咨询与建议

限定检索结果

文献类型

  • 78 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 52 篇 计算机科学与技术...
    • 46 篇 软件工程
    • 12 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 6 篇 土木工程
    • 4 篇 机械工程
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 安全科学与工程
  • 38 篇 理学
    • 18 篇 数学
    • 10 篇 物理学
    • 7 篇 生物学
    • 5 篇 系统科学
    • 3 篇 统计学(可授理学、...
  • 19 篇 管理学
    • 11 篇 图书情报与档案管...
    • 9 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 5 篇 农学
    • 4 篇 作物学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 4 篇 dipper throated ...
  • 3 篇 task analysis
  • 3 篇 grey wolf optimi...
  • 3 篇 learning algorit...
  • 3 篇 databases
  • 3 篇 machine learning
  • 3 篇 feature selectio...
  • 3 篇 training
  • 2 篇 intrusion detect...
  • 2 篇 integral equatio...
  • 2 篇 support vector m...
  • 2 篇 metaheuristics
  • 2 篇 data integration
  • 2 篇 ontologies
  • 2 篇 neural networks
  • 2 篇 information tech...
  • 2 篇 robots
  • 2 篇 monitoring
  • 2 篇 syntactics
  • 2 篇 predictive model...

机构

  • 7 篇 department of sy...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 tashkent univers...
  • 4 篇 information syst...
  • 4 篇 student research...
  • 3 篇 dept. of informa...
  • 3 篇 department of co...
  • 3 篇 department of in...
  • 3 篇 gorgany nature r...
  • 2 篇 programming depa...
  • 2 篇 leninogorsk oil ...
  • 2 篇 information syst...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 ivan franko nati...
  • 2 篇 department of co...

作者

  • 6 篇 mostafa abotaleb
  • 6 篇 christiansen hen...
  • 6 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 steffen bernhard
  • 5 篇 doaa sami khafag...
  • 4 篇 zimborás zoltán
  • 3 篇 nataliia khatsko
  • 3 篇 reem alkanhel
  • 3 篇 theil have chris...
  • 3 篇 jonsson bengt
  • 3 篇 kolarovszki zolt...
  • 3 篇 allamuratova zam...
  • 3 篇 howar falk
  • 3 篇 ivan dyyak
  • 3 篇 svitlana gavryle...
  • 3 篇 kaposi ágoston
  • 2 篇 petrashchuk yaro...
  • 2 篇 ivaschenko anton

语言

  • 101 篇 英文
  • 1 篇 德文
  • 1 篇 其他
检索条件"机构=Department of Information Systems and Programming"
103 条 记 录,以下是11-20 订阅
排序:
Social Engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Migrating Birds Optimization-Based Feature Selection for Text Classification
arXiv
收藏 引用
arXiv 2024年
作者: Kaya, Cem Kilimci, Zeynep Hilal Uysal, Mitat Kaya, Murat Dogus University Turkey Department of Information Systems Engineering Kocaeli University Turkey Department of Software Engineering Dogus University Turkey Department of Computer Programming Acibadem University Turkey
This research introduces a novel approach, MBO-NB, that leverages Migrating Birds Optimization (MBO) coupled with Naive Bayes as an internal classifier to address feature selection challenges in text classification ha... 详细信息
来源: 评论
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 4531-4545页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu... 详细信息
来源: 评论
Applications of Fuzzy Logic in Recruitment systems
Applications of Fuzzy Logic in Recruitment Systems
收藏 引用
2022 International Conference on information Science and Communications Technologies, ICISCT 2022
作者: Medetova, Kunduz Sultanov, Djamshid Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of System and Applied Programming Tashkent Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of Hardware and Software of Management Systems in Telcommunications Tashkent Uzbekistan
This paper presents methods for solving problems using the method of fuzzy logic. This method serves to study the characteristics of determining the level of compliance of a candidate for an existing vacant position. ... 详细信息
来源: 评论
Method of Detection of Intrusions Based on Stacking Meta-Algorithm
Method of Detection of Intrusions Based on Stacking Meta-Alg...
收藏 引用
Advanced Technology (KhPIWeek), IEEE KhPI Week on
作者: Svitlana Gavrylenko Vladislav Zozulia Nataliia Khatsko Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Department Information Systems and Technologies National Technical University «Kharkiv Polytechnic Institute» Kharkiv Ukraine
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, develo... 详细信息
来源: 评论
A lightweight attention-driven YOLOv5m model for improved brain tumor detection
收藏 引用
Computers in Biology and Medicine 2025年 188卷 109893-109893页
作者: Muksimova, Shakhnoza Umirzakova, Sabina Mardieva, Sevara Iskhakova, Nargiza Sultanov, Murodjon Cho, Young Im Department of Computer Engineering Gachon University Sujeong-gu Seongnam-si461-701 Korea Republic of Department of Information Systems and Technologies of the Tashkent State University of Economic Tashkent100066 Uzbekistan Department of Systematic and Practical Programming Tashkent University of Information Technologies named after Muhammad Al-Khwarizmi Tashkent100200 Uzbekistan
Brain tumors are regarded as one of the most lethal, devastating, and aggressive diseases, significantly reducing the life expectancy of affected individuals. For this reason, in pursuit of advancing brain tumor diagn... 详细信息
来源: 评论
B2A, A Straight-Through Approach from Basics to Advanced Level: Case Study for Python Course  11
B2A, A Straight-Through Approach from Basics to Advanced Lev...
收藏 引用
11th Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2024
作者: Shazmeen, Abbasi Dakić, Pavle Zoltan, Alwahab Dhulfiqar Department of Programming Languages and Compilers Faculty of Informatics Eötvös Loránd University 1/C Pázmány Péter st. BudapestH-1117 Hungary Faculty of Informatics and Computing Singidunum University Danijelova 32 Belgrade Serbia Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava Ilkovičova 2 Bratislava842 16 Slovakia
In this study, we present a straightforward teaching strategy for teaching the Python programming language. Our method emphasizes a clear progression from fundamental to sophisticated concepts. Beginning with a thorou... 详细信息
来源: 评论
Advanced Computer-Aided Optimization of Quartz Resonator-Based Sensors
Advanced Computer-Aided Optimization of Quartz Resonator-Bas...
收藏 引用
International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH)
作者: Volodymyr Savchenko Oksana Mnushka Oleg Sokulskyi Computer Engineering and Programming Department National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Information Systems and Technologies Department National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” Kyiv Ukraine
In this study, we present an improved approach to optimizing the parameters of sensor sensing elements using quartz resonators with an interelectrode gap. We combine graphical and analytical methods to solve the multi... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论
Benchmarking Photonic Quantum Machine Learning Simulators  17
Benchmarking Photonic Quantum Machine Learning Simulators
收藏 引用
17th IEEE International Symposium on Applied Computational Intelligence and Informatics, SACI 2023
作者: Varga, Henrik Kiss, Attila Kolarovszki, Zoltan Elte Eötvös Loránd University Department of Algorithms and Their Applications Budapest Hungary Elte Eötvös Loránd University Department of Information Systems Budapest Hungary J. Selye University Department of Informatics Komárno Slovakia Department of Programming Languages and Compilers Elte Eotvos Lorand University Budapest Hungary Wigner Research Centre for Physics Department of Computational Sciences Budapest Hungary
In the past few years, quantum computing has gotten more attention, and the need for efficient simulations is getting increasingly important as well. A significant branch of quantum computing is photonic quantum compu... 详细信息
来源: 评论