咨询与建议

限定检索结果

文献类型

  • 54 篇 会议
  • 17 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 73 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 45 篇 工学
    • 36 篇 计算机科学与技术...
    • 31 篇 软件工程
    • 10 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 6 篇 生物工程
    • 6 篇 网络空间安全
    • 4 篇 电子科学与技术(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 2 篇 电气工程
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 水利工程
  • 22 篇 理学
    • 9 篇 数学
    • 7 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 3 篇 物理学
    • 3 篇 化学
    • 2 篇 地质学
    • 2 篇 系统科学
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 4 篇 computational mo...
  • 4 篇 dipper throated ...
  • 4 篇 artificial intel...
  • 3 篇 grey wolf optimi...
  • 3 篇 data models
  • 2 篇 internet of thin...
  • 2 篇 metaheuristics
  • 2 篇 neural networks
  • 2 篇 ethics
  • 2 篇 adversarial mach...
  • 2 篇 monitoring
  • 2 篇 biogas
  • 2 篇 real-time system...
  • 2 篇 production
  • 2 篇 machine learning
  • 2 篇 network security
  • 2 篇 students
  • 2 篇 software
  • 2 篇 feature selectio...
  • 2 篇 forecasting

机构

  • 11 篇 department of sy...
  • 10 篇 technical univer...
  • 7 篇 department of pr...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 department of pr...
  • 4 篇 computer enginee...
  • 4 篇 tashkent univers...
  • 3 篇 neuromorphica lt...
  • 3 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 technical univer...
  • 2 篇 faculty of compu...

作者

  • 8 篇 mostafa abotaleb
  • 8 篇 abdelhameed ibra...
  • 7 篇 gancheva veska
  • 6 篇 veska gancheva
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 doaa sami khafag...
  • 4 篇 koparanov kiril ...
  • 4 篇 minkovska daniel...
  • 4 篇 minkovska daniel...
  • 4 篇 ujkani berat
  • 3 篇 kiril andreev ko...
  • 3 篇 el-sayed m. el-k...
  • 3 篇 trendafilov iani...
  • 3 篇 reem alkanhel
  • 3 篇 allamuratova zam...
  • 3 篇 stoyanova lyudmi...
  • 3 篇 ibrahim abdelham...
  • 3 篇 el-kenawy el-say...
  • 3 篇 daniela veleva m...

语言

  • 72 篇 英文
  • 1 篇 日文
检索条件"机构=Computer Systems and Programming Faculty"
73 条 记 录,以下是61-70 订阅
排序:
Development of a visual programming tool called SmrAI for function testing to mitigate the shortage of programming personnel in the manufacturing
Computer Software
收藏 引用
computer Software 2022年 第4期39卷 61-74页
作者: Sugiyama, Ko-Ichiro Okuda, Satsuki Tanabe, Tsubasa Takao, Kouji Higashi, Hirohito Tanaka, Kazuaki Dept. of Information Engineering National Institute of Technology Matsue College Japan NIPPO Co. Ltd. Japan Ruby Programming Shounendan Japan Shimane IT Open-innovation Center Japan Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology Japan
We have developed a visual programming tool called SmrAI for function testing, and investigated whether wrapping existing source code with Scratch Blocks is an effective means of mitigating the shortage of programming... 详细信息
来源: 评论
Improving Predictions of Long Sequences by Hyperparameter Tuning
Improving Predictions of Long Sequences by Hyperparameter Tu...
收藏 引用
computer Science (COMSCI), International Scientific Conference on
作者: Kiril Andreev Koparanov Krasin Krasimirov Georgiev Vasil Aleksandrov Shterev Daniela Veleva Minkovska Department of Programming and Computer Technologies Faculty of Computer Systems and Technologies Technical University of Sofia 8 Kliment Ohridski blvd Sofia Bulgaria Department of Air Transport Faculty of Transport Technical University of Sofia 8 Kliment Ohridski blvd Sofia Bulgaria Department of Communication Networks Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd Sofia Bulgaria
The problem of forecasting long sequences is important in many different domains. Proper selection of the hyperparameters when a machine learning approach is applied could make the difference between adequate and inad... 详细信息
来源: 评论
Optimizing machine learning algorithms to enhance blood donation for liver patients: a case study
Optimizing machine learning algorithms to enhance blood dona...
收藏 引用
7th IET Smart Cities Symposium (SCS 2023)
作者: Maad M. Mijwil El-Sayed M. El-kenawy Indu Bala Mohammad Aljanabi Mostafa Abotaleb Abdelhameed Ibrahim Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt School of Electrical and Electronics Engineering Lovely Professional University Punjab India Department of Computer Aliraqia University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune...
来源: 评论
Sensing metric-based hybrid underlay/overlay transmission framework for CR-IoT networks for smart city applications
Sensing metric-based hybrid underlay/overlay transmission fr...
收藏 引用
7th IET Smart Cities Symposium (SCS 2023)
作者: Indu Bala Maad M. Mijwil Mostafa Abotaleb El-Sayed M. El-kenawy Abdelhameed Ibrahim School of Electrical and Electronics Engineering Lovely Professional University Punjab India Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
With the increasing number of IoT devices, there is a growing need for bandwidth to support their communication. Unfortunately, there is a shortage of available bandwidth due to preallocated bands for various services...
来源: 评论
Data poisoning: issues, challenges, and needs
Data poisoning: issues, challenges, and needs
收藏 引用
7th IET Smart Cities Symposium (SCS 2023)
作者: Mohammad Aljanabi Alaa Hamza Omran Maad M Mijwil Mostafa Abotaleb El-Sayed M. El-kenawy Sahar Yousif Mohammed Abdelhameed Ibrahim Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science & Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
来源: 评论
Research of Energy Detection Method in Spectrum Sensing in Cognitive Radio Networks
Research of Energy Detection Method in Spectrum Sensing in C...
收藏 引用
International Conference on Information Science and Communications Technologies (ICISCT)
作者: Ernazar Reypnazarov Halimjon Khujamatov Doston Khasanov Zamira Allamuratova Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Computer Enjineering Faculty Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Data Communication Networks and Systems Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Information-Computer Technologies and Programming Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan
This paper presents the threshold value determination model, its implementation algorithm, and the characteristics of the threshold value depending on the probability of false signal detection, developed for the purpo...
来源: 评论
Analysis of Hardware and Software Tools for Implementation of Cognitive Radio Networks
Analysis of Hardware and Software Tools for Implementation o...
收藏 引用
International Conference on Information Science and Communications Technologies (ICISCT)
作者: Ernazar Reypnazarov Halimjon Khujamatov Doston Khasanov Zamira Allamuratova Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Dean of the Computer Enjineering Faculty Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Data Communication Networks and Systems Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Information-Computer Technologies and Programming Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan
This paper analyzes of the hardware and software tools for implementing a cognitive radio network. In particular, software-configurable radio modules, which are considered the main element of the cognitive network, we...
来源: 评论
A flexible framework for web-based virtual reality presentation of cultural heritage
收藏 引用
AIP Conference Proceedings 2021年 第1期2333卷
作者: Dimo Chotrov Angel Bachvarov 1Technical University Sofia Faculty of Computer Systems and Technologies Department Programming and Computer Technologies Bulgaria 2Technical University Sofia Faculty of Mechanical Engineering Department Automation of Discrete Production Engineering Bulgaria
The Virtual Reality (VR) experiences are great for an engaging presentation creating wide public awareness of cultural heritage, especially if the experience is built on a web-based technology. One of the still posing...
来源: 评论
Program recursive forms and programming automatization for functional languages
收藏 引用
WSEAS Transactions on computers 2009年 第8期8卷 1256-1265页
作者: Archvadze, N. Pkhovelishvili, M. Shetsiruli, L. Nizharadze, M. Department of Computer Sciences Faculty of Exact and Natural Sciences I. Javakhishvili Tbilisi State University 2. University st. 0143 Tbilisi South Georgia and the South Sandwich Islands Department of Programming N. Muskhelishvili Computing Mathematic Institute 7 Akuri st. 0193 Tbilisi South Georgia and the South Sandwich Islands Department of Mathematics and Computer Science Shota Rustaveli State University 35 Ninoshvili st. 6010 Batumi South Georgia and the South Sandwich Islands Faculty of Informatics and Control Systems Georgian Technical University 77 Kostava st. 0175 Tbilisi South Georgia and the South Sandwich Islands
The automatic programming system has been considered by means of which it becomes easier to carry out traditional programming stages. There is discussed both recursive forms: parallel, interrecursion and recursion of ... 详细信息
来源: 评论
Darknet traffic big-data analysis and network management to real-time automating the malicious intent detection process by a weight agnostic neural networks framework
arXiv
收藏 引用
arXiv 2021年
作者: Demertzis, Konstantinos Tsiknas, Konstantinos Takezis, Dimitrios Skianis, Charalabos Iliadis, Lazaros Laboratory of Complex Systems Department of Physics Faculty of Sciences International Hellenic University Kavala Campus St. Loukas65404 Greece Department of Electrical and Computer Engineering Democritus University of Thrace Vas. Sofias 12 Xanthi67100 Greece Hellenic National Defence General Staff Stratopedo Papagou Mesogeion 227-231 Athens15561 Greece University of Aegean Karlovassi Samos83200 Greece School of Engineering Department of Civil Engineering Faculty of Mathematics Programming and General courses Democritus University of Thrace Kimmeria Xanthi Greece
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage legitimate credentials with trusted tools already deployed in a network environment, making it difficult for organizations t... 详细信息
来源: 评论