咨询与建议

限定检索结果

文献类型

  • 626 篇 会议
  • 342 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 986 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 567 篇 工学
    • 423 篇 计算机科学与技术...
    • 300 篇 软件工程
    • 90 篇 控制科学与工程
    • 82 篇 信息与通信工程
    • 46 篇 电气工程
    • 33 篇 电子科学与技术(可...
    • 32 篇 机械工程
    • 29 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 23 篇 生物工程
    • 21 篇 化学工程与技术
    • 20 篇 仪器科学与技术
    • 19 篇 材料科学与工程(可...
    • 19 篇 建筑学
    • 18 篇 土木工程
    • 14 篇 交通运输工程
  • 379 篇 理学
    • 266 篇 数学
    • 61 篇 统计学(可授理学、...
    • 50 篇 物理学
    • 49 篇 系统科学
    • 34 篇 生物学
    • 21 篇 化学
  • 153 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 70 篇 工商管理
    • 40 篇 图书情报与档案管...
  • 31 篇 经济学
    • 31 篇 应用经济学
  • 26 篇 医学
    • 23 篇 临床医学
    • 22 篇 基础医学(可授医学...
  • 18 篇 教育学
    • 15 篇 教育学
  • 16 篇 法学
    • 15 篇 社会学
  • 12 篇 农学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 28 篇 artificial intel...
  • 22 篇 computer science
  • 17 篇 monitoring
  • 16 篇 computational mo...
  • 14 篇 application soft...
  • 14 篇 semantics
  • 13 篇 software enginee...
  • 13 篇 data models
  • 12 篇 software
  • 11 篇 decision making
  • 11 篇 hardware
  • 11 篇 training
  • 10 篇 reliability
  • 10 篇 computer archite...
  • 10 篇 neural networks
  • 10 篇 optimization
  • 9 篇 support vector m...
  • 9 篇 logic programmin...
  • 9 篇 robot sensing sy...
  • 9 篇 students

机构

  • 48 篇 department of ap...
  • 25 篇 department of co...
  • 18 篇 department of ap...
  • 17 篇 department of sy...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 13 篇 department of pr...
  • 13 篇 department of co...
  • 11 篇 department of ap...
  • 10 篇 technical univer...
  • 9 篇 department of co...
  • 9 篇 department of ap...
  • 8 篇 department of co...
  • 8 篇 computer techniq...
  • 7 篇 department of ma...
  • 7 篇 department of pr...
  • 6 篇 department for m...
  • 6 篇 programming meth...
  • 6 篇 department of co...
  • 6 篇 computer enginee...

作者

  • 34 篇 pal madhumangal
  • 20 篇 madhumangal pal
  • 18 篇 gancheva veska
  • 14 篇 veska gancheva
  • 14 篇 josef börcsök
  • 12 篇 mondal shyamal k...
  • 12 篇 maiti manoranjan
  • 12 篇 mostafa abotaleb
  • 12 篇 ali hayek
  • 11 篇 gurkan tuna
  • 11 篇 mariana arghir
  • 10 篇 börcsök josef
  • 10 篇 hayek ali
  • 10 篇 boercsoek josef
  • 10 篇 fritzson peter
  • 9 篇 roy sankar kumar
  • 9 篇 roy abi zeid dao...
  • 9 篇 abotaleb mostafa
  • 8 篇 shyamal kumar mo...
  • 8 篇 kayhan gulez

语言

  • 964 篇 英文
  • 16 篇 其他
  • 4 篇 中文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"机构=Computer Programming Department"
986 条 记 录,以下是31-40 订阅
排序:
CI-MM-Dombi operator based on interval type-2 spherical fuzzy set and its applications on sustainable supply chain with risk criteria: using CI-TODIM-MARCOS method
收藏 引用
Soft Computing 2024年 第17-18期28卷 10023-10056页
作者: Giri, Binoy Krishna Roy, Sankar Kumar Department of Applied Mathematics with Oceanology and Computer Programming Vidyasagar University West Bengal Midnapore721102 India
Sustainable supplier selection and optimal quantity transportation (S3OQT) play an important role in supply chain management. This research represents a new four-stage solution approach for S3OQT where the multi-crite... 详细信息
来源: 评论
Deep Learning researches in Turkey: An academic approach  13
Deep Learning researches in Turkey: An academic approach
收藏 引用
13th International Conference Perspective Technologies and Methods in MEMS Design, MEMSTECH 2017
作者: Pala, Zeydin Yamli, Veysi Ünlük, Ibrahim Halil Computer Engineering Department Mus Alparslan University Turkey Computer Programming Department Bitlis Eren University Turkey Computer Programming Department Mus Alparslan University Turkey
Deep learning (DL) is deployed in Deep Neural Networks (DNNs), Recurrent Neural Networks (RNNs), Convolutional Neural Networks (CNNs), Deep Stacked Networks (DSNs), Deep Belief Networks (DBNs), and Deep Boltzmann Mach... 详细信息
来源: 评论
PROGRAM DERIVATION IN TYPE THEORY - A PARTITIONING PROBLEM
收藏 引用
computer LANGUAGES 1986年 第3-4期11卷 161-172页
作者: PETERSSON, K SMITH, JM Programming Methodology Group Department of Computer Sciences University of Göteborg/Chalmers S-412 96 Göteborg Sweden
Martin-Löf's type theory is a theory in which one can write both specifications and programs. By interpreting propositions as types, predicate logic is available when formulating a specification. The rules of... 详细信息
来源: 评论
Multi-Agent Technology for Assessing the Availability of Information at the Software Development Initial Stages  16
Multi-Agent Technology for Assessing the Availability of Inf...
收藏 引用
16th IEEE International Conference on computer Science and Information Technologies, CSIT 2021
作者: Hovorushchenko, Tetiana Pavlova, Olga Computer Engineering and System Programming Department Khmelnytskyi Ukraine
The development of multi-agent technology for assessing the availability of information at the software development initial stages is an actual task, the solution of which is the purpose of this study. The paper prese... 详细信息
来源: 评论
Method of Evaluating the User Interface of Software Systems for Compliance with the Gestalt Principles  14
Method of Evaluating the User Interface of Software Systems ...
收藏 引用
14th IEEE International Scientific and Technical Conference on computer Sciences and Information Technologies, CSIT 2019
作者: Hovorushchenko, Tetiana Pavlova, Olga Kobel, Kostyantyn Computer Engineering and System Programming Department Khmelnytskyi Ukraine
The purpose of this study is increasing the usability of the user interfaces (UI) by ensuring their compliance with Gestalt principles. The developed method of evaluating the compliance of the UI with Gestalt principl... 详细信息
来源: 评论
Prediction and graph visualization of cyber attacks using graph attention networks
收藏 引用
computers & Security 2025年 157卷
作者: Mucahit Soylu Resul Das Inonu University Department of Organized Industrial Zone Vocational School Computer Programming Malatya Turkiye Firat University Faculty of Technology Department of Software Engineering 23119 Elazig Turkiye
This study proposes a hybrid approach for visualizing cyberattacks by combining the deep learning-based GAT model with JavaScript-based graph visualization tools. The model processes large, heterogeneous data from the...
来源: 评论
Suspicious transaction alert and blocking system for cryptocurrency exchanges in metaverse’s social media universes: RG-guard
收藏 引用
Neural Computing and Applications 2024年 第30期36卷 18825-18840页
作者: Gürfidan, Remzi Computer Programming Department Yalvaç Technical Sciences Vocational School Isparta University of Applied Science Isparta Turkey
In this study, we propose an effective system called RG-Guard that detects potential risks and threats in the use of cryptocurrencies in the metaverse ecosystem. In order for the RG-Guard engine to detect suspicious t... 详细信息
来源: 评论
THE EPISTEMOLOGY OF A RULE-BASED EXPERT SYSTEM - A FRAMEWORK FOR EXPLANATION
收藏 引用
ARTIFICIAL INTELLIGENCE 1983年 第3期20卷 215-251页
作者: CLANCEY, WJ Heuristic Programming Project Computer Science Department Stanford University Stanford CA 94305 U.S.A
Production rules are a popular representation for encoding heuristic knowledge in programs for scientific and medical problem solving. However, experience with one of these programs, mycin, indicates that the represen...
来源: 评论
Software development for safety-related systems
Software development for safety-related systems
收藏 引用
2nd International Conference on Systems, ICONS 2007
作者: Börcsök, Josef Schaefer, Sebastian Department of Computer Architecture and System Programming University of Kassel
Safety-related systems mostly comprise hardware and software solutions. Due to the increasing application of complex hardware and software systems, the software systems have to be considered regarding safety as well a... 详细信息
来源: 评论
The optimal sequential and parallel algorithms to compute all hinge vertices on interval graphs
收藏 引用
Journal of Applied Mathematics and Computing 2001年 第2期8卷 295-309页
作者: Bera, Debashis Pal, Madhumangal Pal, Tapan K. Department of Applied Mathematics with Oceanology and Computer Programming Vidyasagar University Midnapore - 721 102 West-Bengal India
If the distance between two vertices becomes longer after the removal of a vertex u, then u is called a hinge vertex. In this paper, a linear time sequential algorithm is presented to find all hinge vertices of an int... 详细信息
来源: 评论