咨询与建议

限定检索结果

文献类型

  • 65 篇 会议
  • 34 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 44 篇 计算机科学与技术...
    • 38 篇 软件工程
    • 12 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 电气工程
    • 6 篇 网络空间安全
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 1 篇 冶金工程
  • 35 篇 理学
    • 20 篇 数学
    • 8 篇 物理学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 化学
    • 3 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 海洋科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 农学

主题

  • 8 篇 artificial intel...
  • 5 篇 computational in...
  • 4 篇 dipper throated ...
  • 4 篇 mathematical mod...
  • 3 篇 decision support...
  • 3 篇 grey wolf optimi...
  • 3 篇 software enginee...
  • 3 篇 learning algorit...
  • 3 篇 classification a...
  • 3 篇 software
  • 2 篇 intrusion detect...
  • 2 篇 information syst...
  • 2 篇 information syst...
  • 2 篇 game theory, eco...
  • 2 篇 metaheuristics
  • 2 篇 deep learning
  • 2 篇 concurrent softw...
  • 2 篇 software algorit...
  • 2 篇 informatics
  • 2 篇 computer communi...

机构

  • 13 篇 department of sy...
  • 6 篇 department of in...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information comm...
  • 4 篇 computer enginee...
  • 3 篇 dept. of informa...
  • 3 篇 faculty of engin...
  • 3 篇 department of sy...
  • 3 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of so...
  • 2 篇 "aurel vlaicu" u...
  • 2 篇 institute of nuc...
  • 2 篇 lovely professio...
  • 2 篇 department of th...

作者

  • 7 篇 shahnaz n. shahb...
  • 6 篇 mostafa abotaleb
  • 6 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 steffen bernhard
  • 5 篇 doaa sami khafag...
  • 4 篇 abotaleb mostafa
  • 3 篇 reem alkanhel
  • 3 篇 jonsson bengt
  • 3 篇 howar falk
  • 3 篇 valentina emilia...
  • 3 篇 m. abotaleb
  • 2 篇 vladik kreinovic...
  • 2 篇 shahbazova shahn...
  • 2 篇 marius mircea ba...
  • 2 篇 a. ali subhi
  • 2 篇 aleksander spiva...
  • 2 篇 alkattan hussein
  • 2 篇 cassel sofia

语言

  • 106 篇 英文
  • 1 篇 德文
  • 1 篇 其他
检索条件"机构=Department of Information Technology & Programming"
108 条 记 录,以下是1-10 订阅
排序:
A fault-tolerant scheduling strategy through proactive and clustering techniques for scientific workflows in cloud computing
收藏 引用
Soft Computing 2025年 第2期29卷 755-781页
作者: Farhood, Suha Mubdir Khorsand, Reihaneh Hussein, Nashwan Jasim Ramezanpour, Mohammadreza Branch Islamic Azad University Isfahan Iran Department of Programming Collage of Information Technology University of Babylon Hillah Iraq Department of Computer Engineering Mobarakeh Branch Islamic Azad University Mobarakeh Isfahan Iran
Cloud computing offers solutions for various scientific and business applications. Large-scale scientific applications, which are organized as scientific workflows, are carried out using cloud computing. However, the ... 详细信息
来源: 评论
Renal Tumor Classification and Detection Based on Artificial Intelligence  3
Renal Tumor Classification and Detection Based on Artificial...
收藏 引用
3rd International Conference on Communications, information System, and Data Science, CISDS 2024
作者: Al-Taie, Raflaa Hilmi Hussein, Nashwan J. Physiology and Organ Functions Department College of Medicine University of Babylon Iraq Department of Electrical Power Engineering AL-Hussain University College Department of Programming Collage of Information Technology University of Babylon Iraq
The kidney is a crucial organ in the human body, co-operating billions of pipelines to cleanse the body's water. Kidney failure, renal tumor happens when cells divide uncontrollably and form an aberrant collection... 详细信息
来源: 评论
Educational Research Trends of the Use of Gaze Learning Data Through Topic Modeling and Scientometric Analysis  1st
Educational Research Trends of the Use of Gaze Learning D...
收藏 引用
1st International workshop on AI for Research, AI4Research 2024 and 4th International workshop on Democracy and AI, DemocrAI 2024, held in conjunction with 33rd International Joint Conference on Artificial Intelligence, IJCAI 2024
作者: Lee, Jungmin Shin, Huigon Yoo, YoungJoon Choi, Jongwon Kim, Mi Song Department of Advanced Imaging GSAIM Chung-Ang University Seoul Korea Republic of Computer Programming and Analysis School of Information Technology Fanshawe College London Canada Department of Artificial Intelligence Chung-Ang University Seoul Korea Republic of Curriculum Studies Western University London Canada
Multimodal learning analytics have become increasingly important in enabling a deeper understanding of teaching and learning in educational research. However, in comparison to other multimodal learning data, there is ... 详细信息
来源: 评论
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext
收藏 引用
Frontiers of Computer Science 2025年 第2期19卷 133-135页
作者: Lejun ZHANG Bo ZHANG Ran GUO Zhujun WANG Guopeng WANG Jing QIU Shen SU Yuan LIU Guangxia XU Zhihong TIAN Sergey GATAULLIN Cyberspace Institute Advanced Technology Guangzhou UniversityGuangzhou 510006China Research and Development Center for E-Learning Ministry of EducationBeijing 100039China College of Information Engineering Yangzhou UniversityYangzhou 225009China School Math and Computer Science Quanzhou Normal UniversityQuanzhou 362000China Pazhou Lab Guangzhou 510330China School of Physics and Materials Science Guangzhou UniversityGuangzhou 510006China Central Economic and Mathematics Institute Russian Academy of SciencesMoscow 117418Russia Industrial Programming Department MIREA-Russian Technological UniversityMoscow 119454Russia
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods ... 详细信息
来源: 评论
The use of Cryptography in Network Security
The use of Cryptography in Network Security
收藏 引用
9th International Conference on Application of information and Communication Technologies, AICT 2015
作者: Jafarov, Zafar Information Technology and Programming' Department Azerbaijan Technical University Baku Azerbaijan
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software func... 详细信息
来源: 评论
Text classification experiments on Mongolian language
Text classification experiments on Mongolian language
收藏 引用
8th International Forum on Strategic technology, IFOST 2013
作者: Damiran, Zolboo Altangerel, Khuder MUST-CSMS/Department of Information System Ulaanbaatar Mongolia MUST-CSMS/Department of Programming Technology Ulaanbaatar Mongolia
Text classification is an important task of assigning objects from a universe to two or more classes, especially classification is to classify the topic or the theme of a document. In this research, we have analyzed t... 详细信息
来源: 评论
A succinct canonical register automaton model for data domains with binary relations
A succinct canonical register automaton model for data domai...
收藏 引用
10th International Symposium on Automated technology for Verification and Analysis, ATVA 2012
作者: Cassel, Sofia Jonsson, Bengt Howar, Falk Steffen, Bernhard Dept. of Information Technology Uppsala University Sweden Department of Programming Systems Technical University Dortmund Germany
We present a novel canonical automaton model for languages over infinite data domains, that is suitable for specifying the behavior of services, protocol components, interfaces, etc. The model is based on register aut... 详细信息
来源: 评论
A New Method for Research of Grown-In Microdefects in Dislocation-Free Silicon Single Crystals
收藏 引用
Journal of Crystallization Process and technology 2011年 第2期1卷 13-17页
作者: V.I Talanin I.E Talanin N.Ph Ustimenko Department of Programming & Information Technology Classic Private University
As a virtual experimental device for analysis and calculation of grown-in microdefects formation in undoped silicon dislocation-free single crystals the software is proposed. The software is built on the basis on diff... 详细信息
来源: 评论
Visual Language Plans - Formalization of a pedagogical learnflow modeling language
Visual Language Plans - Formalization of a pedagogical learn...
收藏 引用
International Workshop on Petri Nets and Software Engineering, PNSE 2014
作者: Irgang, Kerstin Irgang, Thomas Human-Centered Information Systems Clausthal University of Technology Germany Department of Software Engineering and Theory of Programming Fernuniversität Hagen Germany
In this paper we present an approach to support selfregulated learn-flows in the collaborative environment Metafora. In this environment students construct Visual Language Plans. Those plans model workflows of learnin... 详细信息
来源: 评论
Promoter recognition with machine learning algorithms keREM, RULSE-3 and ANN
Promoter recognition with machine learning algorithms keREM,...
收藏 引用
International Symposium on INnovations in Intelligent SysTems and Applications, INISTA 2012
作者: Karli, Günay Nayir, Ahmet Faculty of Engineering and Information Technology International Burch Universiy Sarajevo Bosnia and Herzegovina Department of Computer Programming Fatih University Istanbul Turkey
Data mining has become an important and active area of research because of theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown knowledge from... 详细信息
来源: 评论