咨询与建议

限定检索结果

文献类型

  • 93 篇 会议
  • 45 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 84 篇 工学
    • 62 篇 计算机科学与技术...
    • 54 篇 软件工程
    • 20 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 10 篇 生物医学工程(可授...
    • 9 篇 电气工程
    • 8 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 3 篇 光学工程
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
  • 50 篇 理学
    • 27 篇 数学
    • 15 篇 物理学
    • 8 篇 生物学
    • 5 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 3 篇 化学
    • 1 篇 大气科学
    • 1 篇 海洋科学
  • 20 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 农学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 8 篇 artificial intel...
  • 6 篇 computational in...
  • 6 篇 software
  • 5 篇 mathematical mod...
  • 4 篇 automation
  • 4 篇 software enginee...
  • 4 篇 dipper throated ...
  • 4 篇 testing
  • 3 篇 decision support...
  • 3 篇 grey wolf optimi...
  • 3 篇 education
  • 3 篇 information tech...
  • 3 篇 learning algorit...
  • 3 篇 reusability
  • 3 篇 production
  • 3 篇 classification a...
  • 3 篇 hardware
  • 2 篇 intrusion detect...
  • 2 篇 information syst...
  • 2 篇 information syst...

机构

  • 13 篇 department of sy...
  • 6 篇 department of in...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 information comm...
  • 4 篇 computer enginee...
  • 3 篇 dept. of informa...
  • 3 篇 university spbpu...
  • 3 篇 faculty of engin...
  • 3 篇 university itmo ...
  • 3 篇 department of sy...
  • 3 篇 department of in...
  • 3 篇 ivannikov instit...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of so...
  • 2 篇 icas institute f...

作者

  • 7 篇 shahnaz n. shahb...
  • 6 篇 mostafa abotaleb
  • 6 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 steffen bernhard
  • 5 篇 doaa sami khafag...
  • 4 篇 gasnikov alexand...
  • 4 篇 abotaleb mostafa
  • 3 篇 reem alkanhel
  • 3 篇 jonsson bengt
  • 3 篇 howar falk
  • 3 篇 valentina emilia...
  • 3 篇 m. abotaleb
  • 2 篇 vladik kreinovic...
  • 2 篇 shahbazova shahn...
  • 2 篇 werner bonath
  • 2 篇 marius mircea ba...
  • 2 篇 a. ali subhi
  • 2 篇 aleksander spiva...

语言

  • 145 篇 英文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 其他
检索条件"机构=Information Technology and Programming"
148 条 记 录,以下是1-10 订阅
排序:
A fault-tolerant scheduling strategy through proactive and clustering techniques for scientific workflows in cloud computing
收藏 引用
Soft Computing 2025年 第2期29卷 755-781页
作者: Farhood, Suha Mubdir Khorsand, Reihaneh Hussein, Nashwan Jasim Ramezanpour, Mohammadreza Branch Islamic Azad University Isfahan Iran Department of Programming Collage of Information Technology University of Babylon Hillah Iraq Department of Computer Engineering Mobarakeh Branch Islamic Azad University Mobarakeh Isfahan Iran
Cloud computing offers solutions for various scientific and business applications. Large-scale scientific applications, which are organized as scientific workflows, are carried out using cloud computing. However, the ... 详细信息
来源: 评论
Renal Tumor Classification and Detection Based on Artificial Intelligence  3
Renal Tumor Classification and Detection Based on Artificial...
收藏 引用
3rd International Conference on Communications, information System, and Data Science, CISDS 2024
作者: Al-Taie, Raflaa Hilmi Hussein, Nashwan J. Physiology and Organ Functions Department College of Medicine University of Babylon Iraq Department of Electrical Power Engineering AL-Hussain University College Department of Programming Collage of Information Technology University of Babylon Iraq
The kidney is a crucial organ in the human body, co-operating billions of pipelines to cleanse the body's water. Kidney failure, renal tumor happens when cells divide uncontrollably and form an aberrant collection... 详细信息
来源: 评论
Optimization of Neural Networks Through Semi-Structured Activation Pruning
Optimization of Neural Networks Through Semi-Structured Acti...
收藏 引用
Wave Electronics and its Application in information and Telecommunication Systems (WECONF)
作者: T. M. Tatarnikova A. S. Raskopina Institute of Information Technology and Programming St. Petersburg State University of Aerospace Instrumentation (SUAI) St. Petersburg Russia
Modern neural networks are becoming deeper and more complex, leading to increased computational costs and the need for powerful hardware. The optimization method through semi-structured pruning of activations allows f... 详细信息
来源: 评论
Educational Research Trends of the Use of Gaze Learning Data Through Topic Modeling and Scientometric Analysis  1st
Educational Research Trends of the Use of Gaze Learning D...
收藏 引用
1st International workshop on AI for Research, AI4Research 2024 and 4th International workshop on Democracy and AI, DemocrAI 2024, held in conjunction with 33rd International Joint Conference on Artificial Intelligence, IJCAI 2024
作者: Lee, Jungmin Shin, Huigon Yoo, YoungJoon Choi, Jongwon Kim, Mi Song Department of Advanced Imaging GSAIM Chung-Ang University Seoul Korea Republic of Computer Programming and Analysis School of Information Technology Fanshawe College London Canada Department of Artificial Intelligence Chung-Ang University Seoul Korea Republic of Curriculum Studies Western University London Canada
Multimodal learning analytics have become increasingly important in enabling a deeper understanding of teaching and learning in educational research. However, in comparison to other multimodal learning data, there is ... 详细信息
来源: 评论
Study of an OPTO-ASIC for a Functionally Safe Speed Sensor Using the Spatial Frequency Filter Method
Study of an OPTO-ASIC for a Functionally Safe Speed Sensor U...
收藏 引用
IEEE Design and Diagnostics of Electronic Circuits and Systems (DDECS)
作者: Frank Wasinski Werner Bonath Ubbo Ricklefs Michael Schwarz Josef Börcsök Dept. of Electrical Engineering and Information Technology THM University of Applied Sciences Giessen Germany ICAS Institute for Computer Architecture and System Programming University of Kassel Kassel Germany
For decades, speed sensors based on the spatial frequency filter method have successfully proven themselves in a wide range of applications. This makes the sensor concept particularly suitable for the area of function... 详细信息
来源: 评论
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext
收藏 引用
Frontiers of Computer Science 2025年 第2期19卷 133-135页
作者: Lejun ZHANG Bo ZHANG Ran GUO Zhujun WANG Guopeng WANG Jing QIU Shen SU Yuan LIU Guangxia XU Zhihong TIAN Sergey GATAULLIN Cyberspace Institute Advanced Technology Guangzhou UniversityGuangzhou 510006China Research and Development Center for E-Learning Ministry of EducationBeijing 100039China College of Information Engineering Yangzhou UniversityYangzhou 225009China School Math and Computer Science Quanzhou Normal UniversityQuanzhou 362000China Pazhou Lab Guangzhou 510330China School of Physics and Materials Science Guangzhou UniversityGuangzhou 510006China Central Economic and Mathematics Institute Russian Academy of SciencesMoscow 117418Russia Industrial Programming Department MIREA-Russian Technological UniversityMoscow 119454Russia
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods ... 详细信息
来源: 评论
STRUCTURE CLASHES - AN ALTERNATIVE TO PROGRAM INVERSION
收藏 引用
COMPUTER JOURNAL 1990年 第2期33卷 126-132页
作者: DROMEY, RG CHORVAT, TA Programming Methodology Research Group Computing and Information Technology Griffith University Nathan Brisbane 4111Australia
A method for handling boundary structure clashes is presented. It provides a simple alternative to Jackson's program inversiontechnique. It is a constructive approach based on the use of prototypes. Development be... 详细信息
来源: 评论
The use of Cryptography in Network Security
The use of Cryptography in Network Security
收藏 引用
9th International Conference on Application of information and Communication Technologies, AICT 2015
作者: Jafarov, Zafar Information Technology and Programming' Department Azerbaijan Technical University Baku Azerbaijan
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software func... 详细信息
来源: 评论
The design of blocks integration tool to support end-user programming
The design of blocks integration tool to support end-user pr...
收藏 引用
2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011
作者: Norhudha Sarif, Siti Idris, Sufian Zin, Abdullah Mohd Programming and Software Technology Research Group Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Malaysia
End-user programming is a term that refers to computer programming carried out by end users who do not necessarily have a background in writing programs in conventional programming languages. There is much interest am... 详细信息
来源: 评论
Story telling approach for Integrating Software Blocks
Story telling approach for Integrating Software Blocks
收藏 引用
2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011
作者: Hariri, Hamizah Mohamad Marini, Abu Bakar Zin, Abdullah Mohd Programming and Software Technology Research Group Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Malaysia
Story telling is a process of conveying events by words, images and sounds. It has been used in every culture as a means of entertainment, education or for instilling moral values. The power of story telling has now b... 详细信息
来源: 评论