咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 368 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 968 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 573 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 18 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 17 篇 alauthman mohamm...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 al-qerem ahmad
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir

语言

  • 807 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
968 条 记 录,以下是41-50 订阅
排序:
MIDAS: A Multi-chain Interoperable Data and Access System for Healthcare  12th
MIDAS: A Multi-chain Interoperable Data and Access System f...
收藏 引用
12th International Conference on Computational Data and Social Networks, CSoNet 2023
作者: Nguyen, Bui Kim Ngan Nguyen, Binh Thuc Tram Tran, Tuan-Dung Duy, Phan The Pham, Van-Hau Faculty of Computer Networks and Communications University of Information Technology Vietnam National University Ho Chi Minh City Viet Nam Information Security Laboratory University of Information Technology Vietnam National University Ho Chi Minh City Viet Nam
The emergence of Blockchain technology has inaugurated a transformative era by its multifaceted advantages and wide-ranging applications across diverse industries. Nevertheless, while holding great promise, Blockchain... 详细信息
来源: 评论
Sentiment Analysis using Dictionary-Based Lexicon Approach: Analysis on the Opinion of Indian Community for the Topic of Cryptocurrency
收藏 引用
Annals of Data Science 2024年 第6期11卷 2019-2034页
作者: Loomba, Sankalp Dave, Madhavi Arolkar, Harshal Sharma, Sachin School of Cyber Security and Digital Forensics National Forensic Sciences University Gujarat Gandhinagar India Adani Institute of Digital Technology Management Gujarat Ahmedabad India Faculty of Computer Application and Information Technology GLS University Gujarat Ahmedabad India Indrashil University Gujarat Mehsana India
Due to the ever-increasing computing power and easy availability, social-networking platforms like Facebook, Twitter, etc. have become a popular medium to express one’s views instantly, be it about political situatio... 详细信息
来源: 评论
Optimizing Resource Allocation Framework for Multi-Cloud Environment
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4119-4136页
作者: Tahir Alyas Taher M.Ghazal Badria Sulaiman Alfurhood Ghassan F.Issa Osama Ali Thawabeh Qaiser Abbas Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan School of Information Technology Skyline University CollegeUniversity City Sharjah1797SharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebansaan Malaysia(UKM)43600BangiSelangorMalaysia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11564Saudi Arabia Skyline University College University City Sharjah1797SharjahUAE Faculty of Computer and Information Systems Islamic University of Madinah Madinah42351Saudi Arabia
Cloud computingmakes dynamic resource provisioning more *** a functioning service is crucial,and changes are made when particular criteria are *** research explores the decentralized multi-cloud environment for alloca... 详细信息
来源: 评论
Machine Learning Supported Network Attack Detection with a Novel Method Based on Random Forest-Based Feature Fusion  17
Machine Learning Supported Network Attack Detection with a N...
收藏 引用
17th International Conference on information security and Cryptology, ISCTurkiye 2024
作者: Cinar, Cihan Dogru, Ibrahim Alper Atacak, Ismail Information Security Engineering Graduate School of Natural and Applied Sciences Gazi University Ankara Turkey Department of Computer Engineering Faculty of Technology Gazi University Ankara Turkey
Nowadays, Innovative techniques, including artificial intelligence and machine learning (ML), have been employed in attack detection systems across numerous domains to create effective detection mechanisms that identi... 详细信息
来源: 评论
Utilizing Machine Learning in Medical Diagnosis: Systematic Review and Empirical Analysis  24
Utilizing Machine Learning in Medical Diagnosis: Systematic ...
收藏 引用
24th International Arab Conference on information technology, ACIT 2023
作者: Alazaidah, Raed Hassan, Mohammad Al-Rbabah, Lara Samara, Ghassan Yusof, Marina Al-Sherideh, Ala'a Saeb Zarqa University Ai Faculty of Information Technology Department of Data Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan The Hashemite University Faculty of Engineering Department of Computer Engineering Zarqa Jordan Selanger Malaysia Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan
During the last few years, several real-life applications have attempted to utilize the proven high capabilities of artificial intelligence in general and machine learning in particular. Machine learning has been util... 详细信息
来源: 评论
Multi-Party Privacy Policy Management in the Context of Health Monitoring: An Exploratory Study  23
Multi-Party Privacy Policy Management in the Context of Heal...
收藏 引用
8th International Conference on Sustainable information Engineering and technology, SIET 2023
作者: Sun, Luyi Yeng, Prosper Fauzi, Muhammad Ali Khatiwada, Pankaj Yang, Bian Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway Faculty of Computer Science Brawijaya University Malang Indonesia
There is an increasing number of assisted living technologies and health monitoring systems to provide electronic health services and help patients and the elderly stay at home longer. It ensures users' safety and... 详细信息
来源: 评论
A Survey of information security Roles and Trends in the Quranic Perspective  1
A Survey of Information Security Roles and Trends in the Qur...
收藏 引用
1st International Conference on Cyber security and Computing, CyberComp 2024
作者: Yunus, Mohd Amin Mohd Rahman, Nurul Hidayah Ab Hamid, Isredza Rahmi A. Universiti Tun Hussein Onn Malaysia Applied Information System Faculty of Computer Science and Information Technology Parit Raja Malaysia Centre of Information Security Research Universiti Tun Hussein Onn Malaysia Parit Raja Malaysia
In this study, we surveyed the existing information security literature related to the Quran to contribute to the knowledge gap(s) in seeking the role of information security in the Quran research area. Materials publ... 详细信息
来源: 评论
Intelligent wearable vision systems for the visually impaired in Saudi Arabia
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8571-8591页
作者: Talaat, Fatma M. El-Shafai, Walid Soliman, Naglaa F. Algarni, Abeer D. El-Samie, Fathi E. Abd Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Faculty of Computer Science and Engineering New Mansoura University Gamasa35712 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Navigating the world with visual impairments presents unique challenges, often limiting independence and safety. This research introduces SafeStride, a novel algorithm designed to empower visually impaired individuals... 详细信息
来源: 评论
A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 201-241页
作者: Naglaa F.Soliman Fatma E.Fadl-Allah Walid El-Shafai Mahmoud I.Aly Maali Alabdulhafith Fathi E.Abd El-Samie Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electronics and Communications Faculty of EngineeringZagazig UniversityZagazig44519Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia ***-quality images require well-tuned communication *** Single C... 详细信息
来源: 评论
Utilizing Smartwatches and Deep Learning Models for Enhanced Avalanche Victim Identification, Localization, and Efficient Recovery Strategies: An In-depth Study  5
Utilizing Smartwatches and Deep Learning Models for Enhanced...
收藏 引用
5th International Conference on information Management and Machine Intelligence, ICIMMI 2023
作者: Jha, Khyati Pasbola, Mansi Rai, Hari Mohan Amanzholova, Saule Department of Computer Science Dronacharya Group of Institutions Greater Noida India Faculty of Computer Technologies and Cyber Security International University of Information Technology Almaty Kazakhstan
This article explores the transformative impact of modern technology on avalanche response and safety, addressing the longstanding challenges associated with avalanches in mountainous regions. Historically, avalanches... 详细信息
来源: 评论