咨询与建议

限定检索结果

文献类型

  • 197 篇 会议
  • 108 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 214 篇 工学
    • 156 篇 计算机科学与技术...
    • 112 篇 软件工程
    • 37 篇 信息与通信工程
    • 29 篇 控制科学与工程
    • 19 篇 生物医学工程(可授...
    • 18 篇 电气工程
    • 15 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 10 篇 土木工程
    • 8 篇 化学工程与技术
    • 7 篇 建筑学
    • 6 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
  • 126 篇 理学
    • 80 篇 数学
    • 20 篇 生物学
    • 20 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 16 篇 物理学
    • 6 篇 化学
  • 52 篇 管理学
    • 36 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 18 篇 图书情报与档案管...
  • 13 篇 医学
    • 11 篇 临床医学
    • 10 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 8 篇 法学
    • 7 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 教育学
    • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 11 篇 artificial intel...
  • 6 篇 computer science
  • 5 篇 support vector m...
  • 4 篇 programming prof...
  • 4 篇 compilers
  • 4 篇 reliability
  • 4 篇 concurrent compu...
  • 4 篇 computer archite...
  • 4 篇 neural networks
  • 4 篇 computational in...
  • 4 篇 optimization
  • 4 篇 monitoring
  • 4 篇 decision making
  • 4 篇 dipper throated ...
  • 4 篇 software design
  • 4 篇 artificial neura...
  • 4 篇 functional progr...
  • 3 篇 safety
  • 3 篇 grey wolf optimi...
  • 3 篇 automation

机构

  • 16 篇 department of sy...
  • 10 篇 department of ap...
  • 7 篇 department of ma...
  • 6 篇 programming meth...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 university of lü...
  • 4 篇 department of ap...
  • 4 篇 national institu...
  • 3 篇 university spbpu...
  • 3 篇 department of ap...
  • 3 篇 zuse institute b...

作者

  • 9 篇 maiti manoranjan
  • 8 篇 mostafa abotaleb
  • 8 篇 pal madhumangal
  • 8 篇 abdelhameed ibra...
  • 7 篇 scholz sven-bodo
  • 7 篇 grelck clemens
  • 7 篇 abotaleb mostafa
  • 5 篇 pal anita
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 börcsök j.
  • 5 篇 de meuter wolfga...
  • 5 篇 van cutsem tom
  • 5 篇 doaa sami khafag...
  • 4 篇 choe km
  • 4 篇 bergstra j.a.
  • 4 篇 schwarz m.h.
  • 4 篇 hayek ali
  • 4 篇 dybjer peter
  • 4 篇 mostinckx stijn

语言

  • 305 篇 英文
  • 5 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Computer Programming Technology"
313 条 记 录,以下是141-150 订阅
排序:
Design and testing tool for a safe monitoring system for neurodegenerative disorder patients  3
Design and testing tool for a safe monitoring system for neu...
收藏 引用
3rd International Conference on Advances in Computational Tools for Engineering Applications, ACTEA 2016
作者: Halabi, Nashaat El Achkar, Roger Daou, Roy Abi Zeid Hayek, Ali Borcsok, Josef Department of Computer and Communications Engineering Faculty of Engineering American University of Science and Technology Beirut Lebanon Department of Biomedical Technologies Faculty of Public Health Lebanese German University Sahel Alma Lebanon Department of Computer Architecture and System Programming Faculty of Electrical Engineering/Computer Science University of Kassel Kassel Germany
This paper aims to develop a sensor based monitoring and analyzing system for Neuro-Degenerative Disorder patients (NDD);this may consist on SpO2 sensor, Electrophysiological sensors, NIBP, Motion Capture sensors and ... 详细信息
来源: 评论
Tranquility: A low disruptive alternative to quiescence for ensuring safe dynamic updates
Tranquility: A low disruptive alternative to quiescence for ...
收藏 引用
作者: Vandewoude, Yves Ebraert, Peter Berbers, Yolande D'Hondt, Theo Department of Computer Science Katholieke Universiteit Leuven Celestijnenlaan 200A 3001 Heverlee Belgium Programming Technology Lab. Vrije Universiteit Brussel Plainlaan 2 B1050 Brussels Belgium
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes. We show that their notion of quiescence as a necessary and sufficient con... 详细信息
来源: 评论
Coloring gray-scale image using artificial neural networks
Coloring gray-scale image using artificial neural networks
收藏 引用
International Conference on Adaptive Science & technology (ICAST)
作者: Bekir Karlik Mustafa Sariöz Department of Computer Engineering Haliç University Istanbul Turkey Computer Technology and Programming Fatih University Istanbul Turkey
This paper presents a novel method on coloring the grayscale images. For this purpose, a combination of artificial neural networks and some image processing algorithms was developed to transfer colors from a user-sele... 详细信息
来源: 评论
Software Engineering Research and Applications  1
收藏 引用
丛书名: Lecture Notes in computer Science
1000年
作者: Walter Dosch Roger Y. Lee Chisu Wu
It was our great pleasure to extend a welcome to all who participated in SERA 2004, the second International Conference on Software Engineering Research, Management and Applications, held at the Omni Hotel, Los Angele... 详细信息
来源: 评论
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2677-2693页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io... 详细信息
来源: 评论
Optimizations and Deoptimizations for Escape Analysis in Open World
收藏 引用
Chinese Journal of Electronics 2023年 第2期19卷 211-216页
作者: Xiaohua Shi Gansha Wu Jin Maozhong Guei-Yuan Lueh School of Computer Science Beihang University Beijing China Programming System Laboratory Microprocessor Technology Labs Intel Corporation Beijing China
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime plat... 详细信息
来源: 评论
Dynamic Calculation and Characterization of Threshold Value in Optical Character Recognition
Dynamic Calculation and Characterization of Threshold Value ...
收藏 引用
International Conference on challenges in IT, Engineering and technology (ICCIET’2014, Phuket)
作者: Ay?e Eldem Fatih Ba??ift?i Department of Computer Technology and Computer Programming Technical Science Vocational High School Karamano?lu Mehmetbey University Department of Computer Engineering Faculty of Technology Selcuk University
Optical character recognition(OCR) can be used in some management mechanisms of state and business world to organize documents scanned or captured by camera. Therefore, OCR is one of the subjects rapidly evolving in t... 详细信息
来源: 评论
A survey on OPC and OPC-UA: About the standard, developments and investigations
A survey on OPC and OPC-UA: About the standard, developments...
收藏 引用
XXII International Symposium on Information, Communication and Automation Technologies, ICAT
作者: M. H. Schwarz J. Börcsök Safety Computer Technology University of Kassel Kassel Germany Computer Architecture und System Programming University of Kassel Kassel Germany
In 1996, a new standard was announced that should serve as a software interface to exchange process data and to solve the problem to exchange process data using different industrial protocols and communication systems... 详细信息
来源: 评论
A novel reduction method for type-2 uncertain normal critical values and its applications on 4D profit transportation problem involving damageable and substitute items
收藏 引用
International Journal of Applied and Computational Mathematics 2021年 第4期7卷 1-30页
作者: Sahoo, Palash Jana, Dipak Kumar Pramanik, Sutapa Panigrahi, Goutam Department of Mathematics National Institute of Technology Durgapur Durgapur 713209 West Bengal India School of Applied Sciences & Humanities Haldia Institute of Technology Haldia Purba Midnapur 721657 West Bengal India Department of Applied Mathematics with Oceanology and Computer Programming Vidyasagar University Midnapore 721102 West Bengal India
In this paper, we developed and investigated some four-dimensional profit maximization transportation problems considering damageablity and substitutability, where the parameters are of a type-2 normal uncertain varia... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论