咨询与建议

限定检索结果

文献类型

  • 266 篇 会议
  • 85 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 212 篇 工学
    • 133 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 32 篇 信息与通信工程
    • 30 篇 控制科学与工程
    • 20 篇 电气工程
    • 19 篇 生物医学工程(可授...
    • 18 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 14 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 11 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 仪器科学与技术
    • 10 篇 材料科学与工程(可...
    • 9 篇 交通运输工程
    • 9 篇 网络空间安全
  • 128 篇 理学
    • 67 篇 数学
    • 26 篇 物理学
    • 20 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 16 篇 生物学
    • 11 篇 化学
    • 8 篇 海洋科学
  • 59 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 27 篇 工商管理
    • 17 篇 图书情报与档案管...
  • 13 篇 医学
    • 12 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 8 篇 教育学
    • 8 篇 教育学
  • 7 篇 法学
  • 6 篇 农学
  • 5 篇 经济学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 9 篇 support vector m...
  • 8 篇 wireless sensor ...
  • 7 篇 neural networks
  • 7 篇 optimization
  • 7 篇 monitoring
  • 7 篇 artificial intel...
  • 6 篇 computer science
  • 6 篇 decision support...
  • 6 篇 robot sensing sy...
  • 6 篇 decision making
  • 6 篇 analytical model...
  • 6 篇 artificial neura...
  • 6 篇 training
  • 5 篇 intrusion detect...
  • 5 篇 reliability
  • 5 篇 software enginee...
  • 5 篇 navigation
  • 5 篇 software
  • 5 篇 accuracy
  • 5 篇 information stor...

机构

  • 15 篇 department of co...
  • 14 篇 department of sy...
  • 12 篇 department of co...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 computer techniq...
  • 7 篇 department of co...
  • 6 篇 department of ap...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 5 篇 computer enginee...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 national technic...
  • 5 篇 mart learning ed...
  • 5 篇 computer enginee...
  • 4 篇 computer enginee...
  • 4 篇 national technic...

作者

  • 12 篇 mostafa abotaleb
  • 10 篇 gurkan tuna
  • 8 篇 kayhan gulez
  • 8 篇 hayek ali
  • 8 篇 kuchuk nina
  • 8 篇 abdelhameed ibra...
  • 7 篇 börcsök josef
  • 7 篇 boercsoek josef
  • 7 篇 nina kuchuk
  • 6 篇 sarkar biswajit
  • 6 篇 tuna gurkan
  • 6 篇 hovorushchenko t...
  • 6 篇 v. cagri gungor
  • 6 篇 krini abderrahim
  • 6 篇 roy abi zeid dao...
  • 6 篇 abotaleb mostafa
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 zakovorotnyi ole...
  • 5 篇 doaa sami khafag...

语言

  • 351 篇 英文
  • 5 篇 其他
  • 2 篇 中文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Programming"
359 条 记 录,以下是261-270 订阅
排序:
Identification of the Parameter of the Single-Phase Flow Model in the Reservoir with the Power Law of Filtration
Identification of the Parameter of the Single-Phase Flow Mod...
收藏 引用
International Conference on Problems of Cybernetics and Informatics (PCI)
作者: Khanlar Gamzaev Sergey Leonov Sevil Huseynzade Sevinc Kerimova Department of General and Applied Mathematics Azerbaijan State Oil and Industry University Baku Azerbaijan Department of Computer Engineering and Programming National Technical University "Kharkiv Polytechnic Institute" (of Affiliation) Kharkiv Ukraine
The process of unsteady flow of a single-phase liquid in a cylindrical reservoir arising under the elastic mode of reservoir development is considered. To describe this process, a power law of filtration is proposed f...
来源: 评论
Method of Detection of Intrusions Based on Stacking Meta-Algorithm
Method of Detection of Intrusions Based on Stacking Meta-Alg...
收藏 引用
Advanced Technology (KhPIWeek), IEEE KhPI Week on
作者: Svitlana Gavrylenko Vladislav Zozulia Nataliia Khatsko Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Department Information Systems and Technologies National Technical University «Kharkiv Polytechnic Institute» Kharkiv Ukraine
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, develo... 详细信息
来源: 评论
Word-Based Turkish Lip Reading System with Two Stream 3dcnn and Bilstm
SSRN
收藏 引用
SSRN 2023年
作者: Erbey, Ali Barışçı, Necaattin Department of Computer Programming Distance Education Vocational School Usak University Usak64200 Turkey Department of Information Systems Informatics Institute Gazi University Ankara Turkey Department of Computer Engineering Faculty of Technology Gazi University Ankara06500 Turkey
Lip reading is a technique that aims to understand spoken words by analyzing people's lip movements. Deep learning algorithms are used as a powerful tool for detecting and recognizing lip movements more accurately... 详细信息
来源: 评论
Social engineering Attacks Detection Approach
Social Engineering Attacks Detection Approach
收藏 引用
IEEE International Conference on Dependable Systems, Services and Technologies (DESSERT)
作者: Sergii Lysenko Volodymyr Vorobiov Oleksandr Bokhonko Piotr Gaj Oleg Savenko Jacek Wołoszyn Department of Computer Engineering and Information Systems Khmelnitsky National University Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Department of Computer Engineering and System Programming Khmelnitsky National University Khmelnitsky Ukraine Department of Informatics and Teleinformatics Kazimierz Pulaski University of Technology and Humanities in Radom Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
来源: 评论
Methods for Improving the Quality of Classification on Imbalanced Data
Methods for Improving the Quality of Classification on Imbal...
收藏 引用
Advanced Technology (KhPIWeek), IEEE KhPI Week on
作者: Svitlana Gavrylenko Zozulia Vladislav Nataliia Khatsko Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Department of Information Systems and Technologies National Technical University «Kharkiv Polytechnic Institute» Kharkiv Ukraine
The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate method...
来源: 评论
Optimizing machine learning algorithms to enhance blood donation for liver patients: a case study
Optimizing machine learning algorithms to enhance blood dona...
收藏 引用
7th IET Smart Cities Symposium (SCS 2023)
作者: Maad M. Mijwil El-Sayed M. El-kenawy Indu Bala Mohammad Aljanabi Mostafa Abotaleb Abdelhameed Ibrahim Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt School of Electrical and Electronics Engineering Lovely Professional University Punjab India Department of Computer Aliraqia University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune...
来源: 评论
Models and algorithms for determining the probability of occurrence of a critical combination of events for three-element minimum sections in intelligent decision support systems
Models and algorithms for determining the probability of occ...
收藏 引用
Advanced Technology (KhPIWeek), IEEE KhPI Week on
作者: Oleksii Kolomiitsev Iryna Zakharchenko Viacheslav Tretiak Serhii Osiievskyi Alina Rybalchenko Hennadii Heiko Computer Engineering and Programming Department National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Department of mathematics and software of ACS Ivan Kozhedub Kharkiv National Air Force University Kharkiv Ukraine
A method for determining the probability of occurrence of a critical combination of events for the three-element minimum cross-sections of attributes of the characteristics of the software quality model of intelligent...
来源: 评论
Multi-criteria Radio Frequency Identification Approach for Manufacturing Company Selection Based on Partitioned Maclaurin Symmetric Mean Operators Under Complex Intuitionistic Fuzzy Set Environment
收藏 引用
International Journal of Fuzzy Systems 2024年 第5期26卷 1730-1748页
作者: Azam, Muhammad Jana, Chiranjibe Khan, Muhammad Sajjad Ali Pal, Madhumangal Xin, Qin Yang, Shilin Sarkar, Biswajit Faculty of Science Beijing University of Technology Beijing100022 China Department of Applied Mathematics with Oceanology and Computer Programming Vidyasagar University Midnapore721102 India Department of Mathematics Khushal Khan Khattak University Karak Khyber Pakhtunkhwa Karak27200 Pakistan Faculty of Science and Technology University of the Faroe Islands Tórshavn Faroe Islands Department of Industrial Engineering Yonsei University 50 Yonsei-ro Sinchon-dong Seodaemun-gu Seoul03722 Korea Republic of Center for Global Health Research Saveetha Medical College Saveetha Institute of Medical and Technical Sciences Saveetha University Tamil Nadu 600077 Chennai India Department of Industrial Engineering and Management National Taipei University of Technology Taipei City 106344 Taiwan Chennai602105 India
The theory of intuitionistic fuzzy sets (IFSs) plays an essential role to deal with uncertainty and ambiguity. However, the IFSs deal only with anticipation, not periodicity. But, complex IFSs (CIFS) can handle both u... 详细信息
来源: 评论
Uvlhub: A Feature Model Data Repository Using Uvl and Open Science Principles
SSRN
收藏 引用
SSRN 2023年
作者: Romero-Organvidez, David Galindo, José A. Sundermann, Chico Horcas, Jose-Miguel Benavides, David Department of Computer Languages and Systems University of Seville Spain Institute of Software Engineering and Programming Languages Ulm University Germany CAOSD ITIS Software University of Málaga Spain
Feature models are the de facto standard for modelling variabilities and commonalities. Concrete models in different domains exist;however, many are in private or sparse repositories or belong to discontinued projects... 详细信息
来源: 评论
Speaker's Emotions Recognition Module Based on the GoogleLeNet Neural Network
Speaker's Emotions Recognition Module Based on the GoogleLeN...
收藏 引用
2022 International Conference on Smart Information Systems and Technologies, SIST 2022
作者: Tereikovskyi, Ihor Tereikovska, Liudmyla Kryvoruchko, Olena Tereikovskyi, Oleh Tyshchenko, Dmytro Franchuk, Tamara National Technical University Of Ukraine Igor Sikorsky Kyiv Polytechnic Institute Dept. Of System Programming And Specialized Computer Systems Kyiv Ukraine Kyiv National University Of Construction And Architecture Dept. Of Information Technology For Design And Applied Mathematics Kyiv Ukraine Kyiv National University Of Trade And Economics Dept. Of Software Engineering And Cyber Security Kyiv Ukraine National Technical University Of Ukraine Igor Sikorsky Kyiv Polytechnic Institute Dept. Of Department Of Computer Engineering Kyiv Ukraine
The article is devoted to the development of means for recognition of the emotions of the speaker, based on the neural network analysis of fixed fragments of the voice signal. The possibility of improving recognition ... 详细信息
来源: 评论