咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 85 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 238 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 161 篇 工学
    • 122 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 24 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 电气工程
    • 11 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 化学工程与技术
    • 7 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 网络空间安全
    • 4 篇 动力工程及工程热...
  • 107 篇 理学
    • 71 篇 数学
    • 19 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 16 篇 生物学
    • 10 篇 物理学
    • 6 篇 化学
  • 37 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 17 篇 工商管理
    • 11 篇 图书情报与档案管...
  • 13 篇 医学
    • 11 篇 临床医学
    • 10 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 8 篇 artificial intel...
  • 5 篇 support vector m...
  • 4 篇 computer science
  • 4 篇 reliability
  • 4 篇 neural networks
  • 4 篇 monitoring
  • 4 篇 decision making
  • 4 篇 dipper throated ...
  • 4 篇 artificial neura...
  • 3 篇 grey wolf optimi...
  • 3 篇 computer archite...
  • 3 篇 computational in...
  • 3 篇 optimization
  • 3 篇 decision trees
  • 3 篇 middleware
  • 3 篇 functional progr...
  • 2 篇 covid-19
  • 2 篇 fuzzy logic
  • 2 篇 intrusion detect...
  • 2 篇 software systems

机构

  • 16 篇 department of sy...
  • 10 篇 department of ap...
  • 7 篇 department of ma...
  • 6 篇 programming meth...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 department of ap...
  • 3 篇 department of ap...
  • 3 篇 zuse institute b...
  • 3 篇 university of tw...
  • 3 篇 rwth aachen univ...
  • 3 篇 programming meth...

作者

  • 9 篇 maiti manoranjan
  • 8 篇 mostafa abotaleb
  • 8 篇 pal madhumangal
  • 8 篇 abdelhameed ibra...
  • 7 篇 abotaleb mostafa
  • 5 篇 pal anita
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 de meuter wolfga...
  • 5 篇 doaa sami khafag...
  • 4 篇 choe km
  • 4 篇 bergstra j.a.
  • 4 篇 hayek ali
  • 4 篇 dybjer peter
  • 4 篇 van cutsem tom
  • 4 篇 anita pal
  • 4 篇 el-kenawy el-say...
  • 4 篇 d'hondt theo
  • 4 篇 madhumangal pal
  • 3 篇 sarkar biswajit

语言

  • 232 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Technology and Programming"
238 条 记 录,以下是81-90 订阅
排序:
Pricing Policy with the Effect of Fairness Concern, Imprecise Greenness, and Prices in Imprecise Market for a Dual Channel
Pricing Policy with the Effect of Fairness Concern, Imprecis...
收藏 引用
International Conference on Nonlinear Applied Analysis and Optimization, ICNAAO-2021
作者: Ganguly, Sanchari Das, Pritha Maiti, Manoranjan Department of Mathematics Indian Institute of Engineering Science and Technology Shibpur WB Howrah711103 India Department of Applied Mathematics Oceanology and Computer Programming Vidyasagar University WB Midnapore721102 India
Fairness concern behavior, a well-known cognitive bias, refers to a person’s attitude of dissatisfaction for unequal pay-offs in someone’s favor. Against environmental pollution, many firms are focused on green manu... 详细信息
来源: 评论
Estimation of Potential Locations of Trade Objects on the Basis of Fuzzy Set Theory
Estimation of Potential Locations of Trade Objects on the Ba...
收藏 引用
International Conference on Intelligent and Fuzzy Systems, INFUS 2020
作者: Oglu, Alekperov Ramiz Balashirin Oglu, Salahli Vuqar Mamadali Information Technology and Programming Azerimed LLC BakuAZ1147 Azerbaijan Department of Computer Engineering Odlar Yurdu University BakuAZ1072 Azerbaijan
In the present article, we have considered the issue of selection of potential locations of trade objects as a multi-factor decision-making in the conditions of uncertainty by applying the theory of fuzzy sets. Exampl... 详细信息
来源: 评论
On sequential composition, action prefixes and process prefix
收藏 引用
Formal Aspects of Computing 1994年 第3期6卷 250-268页
作者: Baeten, J.C.M. Bergstra, J.A. Department of Mathematics and Computer Science Eindhoven University of Technology MB Eindhoven 5600 PO Box 513 Netherlands Programming Research Group University of Amsterdam Amsterdam Netherlands Department of Philosophy Utrecht University Utrecht Netherlands
We illustrate the difference between sequential composition in process algebra axiomatisations like ACP and action prefixing in process calculi like CCS. We define both early and late input in a general framework exte... 详细信息
来源: 评论
Spectral Analysis of Neural Network Long-Term Predictions
Spectral Analysis of Neural Network Long-Term Predictions
收藏 引用
2021 International Conference on High technology for Sustainable Development, HiTech 2021
作者: Koparanov, Kiril Trifonov, Rumen Minkovska, Daniela Georgiev, Krasin Technical University of Sofia Department of Programming and Computer Technologies Sofia Bulgaria Technical University of Sofia Information Technology in Industry Sofia Bulgaria Technical University of Sofia Department of Aeronautics Sofia Bulgaria
Long-term predictions of time series is a task with multiple applications. Exploiting neural networks for such problem has not been studied enough for financial purposes. An empirical study of specific cases with real... 详细信息
来源: 评论
Optics in computer architectures: Basis of WDM, technologies and potentials
Optics in computer architectures: Basis of WDM, technologies...
收藏 引用
2nd International Conference on Systems, ICONS 2007
作者: Wang, Y. Kusserrow, T. Irmer, S. Hasse, A. Bartels, M. Dharmarasu, N. Hillmer, H. Börcsök, J. Mikami, O. University of Kassel Kassel Germany Department of Computer Architecture and System Programming University of Kassel Germany Department of Information Telecommunication and Electronics School of Information Science and Technology Tokai University Hiratsuka-shi Japan
We present novel concepts, technologies and potentials of optical data communication, especially for future computer architectures. The WDM (wavelength division multiplexing) and the optical wiring technologies are ex... 详细信息
来源: 评论
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2677-2693页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io... 详细信息
来源: 评论
A proof-theoretic approach to logic programming: II. Programs as definitions
收藏 引用
Journal of Logic and Computation 1991年 第5期1卷 635-660页
作者: Hallnäs, Lars Schroeder-Heister, Peter Programming Methodology Group Department of Computer Science Chalmers University of Technology Sweden Universitä Tübingen 7400 Tübingen Germany University Göteborg 412 96 Göteborg Sweden
We introduce a definitional extension of logic programming by means of an inference schema (Ph), which, in acertain sense, is dual to the (1-P) schema of rule application discussed in Part I. In the operational semant...
来源: 评论
Social Engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Real space process algebra
收藏 引用
Formal Aspects of Computing 1993年 第6期5卷 481-529页
作者: Baeten, J.C.M. Bergstra, J.A. Department of Computer Science Eindhoven University of Technology MB Eindhoven 5600 P.O. Box 513 Netherlands Programming Research Group University of Amsterdam Amsterdam Netherlands Department of Philosophy Utrecht University Utrecht Netherlands
The real time process algebra of Baeten and Bergstra [Formal Aspects of Computing, 3, 142-188 (1991)] is extended to real space by requiring the presence of spatial coordinates for each atomic action, in addition to t... 详细信息
来源: 评论
Multi-choice stochastic bi-level programming problem in cooperative nature via fuzzy programming approach
收藏 引用
Journal of Industrial Engineering International 2016年 第3期12卷 287-298页
作者: Maiti, Sumit Kumar Roy, Sankar Kumar School of Applied Sciences and Humanities Haldia Institute of Technology Purba Midnapore Haldia 721 157 India Department of Applied Mathematics with Oceanology and Computer Programming Vidyasagar University Midnapore 721 102 India
In this paper, a Multi-Choice Stochastic Bi-Level programming Problem (MCSBLPP) is considered where all the parameters of constraints are followed by normal distribution. The cost coefficients of the objective functio... 详细信息
来源: 评论