咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 30 篇 期刊文献

馆藏范围

  • 72 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 理学
    • 21 篇 物理学
    • 16 篇 数学
    • 15 篇 生物学
    • 4 篇 系统科学
    • 3 篇 统计学(可授理学、...
  • 32 篇 工学
    • 27 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 14 篇 生物工程
    • 10 篇 信息与通信工程
    • 9 篇 生物医学工程(可授...
    • 5 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 安全科学与工程
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 7 篇 法学
    • 6 篇 社会学
    • 3 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 authentication
  • 4 篇 feature extracti...
  • 3 篇 support vector m...
  • 3 篇 image segmentati...
  • 3 篇 crime
  • 3 篇 classification a...
  • 3 篇 machine learning...
  • 3 篇 denial-of-servic...
  • 2 篇 chaotic systems
  • 2 篇 neural networks
  • 2 篇 training
  • 1 篇 sensor nodes
  • 1 篇 iris recognition
  • 1 篇 computer science
  • 1 篇 features selecti...
  • 1 篇 surveys
  • 1 篇 scalability
  • 1 篇 bioinformatic sy...
  • 1 篇 intrusions of ba...
  • 1 篇 bibliographies

机构

  • 8 篇 informatics inst...
  • 6 篇 informatics inst...
  • 3 篇 department of co...
  • 3 篇 university of te...
  • 3 篇 baghdad iraq
  • 3 篇 college of scien...
  • 3 篇 iraqi commission...
  • 3 篇 informatics inst...
  • 3 篇 computer science...
  • 2 篇 department of me...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of te...
  • 2 篇 university of in...
  • 2 篇 university of in...
  • 2 篇 informatics inst...
  • 2 篇 informatics inst...
  • 2 篇 informatics inst...
  • 2 篇 informatics inst...

作者

  • 4 篇 maysaa h. abdula...
  • 4 篇 farhan alaa k.
  • 3 篇 abdalrdha zainab...
  • 3 篇 hoomod haider k.
  • 3 篇 al-bakry abbas m...
  • 3 篇 abdulameer maysa...
  • 3 篇 naif jolan rokan
  • 2 篇 alsaeedi ali hak...
  • 2 篇 khalid a. hussei...
  • 2 篇 muhammed saleh m...
  • 2 篇 hadi suha mohamm...
  • 2 篇 alkhayyat ahmed
  • 2 篇 jolan rokan naif
  • 2 篇 abdullah mahmood...
  • 2 篇 yas ruwaida m.
  • 2 篇 alaa k. farhan
  • 2 篇 jaber mustafa mu...
  • 2 篇 soukaena h hashe...
  • 2 篇 mahmood z. abdul...
  • 2 篇 huda h ali

语言

  • 58 篇 英文
  • 14 篇 其他
  • 1 篇 斯洛文尼亚文
  • 1 篇 中文
检索条件"机构=Informatics Institute for Post-Graduation Studies Iraqi Commission for Computer & informatics"
72 条 记 录,以下是11-20 订阅
排序:
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
Construct an Efficient DDoS Attack Detection System Based on...
收藏 引用
2022 iraqi International Conference on Communication and Information Technologies, IICCIT 2022
作者: Ghurkan, Dhurgham Kareem Abdulrahman, Amer A. Middle Technical University Informatics Institute for Post Graduate Studies Iraqi Commission for Computers and Informatics Technical Institute-Suwaira Dept of Computer Baghdad Iraq Dept. of Computer Baghdad Iraq
Distributed Denial of Service (DDoS) attacks are intended to drain network resources and increase malicious traffic. This paper describes the mechanism and methods of DDoS attacks. By studying and analyzing a data set... 详细信息
来源: 评论
Bird Image Dataset Classification using Deep Convolutional Neural Network Algorithm
Bird Image Dataset Classification using Deep Convolutional N...
收藏 引用
Data Science and Intelligent Computing (ICDSIC), International Conference on
作者: Maysaa H. Abdulameer Huda W. Ahmed Israa S. Ahmed Informatics Institute for Post-Graduation Studies (IIPS) Iraqi Commission for Computer& Informatics (ICCI) Baghdad Iraq
The conventional system that is now in place was majorly used in practical problems, especially in classification problems such as lack of adaptability, weak classification accuracy, and unsatisfying results. Deep Lea... 详细信息
来源: 评论
Early Prediction of Chronic Heart Disease Based on Electronic Triage Dataset by using Machine Learning
Early Prediction of Chronic Heart Disease Based on Electroni...
收藏 引用
2023 Al-Sadiq International Conference on Communication and Information Technology, AICCIT 2023
作者: Muhammed, Saleh Mahdi Abdul-Majeed, Ghassan Mahmoud, Mahmoud Shuker Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Department of Computer Science Baghdad Iraq University of Baghdad College of Engineering Department of Computer Science Baghdad Iraq Al/Mansour University College Department of Communications Baghdad Iraq
Chronic Heart Disease (CHD) is the main reason for mortality around the world, constituting about 15% of all natural deaths, which confirms the importance of early detection to mitigate these rates. CHD can be detecte... 详细信息
来源: 评论
Weighting Heart Disease Criteria Using Multi-Criteria Decision-Making
Weighting Heart Disease Criteria Using Multi-Criteria Decisi...
收藏 引用
2023 Al-Sadiq International Conference on Communication and Information Technology, AICCIT 2023
作者: Muhammed, Saleh Mahdi Abdul-Majeed, Ghassan Mahmoud, Mahmoud Shuker Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Department of Computer Science Baghdad Iraq University of Baghdad College of Engineering Department of Computer Science Baghdad Iraq Al-Mansour University College Department of Communications Baghdad Iraq
Heart disease describes a group of conditions that affect the heart and there are many different factors including lifestyle, medical history, family history, and so on that may cause this complex disease. It is there... 详细信息
来源: 评论
Student Abnormal Behavior Detection Using Dlib Combined With YOLO Models
Student Abnormal Behavior Detection Using Dlib Combined With...
收藏 引用
2022 International Conference on Intelligent Technology, System and Service for Internet of Everything, ITSS-IoE 2022
作者: Alkhalisy, Muhanad Abdul Elah Abd, Saad Hameed Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Al-Mansur University College Department of Computer Science Baghdad Iraq
In the last years, educational technology has advanced tremendously. To better serve their students, schools and universities are moving online. AI-based proctoring solutions have also grabbed the industry, and online... 详细信息
来源: 评论
Secure Wireless Sensor Network Authentication by Utilized Modified SHA3 Hash Algorithm
Secure Wireless Sensor Network Authentication by Utilized Mo...
收藏 引用
2022 International Conference on Data Science and Intelligent Computing, ICDSIC 2022
作者: Jafer, Azhar Sadiq Hussein, Khalid A. Naif, Jolan Rokan College of Education Mustanisiryah University Department of Computer Science Baghdad Iraq Iraqi Commission for Computers & Informatics Informatics Institute for Postgraduate Studies Baghdad Iraq
Wireless Sensor Network is an integration between software and hardware network that makes use a number of sensors to identify physical phenomena. However, WSN is easily attacked by attackers because WSNs uses wireles... 详细信息
来源: 评论
Implementing a Modified Low-complexity U-Net Model for Segmenting Brain Tumors
Implementing a Modified Low-complexity U-Net Model for Segme...
收藏 引用
2023 Al-Sadiq International Conference on Communication and Information Technology, AICCIT 2023
作者: Al-Murshidawy, Mawj Abdul-Ameer Al-Shamma, Omran Information Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Department of Computer Science Baghdad Iraq University of Information Technology and Communications Scientific Affairs Department Baghdad Iraq
Accurate segmenting of brain tumors has become a challenge recently. Manual segmentation needs experts with high skills and takes a long time. This challenge motivates several researchers to introduce various models t... 详细信息
来源: 评论
Behavior Analysis of Machine Learning Algorithms for Botnets Detection
Behavior Analysis of Machine Learning Algorithms for Botnets...
收藏 引用
Information Technology, Applied Mathematics and Statistics (ICITAMS), International Conference on
作者: Huda H. Ali Ruwaida M. Yas Maysaa H. Abdulameer Computer Engneering Techneques Imam Al-Kadhum College (IKC) Baghdad Iraq Informatics Institute for Post-Graduation Studies Iraqi Commission for Computer & Informatic Baghdad Iraq
Botnets constitute a significant cybersecurity threat becoming increasingly sophisticated and challenging to detect. In addition, they are used for various illegal activities, such as spreading viruses, conducting DDo... 详细信息
来源: 评论
The Effects of Weather Conditions on Data Transmission in Free Space for Wireless Sensor Networks  3rd
The Effects of Weather Conditions on Data Transmission in Fr...
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Kadhim, Aqeel A. Naif, Jolan R. Salman, Muna M. Hoomod, Haider K. Computer Techniques Engineering Department Imam AlKadhim University College Baghdad Iraq Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Information Technology Directorate Ministry of Science and Technology Baghdad Iraq College of Education Computer Science Department Al-Mustansiriya University Baghdad Iraq
It is necessary to collect data measured in open lands, whether for example for monitoring purposes or for border protection. The process of data transmission from active nodes and its next level to the cluster head (... 详细信息
来源: 评论
A proactive grey wolf optimization for improving bioinformatic systems with high dimensional data
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第8期16卷 4797-4814页
作者: Alsaeedi, Ali Hakem Al-Shammary, Dhiah Hadi, Suha Mohammed Ahmed, Khandakar Ibaida, Ayman AlKhazraji, Nooruldeen College of Computer Science and Information Technology University of Al-Qadisiyah Diwaniyah Iraq Informatics Institute for Postgraduate Studies Iraqi Commission for Computer and Informatics Baghdad Iraq Intelligent Technology Innovation Lab Victoria University Melbourne VIC Australia Digital Department of America’s Land Schlumberger Technology Corporation Sugar Land 77478 TX United States Footscray Australia
This paper introduces a new methodology for optimization problems, combining the Grey Wolf Optimizer (GWO) with Simi-stochastic search processes. Intelligent optimizations represent an advanced approach in machine lea... 详细信息
来源: 评论