Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
This paper presents a study of the segmentation of medical *** paper provides a solid introduction to image enhancement along with image segmentation *** the first step,the morphological operations are employed to ens... 详细信息
来源: 评论
Hybrid Segmentation Approach for Different Medical Image Modalities
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3454-3471页
作者: Walid El-Shafai Amira A.Mahmoud El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi E.Abd El-Samie Department Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia
The segmentation process requires separating the image region into sub-regions of similar *** sub-region has a group of pixels having the same characteristics,such as texture or *** paper suggests an efficient hybrid ... 详细信息
来源: 评论
A Hybrid security Framework for Medical Image Communication
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 2713-2730页
作者: Walid El-Shafai Hayam A.Abd El-Hameed Ashraf A.M.Khalaf Naglaa F.Soliman Amel A.Alhussan Fathi E.Abd El-Samie Department of Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Electrical Communications Engineering Department Faculty of EngineeringMinia UniversityMinia61111Egypt Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia
Authentication of the digital image has much attention for the digital *** image authentication can be verified with image watermarking and image encryption *** schemes are widely used to protect images against forger... 详细信息
来源: 评论
Comparative Analysis of Data Dynamics Based on Wavelet Coherence Using Higher-Order Moments  2
Comparative Analysis of Data Dynamics Based on Wavelet Coher...
收藏 引用
2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Al-Sharo, Yasser Abu-Jassar, Amer Vasiurenko, Oleg Lyashenko, Vyacheslav Ajloun National University Faculty of Information Technology Department of Cyber Security Ajloun Jordan Ajloun National University Faculty of Information Technology Department of Computer Science Ajloun Jordan Kyiv University of Intellectual Property and Law Department of Cybersecurity It and Economics Kyiv Ukraine Kharkiv National University of Radio Electronics Department of Media Systems and Technology Kharkiv Ukraine
The article addresses the challenges of analyzing data represented as time series, depicting the evolution of a specific process, phenomenon, or object over time. Special emphasis is placed on conducting a comparative... 详细信息
来源: 评论
Defensive Auto-Updatable and Adaptable Bot Recommender System (DAABRS): A New Architecture Approach in Cloud Computing Systems  6
Defensive Auto-Updatable and Adaptable Bot Recommender Syste...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Khwaldeh, Sufian Mohit, Y. Khushwant, S. Department of Network and Information Security College of lnformation Technology University of Fujairah 1207 United Arab Emirates Department of Information Technology Faculty of Information Technology and Systems The University of Jordan Aqaba77110 Jordan Department of Mathematics University Institute of Sciences Chandigarh University Punjab Mohali140413 India Department of Computer Science & Engineering University Institute of Engineering and Technology M. D. University Rohtak124001 India
Cloud server data security makes extensive use of data centers and instantly accessible edge systems for possible transactions involving sizable and confidential data. These Edge Systems are chosen for rental based on... 详细信息
来源: 评论
Teaching pentesting to social sciences students using experiential learning techniques to improve attitudes towards possible cybersecurity careers  22
Teaching pentesting to social sciences students using experi...
收藏 引用
22nd European Conference on Cyber Warfare and security, ECCWS 2023
作者: Melnikovas, Aleksandras Lugo, Ricardo G. Maennel, Kaie Brilingaite, Agne Sutterlin, Stefan Juozapavicius, Ausrius General Jonas Zemaitis Military Academy of Lithuania Lithuania Faculty of Health Welfare and Organisation Ostfold University College Norway School of Information Technology Tallinn University of Technology Tallinn Estonia Institute of Computer Science Vilnius University Vilnius Lithuania School of Computer and Mathematical Sciences The University of Adelaide Adelaide Australia Department of Information Security and Communication Technology Norwegian University of Science and Technology Norway Faculty of Computer Science Albstadt-Sigmaringen University Sigmaringen Germany
Labor market analysis shows that there is a significant shortage of experienced cybersecurity professionals, and this trend is expected to continue in the future. In addition, young people who are reluctant to choose ... 详细信息
来源: 评论
Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps:An Ultra-Wide Range Dynamics for Image Encryption
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2161-2188页
作者: De Rosal Ignatius Moses Setiadi T.Sutojo Supriadi Rustad Muhamad Akrom Sudipta Kr Ghosal Minh T.Nguyen Arnold Adimabua Ojugo Research Center for Quantum Computing and Materials Informatics Faculty of Computer ScienceDian Nuswantoro UniversitySemarang50131Indonesia Department of Cyber Forensics and Information Security Behala Government Polytechnic756Upendra Nath Banerjee RoadParnasreeBehalaKolkata700060India Thai Nguyen University of Technology Thai Nguyen UniversityThai Nguyen240000Vietnam Department of Computer Science Federal University of Petroleum ResourcesEffurun330102Nigeria
Data security has become a growing priority due to the increasing frequency of cyber-attacks,necessitating the development of more advanced encryption *** paper introduces Single Qubit Quantum Logistic-Sine XYZ-Rotati... 详细信息
来源: 评论