咨询与建议

限定检索结果

文献类型

  • 903 篇 会议
  • 446 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 809 篇 工学
    • 601 篇 计算机科学与技术...
    • 434 篇 软件工程
    • 127 篇 控制科学与工程
    • 121 篇 信息与通信工程
    • 59 篇 电气工程
    • 49 篇 电子科学与技术(可...
    • 47 篇 机械工程
    • 47 篇 安全科学与工程
    • 38 篇 生物医学工程(可授...
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 34 篇 生物工程
    • 28 篇 仪器科学与技术
    • 25 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
    • 18 篇 交通运输工程
  • 487 篇 理学
    • 334 篇 数学
    • 81 篇 统计学(可授理学、...
    • 64 篇 系统科学
    • 63 篇 物理学
    • 45 篇 生物学
    • 25 篇 化学
  • 207 篇 管理学
    • 148 篇 管理科学与工程(可...
    • 85 篇 工商管理
    • 61 篇 图书情报与档案管...
  • 40 篇 经济学
    • 38 篇 应用经济学
  • 33 篇 医学
    • 26 篇 基础医学(可授医学...
    • 26 篇 临床医学
  • 27 篇 法学
    • 25 篇 社会学
  • 26 篇 教育学
    • 21 篇 教育学
  • 15 篇 农学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 33 篇 safety
  • 31 篇 computer science
  • 28 篇 computer archite...
  • 27 篇 software
  • 23 篇 monitoring
  • 23 篇 hardware
  • 22 篇 artificial intel...
  • 21 篇 computational mo...
  • 20 篇 application soft...
  • 18 篇 semantics
  • 17 篇 data models
  • 15 篇 reliability
  • 15 篇 optimization
  • 14 篇 programming prof...
  • 14 篇 system-on-chip
  • 14 篇 iec standards
  • 13 篇 functional progr...
  • 13 篇 standards
  • 13 篇 training
  • 12 篇 support vector m...

机构

  • 48 篇 department of ap...
  • 25 篇 department of co...
  • 18 篇 department of ap...
  • 17 篇 department of sy...
  • 17 篇 computer archite...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 13 篇 department of pr...
  • 13 篇 department of co...
  • 11 篇 department of ap...
  • 10 篇 technical univer...
  • 9 篇 department of co...
  • 9 篇 icas institute f...
  • 9 篇 department of ap...
  • 8 篇 institute for co...
  • 8 篇 department of co...
  • 8 篇 computer techniq...
  • 7 篇 department of ma...
  • 7 篇 department of pr...
  • 7 篇 chair for comput...

作者

  • 43 篇 josef börcsök
  • 34 篇 pal madhumangal
  • 30 篇 ali hayek
  • 22 篇 börcsök josef
  • 19 篇 gancheva veska
  • 19 篇 madhumangal pal
  • 17 篇 veska gancheva
  • 15 篇 börcsök j.
  • 15 篇 boercsoek josef
  • 15 篇 fritzson peter
  • 14 篇 hayek ali
  • 12 篇 mondal shyamal k...
  • 12 篇 maiti manoranjan
  • 12 篇 gurkan tuna
  • 12 篇 mostafa abotaleb
  • 11 篇 mariana arghir
  • 10 篇 tuna gurkan
  • 10 篇 xue jingling
  • 10 篇 roy abi zeid dao...
  • 9 篇 roy sankar kumar

语言

  • 1,318 篇 英文
  • 23 篇 其他
  • 8 篇 中文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Computer Programming "
1351 条 记 录,以下是351-360 订阅
排序:
Synthesis Algorithm for a Continuous Robust Regulator on a Manifold for a Manipulator under Non-Random Noise Conditions
Synthesis Algorithm for a Continuous Robust Regulator on a M...
收藏 引用
2020 International Russian Automation Conference, RusAutoCon 2020
作者: Kolesnikov, A.A. Kolesnikova, S.I. Institute of Computer Technology and Information Security South Federal University Taganrog Russia Institute of Computational Systems and Programming St.Petersburg State University of Aerospae Instrumentation St. Petersburg Russia
The nonlinear adaptation algorithm is considered as applied to stabilization of the center of mass of a moving object subject to nonrandom noise in the control variable. An unknown disturbance is a bounded and continu... 详细信息
来源: 评论
Emergent Atomic Environments in Twisted Bilayer Graphene and Their Use in the Prediction of the Vibrational Properties
arXiv
收藏 引用
arXiv 2023年
作者: Ickecan, Dilara Okyayli, Yunus Emre Bleda, Erdi Ata Erbahar, Dogan Marmara University Dept. of Physics Ziverbey Istanbul34722 Turkey Istanbul Ticaret University Dept. of Computer Programming Istanbul34840 Turkey Dogus University Dept. of Mechanical Engineering Erbahar Researcher Lab Umraniye Istanbul34775 Turkey Dogus University Faculty of Engineering Dept. of Mechanical Engineering Umraniye Istanbul34775 Turkey
While Bernal stacked bilayer graphene bears two distinct atom types in its lattice, there exists no analytical framework addressing the number of atomic environments that emerge in twisted bilayer graphene superlattic... 详细信息
来源: 评论
Profit Maximization in a Gas Field Model  14
Profit Maximization in a Gas Field Model
收藏 引用
14th International Conference Management of Large-Scale System Development, MLSD 2021
作者: Skiba, Alexander Skiba, Nadezhda Federal Research Center 'Computer Science and Control' Russian Academy of Sciences Department of Mathematical Methods of Regional Programming Moscow Russia Kuban State Technological University Institute of Oil Gas and Energy Ministry of Science and Higher Education Department of Oil and Gas Business Named after Prof Vartumyan G. T. Krasnodar Russia
We consider a dynamic continuous gas production at a deposit. We set and solve the optimization control problem for maximum profit, taking into account the discount factor. The problem posed relates to some optimal co... 详细信息
来源: 评论
INSIGHT into the NON PERIODIC MOTION of the KNIFE FOLLOWER with A POLYDYNE CAM MECHANISM
INSIGHT into the NON PERIODIC MOTION of the KNIFE FOLLOWER w...
收藏 引用
ASME 2020 International Design Engineering Technical Conferences and computers and Information in Engineering Conference, IDETC-CIE 2020
作者: Yousuf, Louay S. Dabool, Yaakob K.H. Department of Mechanical Engineering San Diego State University 5500 Campanile Drive San DiegoCA92182-1323 United States Department of Computer and Programming Engineering Almustansiriyah University Baghdad Iraq
A polydyne cam and knife follower system are studied. The effect of cam angular velocity and follower guides internal dimensions on Lyapunov parameter is considered. Wolf algorithm is used to quantify largest Lyapunov... 详细信息
来源: 评论
A Machine Learning Based Plagiarism Detection in Source Code
A Machine Learning Based Plagiarism Detection in Source Code
收藏 引用
作者: Nickolay Viuginov Petr Grachev Andrey Filchenkov Faculty of Information Technologies and Programming International Laboratory "Computer Technologies" ITMO University
Converting source codes to feature vectors can be useful in programming-related tasks, such as plagiarism detection on ACM contests. We present a brand-new method for feature extraction from C++ files, which includes ... 详细信息
来源: 评论
Prediction and graph visualization of cyber attacks using graph attention networks
收藏 引用
computers & Security 2025年 157卷
作者: Mucahit Soylu Resul Das Inonu University Department of Organized Industrial Zone Vocational School Computer Programming Malatya Turkiye Firat University Faculty of Technology Department of Software Engineering 23119 Elazig Turkiye
This study proposes a hybrid approach for visualizing cyberattacks by combining the deep learning-based GAT model with JavaScript-based graph visualization tools. The model processes large, heterogeneous data from the...
来源: 评论
Sequential Series-Based Prediction Model in Adaptive Cloud Resource Allocation for Data Processing and Security
Sequential Series-Based Prediction Model in Adaptive Cloud R...
收藏 引用
IEEE International Conference on Dependable Systems, Services and Technologies (DESSERT)
作者: Inna Petrovska Heorhii Kuchuk Nina Kuchuk Oleksandr Mozhaiev Maxim Pochebut Yurii Onishchenko National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Department of “Cyber Security and DATA Technologies” Kharkiv National University of Internal Affairs Kharkiv Ukraine Academic Board SET University Kiev Ukraine Department № 4 Kharkiv National University of Internal Affairs Kharkiv Ukraine
A developed adaptive forecasting model for cloud resource allocation is presented. It employs principal component analysis on a sequence of virtual machine (VM) requests. Requests are processed to detect anomalies, an...
来源: 评论
A Cyberattacks Detection Technique Based on Evolutionary Algorithms
A Cyberattacks Detection Technique Based on Evolutionary Alg...
收藏 引用
IEEE International Conference on Dependable Systems, Services and Technologies (DESSERT)
作者: Sergii Lysenko Kira Bobrovnikova Roman Shchuka Oleg Savenko Department of Computer Engineering and System Programming Khmelnitsky National University Khmelnitsky Ukraine
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on ...
来源: 评论
A non-potential Target Function for Controlling the UAVs Group Flight in Presence of Concave Obstacles  5
A non-potential Target Function for Controlling the UAVs Gro...
收藏 引用
5th IEEE International Conference Actual Problems of Unmanned Aerial Vehicles Developments, APUAVD 2019
作者: Glazok, Olexiy M. Computer and Programming Engineering National Aviation University Dept. of Cybersecurity Kyiv Ukraine
A solution for the problem of controlling the unmanned quadrotor vehicles group flight in presence of obstacles of complex form is proposed. A traditional approach to construction of the target function does not solve... 详细信息
来源: 评论
Platform for big biomedical data streams management and analytics
收藏 引用
International Journal of Circuits, Systems and Signal Processing 2020年 14卷 580-588页
作者: Gancheva, Veska Programming and Computer Technologies Department Technical University of Sofia 8 Kliment Ohridski boul Sofia1000 Bulgaria
Major challenge in the analysis of clinical data and knowledge discovery is to suggest an integrated, advanced and efficient tools, methods and technologies for access and processing of progressively increasing amount... 详细信息
来源: 评论