咨询与建议

限定检索结果

文献类型

  • 212 篇 会议
  • 51 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 264 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 149 篇 工学
    • 90 篇 计算机科学与技术...
    • 70 篇 软件工程
    • 33 篇 安全科学与工程
    • 27 篇 控制科学与工程
    • 24 篇 信息与通信工程
    • 12 篇 土木工程
    • 11 篇 电子科学与技术(可...
    • 10 篇 电气工程
    • 10 篇 生物医学工程(可授...
    • 8 篇 机械工程
    • 8 篇 船舶与海洋工程
    • 7 篇 建筑学
    • 7 篇 生物工程
    • 7 篇 网络空间安全
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 交通运输工程
  • 72 篇 理学
    • 31 篇 数学
    • 17 篇 统计学(可授理学、...
    • 16 篇 物理学
    • 14 篇 系统科学
    • 8 篇 海洋科学
    • 8 篇 生物学
  • 34 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 10 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 12 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
  • 5 篇 法学
  • 4 篇 经济学
  • 4 篇 教育学
  • 1 篇 农学

主题

  • 31 篇 safety
  • 21 篇 computer archite...
  • 17 篇 hardware
  • 17 篇 software
  • 14 篇 system-on-chip
  • 14 篇 iec standards
  • 11 篇 monitoring
  • 8 篇 reliability
  • 8 篇 software reliabi...
  • 7 篇 field programmab...
  • 6 篇 failure rate
  • 6 篇 vehicles
  • 5 篇 iso standards
  • 5 篇 acceleration
  • 5 篇 probability
  • 4 篇 support vector m...
  • 4 篇 accident prevent...
  • 4 篇 application soft...
  • 4 篇 hazards
  • 4 篇 process control

机构

  • 25 篇 department of co...
  • 17 篇 department of sy...
  • 17 篇 computer archite...
  • 13 篇 department of co...
  • 9 篇 icas institute f...
  • 8 篇 institute for co...
  • 8 篇 computer techniq...
  • 7 篇 chair for comput...
  • 7 篇 computer archite...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 mart learning ed...
  • 6 篇 universitat kass...
  • 5 篇 computer enginee...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 computer archite...

作者

  • 43 篇 josef börcsök
  • 30 篇 ali hayek
  • 22 篇 börcsök josef
  • 15 篇 börcsök j.
  • 15 篇 boercsoek josef
  • 14 篇 hayek ali
  • 12 篇 mostafa abotaleb
  • 10 篇 roy abi zeid dao...
  • 9 篇 abotaleb mostafa
  • 8 篇 j. börcsök
  • 8 篇 schwarz m.h.
  • 8 篇 krini abderrahim
  • 8 篇 abdelhameed ibra...
  • 7 篇 j. borcsok
  • 7 篇 michael schwarz
  • 7 篇 michael schreibe...
  • 7 篇 daou roy abi zei...
  • 7 篇 schwarz michael
  • 6 篇 holub p.
  • 6 篇 boercsoek j.

语言

  • 256 篇 英文
  • 6 篇 中文
  • 2 篇 其他
检索条件"机构=Computer and System Programming"
264 条 记 录,以下是51-60 订阅
排序:
Design and Implementation of an Instrumented walking cane for Detection of Freezing of Gait  3
Design and Implementation of an Instrumented walking cane fo...
收藏 引用
3rd IEEE International Multidisciplinary Conference on Engineering Technology, IMCET 2021
作者: Haidar Ahmad, Joelle El-Asmar, Alain Abi Zeid Daou, Roy Hayek, Ali Boercsoek, Josef Faculty of Public Health Biomedical Technologies Department Jounieh Lebanon MART Learning Education and Research Center Chananir Lebanon University of Kassel Faculty of Electrical Engineering/Computer Science Department of Computer Architecture and System Programming Germany
Independent mobility is an important feature of an individual's normal life and with the elderly population continually growing, assistive devices such as walkers and canes provide help and guidance to users. Free... 详细信息
来源: 评论
A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer Science and Mathematics 2024年 第3期5卷 45-91页
作者: Ali, Guma Mijwil, Maad M. Buruga, Bosco Apparatus Abotaleb, Mostafa Muni University Arua00256 Uganda Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of Library and Information Services Muni University Arua00256 Uganda Department of System Programming South Ural State University Chelyabinsk Russia
The fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation "financial technologies (FinTech)" around the globe. However, the security of FinTech syst... 详细信息
来源: 评论
Design and Implementation of a QoL Improvement system for Visually Impaired Patients  5
Design and Implementation of a QoL Improvement System for Vi...
收藏 引用
5th International Conference on Advances in Computational Tools for Engineering Applications, ACTEA 2023
作者: Abi Zeid Daou, Roy Beaino, Jad Hawat, Johnny Ibrahim, Ramy Hayek, Ali Boercsoek, Josef Olmedo, Jose Javier Serrano Université la Sagesse Faculty of Engineering Mechatronics Department Beirut Lebanon MART Learning Education and Research Center Chananir Lebanon University of Applied Science Hamm-Lippstadt Department Lippstadt 2 Hardware Engineering Hamm59063 Germany University of Kassel Faculty of Electrical Engineering/Computer Science Department of Computer Architecture and System Programming Germany Centro de Tecnología Biomédica Universidad Politécnica de Madrid Lab of Bioinstrumentation and Nanomedicine Spain
Visually impaired people encounter several challenges in their mobility and navigation. Their daily activities are obstructed due to their inability to adapt or recognize accurately their surroundings, especially outs... 详细信息
来源: 评论
Ensuring Information Security in the Intelligent Scientific and Technical Information systems  15
Ensuring Information Security in the Intelligent Scientific ...
收藏 引用
15th International Scientific and Practical Conference on Environment. Technology. Resources, ETR 2024
作者: Kerimov, Komil Azizova, Zarina Bekkamov, Fayzi Rakhimov, Mekhriddin Ochilov, Mannon Department of System and Applied Programming Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Information Security Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Library Information Systems Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Computer Systems Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan
Scientific and scientific-technical information is a valuable tool for the development of education, technology and society as a whole. The increase in the volume of information and the development of information netw... 详细信息
来源: 评论
Safe-system-on-Chip for Functional Safety
Safe-System-on-Chip for Functional Safety
收藏 引用
IEEE SSD International Multi-Conference on systems, Signals and Devices
作者: Josef Börcsök Waldemar Müller Eike Hahn Michael Schwarz Mohamed Abdelawwad ICAS Institute for Computer Architecture and System Programming University of Kassel Kassel Germany
Various research institutions and semiconductor manufacturers have presented approaches for miniaturized safety systems based on redundant configurations in the last years. ICAS has been working on approaches for Safe... 详细信息
来源: 评论
SoC approach for low cost and low power consumption based on ARM Cortex M3 according to ISO 26262
SoC approach for low cost and low power consumption based on...
收藏 引用
IEEE SSD International Multi-Conference on systems, Signals and Devices
作者: Muhammad Ikram Hafiz Mohamed Abdelawwad Waldemar Müller Eike Hahn Josef Börcsök ICAS Institute for Computer Architecture and System Programming University of Kassel Kassel Germany
The next milestone in the automotive industry is to achieve the complete autonomous driving capability. This demands high performance computing controllers and a larger number of Electronic Controller Units (ECUs) for... 详细信息
来源: 评论
Communication SoC based on 1oo2D architecture for industrial human-robot-collaboration
Communication SoC based on 1oo2D architecture for industrial...
收藏 引用
IEEE SSD International Multi-Conference on systems, Signals and Devices
作者: Mohamed Abdelawwad Malte Drabesch Michael Schwarz Muhammad Ikram Hafiz Josef Börcsök ICAS Institute for Computer Architecture and System Programming University of Kassel Kassel Germany
The mechanical force imparted by industrial robots is enormous and can lead to dangerous situations for human workers and property if they malfunction. system designs based on the redundancy concept are essential to a... 详细信息
来源: 评论
Modelling the Process of Determining the Tourist Demand Based on Fishbein's Multi-Attribute Model  15
Modelling the Process of Determining the Tourist Demand Base...
收藏 引用
15th IEEE International Scientific and Technical Conference on computer Sciences and Information Technologies, CSIT 2020
作者: Hovorushchenko, Tetiana Glukhov, Vladyslav Hovorushchenko, Olha Computer Engineering and System Programming Department Khmelnytskyi Ukraine Khmelnytskyi Lyceum No. 17 Khmelnytskyi Ukraine
The purpose of this paper is automating the analysis of tourist demand by developing a web-service for surveying tourists (both real and potential) and for presenting the survey results in the form of determining the ... 详细信息
来源: 评论
AbotalebNet: A Novel Deep Learning Architecture for Time Series Forecasting with Convolutional and LSTM Layers Enhanced by Multi-Head Attention
AbotalebNet: A Novel Deep Learning Architecture for Time Ser...
收藏 引用
Trends in Quantum Computing and Emerging Business Technologies (TQCEBT), International Conference on
作者: Mostafa Abotaleb Tatiana Makarovskikh Maad M. Mijwil Indu Bala Kamal Kant Hiran Ruchi Doshi Dep. of System Programming South Ural State University Chelyabinsk Russia Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Electrical and Electronics Engineering Lovely Professional University Punjab India Dep. of Computer Science Sir Padampat Singhania University Udaipur India Dep. of Computer Science and Engineering Universidad Azteca Chalco Mexico
This paper introduces AbotalebNet, a novel deep learning architecture optimized for time series forecasting, with a particular focus on the complexities of COVID-19 data. AbotalebNet’s architecture is mathematically ... 详细信息
来源: 评论
Social Engineering Attacks Detection Approach
Social Engineering Attacks Detection Approach
收藏 引用
IEEE International Conference on Dependable systems, Services and Technologies (DESSERT)
作者: Sergii Lysenko Volodymyr Vorobiov Oleksandr Bokhonko Piotr Gaj Oleg Savenko Jacek Wołoszyn Department of Computer Engineering and Information Systems Khmelnitsky National University Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Department of Computer Engineering and System Programming Khmelnitsky National University Khmelnitsky Ukraine Department of Informatics and Teleinformatics Kazimierz Pulaski University of Technology and Humanities in Radom Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
来源: 评论