咨询与建议

限定检索结果

文献类型

  • 197 篇 会议
  • 109 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 314 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 215 篇 工学
    • 157 篇 计算机科学与技术...
    • 112 篇 软件工程
    • 37 篇 信息与通信工程
    • 29 篇 控制科学与工程
    • 19 篇 生物医学工程(可授...
    • 18 篇 电气工程
    • 15 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 10 篇 土木工程
    • 8 篇 化学工程与技术
    • 7 篇 建筑学
    • 6 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
  • 126 篇 理学
    • 80 篇 数学
    • 20 篇 生物学
    • 20 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 16 篇 物理学
    • 6 篇 化学
  • 52 篇 管理学
    • 36 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 18 篇 图书情报与档案管...
  • 13 篇 医学
    • 11 篇 临床医学
    • 10 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 8 篇 法学
    • 7 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 教育学
    • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 11 篇 artificial intel...
  • 6 篇 computer science
  • 5 篇 support vector m...
  • 4 篇 programming prof...
  • 4 篇 compilers
  • 4 篇 reliability
  • 4 篇 concurrent compu...
  • 4 篇 computer archite...
  • 4 篇 neural networks
  • 4 篇 computational in...
  • 4 篇 optimization
  • 4 篇 monitoring
  • 4 篇 decision making
  • 4 篇 dipper throated ...
  • 4 篇 software design
  • 4 篇 artificial neura...
  • 4 篇 functional progr...
  • 3 篇 safety
  • 3 篇 grey wolf optimi...
  • 3 篇 automation

机构

  • 16 篇 department of sy...
  • 10 篇 department of ap...
  • 7 篇 department of ma...
  • 6 篇 programming meth...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 university of lü...
  • 4 篇 department of ap...
  • 4 篇 national institu...
  • 3 篇 university spbpu...
  • 3 篇 department of ap...
  • 3 篇 zuse institute b...

作者

  • 9 篇 maiti manoranjan
  • 8 篇 mostafa abotaleb
  • 8 篇 pal madhumangal
  • 8 篇 abdelhameed ibra...
  • 7 篇 scholz sven-bodo
  • 7 篇 grelck clemens
  • 7 篇 abotaleb mostafa
  • 5 篇 pal anita
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 börcsök j.
  • 5 篇 de meuter wolfga...
  • 5 篇 van cutsem tom
  • 5 篇 doaa sami khafag...
  • 4 篇 choe km
  • 4 篇 bergstra j.a.
  • 4 篇 schwarz m.h.
  • 4 篇 hayek ali
  • 4 篇 dybjer peter
  • 4 篇 mostinckx stijn

语言

  • 306 篇 英文
  • 5 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Computer Programming Technology"
314 条 记 录,以下是11-20 订阅
排序:
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4531-4545页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu... 详细信息
来源: 评论
Pricing Policy with the Effect of Fairness Concern, Imprecise Greenness, and Prices in Imprecise Market for a Dual Channel
Pricing Policy with the Effect of Fairness Concern, Imprecis...
收藏 引用
International Conference on Nonlinear Applied Analysis and Optimization, ICNAAO-2021
作者: Ganguly, Sanchari Das, Pritha Maiti, Manoranjan Department of Mathematics Indian Institute of Engineering Science and Technology Shibpur WB Howrah711103 India Department of Applied Mathematics Oceanology and Computer Programming Vidyasagar University WB Midnapore721102 India
Fairness concern behavior, a well-known cognitive bias, refers to a person’s attitude of dissatisfaction for unequal pay-offs in someone’s favor. Against environmental pollution, many firms are focused on green manu... 详细信息
来源: 评论
Al-Biruni Earth Radius Optimization for COVID-19 Forecasting
收藏 引用
computer Systems Science & Engineering 2023年 第7期46卷 883-896页
作者: El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Tatiana Makarovskikh Amal H.Alharbi Doaa Sami Khafaga Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura University35516MansouraEgypt Department of System Programming South Ural State University454080ChelyabinskRussia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve... 详细信息
来源: 评论
Optimization of MIMO Antenna Approach for 5G Wireless Applications
Optimization of MIMO Antenna Approach for 5G Wireless Applic...
收藏 引用
International Conference on Systems and Control (ICSC)
作者: Aqreerah Atuwayr Akrem Asmeida Haitham Saleh Ben Abdelmula Abdulhakim Alhadi Anaiba High Institution of Engineering Technology College of Computer Technology Zawia College of Computer Technology Zawia Libyan Center for Electronic Systems Programming and Aviation Research Libyan Center for Electronic Systems Programming and Aviation Research
In this communication, an improved MIMO antenna array with defected ground structure (DGS) is designed for 5G wireless applications. Its schematic comprises eight radiator elements, situated at the center of an FR-4 p...
来源: 评论
Application-based spam detection with machine learning algorithms  27
Application-based spam detection with machine learning algor...
收藏 引用
27th International Conference on Information Society and University Studies, IVUS 2022
作者: Erbey, Ali Barışçı, Necaattin Uşak University Distance Education Vocational School Department of Computer Programming Uşak Turkey Gazi University Faculty of Technology Department of Computer Engineering Ankara Turkey
We investigated the process of unsupervised generative learning and the structure of informative generative representations of images of handwritten digits (MNIST dataset). Learning models with the architecture of spa... 详细信息
来源: 评论
Social Engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
A Method for Extracting Target Speaker in Dual - Microphone System
A Method for Extracting Target Speaker in Dual - Microphone ...
收藏 引用
2022 Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2022
作者: Trong The, Quan Thi Thu Dung, Nguyen University Itmo Information Technologies and Programming Faculty Saint Petersburg Russia University SPbPU Institute of Computer Science and Technology Saint Petersburg Russia
Advances in technology have produced smaller and more powerful computing devices. For example, there are currently a variety of portable personal computing devices, including wireless computing devices, such as portab... 详细信息
来源: 评论
An Improved Implementation of Generalized Sidelobe Canceller Filter in Diffuse Noise Field
An Improved Implementation of Generalized Sidelobe Canceller...
收藏 引用
2022 Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2022
作者: The, Quan Trong Dung, Nguyen Thi Thu University Itmo Information Technologies and Programming Faculty Saint Petersburg Russia University SPbPU Institute of Computer Science and Technology Saint Petersburg Russia
Algorithms, which used in the microphone array, are currently widely popular, especially the GSC algorithm. Compared with the single-channel algorithm model, GSC uses information of direction of arrival (DOA) of the o... 详细信息
来源: 评论
A Speech Enhancement in Diffuse Noise Field using Minimum Variance Distortionless Response Filter
A Speech Enhancement in Diffuse Noise Field using Minimum Va...
收藏 引用
2022 Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2022
作者: Trong The, Quan Thi Thu Dung, Nguyen University Itmo Information Technologies and Programming Faculty Saint Petersburg Russia University SPbPU Institute of Computer Science and Technology Saint Petersburg Russia
Array signal processing is an important branch in the field of signal processing. It has been widely used in many military and national economic fields such as radar, communications, sonar, navigation, voice signal pr... 详细信息
来源: 评论