咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 12 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 5 篇 生物工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 农业工程
    • 1 篇 环境科学与工程(可...
  • 13 篇 理学
    • 6 篇 物理学
    • 5 篇 数学
    • 4 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 大气科学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 2 篇 fuzzy logic
  • 2 篇 lighting
  • 2 篇 virtual reality
  • 1 篇 complex networks
  • 1 篇 intrusion detect...
  • 1 篇 metals
  • 1 篇 programming prof...
  • 1 篇 airfoils
  • 1 篇 reinforcement le...
  • 1 篇 support vector m...
  • 1 篇 sustainable deve...
  • 1 篇 space vehicles
  • 1 篇 object oriented ...
  • 1 篇 safety
  • 1 篇 human computer i...
  • 1 篇 systematics
  • 1 篇 security of data
  • 1 篇 bmi
  • 1 篇 embedded systems
  • 1 篇 neural networks

机构

  • 4 篇 department of sy...
  • 3 篇 department of in...
  • 3 篇 department of sy...
  • 3 篇 mart learning ed...
  • 2 篇 university of ap...
  • 2 篇 department of sy...
  • 2 篇 department of th...
  • 2 篇 department of sy...
  • 2 篇 tashkent univers...
  • 2 篇 faculty of ecomo...
  • 2 篇 department of ha...
  • 2 篇 sulaiman al-rajh...
  • 2 篇 department of co...
  • 1 篇 tashkent state t...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of fo...
  • 1 篇 ss jain subodh a...
  • 1 篇 queen elizabeth ...

作者

  • 3 篇 kerimov komil
  • 3 篇 hayek ali
  • 3 篇 boercsoek josef
  • 3 篇 josef boercsoek
  • 3 篇 azizova zarina
  • 2 篇 jose javier serr...
  • 2 篇 daou roy abi zei...
  • 2 篇 azizbek khaitov
  • 2 篇 olmedo jose javi...
  • 2 篇 roy abi zeid dao...
  • 2 篇 ali hayek
  • 1 篇 a s epikhin
  • 1 篇 t g elizarova
  • 1 篇 tikhonov alexey
  • 1 篇 bakhrom kabulov
  • 1 篇 abi zeid daou ro...
  • 1 篇 marysheva l.t
  • 1 篇 evtushenko tatia...
  • 1 篇 y. yamamoto
  • 1 篇 kumar manish

语言

  • 34 篇 英文
检索条件"机构=Department of System and Applied Programming"
34 条 记 录,以下是1-10 订阅
排序:
Search for new technical solutions when designing color measuring systems
Search for new technical solutions when designing color meas...
收藏 引用
2019 International Conference on Information Science and Communications Technologies, ICISCT 2019
作者: Marysheva, L.T. Isxakova, N.P. Latipova, N.X. Khaitov, Azizbek Tashkent University of Information Technologies Department of System and Applied Programming Tashkent100 200 Uzbekistan
To search for new technical solutions when designing color measuring systems, we need a design object, i.e. to divide color measuring device into fragments, and solutions are sought for these fragments separately. At ... 详细信息
来源: 评论
Rapidly prototyping implementation infrastructure of Domain Specific Languages: A semantics-based approach
Rapidly prototyping implementation infrastructure of Domain ...
收藏 引用
20th Annual ACM Symposium on applied Computing
作者: Wang, Qian Gupta, Gopal Applied Logic Programming-Languages and System Lab Department of Computer Science University of Texas Dallas
Domain Specific Languages (DSLs) are high level languages designed for solving problems in a particular domain, and have been suggested as means for developing reliable software systems. However, designing of a domain... 详细信息
来源: 评论
Machine learning methods as a tool for diagnostic and prognostic research in cardiovascular disease
Machine learning methods as a tool for diagnostic and progno...
收藏 引用
2021 International Conference on Information Science and Communications Technologies, ICISCT 2021
作者: Khidirova, Charos Sadikova, Shakhnoza Mukhsinov, Shamil Nashvandova, Gulrukhsor Mirzaeva, Sarvinoz Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of System and Applied Programming Tashkent Uzbekistan Tashkent State Technical University Department of Information Processing and Control Systems Tashkent Uzbekistan
Machine learning (ML) methods are the main tool of artificial intelligence, the use of which makes it possible to automate the processing and analysis of big data, to reveal hidden or non-obvious patterns on this basi... 详细信息
来源: 评论
Adaptive Model for Protection of Electronic Resources against Information Security Threats  15
Adaptive Model for Protection of Electronic Resources agains...
收藏 引用
15th International Scientific and Practical Conference on Environment. Technology. Resources, ETR 2024
作者: Kerimov, Komil Azizova, Zarina Department of System and Applied Programming Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Information Security Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan
The rapid development of digitalization and the creation of electronic resources, in areas such as e-commerce, government portals and others leads to the actualization of data protection issues. The protection of elec... 详细信息
来源: 评论
Methodology of Information Security Risk Assessment of Electronic Resources under Unauthorized Access Threats  15
Methodology of Information Security Risk Assessment of Elect...
收藏 引用
15th International Scientific and Practical Conference on Environment. Technology. Resources, ETR 2024
作者: Kerimov, Komil Azizova, Zarina Department of System and Applied Programming Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Information Security Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan
The article proposes a methodology for assessing the risk of information security of a computer network based on the results of the analysis of vulnerability attributes and protection attributes of information system ... 详细信息
来源: 评论
AI methods of control for distributed space systems: a review  8
AI methods of control for distributed space systems: a revie...
收藏 引用
8th Scientific School "Dynamics of Complex Networks and their Applications", DCNA 2024
作者: Granichin, Oleg Tikhonov, Alexey Ivanskiy, Yury Kopylova, Kseniia Department of System Programming Saint Petersburg State University Saint Petersburg Russia Department of Theory and Applied Mechanics Saint Petersburg State University Saint Petersburg Russia Faculty of Ecomonic Cybernetics Saint Petersburg State University Saint Petersburg Russia
The paper is a short review of the problems arising in control of distributed systems of spacecraft due to different kinds of uncertainties and of various AI-based approaches to deal with them. The considered uncertai... 详细信息
来源: 评论
Vision-Based Metal Oxide Semiconductor Transistor-Level Layout Error Classification Using EfficientNet Model
Vision-Based Metal Oxide Semiconductor Transistor-Level Layo...
收藏 引用
2020 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2020
作者: Ilagan, Lorena Concepcion Ii, Ronnie Cabatuan, Melvin Roque, Christian University of Perpetual Help System DALTA Electronics Engineering Department Las Pinãs City Philippines De la Salle University Electronics and Communications Engineering Department Manila Philippines Center for Applied Microelectronics and Programming Inc. Muntinlupa City Philippines
In response to the emerging challenges of providing intelligent dynamic integrated circuit (IC) layout checking, computer vision in IC design and constraint engineering highlights the opportunities of computational in... 详细信息
来源: 评论
Applications of Fuzzy Logic in Recruitment systems
Applications of Fuzzy Logic in Recruitment Systems
收藏 引用
2022 International Conference on Information Science and Communications Technologies, ICISCT 2022
作者: Medetova, Kunduz Sultanov, Djamshid Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of System and Applied Programming Tashkent Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of Hardware and Software of Management Systems in Telcommunications Tashkent Uzbekistan
This paper presents methods for solving problems using the method of fuzzy logic. This method serves to study the characteristics of determining the level of compliance of a candidate for an existing vacant position. ... 详细信息
来源: 评论
Calculating methodology for information characteristics on chemical preprojection
Calculating methodology for information characteristics on c...
收藏 引用
2019 International Conference on Information Science and Communications Technologies, ICISCT 2019
作者: Gulyamov, Shuxrat Manapovich Zaynutdinova, Mastura Bahadirovna Khojieva, Nasiba Jumabaevna Tashkent State Technical University Doctor of Technical Sciences Tashkent Uzbekistan Tashkent University of Information Technologies Candidate of Technical Sciences Tashkent Uzbekistan Tashkent University of Information Technologies Applicant of the Department 'System and Applied Programming' Tashkent Uzbekistan
In order to introduce generalized assessments of the degree of perfection of technological schemes of chemical-technological systems, the basic information characteristics of chemical-technological systems that can be... 详细信息
来源: 评论
Optimizing neural network architecture using Tikhonov regularization parameter for intrusion detection systems and classification of attacks
Optimizing neural network architecture using Tikhonov regula...
收藏 引用
2008 International Conference on Information and Knowledge Engineering, IKE 2008
作者: Sharawi, Marwa S. Sammany, Mohammed El-Beltagy, Mohammed Saroit, Imane Faculty of Informatics and Computer Science British University in Egypt Cairo Egypt Department of Applied Mathematics and Programming Aleppo University Aleppo Syria Department of Decision Support System Faculty of Computers and Information Cairo University Cairo Egypt Department of Information Technology Faculty of Computers and Information Cairo University Cairo Egypt
Network Intrusion Detection systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be re... 详细信息
来源: 评论