咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 370 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 574 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 19 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 16 篇 alauthman mohamm...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir
  • 10 篇 muhammad adnan k...

语言

  • 809 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
970 条 记 录,以下是51-60 订阅
排序:
Utilizing Smartwatches and Deep Learning Models for Enhanced Avalanche Victim Identification, Localization, and Efficient Recovery Strategies: An In-depth Study  5
Utilizing Smartwatches and Deep Learning Models for Enhanced...
收藏 引用
5th International Conference on information Management and Machine Intelligence, ICIMMI 2023
作者: Jha, Khyati Pasbola, Mansi Rai, Hari Mohan Amanzholova, Saule Department of Computer Science Dronacharya Group of Institutions Greater Noida India Faculty of Computer Technologies and Cyber Security International University of Information Technology Almaty Kazakhstan
This article explores the transformative impact of modern technology on avalanche response and safety, addressing the longstanding challenges associated with avalanches in mountainous regions. Historically, avalanches... 详细信息
来源: 评论
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论
A Robust Model for Translating Arabic Sign Language into Spoken Arabic Using Deep Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2037-2057页
作者: Khalid M.O.Nahar Ammar Almomani Nahlah Shatnawi Mohammad Alauthman Department of Computer Sciences Faculty of Information Technology and Computer SciencesYarmouk University-Irbid21163Jordan School of Computing Skyline University CollegeSharjahP.O.Box 1797United Arab Emirates IT-Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan
This study presents a novel and innovative approach to auto-matically translating Arabic Sign Language(ATSL)into spoken *** proposed solution utilizes a deep learning-based classification approach and the transfer lea... 详细信息
来源: 评论
Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks  14
Enhancing Side-Channel Attacks Prediction using Convolutiona...
收藏 引用
14th International Conference on Advanced computer information Technologies, ACIT 2024
作者: Alemerien, Khalid Al-Suhemat, Sadeq Alsuhimat, Fadi Altarawneh, Enshirah Tafila Technical University Information Technology Department Tafila Jordan Isra University Faculty of Information Technology Amman Jordan Philadelphia University Cyber Security Department Amman Jordan Hashemite University Computer Engineering Department Zarqa Jordan
A common type of cyberattack is the side channel attack (SCA), which affects many devices and equipment connected to a network. These attacks have different types, like power attacks such as DPA, electromagnetic attac... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
AI-Based Intelligent Model to Predict Epidemics Using Machine Learning Technique
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 1095-1104页
作者: Liaqat Ali Saif E.A.Alnawayseh Mohammed Salahat Taher M.Ghazal Mohsen A.A.Tomh Beenu Mago College of Engineering and Technology University of Science and Technology of FujairahFujairahUAE Electrical Engineering Department Faculty of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City Sharjah1797UAE Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia43600Malaysia Faculty of Computer Science NCBA&ELahore54660Pakistan School of Information Technology Skyline University CollegeUniversity City Sharjah1797SharjahUAE
The immediate international spread of severe acute respiratory syn-drome revealed the potential threat of infectious diseases in a closely integrated and interdependent *** an outbreak occurs,each country must have a ... 详细信息
来源: 评论
An Energy-Efficient Protocol for Internet of Things Based Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2397-2412页
作者: Mohammed Mubarak Mustafa Ahmed Abelmonem Khalifa Korhan Cengiz Nikola Ivkovic Department of Information Technology Sri Krishna College of Engineering&TechnologyCoimbatoreIndia Department of Networking and Security College of Information TechnologyUniversity of FujairahFujairahUAE Switching and Traffic Department National Telecommunication InstituteCairoEgypt Department of Computer Engineering Istinye UniversityZeytinburnuIstanbulTurkey Faculty of Organization and Informatics University of ZagrebVarazdinCroatia
The performance of Wireless Sensor Networks(WSNs)is an important fragment of the Internet of Things(IoT),where the current WSNbuilt IoT network’s sensor hubs are enticing due to their critical *** grouping hubs,a clu... 详细信息
来源: 评论
Realizing the Potential of Metaverse to Revolutionize the Future of Healthcare  2
Realizing the Potential of Metaverse to Revolutionize the Fu...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Ishtaiwi, Abdelraouf Hadi, Wael Al-Qerem, Ahmad University Of Petra Department Of Data Science And Artificial Intelligence Amman Jordan University Of Petra Department Of Information Security Amman Jordan Zarqa University Faculty Of Information Technology Computer Science Department Zarqa Jordan
The emergence of metaverse technology, underpinned by virtual reality, augmented reality, and artificial intelligence, holds profound implications for transforming healthcare. This paper reviews the current applicatio... 详细信息
来源: 评论
A Comparative Analysis on Three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method  8
A Comparative Analysis on Three Duplication Elements in Copy...
收藏 引用
8th IEEE International Conference on Software Engineering and computer Systems, ICSECS 2023
作者: Nor Azaimi, Nur Izzati Abd Warif, Nor Bakiah Ismail, Nor-Syahidatul N Universiti Tun Hussein Onn Malaysia Faculty of Computer Science and Information Technology Johor Malaysia Centre for Information Security Research Universiti Tun Hussein Onn Malaysia Faculty of Computer Science and Information Technology Johor Malaysia Universiti Malaysia Pahang Al-Sultan Abdullah Faculty of Computing Department of Computer System and Networking Pekan Pahang Malaysia
Image forgery is the alteration of a digital image to hide some of the important and useful information. Copy-move forgery (CMF) is one of the most difficult to detect because the copied part of the image has the same... 详细信息
来源: 评论
Classification of Sleep-Related Disorders Using Machine Learning Techniques  25
Classification of Sleep-Related Disorders Using Machine Lear...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Nasir, Ola Alazaidah, Raed Al-Safarini, Maram Y. Alamleh, Amneh Zaid, Ali Abu Mansur, Hasan Elrashidi, Ali Alzoubi, Haneen Bani-Bakr, Alaa Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan American University of Madaba Faculty of Business Department of Accounting Madaba Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Private University Faculty of It Applied Science Department of Computer Science Amman Jordan
Several people suffer from irregular sleep patterns, a problem that negatively affects their daily lives. It presents a multitude of challenges, including daytime distress, disturbances in sleep-wake patterns, feeling... 详细信息
来源: 评论