咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 30 篇 期刊文献

馆藏范围

  • 72 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 理学
    • 21 篇 物理学
    • 16 篇 数学
    • 15 篇 生物学
    • 4 篇 系统科学
    • 3 篇 统计学(可授理学、...
  • 32 篇 工学
    • 27 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 14 篇 生物工程
    • 10 篇 信息与通信工程
    • 9 篇 生物医学工程(可授...
    • 5 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 安全科学与工程
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 法学
    • 6 篇 社会学
    • 3 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 authentication
  • 4 篇 feature extracti...
  • 3 篇 support vector m...
  • 3 篇 image segmentati...
  • 3 篇 crime
  • 3 篇 classification a...
  • 3 篇 machine learning...
  • 3 篇 denial-of-servic...
  • 2 篇 chaotic systems
  • 2 篇 neural networks
  • 2 篇 training
  • 1 篇 sensor nodes
  • 1 篇 iris recognition
  • 1 篇 computer science
  • 1 篇 features selecti...
  • 1 篇 surveys
  • 1 篇 scalability
  • 1 篇 bioinformatic sy...
  • 1 篇 intrusions of ba...
  • 1 篇 bibliographies

机构

  • 8 篇 informatics inst...
  • 6 篇 informatics inst...
  • 3 篇 department of co...
  • 3 篇 university of te...
  • 3 篇 baghdad iraq
  • 3 篇 college of scien...
  • 3 篇 iraqi commission...
  • 3 篇 informatics inst...
  • 3 篇 computer science...
  • 2 篇 department of me...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of te...
  • 2 篇 university of in...
  • 2 篇 university of in...
  • 2 篇 informatics inst...
  • 2 篇 informatics inst...
  • 2 篇 informatics inst...
  • 2 篇 informatics inst...

作者

  • 4 篇 maysaa h. abdula...
  • 4 篇 farhan alaa k.
  • 3 篇 abdalrdha zainab...
  • 3 篇 hoomod haider k.
  • 3 篇 al-bakry abbas m...
  • 3 篇 abdulameer maysa...
  • 3 篇 naif jolan rokan
  • 2 篇 alsaeedi ali hak...
  • 2 篇 khalid a. hussei...
  • 2 篇 muhammed saleh m...
  • 2 篇 hadi suha mohamm...
  • 2 篇 alkhayyat ahmed
  • 2 篇 jolan rokan naif
  • 2 篇 abdullah mahmood...
  • 2 篇 yas ruwaida m.
  • 2 篇 alaa k. farhan
  • 2 篇 jaber mustafa mu...
  • 2 篇 soukaena h hashe...
  • 2 篇 mahmood z. abdul...
  • 2 篇 huda h ali

语言

  • 58 篇 英文
  • 14 篇 其他
  • 1 篇 斯洛文尼亚文
  • 1 篇 中文
检索条件"机构=Informatics Institute for Post-Graduation Studies Iraqi Commission for Computer & informatics"
72 条 记 录,以下是1-10 订阅
排序:
Behavior Analysis of Machine Learning Algorithms for Botnets Detection  5
Behavior Analysis of Machine Learning Algorithms for Botnets...
收藏 引用
5th International Conference on Information Technology, Applied Mathematics and Statistics, ICITAMS 2023
作者: Ali, Huda H. Yas, Ruwaida M. Abdulameer, Maysaa H. Baghdad Iraq Informatics Institute For Post-Graduation Studies Iraqi Commission For Computer & Informatic Baghdad Iraq
Botnets constitute a significant cybersecurity threat becoming increasingly sophisticated and challenging to detect. In addition, they are used for various illegal activities, such as spreading viruses, conducting DDo... 详细信息
来源: 评论
Enhanced Cancer Subclassification Using Multi-Omics Clustering and Quantum Cat Swarm Optimization
Iraqi Journal for Computer Science and Mathematics
收藏 引用
iraqi Journal for computer Science and Mathematics 2024年 第3期5卷 552-582页
作者: Ali, Ali Mahmoud Mohammed, Mazin Abed Informatics Institute for Postgraduate Studies Iraqi Commission for Computers & Informatics Baghdad Iraq Department of Artificial Intelligence College of Computer Science and Information Technology University of Anbar Anbar31001 Iraq
Integrating multiple omics data can significantly improve the accuracy of cancer subclassification, a challenging task due to the high dimensionality and limited sample sizes. The integration of these data sets can en... 详细信息
来源: 评论
A Comparative Study of Text Classification using Artificial Intelligence Models  4
A Comparative Study of Text Classification using Artificial ...
收藏 引用
4th International Conference on Current Research in Engineering and Science Applications, ICCRESA 2022
作者: Abdulameer, Maysaa H. Abdullah, Mahmood Z. Informatics Institute for Post-Graduation Studies Iraqi Commission for Computer & informatics Baghdad Iraq College of Engineering Al-Mustansiriyah University Baghdad Iraq
The presented study provides experiments for carrying out empirical studies related to deep learning, especially convolution networks, concerning novel dataset classification (video and audio). The study will utilize ... 详细信息
来源: 评论
Developing a method to detect driver drowsiness based on a single EEG channel and discriminated features
收藏 引用
International Journal of Intelligent Systems Technologies and Applications 2024年 第1期22卷 29-40页
作者: Hussein, Raed Mohammed George, Loay E. Miften, Firas Sabar Iraqi Commission for Computers and Informatics Informatics Institute of Postgraduate Studies Baghdad Iraq Computer Sciences Department University of Information Technology and Communication Baghdad Iraq Computer Sciences Department College of Education for Pure Science University of Thi-Qar Thi-Qar Iraq
Driver drowsiness is one of the leading causes of road deaths and transportation industry dangers. Due to its direct evaluation of neurophysiological brain activity, electroencephalography (EEG) has been regarded as o... 详细信息
来源: 评论
Efficient Key Management in Lightweight Cryptography: A New Hashing-Based Approach  8
Efficient Key Management in Lightweight Cryptography: A New ...
收藏 引用
8th International Symposium on Multidisciplinary studies and Innovative Technologies, ISMSIT 2024
作者: Al-Mahmood, Haider H. Alsaad, Saad N. Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq University of Mustansiriyah Department of Computer Science College of Science Baghdad Iraq
Lightweight encryption methods are introduced to overcome the challenges of high-power consumption and high memory usage in the traditional cryptography system. The primary goal of the lightweight encryption technique... 详细信息
来源: 评论
A classifier design for micro bubble generators based on deep learning technique
收藏 引用
Materials Today: Proceedings 2023年 80卷 2684-2696页
作者: Qaddoori, Ayman S. Saud, Jamila H. Hamad, F.A. Informatics Institute for Postgraduate Studies Iraqi Commission for Computer and Informatics Baghdad Iraq College of Science Mustansiriyah University Baghdad Iraq School of computing Engineering and Digital Technology Teesside University Middlesbrough United Kingdom
This paper aims to study the sizes of bubbles generated by the micro-bubble generator device (MBGs) in the water because of its impact on the dissolved oxygen percentage in the water and we find this in aquaculture wh... 详细信息
来源: 评论
CNN Hyper-Parameter Optimizer based on Evolutionary Selection and GOW Approach for Crimes Tweet Detection  16
CNN Hyper-Parameter Optimizer based on Evolutionary Selectio...
收藏 引用
16th International Conference on Developments in eSystems Engineering, DeSE 2023
作者: Abdalrdha, Zainab Khyioon Al-Bakry, Abbas Mohsin Farhan, Alaa K. Informatics Institute of Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Baghdad Iraq University of Technology Department of Computer Sciences Baghdad Iraq
Social media is widely utilized for crime, highlighting the need for automated crime detection and prevention systems that can reach a vast audience. There is substantial study on specific social media crimes, but a h... 详细信息
来源: 评论
Improving the CNN Model for Arabic Crime Tweet Detection Based on an Intelligent Dictionary  16
Improving the CNN Model for Arabic Crime Tweet Detection Bas...
收藏 引用
16th International Conference on Developments in eSystems Engineering, DeSE 2023
作者: Abdalrdha, Zainab Khyioon Al-Bakry, Abbas Mohsin Farhan, Alaa K. Informatics Institute of Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Baghdad Iraq University of Technology Department of Computer Sciences Baghdad Iraq
Rising crime rates in Iraq and the Arab World pose significant challenges for law enforcement, exacerbated by vast data on criminal activity, technological advances, and high population density. This research aims to ... 详细信息
来源: 评论
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM  3rd
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Khaleel, Thura Jabbar Shiltagh, Nadia Adnan Iraqi Commission for Computers and Information/Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Engineering Department College of Engineering University of Baghdad Baghdad Iraq
Protecting software-defined networking (SDN) against cyber-attacks has become crucial in an expanding digital threat environment. Distributed Denial-of-Service (DDoS) attacks are risky since they may seriously interru... 详细信息
来源: 评论
EAMSA 512: New 512 Bits Encryption Algorithm Based on Modified SALSA20
Iraqi Journal for Computer Science and Mathematics
收藏 引用
iraqi Journal for computer Science and Mathematics 2023年 第2期4卷 131-142页
作者: Naif, Jolan Rokan Ahmed, Israa S. Zaki, Nashwan Dheyaa Hoomod, Haider K. Informatic Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq University of Information Technology and Communications Baghdad Iraq Computer Science Department College of Education Mustanisiryah University Baghdad Iraq
This paper presents the 512-bit encryption algorithm based on modified SALSA20 using an 11-dimensional chaotic system used for generating the keys for the proposed encryption algorithm. Chaotic keys are derived from a... 详细信息
来源: 评论