咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 14 篇 期刊文献

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 16 篇 计算机科学与技术...
    • 15 篇 软件工程
    • 5 篇 船舶与海洋工程
    • 4 篇 土木工程
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 3 篇 生物工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
  • 12 篇 理学
    • 5 篇 海洋科学
    • 4 篇 物理学
    • 3 篇 生物学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 大气科学
    • 1 篇 系统科学
  • 4 篇 医学
    • 4 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 4 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 4 篇 dipper throated ...
  • 3 篇 grey wolf optimi...
  • 3 篇 monitoring
  • 2 篇 metaheuristics
  • 2 篇 software
  • 2 篇 feature selectio...
  • 2 篇 computer vision
  • 1 篇 power demand
  • 1 篇 internet of thin...
  • 1 篇 intrusion detect...
  • 1 篇 computer circuit...
  • 1 篇 natural language...
  • 1 篇 trojan horses
  • 1 篇 support vector m...
  • 1 篇 dataset balancin...
  • 1 篇 object oriented ...
  • 1 篇 lstm
  • 1 篇 smart city
  • 1 篇 safety
  • 1 篇 intelligent agen...

机构

  • 11 篇 department of sy...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 3 篇 department of in...
  • 3 篇 gorgany nature r...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of in...
  • 2 篇 vasyl stefanyk p...
  • 2 篇 computer vision ...
  • 2 篇 department of co...

作者

  • 8 篇 mostafa abotaleb
  • 8 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 doaa sami khafag...
  • 3 篇 el-sayed m. el-k...
  • 3 篇 reem alkanhel
  • 3 篇 oleg savenko
  • 3 篇 ibrahim abdelham...
  • 3 篇 el-kenawy el-say...
  • 3 篇 abotaleb mostafa
  • 3 篇 mijwil maad m.
  • 2 篇 maad m. mijwil
  • 2 篇 petrashchuk yaro...
  • 2 篇 sergii lysenko
  • 2 篇 indu bala
  • 2 篇 hryha volodymyr
  • 2 篇 aljanabi mohamma...
  • 2 篇 mohammad aljanab...
  • 2 篇 savenko oleg

语言

  • 41 篇 英文
检索条件"机构=Department of System Programming and Specialized Computer Systems"
41 条 记 录,以下是11-20 订阅
排序:
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4531-4545页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu... 详细信息
来源: 评论
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2695-2709页
作者: Reem Alkanhel Doaa Sami Khafaga El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science University of Engineering and TechnologyTaxilaPakistan Department of System Programming South Ural State UniversityChelyabinsk454080Russia
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw... 详细信息
来源: 评论
"MASTAC": New curriculum for master and doctoral studies in critical software and computing
"MASTAC": New curriculum for master and doctoral studies in ...
收藏 引用
30th International Conference on Software Engineering, ICSE 2008 - 2008 International Workshop on Software Engineering in East and South Europe Workshop, SEESE'08
作者: Kharchenko, Vyacheslav Pomorova, Oksana Phillips, Chris Romanovsky, Alexander Popov, Peter Troubitsyna, Elena Department Computer Systems Networks National Aerospace University KhAI Department of System Programming Khmelnitskiy National University School of Computing Science University Newcastle upon Tyne Centre for Software Reliability University Newcastle upon Tyne Centre for Software Reliability City University London Department of Computer Science Åbo Akademi University
The paper presents the on-going EC-funded Tempus project "MSc and PhD studies in Aerospace Critical Computing" executed by the National Aerospace University, Kharkiv, Ukraine with the support of Newcastle Un... 详细信息
来源: 评论
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2677-2693页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io... 详细信息
来源: 评论
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论
Using Natural Version Redundancy of FPGA Projects in Area of Critical Applications
Using Natural Version Redundancy of FPGA Projects in Area of...
收藏 引用
IEEE International Conference on Dependable systems, Services and Technologies (DESSERT)
作者: Oleksandr Drozd Vitaliy Romankevich Mykola Kuznietsov Myroslav Drozd Oleksandr Martynyuk Department of Computer Intelligent Systems and Networks Odessa National Polytechnic University Odessa Ukraine System programming and specialized computer systems National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" Kyiv Ukraine Department of Information Systems Odessa National Polytechnic University Odessa Ukraine
The paper focuses on the role of version redundancy, which increases with the expansion of critical applications and the tightening of their functional safety requirements. International standards governing these requ...
来源: 评论
IoT Cyberattack Detection Approach Based on Energy Consumption Analysis
IoT Cyberattack Detection Approach Based on Energy Consumpti...
收藏 引用
IEEE International Conference on Dependable systems, Services and Technologies (DESSERT)
作者: Kira Bobrovnikova Oleg Savenko Sergii Lysenko Ivan Hurman Department of Computer Engineering and Information Systems Khmelnitsky National University Khmelnitsky Ukraine Department of Computer Engineering and System Programming Khmelnitsky National University Khmelnitsky Ukraine
Today, the Internet of Things has been widely used and is becoming an increasingly vital part in various areas of human activity, which helps to effectively solve various real-life tasks and problems. The infrastructu... 详细信息
来源: 评论
Promising Developments in Cyber Physical system Tools for Background Monitoring of Reserve Landscape  11
Promising Developments in Cyber Physical System Tools for Ba...
收藏 引用
11th International Conference on Advanced computer Information Technologies, ACIT 2021
作者: Nykolaychuk, Yaroslav Grynchychyn, Taras Pitukh, Ihor Petrashchuk, Yaroslav Nykolaychuk, Lyubov Hryha, Volodymyr West Ukrainian National University Department of Specialized Computer Systems Ternopil Ukraine Nadvirna Vocational College by National Transport University Department of Programming and Information Technologies Nadvirna Ukraine Gorgany Nature Reserve Nadvirna Ukraine Ivano-Frankivsk National Technical University of Oil and Gas Department of Social Communication and Law Ivano-Frankivsk Ukraine Vasyl Stefanyk Precarpathian National University Department of Computer Engineering and Electronics Ivano-Frankivsk Ukraine
Experience in designing and building cyber physical interactive distributed monitoring systems for industrial facilities and reserve landscapes is analyzed. Advantages of the existing interactive and dialogue computer... 详细信息
来源: 评论
Structure and Functioning of Information systems of Background Monitoring of Landscape Elements of Gorgany Nature Reserve  10
Structure and Functioning of Information Systems of Backgrou...
收藏 引用
10th International Conference on Advanced computer Information Technologies, ACIT 2020
作者: Nykolaychuk, Yaroslav Petrashchuk, Yaroslav Slobodian, Olena Pitukh, Ihor Grynchyshyn, Taras Nykolaychuk, Lyubov Hryha, Volodymyr Ternopil National Economic University Department of Specialized Computer Systems Ternopil Ukraine Gorgany Nature Reserve Nadvirna Ukraine Nadvirna College by National Transport University Department of Programming and Information Technologies Nadvirna Ukraine Ivano-Frankivsk National Technical University of Oil and Gas Department of Social Communication and Law Ivano-Frankivsk Ukraine Vasyl Stefanyk Precarpathian National University Department of Computer Engineering and Electronics Ivano-Frankivsk Ukraine
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site 'Beech forests of the Carpathians and ancient beech forests of Germany'... 详细信息
来源: 评论
Research of Neural Network Methods of Visual Defectoscopy of Metal Structures
Research of Neural Network Methods of Visual Defectoscopy of...
收藏 引用
2023 International Conference on Industrial Engineering, Applications and Manufacturing, ICIEAM 2023
作者: Chernikov, Alexander Smirnova, Elena Zhavoronkov, Oleg Peter the Great St. Petersburg Polytechnic University Higher School of Automation and Robotics St. Petersburg Russia Saint Petersburg State University Department of System Programming St. Petersburg Russia Computer Vision Systems Llc St. Petersburg Russia
The production of metal pipes is an important component of metallurgy and the entire industry as a whole. Traditional surface quality control is carried out by human inspectors, which is unsatisfactory due to low prod... 详细信息
来源: 评论