咨询与建议

限定检索结果

文献类型

  • 1,806 篇 期刊文献
  • 87 篇 学位论文
  • 45 篇 会议
  • 1 册 图书

馆藏范围

  • 1,938 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 831 篇 工学
    • 212 篇 计算机科学与技术...
    • 144 篇 化学工程与技术
    • 132 篇 材料科学与工程(可...
    • 96 篇 电子科学与技术(可...
    • 83 篇 控制科学与工程
    • 77 篇 软件工程
    • 49 篇 机械工程
    • 42 篇 仪器科学与技术
    • 37 篇 环境科学与工程(可...
    • 32 篇 电气工程
    • 28 篇 土木工程
    • 25 篇 信息与通信工程
    • 25 篇 食品科学与工程(可...
    • 24 篇 力学(可授工学、理...
    • 24 篇 建筑学
    • 23 篇 光学工程
  • 688 篇 医学
    • 539 篇 临床医学
    • 54 篇 中西医结合
    • 44 篇 公共卫生与预防医...
    • 33 篇 中药学(可授医学、...
    • 24 篇 药学(可授医学、理...
  • 386 篇 理学
    • 109 篇 化学
    • 98 篇 数学
    • 50 篇 物理学
    • 49 篇 生物学
  • 146 篇 农学
    • 34 篇 作物学
    • 30 篇 农业资源与环境
  • 117 篇 管理学
    • 80 篇 管理科学与工程(可...
  • 62 篇 经济学
    • 55 篇 应用经济学
  • 34 篇 文学
    • 30 篇 外国语言文学
  • 17 篇 法学
  • 15 篇 教育学
  • 4 篇 艺术学
  • 3 篇 哲学
  • 3 篇 军事学

主题

  • 57 篇 deep learning
  • 55 篇 machine learning
  • 26 篇 and
  • 24 篇 covid-19
  • 24 篇 of
  • 21 篇 saudi
  • 20 篇 arabia
  • 19 篇 artificial intel...
  • 16 篇 security
  • 16 篇 classification
  • 15 篇 internet of thin...
  • 14 篇 optimization
  • 14 篇 saudi arabia
  • 13 篇 properties
  • 12 篇 diabetes
  • 12 篇 metaheuristics
  • 12 篇 liver
  • 12 篇 cybersecurity
  • 12 篇 feature selectio...
  • 11 篇 analysis

机构

  • 28 篇 department of co...
  • 21 篇 department of in...
  • 19 篇 research centre ...
  • 16 篇 department of mi...
  • 12 篇 department of in...
  • 11 篇 college of denti...
  • 11 篇 department of co...
  • 11 篇 department of in...
  • 10 篇 department of in...
  • 10 篇 information tech...
  • 9 篇 information syst...
  • 9 篇 chemistry depart...
  • 8 篇 department of ch...
  • 8 篇 computer science...
  • 8 篇 department of co...
  • 8 篇 periodontics and...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 center of excell...
  • 8 篇 department of co...

作者

  • 31 篇 abdullah m.asiri
  • 26 篇 abdullah mohamed
  • 24 篇 abdullah al mamu...
  • 23 篇 mesfer al duhayy...
  • 22 篇 abdullah abusorr...
  • 20 篇 muhammad abdulla...
  • 20 篇 abdelwahed motwa...
  • 20 篇 mengchu zhou
  • 19 篇 abdullah alharbi
  • 19 篇 anwer mustafa hi...
  • 16 篇 abdullah khan
  • 16 篇 md. abdullah yus...
  • 15 篇 mohammed m. a. a...
  • 15 篇 muhammad irfan
  • 14 篇 radwa marzouk
  • 14 篇 abdullah
  • 13 篇 ishfaq yaseen
  • 13 篇 abdullah alqahta...
  • 13 篇 manar ahmed hamz...
  • 12 篇 hanan abdullah m...

语言

  • 1,659 篇 英文
  • 280 篇 中文
检索条件"作者=Abdullah.Aljaafari"
1939 条 记 录,以下是21-30 订阅
排序:
Internet of Things Authentication Protocols: Comparative Study
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 65-91页
作者: Souhayla Dargaoui Mourade Azrour Ahmad ElAllaoui Azidine Guezzaz Abdulatif Alabdulatif abdullah Alnajim Engineering Science and Technology Laboratory IDMS TeamFaculty of Sciences and TechniquesMoulay Ismail University of MeknesErrachidia52000Morocco Higher School Essaouira Cadi Ayyad UniversityMarrakesh44000Morocco Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Information Technology College of ComputerQassim UniversityBuraydah51452Saudi Arabia
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Adaptation of Federated Explainable Artificial Intelligence for Efficient and Secure E-Healthcare Systems
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3413-3429页
作者: Rabia Abid Muhammad Rizwan Abdulatif Alabdulatif abdullah Alnajim Meznah Alamro Mourade Azrour Department of Computer Science Kinnaird College for WomenLahorePakistan College of Science and Engineering University of DerbyDerbyDE221GBUK Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Information Technology College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia STI Laboratory IDMS TeamFaculty of Sciences and TechniquesMoulay Ismail University of MeknèsMeknesMorocco
Explainable Artificial Intelligence(XAI)has an advanced feature to enhance the decision-making feature and improve the rule-based technique by using more advanced Machine Learning(ML)and Deep Learning(DL)based *** thi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Review of Image Steganography Based on Multiple Hashing Algorithm
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2463-2494页
作者: abdullah Alenizi Mohammad Sajid Mohammadi Ahmad A.Al-Hajji Arshiya Sajid Ansari Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56312Saudi Arabia
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient Object Segmentation and Recognition Using Multi-Layer Perceptron Networks
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1381-1398页
作者: Aysha Naseer Nouf abdullah Almujally Saud S.Alotaibi Abdulwahab Alazeb Jeongmin Park Department of Computer Science Air UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Information System Department Umm Al-Qura UniversityMakkahSaudi Arabia Department of Computer Science College of Computer Science and Information SystemNajran UniversityNajran55461Saudi Arabia Department of Computer Engineering Tech University of KoreaGyeonggi-do15073South Korea
Object segmentation and recognition is an imperative area of computer vision andmachine learning that identifies and separates individual objects within an image or video and determines classes or categories based on ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Video Summarization Approach Based on Binary Robust Invariant Scalable Keypoints and Bisecting K-Means
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3565-3583页
作者: Sameh Zarif Eman Morad Khalid Amin abdullah Alharbi Wail S.Elkilani Shouze Tang Department of Information Technology Faculty of Computers and InformationMenoufia UniversityMenoufia32511Egypt Department of Artificial Intelligence Faculty of Artificial IntelligenceEgyptian Russian UniversityBader11829Egypt Department of Computer Science Community CollegeKing Saud UniversityRiyadh11362Saudi Arabia College of Applied Computer Science King Saud UniversityAl-Muzahmiya19676Saudi Arabia School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing400065China
Due to the exponential growth of video data,aided by rapid advancements in multimedia *** became difficult for the user to obtain information from a large video *** process of providing an abstract of the entire video... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Investigation of risk factors in the development of recurrent urethral stricture after internal urethrotomy
收藏 引用
World Journal of Clinical Cases 2024年 第14期12卷 2324-2331页
作者: abdullah Gul Ozgur Ekici Salim Zengin Deniz Barali Tarik Keskin Department of Urology University of Health SciencesBursa Yüksekİhtisas Education and Research HospitalBursa 16100Türkiye Department of Urology University of Health SciencesBursa City HospitalBursa 16000Türkiye
BACKGROUND Urethral stricture is a condition that often develops with trauma and results in narrowing of the urethral *** endoscopic methods are mostly used in its treatment,it has high recurrence ***,open urethroplas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The circuitry landscape of perovskite solar cells:An in-depth analysis
收藏 引用
Journal of Energy Chemistry 2024年 第7期94卷 393-413页
作者: Siddhi Vinayak Pandey Daniel Prochowicz Apurba Mahapatra Saravanan Pandiaraj abdullah N.Alodhayb Seckin Akin Pankaj Yadav Department of Solar Energy School of Energy TechnologyPandit Deendayal Energy UniversityGandhinagar 382007GujaratIndia Department of Physical Chemistry Polish Academy of SciencesKasprzaka 44/5201-224 WarsawPoland Department of Self-Development Skills King Saud UniversityRiyadh 11451Saudi Arabia Department of Physics and Astronomy College of ScienceKing Saud UniversityP.O.Box 2455Riyadh 11451Saudi Arabia Department of Metallurgical and Materials Engineering Necmettin Erbakan University42060 KonyaTurkey Department of Physics School of Energy TechnologyPandit Deendayal Energy UniversityGandhinagar 382007GujaratIndia
The extensive research and development in perovskite solar cells (PSCs) have rekindled the hopes of converting solar energy into *** elusive understanding of underlying mechanisms is required for the development of ef... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Communication-less Management Strategy for Electric Vehicle Charging in Droop-controlled Islanded Microgrids
收藏 引用
Journal of Modern Power Systems and Clean Energy 2024年 第4期12卷 1227-1238页
作者: abdullah Azhar Al-Obaidi Mohammed Zaki El-Sharafy Hany E.Z.Farag Saifullah Shafiq Ali Al-Awami Independent Electricity System Operator(IESO) MississaugaCanada Department of Electrical Engineering and Computer Science York UniversityTorontoCanada University of Queensland StLucia QLD 4067Australia Department of Electrical Engineering King Fahd University of Petroleum&MineralsDhahranSaudi Arabia
Adopting high penetration levels of electric vehicles(EVs)necessitates the implementation of appropriate charging management systems to mitigate their negative impacts on pow-er distribution ***,most of the proposed E... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1461-1479页
作者: Sarah Mustafa Eljack Mahdi Jemmali Mohsen Denden Mutasim Al Sadig abdullah M.Algashami Sadok Turki Department of Computer Science and Information College of Science at ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Computing and InformaticsUniversity of SharjahSharjahUnited Arab Emirates Higher Institute of Computer Science and Mathematics University of MonastirMonastir5000Tunisia Mars Laboratory University of SousseSousseTunisia Department of Logistic and Maintenance UFR MIM at MetzUniversity of LorraineMetzFrance Department of Computer and Information Technologies College of Telecommunicationand Information Riyadh CTITechnical and Vocational Training Corporation TVTCRiyadh12464Saudi Arabia Department of Computer Science Higher Institute of Applied Sciences of SousseSousse UniversitySousse4000Tunisia
In the cloud environment,ensuring a high level of data security is in high *** planning storage optimization is part of the whole security process in the cloud *** enables data security by avoiding the risk of data lo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论