咨询与建议

限定检索结果

文献类型

  • 242 篇 会议
  • 56 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 114 篇 计算机科学与技术...
    • 90 篇 软件工程
    • 22 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 18 篇 生物医学工程(可授...
    • 17 篇 安全科学与工程
    • 16 篇 电气工程
    • 14 篇 生物工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 光学工程
    • 6 篇 土木工程
    • 5 篇 动力工程及工程热...
    • 5 篇 交通运输工程
  • 91 篇 理学
    • 42 篇 数学
    • 30 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 12 篇 系统科学
    • 4 篇 化学
    • 4 篇 海洋科学
  • 45 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 16 篇 医学
    • 14 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 6 篇 教育学
    • 6 篇 教育学
  • 4 篇 法学
  • 4 篇 农学
  • 3 篇 经济学

主题

  • 14 篇 software
  • 10 篇 training
  • 8 篇 forecasting
  • 7 篇 computer archite...
  • 7 篇 neural networks
  • 7 篇 monitoring
  • 6 篇 safety
  • 6 篇 static analysis
  • 6 篇 machine learning
  • 6 篇 hardware
  • 6 篇 testing
  • 6 篇 mathematical mod...
  • 5 篇 tools
  • 5 篇 software quality
  • 4 篇 information syst...
  • 4 篇 reliability
  • 4 篇 registers
  • 4 篇 support vector m...
  • 4 篇 programming
  • 4 篇 automation

机构

  • 30 篇 department of sy...
  • 25 篇 department of co...
  • 13 篇 department of co...
  • 8 篇 computer techniq...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 mart learning ed...
  • 5 篇 computer enginee...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of fo...
  • 5 篇 department of co...
  • 5 篇 department of in...
  • 5 篇 universitat kass...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 university of ka...
  • 4 篇 information comm...
  • 4 篇 department of sy...

作者

  • 19 篇 abotaleb mostafa
  • 16 篇 mostafa abotaleb
  • 14 篇 josef börcsök
  • 12 篇 ali hayek
  • 10 篇 börcsök josef
  • 10 篇 hayek ali
  • 10 篇 boercsoek josef
  • 9 篇 yevtushenko nina
  • 9 篇 el-kenawy el-say...
  • 9 篇 roy abi zeid dao...
  • 8 篇 makarovskikh tat...
  • 8 篇 abdelhameed ibra...
  • 7 篇 daou roy abi zei...
  • 7 篇 oleg savenko
  • 7 篇 tetiana hovorush...
  • 6 篇 el-sayed m. el-k...
  • 6 篇 hovorushchenko t...
  • 6 篇 krini abderrahim
  • 6 篇 savenko oleg
  • 5 篇 el-sayed m.el-ke...

语言

  • 294 篇 英文
  • 3 篇 中文
  • 1 篇 俄文
  • 1 篇 其他
检索条件"机构=Department of System Programming"
299 条 记 录,以下是111-120 订阅
排序:
A filtered tuning method for a GPC controller
A filtered tuning method for a GPC controller
收藏 引用
IET Irish Signals and systems Conference (ISSC 2010)
作者: M.H. Schwarz C.S. Cox J. Börcsök Department of Computer architecture and System programming Safety Computer Technology University of Kassel Germany Control Systems Centre University of Sunderland UK Department of Computer architecture and System programming University of Kassel Germany
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas ex...
来源: 评论
Forming the logical conclusion about sufficiency of information of software requirements specification for software quality assessment by ISO 25010:2011
Forming the logical conclusion about sufficiency of informat...
收藏 引用
IEEE Ukraine Conference on Electrical and Computer Engineering (UKRCON)
作者: Tetiana Hovorushchenko Computer Engineering & System Programming Department Khmelnitsky National University Khmelnitsky Ukraine
The aim of this study is the development of the method of generating and filling the template of ontology for the quality of the concrete software and method of forming the logical conclusion about the sufficiency of ... 详细信息
来源: 评论
The Unknown Component Problem: Theory and Applications
收藏 引用
2007年
作者: Tiziano Villa Robert King Brayton Alan Mishchenko Alexandre F Petrenko Alberto Luigi Sangiovanni-Vincentelli Nina V Yevtushenko
来源: 评论
Design of a low cost equipment that may limit Sudden Infant Death Syndrome  4
Design of a low cost equipment that may limit Sudden Infant ...
收藏 引用
4th International Conference on Advances in Biomedical Engineering, ICABME 2017
作者: Daou, Roy Abi Zeid Maalouf, Frederic Geagea, Christian Hayek, Ali Boercsoek, Josef Lebanese German University Faculty of Public Health Biomedical Technologies Department Sahel-Alma Lebanon MART Learning Education and Research Center Chananiir Lebanon Department of Computer Architecture and System Programming University of Kassel Kassel Germany
This paper deals with the Sudden Infant Death Syndrome (SIDS) problem. The main objective is to limit it by controlling the main reasons that may lead to it. Sudden infant death syndrome is the death without specific ... 详细信息
来源: 评论
A Cyberattacks Detection Technique Based on Evolutionary Algorithms
A Cyberattacks Detection Technique Based on Evolutionary Alg...
收藏 引用
IEEE International Conference on Dependable systems, Services and Technologies (DESSERT)
作者: Sergii Lysenko Kira Bobrovnikova Roman Shchuka Oleg Savenko Department of Computer Engineering and System Programming Khmelnitsky National University Khmelnitsky Ukraine
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on ...
来源: 评论
Adaptive Model for Protection of Electronic Resources against Information Security Threats  15
Adaptive Model for Protection of Electronic Resources agains...
收藏 引用
15th International Scientific and Practical Conference on Environment. Technology. Resources, ETR 2024
作者: Kerimov, Komil Azizova, Zarina Department of System and Applied Programming Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Information Security Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan
The rapid development of digitalization and the creation of electronic resources, in areas such as e-commerce, government portals and others leads to the actualization of data protection issues. The protection of elec... 详细信息
来源: 评论
Runtime Verification of Linux Kernel Modules Based on Call Interception
Runtime Verification of Linux Kernel Modules Based on Call I...
收藏 引用
International Conference on Software Testing, Verification, and Validation, ICST
作者: Vladimir V. Rubanov Eugene A. Shatokhin Department of Software Engineering Institute of System Programming of the Russian Academy of Sciences Moscow Russia
Verification of Linux kernel modules and especially device drivers is a critically important task. However, due to the special nature of the kernel operation, it is very challenging to perform runtime analysis of part... 详细信息
来源: 评论
The Lecturers’ Inter-University Collaboration during IT-Training Courses
The Lecturers’ Inter-University Collaboration during IT-Tra...
收藏 引用
IEEE Conference on Quality Management, Transport and Information Security, Information Technologies (IT&MQ&IS)
作者: Natalia V. Dneprovskaya Svetlana Kulikova Vyacheslav V. Zolotarev Inessa V. Shevtsova Department of Information System Management and Programming Plekhanov Russian University of Economics Moscow Russia
Increasing requirements to the content and form of higher education in conditions of digital economy set new tasks for professors: formation of applied competences, the involvement of students in project activities, p... 详细信息
来源: 评论
Understanding of Data De-identification: Issues of Relevance and Problems
Understanding of Data De-identification: Issues of Relevance...
收藏 引用
2021 International Conference on Information Science and Communications Technologies, ICISCT 2021
作者: Ganiev, Abdukhalil A. Kerimov, Kamil F. Azizova, Zarina I. Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of Information Security Tashkent Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of System and Application Programming Tashkent Uzbekistan
This paper presents the process of data anonymisation and de-identification, the use of de-identification techniques as a means of data protection, and analyses de-identification and their relevance to the tasks they ... 详细信息
来源: 评论
Emotions simulation in methodology of autonomous adaptive control
Emotions simulation in methodology of autonomous adaptive co...
收藏 引用
IEEE International Symposium on Intelligent Control (ISIC)
作者: A.A. Zhdanov A.N. Yinokurov Simulation Systems Department Institute for System Programming Russian Academy of Science Moscow Russia
We offer a standpoint that emotions are a necessary mechanism for autonomous control systems. By an autonomous controlled object we understand an object, that is controlled by a control system which is its on-board su... 详细信息
来源: 评论