咨询与建议

限定检索结果

文献类型

  • 65 篇 会议
  • 34 篇 期刊文献

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 44 篇 计算机科学与技术...
    • 38 篇 软件工程
    • 12 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 电气工程
    • 6 篇 网络空间安全
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 1 篇 冶金工程
  • 35 篇 理学
    • 20 篇 数学
    • 8 篇 物理学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 化学
    • 3 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 海洋科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 农学

主题

  • 4 篇 dipper throated ...
  • 4 篇 mathematical mod...
  • 3 篇 decision support...
  • 3 篇 grey wolf optimi...
  • 3 篇 learning algorit...
  • 3 篇 classification a...
  • 3 篇 software
  • 2 篇 intrusion detect...
  • 2 篇 information syst...
  • 2 篇 metaheuristics
  • 2 篇 deep learning
  • 2 篇 concurrent softw...
  • 2 篇 software algorit...
  • 2 篇 informatics
  • 2 篇 education
  • 2 篇 information tech...
  • 2 篇 authentication
  • 2 篇 reusability
  • 2 篇 market research
  • 2 篇 aspect orientati...

机构

  • 13 篇 department of sy...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information comm...
  • 4 篇 computer enginee...
  • 3 篇 dept. of informa...
  • 3 篇 department of sy...
  • 3 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of so...
  • 2 篇 institute of nuc...
  • 2 篇 lovely professio...
  • 2 篇 university of di...
  • 2 篇 information tech...
  • 2 篇 electronic and c...
  • 2 篇 v. a. trapezniko...

作者

  • 6 篇 mostafa abotaleb
  • 6 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 steffen bernhard
  • 5 篇 doaa sami khafag...
  • 4 篇 abotaleb mostafa
  • 3 篇 reem alkanhel
  • 3 篇 jonsson bengt
  • 3 篇 howar falk
  • 3 篇 m. abotaleb
  • 2 篇 shahbazova shahn...
  • 2 篇 a. ali subhi
  • 2 篇 alkattan hussein
  • 2 篇 cassel sofia
  • 2 篇 vovk olga
  • 2 篇 tarlan abdullaye...
  • 2 篇 leucker martin
  • 2 篇 caraveo david
  • 2 篇 janar yusupova

语言

  • 97 篇 英文
  • 1 篇 德文
  • 1 篇 其他
检索条件"机构=“Information Technology and Programming” department"
99 条 记 录,以下是1-10 订阅
排序:
A fault-tolerant scheduling strategy through proactive and clustering techniques for scientific workflows in cloud computing
收藏 引用
Soft Computing 2025年 第2期29卷 755-781页
作者: Farhood, Suha Mubdir Khorsand, Reihaneh Hussein, Nashwan Jasim Ramezanpour, Mohammadreza Branch Islamic Azad University Isfahan Iran Department of Programming Collage of Information Technology University of Babylon Hillah Iraq Department of Computer Engineering Mobarakeh Branch Islamic Azad University Mobarakeh Isfahan Iran
Cloud computing offers solutions for various scientific and business applications. Large-scale scientific applications, which are organized as scientific workflows, are carried out using cloud computing. However, the ... 详细信息
来源: 评论
The Problem of Morphological Synthesis and Methods, Algorithms for Handling Errors in Word Forms  3
The Problem of Morphological Synthesis and Methods, Algorith...
收藏 引用
3rd IEEE International Conference on Problems of Informatics, Electronics and Radio Engineering, PIERE 2024
作者: Kochkonbaeva, Buazhar O. Egemberdieva, Julduz S. Satybaev, Abdugany D. Osh State University Department of Information Technology and Programming Osh Kyrgyzstan Kyrgyz-Uzbek International University after named B. Sydykov Department of Information Technology Osh Kyrgyzstan Osh Technological University after named academican M.M. Adyshev Department of Information Technology and Management Osh Kyrgyzstan
Morphological synthesis is a key aspect of natural language processing that focuses on the generation of word forms from their base components - roots, stems, prefixes, affixes, and inflectional morphemes. It plays a ... 详细信息
来源: 评论
Renal Tumor Classification and Detection Based on Artificial Intelligence  3
Renal Tumor Classification and Detection Based on Artificial...
收藏 引用
3rd International Conference on Communications, information System, and Data Science, CISDS 2024
作者: Al-Taie, Raflaa Hilmi Hussein, Nashwan J. Physiology and Organ Functions Department College of Medicine University of Babylon Iraq Department of Electrical Power Engineering AL-Hussain University College Department of Programming Collage of Information Technology University of Babylon Iraq
The kidney is a crucial organ in the human body, co-operating billions of pipelines to cleanse the body's water. Kidney failure, renal tumor happens when cells divide uncontrollably and form an aberrant collection... 详细信息
来源: 评论
A zero-watermarking algorithm for use in RGB and monochrome images  5
A zero-watermarking algorithm for use in RGB and monochrome ...
收藏 引用
5th IEEE KhPI Week on Advanced technology, KhPIWeek 2024
作者: Poddubnyi, Vadym Gvozdov, Roman Sievierinov, Oleksandr Sukhoteplyi, Vladyslav Bulba, Serhii Lysytsia, Dmytro Department of of information technology security Kharkiv National University of Radio Electronic Kharkiv Ukraine Department of Computer Engineering and Programming Ivan Kozhedub Kharkiv National Air Force University Kharkiv Ukraine Department of Computer Engineering and Programming National Technical University "Kharkiv Polytechnic Institute" Kharkiv Ukraine
the article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ... 详细信息
来源: 评论
Classification Algorithms with a Complex Structure in Pattern Recognition  25
Classification Algorithms with a Complex Structure in Patter...
收藏 引用
25th IEEE International Conference of Young Professionals in Electron Devices and Materials, EDM 2024
作者: Nishanov, Akram Kh. Allamov, Oybek Rakhmanov, Askar T. Yusupova, Janar Ruzibaev, Ortik B. Department of Systematic and Practical Programming Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Software Engineering Urgench Branch of Tashkent University of Information Technology named after Muhammad al Khwarizmi Urgench Uzbekistan Department of Systematic and Practical Programming Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Faculty of Software Engineering Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan
The article considers in the intellectual processing of information, moving from a large unit of measurement to a smaller, more important unit of measurement, selecting sets of informative symbols and classifying symb... 详细信息
来源: 评论
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2695-2709页
作者: Reem Alkanhel Doaa Sami Khafaga El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science University of Engineering and TechnologyTaxilaPakistan Department of System Programming South Ural State UniversityChelyabinsk454080Russia
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw... 详细信息
来源: 评论
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
Computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论
Evolutionary Algorithm for Calculating the Optimal Temperature Regime of the Catalytic Process  5
Evolutionary Algorithm for Calculating the Optimal Temperatu...
收藏 引用
5th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency, SUMMA 2023
作者: Antipina, Evgenia Mustafina, Svetlana Antipin, Andrey Ufa University of Science and Technology Department of Scientific Research Ufa Russia Ufa University of Science and Technology Faculty of Mathematics and Information Technologies Ufa Russia Sterlitamak Branch of Ufa University of Science and Technology Department of Applied Informatics and Programming Sterlitamak Russia
The paper formulates an algorithm for searching the optimal temperature regime of the catalytic process in an ideal mixing reactor. The problem of optimal control of the catalytic process is formulated in a general fo... 详细信息
来源: 评论
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2677-2693页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io... 详细信息
来源: 评论
A Case Study on Data Protection for a Cloud- and AI-Based Homecare Medical Device  43rd
A Case Study on Data Protection for a Cloud- and AI-Based...
收藏 引用
43rd International Conference on Application and Theory of Petri Nets and Concurrency , Petri Nets 2022
作者: Bende, Philipp Vovk, Olga Caraveo, David Pechmann, Ludwig Leucker, Martin Institute for Software Engineering and Programming Languages University of Lübeck Lübeck Germany School of Information Technologies Department of Health Technologies Tallinn University of Technology Tallinn Estonia UniTransferKlinik Lübeck GmbH Lübeck Germany
To improve the treatment of many diseases, continuous monitoring of the patient at home with the ability of doctors to interact with individual cases demands an increasing number of medical devices connected to the cl... 详细信息
来源: 评论