咨询与建议

限定检索结果

文献类型

  • 33 篇 会议
  • 12 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 51 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 18 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 7 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 水利工程
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 船舶与海洋工程
    • 1 篇 农业工程
    • 1 篇 生物医学工程(可授...
  • 14 篇 理学
    • 5 篇 数学
    • 3 篇 物理学
    • 3 篇 生物学
    • 2 篇 系统科学
    • 1 篇 大气科学
    • 1 篇 海洋科学
    • 1 篇 地质学
  • 8 篇 管理学
    • 5 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
  • 2 篇 农学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学

主题

  • 6 篇 artificial intel...
  • 4 篇 dipper throated ...
  • 3 篇 information syst...
  • 3 篇 grey wolf optimi...
  • 3 篇 database managem...
  • 3 篇 feature selectio...
  • 3 篇 information stor...
  • 2 篇 intrusion detect...
  • 2 篇 metaheuristics
  • 2 篇 computational in...
  • 2 篇 data mining and ...
  • 2 篇 user interfaces ...
  • 2 篇 computer imaging...
  • 2 篇 convolutional ne...
  • 1 篇 power demand
  • 1 篇 internet of thin...
  • 1 篇 signal detection
  • 1 篇 support vector m...
  • 1 篇 dataset balancin...
  • 1 篇 interoperability

机构

  • 7 篇 department of sy...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 4 篇 tashkent univers...
  • 3 篇 department of co...
  • 3 篇 research group p...
  • 3 篇 department of in...
  • 3 篇 gorgany nature r...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 national technic...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 computer enjinee...
  • 2 篇 kharkiv national...
  • 2 篇 university of in...
  • 2 篇 national technic...

作者

  • 6 篇 mostafa abotaleb
  • 6 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 doaa sami khafag...
  • 4 篇 henning christia...
  • 3 篇 troels andreasen
  • 3 篇 nataliia khatsko
  • 3 篇 reem alkanhel
  • 3 篇 allamuratova zam...
  • 3 篇 svitlana gavryle...
  • 2 篇 petrashchuk yaro...
  • 2 篇 sergii lysenko
  • 2 篇 ernazar reypnaza...
  • 2 篇 halimjon khujama...
  • 2 篇 goriushkina a.e.
  • 2 篇 khujamatov halim...
  • 2 篇 zamira allamurat...
  • 2 篇 zavolodko g.e.
  • 2 篇 hryha volodymyr

语言

  • 50 篇 英文
  • 1 篇 其他
检索条件"机构=Information Systems and Computer Programming Department"
51 条 记 录,以下是31-40 订阅
排序:
A proposal of an example and experiments repository to foster industrial adoption of formal methods  8th
A proposal of an example and experiments repository to foste...
收藏 引用
8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2018
作者: Schlick, Rupert Felderer, Michael Majzik, Istvan Nardone, Roberto Raschke, Alexander Snook, Colin Vittorini, Valeria Center for Digital Safety and Security AIT Austrian Institute of Technology GmbH Vienna Austria Department of Computer Science University of Innsbruck Innsbruck Austria Department of Software Engineering Blekinge Institute of Technology Karlskrona Sweden Department of Measurement and Information Systems Budapest University of Technology and Economics Budapest Hungary University of Naples Federico II Naples Italy Institute of Software Engineering and Programming Languages Ulm University Ulm Germany Electronics and Computer Science University of Southampton Southampton United Kingdom
Formal methods (in a broad sense) have been around almost since the beginning of computer science. Nonetheless, there is a perception in the formal methods community that take-up by industry is low considering the pot... 详细信息
来源: 评论
Method of Detection of Intrusions Based on Stacking Meta-Algorithm
Method of Detection of Intrusions Based on Stacking Meta-Alg...
收藏 引用
Advanced Technology (KhPIWeek), IEEE KhPI Week on
作者: Svitlana Gavrylenko Vladislav Zozulia Nataliia Khatsko Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Department Information Systems and Technologies National Technical University «Kharkiv Polytechnic Institute» Kharkiv Ukraine
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, develo... 详细信息
来源: 评论
Methods for Improving the Quality of Classification on Imbalanced Data
Methods for Improving the Quality of Classification on Imbal...
收藏 引用
Advanced Technology (KhPIWeek), IEEE KhPI Week on
作者: Svitlana Gavrylenko Zozulia Vladislav Nataliia Khatsko Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Department of Information Systems and Technologies National Technical University «Kharkiv Polytechnic Institute» Kharkiv Ukraine
The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate method...
来源: 评论
Using Natural Version Redundancy of FPGA Projects in Area of Critical Applications
Using Natural Version Redundancy of FPGA Projects in Area of...
收藏 引用
IEEE International Conference on Dependable systems, Services and Technologies (DESSERT)
作者: Oleksandr Drozd Vitaliy Romankevich Mykola Kuznietsov Myroslav Drozd Oleksandr Martynyuk Department of Computer Intelligent Systems and Networks Odessa National Polytechnic University Odessa Ukraine System programming and specialized computer systems National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" Kyiv Ukraine Department of Information Systems Odessa National Polytechnic University Odessa Ukraine
The paper focuses on the role of version redundancy, which increases with the expansion of critical applications and the tightening of their functional safety requirements. International standards governing these requ...
来源: 评论
Word-Based Turkish Lip Reading System with Two Stream 3dcnn and Bilstm
SSRN
收藏 引用
SSRN 2023年
作者: Erbey, Ali Barışçı, Necaattin Department of Computer Programming Distance Education Vocational School Usak University Usak64200 Turkey Department of Information Systems Informatics Institute Gazi University Ankara Turkey Department of Computer Engineering Faculty of Technology Gazi University Ankara06500 Turkey
Lip reading is a technique that aims to understand spoken words by analyzing people's lip movements. Deep learning algorithms are used as a powerful tool for detecting and recognizing lip movements more accurately... 详细信息
来源: 评论
Advanced computer-Aided Optimization of Quartz Resonator-Based Sensors
Advanced Computer-Aided Optimization of Quartz Resonator-Bas...
收藏 引用
International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH)
作者: Volodymyr Savchenko Oksana Mnushka Oleg Sokulskyi Computer Engineering and Programming Department National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Information Systems and Technologies Department National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” Kyiv Ukraine
In this study, we present an improved approach to optimizing the parameters of sensor sensing elements using quartz resonators with an interelectrode gap. We combine graphical and analytical methods to solve the multi... 详细信息
来源: 评论
Impact of fluctuation interferences to the responders performance of secondary surveillance radar system
Impact of fluctuation interferences to the responders perfor...
收藏 引用
International Conference on Radio Electronics & Info Communications (UkrMiCo)
作者: I.V. Svyd A.E. Goriushkina G.E. Zavolodko O.S. Maltsev Dept. Radiotechnologies Information and Communication Systems Kharkiv National University of Radio Electronics KNURE Kharkiv Ukraine Department of Computer science and Programming National Technical University «KhPI» NTU «KhPI» Kharkiv Ukraine Department of Information Systems National Technical University «KhPI» NTU «KhPI» Kharkiv Ukraine
The principle of network construction and the principle of request signals service of Secondary surveillance radar systems predetermined the work of the respondents of the considered systems in conditions of intra-sys...
来源: 评论
Algorithmic Support for Building a Distributed IoT System in a Cloud Service
Algorithmic Support for Building a Distributed IoT System in...
收藏 引用
Advanced Technology (KhPIWeek), IEEE KhPI Week on
作者: Mykola Zamkovyi Svitlana Gavrylenko Kyrylo Khatsko Nataliia Khatsko dept. Information Systems and Technologies National Technical University «Kharkiv Polytechnic Institute» Kharkiv Ukraine Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine
The Internet of Things (IoT) today already connects billions of different IoT devices with the Internet. With the advent of new services and services, new challenges arise: how to make a cloud service publicly availab...
来源: 评论
Creating a Dynamic Online Learning Environment with AI Integration
Creating a Dynamic Online Learning Environment with AI Integ...
收藏 引用
International computer Sciences and information Technologies (CSIT)
作者: Oleksandra Bulgakova Zarina Viniarska Viacheslav Zosimov P.M Platonov Educational and Scientific Institute of Computer Engineering Automation Robotics and Computer Programming Odesa National University of Technology Odesa Ukraine Department of Applied information systems Taras Shevchenko National University of Kyiv Kyiv Ukraine
Educational, online learning has become a common practice due to rapid digitalization and recent global events. This study focuses on developing a comprehensive online learning platform that addresses users' needs... 详细信息
来源: 评论
Social Engineering Attacks Detection Approach
Social Engineering Attacks Detection Approach
收藏 引用
IEEE International Conference on Dependable systems, Services and Technologies (DESSERT)
作者: Sergii Lysenko Volodymyr Vorobiov Oleksandr Bokhonko Piotr Gaj Oleg Savenko Jacek Wołoszyn Department of Computer Engineering and Information Systems Khmelnitsky National University Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Department of Computer Engineering and System Programming Khmelnitsky National University Khmelnitsky Ukraine Department of Informatics and Teleinformatics Kazimierz Pulaski University of Technology and Humanities in Radom Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
来源: 评论