咨询与建议

限定检索结果

文献类型

  • 33 篇 会议
  • 12 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 51 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 18 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 7 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 水利工程
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 船舶与海洋工程
    • 1 篇 农业工程
    • 1 篇 生物医学工程(可授...
  • 14 篇 理学
    • 5 篇 数学
    • 3 篇 物理学
    • 3 篇 生物学
    • 2 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 海洋科学
    • 1 篇 地质学
  • 8 篇 管理学
    • 5 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
  • 2 篇 农学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学

主题

  • 6 篇 artificial intel...
  • 4 篇 dipper throated ...
  • 3 篇 information syst...
  • 3 篇 grey wolf optimi...
  • 3 篇 database managem...
  • 3 篇 feature selectio...
  • 3 篇 information stor...
  • 2 篇 intrusion detect...
  • 2 篇 metaheuristics
  • 2 篇 computational in...
  • 2 篇 data mining and ...
  • 2 篇 user interfaces ...
  • 2 篇 computer imaging...
  • 2 篇 convolutional ne...
  • 1 篇 power demand
  • 1 篇 internet of thin...
  • 1 篇 signal detection
  • 1 篇 support vector m...
  • 1 篇 dataset balancin...
  • 1 篇 interoperability

机构

  • 7 篇 department of sy...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 tashkent univers...
  • 3 篇 department of co...
  • 3 篇 research group p...
  • 3 篇 department of in...
  • 3 篇 gorgany nature r...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 national technic...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 computer enjinee...
  • 2 篇 kharkiv national...
  • 2 篇 university of in...
  • 2 篇 national technic...

作者

  • 6 篇 mostafa abotaleb
  • 6 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 doaa sami khafag...
  • 4 篇 henning christia...
  • 3 篇 troels andreasen
  • 3 篇 nataliia khatsko
  • 3 篇 reem alkanhel
  • 3 篇 allamuratova zam...
  • 3 篇 svitlana gavryle...
  • 2 篇 petrashchuk yaro...
  • 2 篇 sergii lysenko
  • 2 篇 ernazar reypnaza...
  • 2 篇 halimjon khujama...
  • 2 篇 goriushkina a.e.
  • 2 篇 khujamatov halim...
  • 2 篇 zamira allamurat...
  • 2 篇 zavolodko g.e.
  • 2 篇 hryha volodymyr

语言

  • 50 篇 英文
  • 1 篇 其他
检索条件"机构=Information Systems and Computer Programming Department"
51 条 记 录,以下是11-20 订阅
排序:
The two year curriculum in computer programming at Purdue University Calumet campus  79
The two year curriculum in Computer Programming at Purdue Un...
收藏 引用
Proceedings of the tenth SIGCSE technical symposium on computer science education
作者: A. J. Adams John Maniotes Information Systems and Computer Programming Department Purdue University Calumet Campus Hammond Indiana
It is the intent of this paper to describe an implementation of a curriculum compatable with the ACM “Curriculum Recommendations and Guide-lines for the Community and Junior College Career Program in computer Program...
来源: 评论
Ensuring information Security in the Intelligent Scientific and Technical information systems  15
Ensuring Information Security in the Intelligent Scientific ...
收藏 引用
15th International Scientific and Practical Conference on Environment. Technology. Resources, ETR 2024
作者: Kerimov, Komil Azizova, Zarina Bekkamov, Fayzi Rakhimov, Mekhriddin Ochilov, Mannon Department of System and Applied Programming Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Information Security Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Library Information Systems Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan Department of Computer Systems Tashkent University of Information Technologies Named after Muhammad al-Khwarizmi Tashkent Uzbekistan
Scientific and scientific-technical information is a valuable tool for the development of education, technology and society as a whole. The increase in the volume of information and the development of information netw... 详细信息
来源: 评论
Hydrogeological-Mathematical Model of Formation and Management of Resources and Quality of Fresh Underground Water of the Karakalpak Artesian Basin
Hydrogeological-Mathematical Model of Formation and Manageme...
收藏 引用
2021 International Conference on information Science and Communications Technologies, ICISCT 2021
作者: Seitnazarov, Kuanish Aytanov, Anvar Kojametov, Ermuhammed Asenbaev, Nurbek Nukus Branch of Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Faculty of 'Computer Engineering' Nukus Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of Computer Systems Tashkent Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of Information Computer Technologies and Programming Tashkent Uzbekistan Nukus Branch of Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of Information Security Nukus Uzbekistan
This article discusses the problems of using groundwater resources of the Karakalpak artesian basin. The task of drawing up a geological and mathematical model of the operational resources of groundwater in the Karaka... 详细信息
来源: 评论
Social Engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Pattern Recognition - Applications and Methods  1
收藏 引用
丛书名: Advances in Intelligent systems and Computing
1000年
作者: Pedro Latorre Carmona J. Salvador Sánchez Ana L.N. Fred
来源: 评论
Analysis of Hardware and Software Tools for Implementation of Cognitive Radio Networks
Analysis of Hardware and Software Tools for Implementation o...
收藏 引用
2022 International Conference on information Science and Communications Technologies, ICISCT 2022
作者: Reypnazarov, Ernazar Khujamatov, Halimjon Khasanov, Doston Allamuratova, Zamira Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Tashkent Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi The Computer Enjineering Faculty Tashkent Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of Data Communication Networks and Systems Tashkent Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of Information-Computer Technologies and Programming Tashkent Uzbekistan
This paper analyzes of the hardware and software tools for implementing a cognitive radio network. In particular, software-configurable radio modules, which are considered the main element of the cognitive network, we... 详细信息
来源: 评论
Research of Energy Detection Method in Spectrum Sensing in Cognitive Radio Networks
Research of Energy Detection Method in Spectrum Sensing in C...
收藏 引用
2022 International Conference on information Science and Communications Technologies, ICISCT 2022
作者: Reypnazarov, Ernazar Khujamatov, Halimjon Khasanov, Doston Allamuratova, Zamira Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Tashkent Uzbekistan Computer Enjineering Faculty Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Tashkent Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Department of Data Communication Networks and Systems Tashkent Uzbekistan Department of Information-Computer Technologies and Programming Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Tashkent Uzbekistan
This paper presents the threshold value determination model, its implementation algorithm, and the characteristics of the threshold value depending on the probability of false signal detection, developed for the purpo... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论
Comparative analysis of signal processing methods secondary surveillance radar
Comparative analysis of signal processing methods secondary ...
收藏 引用
2018 International Conference on information and Telecommunication Technologies and Radio Electronics, UkrMiCo 2018
作者: Goriushkina, A.E. Svyd, I.V. Zavolodko, G.E. Maistrenko, G.V. National Technical University KhPI NTU KhPI Department of Computer Science and Programming Kharkiv Ukraine Kharkiv National University of Radio Electronics KNURE Dept. Radiotechnologies Information and Communication Systems Kharkiv Ukraine National Technical University KhPI NTU KhPI Department of Information Systems Kharkiv Ukraine Kharkiv National University of Radio Electronics KNURE Department of Electronic Computers Kharkiv Ukraine
In the paper, based on a comparative analysis of the methods of processing time-interval codes used as secondary surveillance radar information signals consisting of a different sequence of performing joint decoding o... 详细信息
来源: 评论
IoT Cyberattack Detection Approach Based on Energy Consumption Analysis
IoT Cyberattack Detection Approach Based on Energy Consumpti...
收藏 引用
IEEE International Conference on Dependable systems, Services and Technologies (DESSERT)
作者: Kira Bobrovnikova Oleg Savenko Sergii Lysenko Ivan Hurman Department of Computer Engineering and Information Systems Khmelnitsky National University Khmelnitsky Ukraine Department of Computer Engineering and System Programming Khmelnitsky National University Khmelnitsky Ukraine
Today, the Internet of Things has been widely used and is becoming an increasingly vital part in various areas of human activity, which helps to effectively solve various real-life tasks and problems. The infrastructu... 详细信息
来源: 评论