咨询与建议

限定检索结果

文献类型

  • 54 篇 会议
  • 17 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 73 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 45 篇 工学
    • 36 篇 计算机科学与技术...
    • 31 篇 软件工程
    • 10 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 6 篇 生物工程
    • 6 篇 网络空间安全
    • 4 篇 电子科学与技术(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 2 篇 电气工程
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 水利工程
  • 22 篇 理学
    • 9 篇 数学
    • 7 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 3 篇 物理学
    • 3 篇 化学
    • 2 篇 地质学
    • 2 篇 系统科学
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 4 篇 computational mo...
  • 4 篇 dipper throated ...
  • 4 篇 artificial intel...
  • 3 篇 grey wolf optimi...
  • 3 篇 data models
  • 2 篇 internet of thin...
  • 2 篇 metaheuristics
  • 2 篇 neural networks
  • 2 篇 ethics
  • 2 篇 adversarial mach...
  • 2 篇 monitoring
  • 2 篇 biogas
  • 2 篇 real-time system...
  • 2 篇 production
  • 2 篇 machine learning
  • 2 篇 network security
  • 2 篇 students
  • 2 篇 software
  • 2 篇 feature selectio...
  • 2 篇 forecasting

机构

  • 11 篇 department of sy...
  • 10 篇 technical univer...
  • 7 篇 department of pr...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 department of pr...
  • 4 篇 computer enginee...
  • 4 篇 tashkent univers...
  • 3 篇 neuromorphica lt...
  • 3 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 technical univer...
  • 2 篇 faculty of compu...

作者

  • 8 篇 mostafa abotaleb
  • 8 篇 abdelhameed ibra...
  • 7 篇 gancheva veska
  • 6 篇 veska gancheva
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 doaa sami khafag...
  • 4 篇 koparanov kiril ...
  • 4 篇 minkovska daniel...
  • 4 篇 minkovska daniel...
  • 4 篇 ujkani berat
  • 3 篇 kiril andreev ko...
  • 3 篇 el-sayed m. el-k...
  • 3 篇 trendafilov iani...
  • 3 篇 reem alkanhel
  • 3 篇 allamuratova zam...
  • 3 篇 stoyanova lyudmi...
  • 3 篇 ibrahim abdelham...
  • 3 篇 el-kenawy el-say...
  • 3 篇 daniela veleva m...

语言

  • 72 篇 英文
  • 1 篇 日文
检索条件"机构=Computer Systems and Programming Faculty"
73 条 记 录,以下是31-40 订阅
排序:
Text, Speech and Dialogue  1
收藏 引用
丛书名: Lecture Notes in computer Science
1000年
作者: Václav Matousek Pavel Mautner Jana Ocelíková Petr Sojka
来源: 评论
Application of Machine Learning Techniques for Software Anomaly Detection
Application of Machine Learning Techniques for Software Anom...
收藏 引用
International Conference on Applied Mathematics & computer Science (ICAMCS)
作者: Veska Gancheva Department of Programming and Computer Technologies Faculty of Computer Systems and Technologies Technical University of Sofia Sofia Bulgaria
A rising variety of platforms and software programs have leveraged repository-stored datasets and remote access in recent years. As a result, datasets are more vulnerable to malicious attacks. As a result, network sec...
来源: 评论
Application of IoT in the study of biogas release parameters  33
Application of IoT in the study of biogas release parameters
收藏 引用
33rd International Scientific Conference Electronics, ET 2024
作者: Nikolov, Neven K. Tzanova, Anelia I. Koparanov, Kiril A. Antonova, Elena V. Minkovska, Daniela V. Technical University of Sofia Faculty of Computer Systems and Technologies Department of Programming and Computer Technologies 8 Kliment Ohridski blvd. Sofia1000 Bulgaria Technical University of Sofia Faculty of Electronic Engineering and Technologies Department of Chemistry 8 Kliment Ohridski blvd. Sofia1000 Bulgaria
This paper describes the development of an IoT device prototype for measuring biogas release parameters. Through the device, measurements are made, and statistics are accumulated based on which calculations are perfor... 详细信息
来源: 评论
Advantages of Applying a Multi-agent Approach in Simulation Modeling: a Data-to-Action Case Study Applied to Electricity Production
Advantages of Applying a Multi-agent Approach in Simulation ...
收藏 引用
National Conference with International Participation (TELECOM)
作者: Krassimir Stoyanov Varbinka Stefanova-Stoyanova Petko Danov Department of Computer Systems Faculty of Computer Systems and Technologies Technical University of Sofia Sofia Bulgaria Department of Programming and Computer Technologies Faculty of Computer Systems and Technologies Technical University of Sofia Sofia Bulgaria
This article examines modern methods for analysis and dynamic process modeling with the context of the capabilities, characteristics and advantages of types of multiagent systems. A practical implementation of the “D... 详细信息
来源: 评论
An Approach to Investigating Plagiarism in Artificial Intelligence Content
An Approach to Investigating Plagiarism in Artificial Intell...
收藏 引用
computer Science (COMSCI), International Scientific Conference on
作者: Daniela Veleva Minkovska Elena Ventseslavova Antonova Kiril Andreev Koparanov Plamen Ognyanov Nakov Department of Programming and Computer Technologies Faculty of Computer Systems and Technologies Technical University of Sofia Sofia Bulgaria Department of Computer Systems Faculty of Computer Systems and Technologies Technical University of Sofia Sofia Bulgaria
A growing number of human-centric tasks like learning, planning, and creative writing require the integration of Artificial Intelligence (AI) in the current era of exponential advancements. Such systems collect and an... 详细信息
来源: 评论
Personalize Web Searching Strategies Classification and Comparison
arXiv
收藏 引用
arXiv 2022年
作者: Evtimova, Mariya Savova Momtchev, Ivan Momtchilov Faculty of Computer Systems and Control Programming Computer Technologies Department Technical University of Sofia Sofia1000 Bulgaria
Personalization is becoming very important direction in semantic web search for the users that needs to find appropriate information. In this paper, a classification of web personalization is proposed and semantic web... 详细信息
来源: 评论
The technique for computer systems Trojan diagnosis in the monitor mode
The technique for computer systems Trojan diagnosis in the m...
收藏 引用
IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing systems: Technology and Applications
作者: Segiy Lysenko Oleg Savenko System programming Department Khmelnitsky National University Khmelnitskiy Ukraine Computer Systems and Programming Faculty Lecturer of System programming Department Khmelnitsky National University Khmelnitskiy Ukraine
New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.
来源: 评论
Al-Biruni Earth Radius Optimization for COVID-19 Forecasting
收藏 引用
computer systems Science & Engineering 2023年 第7期46卷 883-896页
作者: El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Tatiana Makarovskikh Amal H.Alharbi Doaa Sami Khafaga Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura University35516MansouraEgypt Department of System Programming South Ural State University454080ChelyabinskRussia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve... 详细信息
来源: 评论
Traffic and road sign recognition using deep convolutional neural network
Traffic and road sign recognition using deep convolutional n...
收藏 引用
2021 International Conference on Information Science and Communications Technologies, ICISCT 2021
作者: Kuchkorov, Temurbek Khamzaev, Jamshid Allamuratova, Zamira Ochilov, Temur Tashkent University of Information Technologies Nmaed after Muhammad Al-Khwarizmi Department of Computer Systems Tashkent Uzbekistan Tashkent University of Information Technologies Nmaed after Muhammad Al-Khwarizmi Joint Faculty TUIT-BSUIR Department of Information-computer Technologies and Programming Tashkent Uzbekistan
Automatic road sign recognition is one of the most important steps to help a driver prevent accidents. In this paper, the deep convolutional neural network (Deep CNN) was used for the autonomous traffic and road signs... 详细信息
来源: 评论
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论