咨询与建议

限定检索结果

文献类型

  • 153 篇 会议
  • 47 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 210 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 120 篇 工学
    • 89 篇 计算机科学与技术...
    • 76 篇 软件工程
    • 18 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 9 篇 生物工程
    • 8 篇 土木工程
    • 7 篇 电气工程
    • 7 篇 船舶与海洋工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
  • 68 篇 理学
    • 36 篇 数学
    • 11 篇 物理学
    • 11 篇 生物学
    • 9 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 7 篇 海洋科学
    • 3 篇 化学
  • 29 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 7 篇 图书情报与档案管...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 教育学
    • 6 篇 教育学
  • 4 篇 农学
  • 3 篇 医学
  • 1 篇 军事学

主题

  • 11 篇 artificial intel...
  • 6 篇 monitoring
  • 6 篇 semantics
  • 6 篇 information stor...
  • 5 篇 computer science
  • 5 篇 software enginee...
  • 5 篇 software
  • 5 篇 forecasting
  • 5 篇 data models
  • 4 篇 information syst...
  • 4 篇 application soft...
  • 4 篇 supercomputers
  • 4 篇 computational mo...
  • 4 篇 predictive model...
  • 4 篇 dipper throated ...
  • 4 篇 students
  • 4 篇 verification
  • 4 篇 standards
  • 3 篇 internet of thin...
  • 3 篇 intrusion detect...

机构

  • 11 篇 department of sy...
  • 10 篇 technical univer...
  • 7 篇 department of pr...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of el...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 department of pr...
  • 4 篇 computer enginee...
  • 4 篇 tashkent univers...
  • 3 篇 department of pr...
  • 3 篇 research group p...
  • 3 篇 neuromorphica lt...

作者

  • 11 篇 gancheva veska
  • 8 篇 mostafa abotaleb
  • 8 篇 abdelhameed ibra...
  • 7 篇 veska gancheva
  • 7 篇 philippsen micha...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 doaa sami khafag...
  • 5 篇 borovska plamenk...
  • 4 篇 koparanov kiril ...
  • 4 篇 minkovska daniel...
  • 4 篇 steffen bernhard
  • 4 篇 minkovska daniel...
  • 4 篇 henning christia...
  • 4 篇 ujkani berat
  • 3 篇 troels andreasen
  • 3 篇 michael philipps...
  • 3 篇 kiril andreev ko...
  • 3 篇 el-sayed m. el-k...
  • 3 篇 nataliia khatsko

语言

  • 205 篇 英文
  • 4 篇 其他
  • 1 篇 德文
检索条件"机构=Department Computer Systems and Programming"
210 条 记 录,以下是61-70 订阅
排序:
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4531-4545页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu... 详细信息
来源: 评论
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2695-2709页
作者: Reem Alkanhel Doaa Sami Khafaga El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science University of Engineering and TechnologyTaxilaPakistan Department of System Programming South Ural State UniversityChelyabinsk454080Russia
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw... 详细信息
来源: 评论
Design and implementation of an embedded interactive timing system for medical treatment of patients with learning and attention issues  28
Design and implementation of an embedded interactive timing ...
收藏 引用
28th International Scientific Conference Electronics, ET 2019 - Proceedings
作者: Angelova, Maria A. Velchev, Yuliyan S. Dimitrov, Kalin L. Department of Programming and Computer Technologies Faculty of Computer Systems and Technologies 8 Kliment Ohridski blvd Sofia1000 Bulgaria Department of Radio Communications and Video Technologies Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd Sofia1000 Bulgaria
This article describes the design and implementation of an Embedded Interactive Timing System. Such systems are used in the therapy of children who have learning problems. The matching of different beats can help the ... 详细信息
来源: 评论
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2677-2693页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io... 详细信息
来源: 评论
The technique for computer systems Trojan diagnosis in the monitor mode
The technique for computer systems Trojan diagnosis in the m...
收藏 引用
IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing systems: Technology and Applications
作者: Segiy Lysenko Oleg Savenko System programming Department Khmelnitsky National University Khmelnitskiy Ukraine Computer Systems and Programming Faculty Lecturer of System programming Department Khmelnitsky National University Khmelnitskiy Ukraine
New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.
来源: 评论
Neuromorphic Neurons and Networks for Artificial Intelligence Built Using Temporal Space Calculations  32
Neuromorphic Neurons and Networks for Artificial Intelligenc...
收藏 引用
32nd International Scientific Conference Electronics, ET 2023
作者: Trendafilov, Ianislav Gancheva, Veska Neuromorphica Ltd. 8 Kliment Ohridski blvd. Sofia1335 Bulgaria Technical University of Sofia Faculty of Computer Systems and Technologies Department of Programming and Computer Technologies 8 Kliment Ohridski blvd. Sofia1000 Bulgaria
We deigned a spiking neural network that computes network weights in the temporal dimension. Such a network can be used for artificial intelligence and deep learning. We demonstrate circuits implementing blocks for bu... 详细信息
来源: 评论
Good error correcting output codes for adaptive multiclass learning
收藏 引用
4th International Workshop on Multiple Classifier systems, MCS 2003
作者: Tapia, Elizabeth González, José Carlos García-Villalba, Javier Department of Electrical Engineering National Univ. of Rosario Argentina Department of Telematics Engineering Technical Univ. of Madrid Spain Department of Computer Systems and Programming Complutense Univ. of Madrid Spain
In recent work, we introduced a generalization of ECOC learning under the theory of recursive error correcting codes. We named it RECOC (Recursive ECOC) learning. If long output codewords are allowed, as in the case o... 详细信息
来源: 评论
Software Anomaly Detection Method Based on Artificial Neural Network
Software Anomaly Detection Method Based on Artificial Neural...
收藏 引用
IEEE International Conference on e-Business Engineering (ICEBE)
作者: Veska Gancheva Department of Programming and Computer Technologies Faculty of Computer Systems and Technologies Technical University of Sofia Sofia Bulgaria
A growing range of data sets have been created in recent years; these are used by platforms and software applications and kept in remote access repositories. Datasets are therefore more susceptible to harmful attacks.... 详细信息
来源: 评论
Traffic and road sign recognition using deep convolutional neural network
Traffic and road sign recognition using deep convolutional n...
收藏 引用
2021 International Conference on Information Science and Communications Technologies, ICISCT 2021
作者: Kuchkorov, Temurbek Khamzaev, Jamshid Allamuratova, Zamira Ochilov, Temur Tashkent University of Information Technologies Nmaed after Muhammad Al-Khwarizmi Department of Computer Systems Tashkent Uzbekistan Tashkent University of Information Technologies Nmaed after Muhammad Al-Khwarizmi Joint Faculty TUIT-BSUIR Department of Information-computer Technologies and Programming Tashkent Uzbekistan
Automatic road sign recognition is one of the most important steps to help a driver prevent accidents. In this paper, the deep convolutional neural network (Deep CNN) was used for the autonomous traffic and road signs... 详细信息
来源: 评论
Healthcare Data Analytics Based on Machine Learning
Healthcare Data Analytics Based on Machine Learning
收藏 引用
Communications, Computing, Cybersecurity, and Informatics (CCCI), International Conference on
作者: Veska Gancheva Department of Programming and Computer Technologies Faculty of Computer Systems and Technologies Technical University of Sofia Sofia Bulgaria
Technology advancements have transformed medical science and practice, leading to the vast gathering of a wide range of medical data. Medical researchers use artificial intelligence techniques extensively because they... 详细信息
来源: 评论