咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 14 篇 期刊文献

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 16 篇 计算机科学与技术...
    • 15 篇 软件工程
    • 5 篇 船舶与海洋工程
    • 4 篇 土木工程
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 3 篇 生物工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
  • 12 篇 理学
    • 5 篇 海洋科学
    • 4 篇 物理学
    • 3 篇 生物学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 大气科学
    • 1 篇 系统科学
  • 4 篇 医学
    • 4 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 4 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 4 篇 dipper throated ...
  • 3 篇 grey wolf optimi...
  • 3 篇 monitoring
  • 2 篇 metaheuristics
  • 2 篇 software
  • 2 篇 feature selectio...
  • 2 篇 computer vision
  • 1 篇 power demand
  • 1 篇 internet of thin...
  • 1 篇 intrusion detect...
  • 1 篇 computer circuit...
  • 1 篇 natural language...
  • 1 篇 trojan horses
  • 1 篇 support vector m...
  • 1 篇 dataset balancin...
  • 1 篇 object oriented ...
  • 1 篇 lstm
  • 1 篇 smart city
  • 1 篇 safety
  • 1 篇 intelligent agen...

机构

  • 11 篇 department of sy...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 3 篇 department of in...
  • 3 篇 gorgany nature r...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of in...
  • 2 篇 vasyl stefanyk p...
  • 2 篇 computer vision ...
  • 2 篇 department of co...

作者

  • 8 篇 mostafa abotaleb
  • 8 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 doaa sami khafag...
  • 3 篇 el-sayed m. el-k...
  • 3 篇 reem alkanhel
  • 3 篇 oleg savenko
  • 3 篇 ibrahim abdelham...
  • 3 篇 el-kenawy el-say...
  • 3 篇 abotaleb mostafa
  • 3 篇 mijwil maad m.
  • 2 篇 maad m. mijwil
  • 2 篇 petrashchuk yaro...
  • 2 篇 sergii lysenko
  • 2 篇 indu bala
  • 2 篇 hryha volodymyr
  • 2 篇 aljanabi mohamma...
  • 2 篇 mohammad aljanab...
  • 2 篇 savenko oleg

语言

  • 41 篇 英文
检索条件"机构=Department of System Programming and Specialized Computer Systems"
41 条 记 录,以下是1-10 订阅
排序:
Al-Biruni Earth Radius Optimization for COVID-19 Forecasting
收藏 引用
computer systems Science & Engineering 2023年 第7期46卷 883-896页
作者: El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Tatiana Makarovskikh Amal H.Alharbi Doaa Sami Khafaga Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura University35516MansouraEgypt Department of System Programming South Ural State University454080ChelyabinskRussia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve... 详细信息
来源: 评论
Social Engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4531-4545页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu... 详细信息
来源: 评论
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2695-2709页
作者: Reem Alkanhel Doaa Sami Khafaga El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science University of Engineering and TechnologyTaxilaPakistan Department of System Programming South Ural State UniversityChelyabinsk454080Russia
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw... 详细信息
来源: 评论
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2677-2693页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io... 详细信息
来源: 评论
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论
Research of Neural Network Methods of Visual Defectoscopy of Metal Structures
Research of Neural Network Methods of Visual Defectoscopy of...
收藏 引用
2023 International Conference on Industrial Engineering, Applications and Manufacturing, ICIEAM 2023
作者: Chernikov, Alexander Smirnova, Elena Zhavoronkov, Oleg Peter the Great St. Petersburg Polytechnic University Higher School of Automation and Robotics St. Petersburg Russia Saint Petersburg State University Department of System Programming St. Petersburg Russia Computer Vision Systems Llc St. Petersburg Russia
The production of metal pipes is an important component of metallurgy and the entire industry as a whole. Traditional surface quality control is carried out by human inspectors, which is unsatisfactory due to low prod... 详细信息
来源: 评论
Ensuring Information Security in the Intelligent Scientific and Technical Information systems  15
Ensuring Information Security in the Intelligent Scientific ...
收藏 引用
15th International Scientific and Practical Conference on Environment. Technology. Resources, ETR 2024
作者: Kerimov, Komil Azizova, Zarina Bekkamov, Fayzi Rakhimov, Mekhriddin Ochilov, Mannon Department of System and Applied Programming Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Information Security Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Library Information Systems Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Computer Systems Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan
Scientific and scientific-technical information is a valuable tool for the development of education, technology and society as a whole. The increase in the volume of information and the development of information netw... 详细信息
来源: 评论
Optimizing Machine Learning Algorithms to Enhance Blood Donation for Liver Patients: A Case Study  7
Optimizing Machine Learning Algorithms to Enhance Blood Dona...
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Mijwil, Maad M. El-Kenawy, El-Sayed M. Bala, Indu Aljanabi, Mohammad Abotaleb, Mostafa Ibrahim, Abdelhameed Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt School of Electrical and Electronics Engineering Lovely Professional University Punjab India Department of Computer Aliraqia University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune... 详细信息
来源: 评论
Sensing Metric-Based Hybrid Underlay/Overlay Transmission Framework for CR-IoT Networks for Smart City Applications  7
Sensing Metric-Based Hybrid Underlay/Overlay Transmission Fr...
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Bala, Indu Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Ibrahim, Abdelhameed School of Electrical and Electronics Engineering Lovely Professional University Punjab India Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
With the increasing number of IoT devices, there is a growing need for bandwidth to support their communication. Unfortunately, there is a shortage of available bandwidth due to preallocated bands for various services... 详细信息
来源: 评论