咨询与建议

限定检索结果

文献类型

  • 370 篇 会议
  • 112 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 492 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 304 篇 工学
    • 202 篇 计算机科学与技术...
    • 151 篇 软件工程
    • 46 篇 信息与通信工程
    • 46 篇 控制科学与工程
    • 26 篇 电气工程
    • 25 篇 机械工程
    • 24 篇 生物医学工程(可授...
    • 23 篇 土木工程
    • 22 篇 电子科学与技术(可...
    • 18 篇 建筑学
    • 18 篇 生物工程
    • 16 篇 安全科学与工程
    • 14 篇 船舶与海洋工程
    • 13 篇 仪器科学与技术
    • 13 篇 化学工程与技术
    • 12 篇 交通运输工程
    • 12 篇 网络空间安全
  • 164 篇 理学
    • 87 篇 数学
    • 29 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 23 篇 生物学
    • 21 篇 系统科学
    • 14 篇 海洋科学
    • 13 篇 化学
  • 78 篇 管理学
    • 58 篇 管理科学与工程(可...
    • 34 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 14 篇 医学
    • 13 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 12 篇 教育学
    • 12 篇 教育学
  • 7 篇 经济学
  • 7 篇 法学
  • 6 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 12 篇 optimization
  • 11 篇 computer science
  • 11 篇 support vector m...
  • 10 篇 wireless sensor ...
  • 9 篇 artificial intel...
  • 8 篇 software enginee...
  • 8 篇 computational mo...
  • 8 篇 software
  • 7 篇 neural networks
  • 7 篇 monitoring
  • 7 篇 navigation
  • 7 篇 analytical model...
  • 6 篇 reliability
  • 6 篇 decision support...
  • 6 篇 graphics process...
  • 6 篇 robot sensing sy...
  • 6 篇 predictive model...
  • 6 篇 visualization
  • 6 篇 decision making
  • 6 篇 artificial neura...

机构

  • 15 篇 department of co...
  • 14 篇 department of sy...
  • 12 篇 department of co...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 computer techniq...
  • 7 篇 department of co...
  • 6 篇 department of ap...
  • 6 篇 programming lang...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 5 篇 computer enginee...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 national technic...
  • 5 篇 programming lang...
  • 5 篇 mart learning ed...
  • 5 篇 computer enginee...

作者

  • 12 篇 mostafa abotaleb
  • 10 篇 gurkan tuna
  • 10 篇 xue jingling
  • 8 篇 tuna gurkan
  • 8 篇 kayhan gulez
  • 8 篇 börcsök josef
  • 8 篇 hayek ali
  • 8 篇 kuchuk nina
  • 8 篇 krini abderrahim
  • 8 篇 abdelhameed ibra...
  • 7 篇 boercsoek josef
  • 7 篇 lee jaejin
  • 7 篇 nina kuchuk
  • 6 篇 sarkar biswajit
  • 6 篇 gulez kayhan
  • 6 篇 hovorushchenko t...
  • 6 篇 v. cagri gungor
  • 6 篇 josef börcsök
  • 6 篇 roy abi zeid dao...
  • 6 篇 abotaleb mostafa

语言

  • 433 篇 英文
  • 55 篇 其他
  • 2 篇 中文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Computer Programming Engineering"
492 条 记 录,以下是221-230 订阅
Deriving adaptive homing sequences for weakly initialized nondeterministic FSMs
Deriving adaptive homing sequences for weakly initialized no...
收藏 引用
2019 IEEE East-West Design and Test Symposium, EWDTS 2019
作者: Vinarskii, Evgenii Tvardovskii, Aleksandr Evtushenko, Larisa Yevtushenko, Nina Computer Science Department Lomonosov Moscow State University Moscow Russia Radiophysical Department Tomsk State University Tomsk Russia Software Engineering Deparment Ivannikov Institute for System Programming Moscow Russia
State identification sequences, such as homing and distinguishing sequences (HS and DS), are widely used in FSM (Finite State Machine) based testing in order to reduce the size of a returned complete test suite as wel... 详细信息
来源: 评论
Development the Numerical Method to Solve the Inverse Initial Value Problem for the Thermal Conductivity Equation of Composite Materials
收藏 引用
Journal of Physics: Conference Series 2021年 第3期1879卷
作者: H K Al-Mahdawi Department of System Programming School of Electronic Engineering and Computer Science South Ural State University Lenina 76 Chelyabinsk 454080 Russia
In this paper, the heat conduction equation for composite materials posed and solved. This problem is known as an inverse initial value problem for the heat conduction equation. In order to solve and formulate this in...
来源: 评论
Detecting and Counting of Each Nested Curve on Spectrum with Gaussian Package
Detecting and Counting of Each Nested Curve on Spectrum with...
收藏 引用
International Conference on Electrical and Electronics engineering, ELECO
作者: Yasemin Poyraz Kocak Selcuk Sevgen Ruya Samli Computer Programming Department Istanbul University-Cerrahpasa Istanbul Turkey Computer Engineering Department Istanbul University-Cerrahpasa Istanbul Turkey
Spectral analysis plays an important role in the interpretation of astronomical data. The determination of the number and parameters of each nested Gaussian curve on spectrum of any object in the sky gives information... 详细信息
来源: 评论
Special Processors Simulation for Forming and Digital Processing of Error-Correcting Codes in computer Systems
Special Processors Simulation for Forming and Digital Proces...
收藏 引用
International Conference on Modern Problems of Radio engineering, Telecommunications and computer Science
作者: Taras Grynchyshyn Volodymyr Hryha Artur Voronych Mykhaylo Ilko Department of Programming and Information Technologies National Transport University Nadvirna UKRAINE Department of Computer Engineering and Electronics Vasyl Stefanyk Precarpathian National University Ivano-Frankivsk UKRAINE Department of Computer System and Networks Ivano-Frankivsk National Technical University of Oil and Gas Ivano-Frankivsk UKRAINE
The methods of digital and pulse signal modulation in modern computer systems of data transmission are analysed. Process of forming non-redundant coding that use the errors detection and correction in the Galois basis... 详细信息
来源: 评论
Method of Activity of Intelligent Agent for Semantic Analysis of Software Requirements
Method of Activity of Intelligent Agent for Semantic Analysi...
收藏 引用
IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems
作者: Olga Pavlova Tetiana Hovorushchenko Artem Boyarchuk System Programming Department of Khmelnytsky National University Computer Engineering & System Programming Department of Khmelnytsky National University Lecturer of Computer Systems Networks and Cybersecurity Department of National Aerospace University "Kharkiv Aviation Institute"
The paper deals with the development of the method of activity and the realization of the intelligent agent (IA) for semantic analysis of the natural language software requirements. This IA performs the analysis of th... 详细信息
来源: 评论
Darknet traffic big-data analysis and network management to real-time automating the malicious intent detection process by a weight agnostic neural networks framework
arXiv
收藏 引用
arXiv 2021年
作者: Demertzis, Konstantinos Tsiknas, Konstantinos Takezis, Dimitrios Skianis, Charalabos Iliadis, Lazaros Laboratory of Complex Systems Department of Physics Faculty of Sciences International Hellenic University Kavala Campus St. Loukas65404 Greece Department of Electrical and Computer Engineering Democritus University of Thrace Vas. Sofias 12 Xanthi67100 Greece Hellenic National Defence General Staff Stratopedo Papagou Mesogeion 227-231 Athens15561 Greece University of Aegean Karlovassi Samos83200 Greece School of Engineering Department of Civil Engineering Faculty of Mathematics Programming and General courses Democritus University of Thrace Kimmeria Xanthi Greece
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage legitimate credentials with trusted tools already deployed in a network environment, making it difficult for organizations t... 详细信息
来源: 评论
A flexible framework for web-based virtual reality presentation of cultural heritage
收藏 引用
AIP Conference Proceedings 2021年 第1期2333卷
作者: Dimo Chotrov Angel Bachvarov 1Technical University Sofia Faculty of Computer Systems and Technologies Department Programming and Computer Technologies Bulgaria 2Technical University Sofia Faculty of Mechanical Engineering Department Automation of Discrete Production Engineering Bulgaria
The Virtual Reality (VR) experiences are great for an engaging presentation creating wide public awareness of cultural heritage, especially if the experience is built on a web-based technology. One of the still posing...
来源: 评论
Automatic Detection of Smishing Attacks by Machine Learning Methods
Automatic Detection of Smishing Attacks by Machine Learning ...
收藏 引用
International Informatics and Software engineering Conference (UBMYK)
作者: Caner Balim Efnan Sora Gunal Dept. of Computer Programming Afyon Kocatepe University Afyonkarahisar Turkiye Dept. of Computer Engineering Eskisehir Osmangazi University Eskisehir Turkiye
Phishing is a type of cyber-attack aiming to steal people's confidential information using a bait. Smishing is a form of phishing that is carried out via SMS messages sent to mobile phones. Attackers intend to ste... 详细信息
来源: 评论
A botnet detection approach based on the clonal selection algorithm  9
A botnet detection approach based on the clonal selection al...
收藏 引用
9th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT 2018
作者: Lysenko, Sergii Bobrovnikova, Kira Savenko, Oleg Department of Computer Engineering and System Programming Khmelnitsky National University Instytutska 11 Khmelnitsky Ukraine
The paper presents a new technique for the botnets' detection in the corporate area networks. It is based on the usage of the algorithms of the artificial immune systems. Proposed approach is able to distinguish b... 详细信息
来源: 评论
DDoS botnet detection technique based on the use of the semi-supervised fuzzy C-means clustering  14
DDoS botnet detection technique based on the use of the semi...
收藏 引用
14th International Conference on ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer. Volume II: Workshops, ICTERI 2018
作者: Lysenko, Sergii Savenko, Oleg Bobrovnikova, Kira Department of Computer Engineering System Programming Khmelnitsky National University Instytutska 11 Khmelnitsky Ukraine
A new technique for the DDoS botnet detection based on the botnets network features analysis is proposed. It uses the semi-supervised fuzzy c-means clustering. The proposed approach includes the learning and the detec... 详细信息
来源: 评论