咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 85 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 238 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 161 篇 工学
    • 122 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 24 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 电气工程
    • 11 篇 生物工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 化学工程与技术
    • 7 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 网络空间安全
    • 4 篇 动力工程及工程热...
  • 107 篇 理学
    • 71 篇 数学
    • 19 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 16 篇 生物学
    • 10 篇 物理学
    • 6 篇 化学
  • 37 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 17 篇 工商管理
    • 11 篇 图书情报与档案管...
  • 13 篇 医学
    • 11 篇 临床医学
    • 10 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 8 篇 artificial intel...
  • 5 篇 support vector m...
  • 4 篇 computer science
  • 4 篇 reliability
  • 4 篇 neural networks
  • 4 篇 monitoring
  • 4 篇 decision making
  • 4 篇 dipper throated ...
  • 4 篇 artificial neura...
  • 3 篇 grey wolf optimi...
  • 3 篇 computer archite...
  • 3 篇 computational in...
  • 3 篇 optimization
  • 3 篇 decision trees
  • 3 篇 middleware
  • 3 篇 functional progr...
  • 2 篇 covid-19
  • 2 篇 fuzzy logic
  • 2 篇 intrusion detect...
  • 2 篇 software systems

机构

  • 16 篇 department of sy...
  • 10 篇 department of ap...
  • 7 篇 department of ma...
  • 6 篇 programming meth...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 6 篇 computer techniq...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 department of ap...
  • 3 篇 department of ap...
  • 3 篇 zuse institute b...
  • 3 篇 university of tw...
  • 3 篇 rwth aachen univ...
  • 3 篇 programming meth...

作者

  • 9 篇 maiti manoranjan
  • 8 篇 mostafa abotaleb
  • 8 篇 pal madhumangal
  • 8 篇 abdelhameed ibra...
  • 7 篇 abotaleb mostafa
  • 5 篇 pal anita
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 de meuter wolfga...
  • 5 篇 doaa sami khafag...
  • 4 篇 choe km
  • 4 篇 bergstra j.a.
  • 4 篇 hayek ali
  • 4 篇 dybjer peter
  • 4 篇 van cutsem tom
  • 4 篇 anita pal
  • 4 篇 el-kenawy el-say...
  • 4 篇 d'hondt theo
  • 4 篇 madhumangal pal
  • 3 篇 sarkar biswajit

语言

  • 232 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Department of computer technology and programming"
238 条 记 录,以下是11-20 订阅
排序:
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2677-2693页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io... 详细信息
来源: 评论
Social Engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Application-based spam detection with machine learning algorithms  27
Application-based spam detection with machine learning algor...
收藏 引用
27th International Conference on Information Society and University Studies, IVUS 2022
作者: Erbey, Ali Barışçı, Necaattin Uşak University Distance Education Vocational School Department of Computer Programming Uşak Turkey Gazi University Faculty of Technology Department of Computer Engineering Ankara Turkey
We investigated the process of unsupervised generative learning and the structure of informative generative representations of images of handwritten digits (MNIST dataset). Learning models with the architecture of spa... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论
Educational Research Trends of the Use of Gaze Learning Data Through Topic Modeling and Scientometric Analysis  1st
Educational Research Trends of the Use of Gaze Learning D...
收藏 引用
1st International workshop on AI for Research, AI4Research 2024 and 4th International workshop on Democracy and AI, DemocrAI 2024, held in conjunction with 33rd International Joint Conference on Artificial Intelligence, IJCAI 2024
作者: Lee, Jungmin Shin, Huigon Yoo, YoungJoon Choi, Jongwon Kim, Mi Song Department of Advanced Imaging GSAIM Chung-Ang University Seoul Korea Republic of Computer Programming and Analysis School of Information Technology Fanshawe College London Canada Department of Artificial Intelligence Chung-Ang University Seoul Korea Republic of Curriculum Studies Western University London Canada
Multimodal learning analytics have become increasingly important in enabling a deeper understanding of teaching and learning in educational research. However, in comparison to other multimodal learning data, there is ... 详细信息
来源: 评论
PREDICTION OF HEART DISEASE USING CLASSIFICATION AND FEATURE SELECTION METHODS  17
PREDICTION OF HEART DISEASE USING CLASSIFICATION AND FEATURE...
收藏 引用
17th International Symposium on Operational Research in Slovenia, SOR 2023
作者: Akarçay Pervin, Özlem Yapici Pehlivan, Nimet Weber, Gerhard Wilhelm KTO Karatay University Department of Computer Programming Konya Turkey Selçuk University Department of Statistics Konya Turkey Poznan University of Technology Poznan Poland Middle East Technical University Institute of Applied Mathematics Ankara Turkey
Heart disease, known as cardiovascular disease has been one of the main causes of death worldwide in recent years. It is affected by various risk factors such as high blood pressure, high cholesterol, diabetes, smokin... 详细信息
来源: 评论
Evaluating Keyphrase Extraction Methods for Clustering Influenza-Related Scientific Papers  8
Evaluating Keyphrase Extraction Methods for Clustering Influ...
收藏 引用
8th International Iranian Conference on Signal Processing and Intelligent Systems, ICSPIS 2022
作者: Forghani, Majid Firstkov, Artyom Alyannezhadi, Mohammad. M. Forghani, Kazem Krasovskii Institute of Mathematics & Mechanics Mathematical Programming Lab. Yekaterinburg Russia University of Science and Technology of Mazandaran Department of Science Behshahr Iran Iran University of Science and Technology Computer Science Department Tehran Iran
The number of annual scientific publications is growing year by year, which has led to the accumulation and formation of large databases. This increases the complexity of the search for relevant articles. Modern searc... 详细信息
来源: 评论
A Zero-Watermarking Algorithm for Use in RGB and Monochrome Images
A Zero-Watermarking Algorithm for Use in RGB and Monochrome ...
收藏 引用
Advanced technology (KhPIWeek), IEEE KhPI Week on
作者: Vadym Poddubnyi Roman Gvozdov Oleksandr Sievierinov Vladyslav Sukhoteplyi Serhii Bulba Dmytro Lysytsia Department of of information technology security Kharkiv National University of Radio Electronic Kharkiv Ukraine Department of Computer Engineering and Programming Ivan Kozhedub Kharkiv National Air Force University Kharkiv Ukraine Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ... 详细信息
来源: 评论
Advanced IOT Traffic Light Control System  5
Advanced IOT Traffic Light Control System
收藏 引用
5th International Conference on Advances in Computational Tools for Engineering Applications, ACTEA 2023
作者: Hamad, Martin Abou El Hajj, Antonio Daou, Roy Abi Zeid Hayek, Ali Haidar, Gaby Abou Lebanese German University Faculty of Public Health Biomedical Technologies Department Lebanon MART Learning Education and Research Center Lebanon University of Kassel Department of Computer Architecture and System Programming Kassel Germany American University of Science and Technology Engineering Faculty Zahle Lebanon
For several years, traffic congestion has been a major problem in big cities where the number of cars and different means of transportation has been increasing significantly. The problem of congestion is becoming more... 详细信息
来源: 评论
Optimizing Machine Learning Algorithms to Enhance Blood Donation for Liver Patients: A Case Study  7
Optimizing Machine Learning Algorithms to Enhance Blood Dona...
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Mijwil, Maad M. El-Kenawy, El-Sayed M. Bala, Indu Aljanabi, Mohammad Abotaleb, Mostafa Ibrahim, Abdelhameed Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt School of Electrical and Electronics Engineering Lovely Professional University Punjab India Department of Computer Aliraqia University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune... 详细信息
来源: 评论