咨询与建议

限定检索结果

文献类型

  • 65 篇 会议
  • 34 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 44 篇 计算机科学与技术...
    • 38 篇 软件工程
    • 12 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 电气工程
    • 6 篇 网络空间安全
    • 4 篇 生物工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 1 篇 冶金工程
  • 35 篇 理学
    • 20 篇 数学
    • 8 篇 物理学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 化学
    • 3 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 海洋科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 农学

主题

  • 8 篇 artificial intel...
  • 5 篇 computational in...
  • 4 篇 dipper throated ...
  • 4 篇 mathematical mod...
  • 3 篇 decision support...
  • 3 篇 grey wolf optimi...
  • 3 篇 software enginee...
  • 3 篇 learning algorit...
  • 3 篇 classification a...
  • 3 篇 software
  • 2 篇 intrusion detect...
  • 2 篇 information syst...
  • 2 篇 information syst...
  • 2 篇 game theory, eco...
  • 2 篇 metaheuristics
  • 2 篇 deep learning
  • 2 篇 concurrent softw...
  • 2 篇 software algorit...
  • 2 篇 informatics
  • 2 篇 computer communi...

机构

  • 13 篇 department of sy...
  • 6 篇 department of in...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information comm...
  • 4 篇 computer enginee...
  • 3 篇 dept. of informa...
  • 3 篇 faculty of engin...
  • 3 篇 department of sy...
  • 3 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of so...
  • 2 篇 "aurel vlaicu" u...
  • 2 篇 institute of nuc...
  • 2 篇 lovely professio...
  • 2 篇 department of th...

作者

  • 7 篇 shahnaz n. shahb...
  • 6 篇 mostafa abotaleb
  • 6 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 steffen bernhard
  • 5 篇 doaa sami khafag...
  • 4 篇 abotaleb mostafa
  • 3 篇 reem alkanhel
  • 3 篇 jonsson bengt
  • 3 篇 howar falk
  • 3 篇 valentina emilia...
  • 3 篇 m. abotaleb
  • 2 篇 vladik kreinovic...
  • 2 篇 shahbazova shahn...
  • 2 篇 marius mircea ba...
  • 2 篇 a. ali subhi
  • 2 篇 aleksander spiva...
  • 2 篇 alkattan hussein
  • 2 篇 cassel sofia

语言

  • 106 篇 英文
  • 1 篇 德文
  • 1 篇 其他
检索条件"机构=Department of Information Technology & Programming"
108 条 记 录,以下是11-20 订阅
排序:
Educational Research Trends of the Use of Gaze Learning Data Through Topic Modeling and Scientometric Analysis  1st
Educational Research Trends of the Use of Gaze Learning D...
收藏 引用
1st International workshop on AI for Research, AI4Research 2024 and 4th International workshop on Democracy and AI, DemocrAI 2024, held in conjunction with 33rd International Joint Conference on Artificial Intelligence, IJCAI 2024
作者: Lee, Jungmin Shin, Huigon Yoo, YoungJoon Choi, Jongwon Kim, Mi Song Department of Advanced Imaging GSAIM Chung-Ang University Seoul Korea Republic of Computer Programming and Analysis School of Information Technology Fanshawe College London Canada Department of Artificial Intelligence Chung-Ang University Seoul Korea Republic of Curriculum Studies Western University London Canada
Multimodal learning analytics have become increasingly important in enabling a deeper understanding of teaching and learning in educational research. However, in comparison to other multimodal learning data, there is ... 详细信息
来源: 评论
Al-Biruni Earth Radius Optimization for COVID-19 Forecasting
收藏 引用
Computer Systems Science & Engineering 2023年 第7期46卷 883-896页
作者: El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Tatiana Makarovskikh Amal H.Alharbi Doaa Sami Khafaga Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura University35516MansouraEgypt Department of System Programming South Ural State University454080ChelyabinskRussia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve... 详细信息
来源: 评论
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 4531-4545页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu... 详细信息
来源: 评论
Social Engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Methodology of Teaching programming Science Through Online Platforms  3
Methodology of Teaching Programming Science Through Online P...
收藏 引用
3rd IEEE International Conference on Problems of Informatics, Electronics and Radio Engineering, PIERE 2024
作者: Nishanov, Akram Allamov, Oybek Yusupova, Janar Matyakubov, Marks Qalandarov, Baxtiyor Bahrom, Reyimberganov Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Department of Systematic and Practical Programming Tashkent Uzbekistan Urgench Branch of Tashkent University of Information Technology named after Muhammad al-Khwarizmi Department of Software Engineering Urgench Uzbekistan Urgench Branch of Tashkent University of Information Technology named after Muhammad al-Khwarizmi Urgench branch of Tatu named after Muhammad al-Khwarizmi Urgench Uzbekistan Urgench Branch of Tashkent University of Information Technology named after Muhammad al-Khwarizmi Urgench branch of Tatu named after Muhammad al-Khwarizmi Urgench Uzbekistan
This article presents an experiment conducted among students of the Faculty of 'Software Engineering' of the Urgench branch of TATU named after Muhammad al-Khwarizmi. Teaching programming using online platform... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论
The Problem of Morphological Synthesis and Methods, Algorithms for Handling Errors in Word Forms
The Problem of Morphological Synthesis and Methods, Algorith...
收藏 引用
Informatics, Electronics, and Radio Engineering (PIERE), International Conference Problems of
作者: Buazhar O. Kochkonbaeva Julduz S. Egemberdieva Abdugany D. Satybaev Department of Information Technology and Programming Osh State University Osh Kyrgyzstan Department of Information Technology Kyrgyz-Uzbek International University after named B. Sydykov Osh Kyrgyzstan Department of Information Technology and Management Osh Technological University after named academican M.M. Adyshev Osh Kyrgyzstan
Morphological synthesis is a key aspect of natural language processing that focuses on the generation of word forms from their base components - roots, stems, prefixes, affixes, and inflectional morphemes. It plays a ... 详细信息
来源: 评论
A Zero-Watermarking Algorithm for Use in RGB and Monochrome Images
A Zero-Watermarking Algorithm for Use in RGB and Monochrome ...
收藏 引用
Advanced technology (KhPIWeek), IEEE KhPI Week on
作者: Vadym Poddubnyi Roman Gvozdov Oleksandr Sievierinov Vladyslav Sukhoteplyi Serhii Bulba Dmytro Lysytsia Department of of information technology security Kharkiv National University of Radio Electronic Kharkiv Ukraine Department of Computer Engineering and Programming Ivan Kozhedub Kharkiv National Air Force University Kharkiv Ukraine Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ... 详细信息
来源: 评论
B2A, A Straight-Through Approach from Basics to Advanced Level: Case Study for Python Course  11
B2A, A Straight-Through Approach from Basics to Advanced Lev...
收藏 引用
11th Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2024
作者: Shazmeen, Abbasi Dakić, Pavle Zoltan, Alwahab Dhulfiqar Department of Programming Languages and Compilers Faculty of Informatics Eötvös Loránd University 1/C Pázmány Péter st. BudapestH-1117 Hungary Faculty of Informatics and Computing Singidunum University Danijelova 32 Belgrade Serbia Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava Ilkovičova 2 Bratislava842 16 Slovakia
In this study, we present a straightforward teaching strategy for teaching the Python programming language. Our method emphasizes a clear progression from fundamental to sophisticated concepts. Beginning with a thorou... 详细信息
来源: 评论
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext
收藏 引用
Frontiers of Computer Science 2025年 第2期19卷 133-135页
作者: Lejun ZHANG Bo ZHANG Ran GUO Zhujun WANG Guopeng WANG Jing QIU Shen SU Yuan LIU Guangxia XU Zhihong TIAN Sergey GATAULLIN Cyberspace Institute Advanced Technology Guangzhou UniversityGuangzhou 510006China Research and Development Center for E-Learning Ministry of EducationBeijing 100039China College of Information Engineering Yangzhou UniversityYangzhou 225009China School Math and Computer Science Quanzhou Normal UniversityQuanzhou 362000China Pazhou Lab Guangzhou 510330China School of Physics and Materials Science Guangzhou UniversityGuangzhou 510006China Central Economic and Mathematics Institute Russian Academy of SciencesMoscow 117418Russia Industrial Programming Department MIREA-Russian Technological UniversityMoscow 119454Russia
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods ... 详细信息
来源: 评论