咨询与建议

限定检索结果

文献类型

  • 84 篇 会议
  • 43 篇 期刊文献

馆藏范围

  • 127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 74 篇 理学
    • 33 篇 物理学
    • 31 篇 数学
    • 20 篇 生物学
    • 9 篇 系统科学
    • 8 篇 统计学(可授理学、...
  • 57 篇 工学
    • 43 篇 计算机科学与技术...
    • 34 篇 软件工程
    • 19 篇 生物工程
    • 17 篇 信息与通信工程
    • 17 篇 生物医学工程(可授...
    • 9 篇 控制科学与工程
    • 8 篇 光学工程
    • 7 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
  • 23 篇 管理学
    • 15 篇 图书情报与档案管...
    • 9 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 10 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
    • 8 篇 药学(可授医学、理...
  • 7 篇 法学
    • 6 篇 社会学
    • 3 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学

主题

  • 7 篇 feature extracti...
  • 4 篇 support vector m...
  • 4 篇 image segmentati...
  • 4 篇 authentication
  • 4 篇 training
  • 3 篇 chaotic systems
  • 3 篇 neural networks
  • 3 篇 wireless sensor ...
  • 3 篇 crime
  • 3 篇 classification a...
  • 3 篇 machine learning...
  • 3 篇 denial-of-servic...
  • 2 篇 sensor nodes
  • 2 篇 learning systems
  • 2 篇 ophthalmology
  • 2 篇 informatics
  • 2 篇 image edge detec...
  • 2 篇 wireless communi...
  • 2 篇 education
  • 2 篇 buildings

机构

  • 24 篇 informatics inst...
  • 7 篇 iraqi commission...
  • 6 篇 uruk university ...
  • 6 篇 university of in...
  • 6 篇 informatics inst...
  • 6 篇 iraqi commission...
  • 5 篇 informatics inst...
  • 5 篇 baghdad iraq
  • 5 篇 iraqi commission...
  • 5 篇 department of el...
  • 5 篇 informatics inst...
  • 4 篇 information inst...
  • 4 篇 uruk university ...
  • 4 篇 university of in...
  • 4 篇 iraqi commission...
  • 3 篇 iraqi commission...
  • 3 篇 communication en...
  • 3 篇 university of in...
  • 3 篇 department of co...
  • 3 篇 university of te...

作者

  • 5 篇 waleed al-jawher
  • 5 篇 al-jawher waleed
  • 4 篇 maysaa h. abdula...
  • 4 篇 al-jawher waleed...
  • 4 篇 farhan alaa k.
  • 3 篇 al-shamma omran
  • 3 篇 omran al-shamma
  • 3 篇 abdalrdha zainab...
  • 3 篇 amer s. el-ameer
  • 3 篇 sakran ammar abd...
  • 3 篇 hoomod haider k.
  • 3 篇 al-bakry abbas m...
  • 3 篇 jaber mustafa mu...
  • 3 篇 el-ameer amer s.
  • 3 篇 abdulameer maysa...
  • 3 篇 jassim mustafa m...
  • 3 篇 naif jolan rokan
  • 2 篇 alsaeedi ali hak...
  • 2 篇 khalid a. hussei...
  • 2 篇 muhammed saleh m...

语言

  • 107 篇 英文
  • 20 篇 其他
  • 1 篇 斯洛文尼亚文
  • 1 篇 中文
检索条件"机构=Iraqi Commission for Computer and Informatics/Informatics Institute for Postgraduate Studies"
127 条 记 录,以下是31-40 订阅
排序:
Early Prediction of Chronic Heart Disease Based on Electronic Triage Dataset by using Machine Learning
Early Prediction of Chronic Heart Disease Based on Electroni...
收藏 引用
2023 Al-Sadiq International Conference on Communication and Information Technology, AICCIT 2023
作者: Muhammed, Saleh Mahdi Abdul-Majeed, Ghassan Mahmoud, Mahmoud Shuker Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Department of Computer Science Baghdad Iraq University of Baghdad College of Engineering Department of Computer Science Baghdad Iraq Al/Mansour University College Department of Communications Baghdad Iraq
Chronic Heart Disease (CHD) is the main reason for mortality around the world, constituting about 15% of all natural deaths, which confirms the importance of early detection to mitigate these rates. CHD can be detecte... 详细信息
来源: 评论
Student Abnormal Behavior Detection Using Dlib Combined With YOLO Models
Student Abnormal Behavior Detection Using Dlib Combined With...
收藏 引用
2022 International Conference on Intelligent Technology, System and Service for Internet of Everything, ITSS-IoE 2022
作者: Alkhalisy, Muhanad Abdul Elah Abd, Saad Hameed Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Al-Mansur University College Department of Computer Science Baghdad Iraq
In the last years, educational technology has advanced tremendously. To better serve their students, schools and universities are moving online. AI-based proctoring solutions have also grabbed the industry, and online... 详细信息
来源: 评论
Secure Wireless Sensor Network Authentication by Utilized Modified SHA3 Hash Algorithm
Secure Wireless Sensor Network Authentication by Utilized Mo...
收藏 引用
2022 International Conference on Data Science and Intelligent Computing, ICDSIC 2022
作者: Jafer, Azhar Sadiq Hussein, Khalid A. Naif, Jolan Rokan College of Education Mustanisiryah University Department of Computer Science Baghdad Iraq Iraqi Commission for Computers & Informatics Informatics Institute for Postgraduate Studies Baghdad Iraq
Wireless Sensor Network is an integration between software and hardware network that makes use a number of sensors to identify physical phenomena. However, WSN is easily attacked by attackers because WSNs uses wireles... 详细信息
来源: 评论
Weighting Heart Disease Criteria Using Multi-Criteria Decision-Making
Weighting Heart Disease Criteria Using Multi-Criteria Decisi...
收藏 引用
2023 Al-Sadiq International Conference on Communication and Information Technology, AICCIT 2023
作者: Muhammed, Saleh Mahdi Abdul-Majeed, Ghassan Mahmoud, Mahmoud Shuker Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Department of Computer Science Baghdad Iraq University of Baghdad College of Engineering Department of Computer Science Baghdad Iraq Al-Mansour University College Department of Communications Baghdad Iraq
Heart disease describes a group of conditions that affect the heart and there are many different factors including lifestyle, medical history, family history, and so on that may cause this complex disease. It is there... 详细信息
来源: 评论
The Effects of Weather Conditions on Data Transmission in Free Space for Wireless Sensor Networks  3rd
The Effects of Weather Conditions on Data Transmission in Fr...
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Kadhim, Aqeel A. Naif, Jolan R. Salman, Muna M. Hoomod, Haider K. Computer Techniques Engineering Department Imam AlKadhim University College Baghdad Iraq Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Information Technology Directorate Ministry of Science and Technology Baghdad Iraq College of Education Computer Science Department Al-Mustansiriya University Baghdad Iraq
It is necessary to collect data measured in open lands, whether for example for monitoring purposes or for border protection. The process of data transmission from active nodes and its next level to the cluster head (... 详细信息
来源: 评论
A proactive grey wolf optimization for improving bioinformatic systems with high dimensional data
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第8期16卷 4797-4814页
作者: Alsaeedi, Ali Hakem Al-Shammary, Dhiah Hadi, Suha Mohammed Ahmed, Khandakar Ibaida, Ayman AlKhazraji, Nooruldeen College of Computer Science and Information Technology University of Al-Qadisiyah Diwaniyah Iraq Informatics Institute for Postgraduate Studies Iraqi Commission for Computer and Informatics Baghdad Iraq Intelligent Technology Innovation Lab Victoria University Melbourne VIC Australia Digital Department of America’s Land Schlumberger Technology Corporation Sugar Land 77478 TX United States Footscray Australia
This paper introduces a new methodology for optimization problems, combining the Grey Wolf Optimizer (GWO) with Simi-stochastic search processes. Intelligent optimizations represent an advanced approach in machine lea... 详细信息
来源: 评论
New Cloud Computing Authentication Based on Secure Hash Algorithm (SHA-3) and Lightweight Sosemanuk Algorithm  1
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Niaf, Jolan Rokan Kadhim, Aqeel Kamil Mohammed, Qutaiba Humadi Hoomod, Haider K. Salman, Muna Muhsen Iraqi Commission for Computers & Informatics Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Techniques Engineering Department Imam Al-Kadhim College Baghdad Iraq College of Nursing University of Baghdad Baghdad Iraq College of Education Al-Mustansiriyah University Baghdad Iraq Ministry of Science and Technology Department of Information Technology Baghdad Iraq
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of... 详细信息
来源: 评论
A Comparative Study of Text Classification using Artificial Intelligence Models  4
A Comparative Study of Text Classification using Artificial ...
收藏 引用
4th International Conference on Current Research in Engineering and Science Applications, ICCRESA 2022
作者: Abdulameer, Maysaa H. Abdullah, Mahmood Z. Informatics Institute for Post-Graduation Studies Iraqi Commission for Computer & informatics Baghdad Iraq College of Engineering Al-Mustansiriyah University Baghdad Iraq
The presented study provides experiments for carrying out empirical studies related to deep learning, especially convolution networks, concerning novel dataset classification (video and audio). The study will utilize ... 详细信息
来源: 评论
Efficient Key Management in Lightweight Cryptography: A New Hashing-Based Approach
Efficient Key Management in Lightweight Cryptography: A New ...
收藏 引用
International Symposium on Multidisciplinary studies and Innovative Technologies (ISMSIT)
作者: Haider H. Al-Mahmood Saad N. Alsaad Computer Science Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Department of Computer Science College of Science University of Mustansiriyah Baghdad Iraq
Lightweight encryption methods are introduced to overcome the challenges of high-power consumption and high memory usage in the traditional cryptography system. The primary goal of the lightweight encryption technique... 详细信息
来源: 评论
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
Construct an Efficient DDoS Attack Detection System Based on...
收藏 引用
2022 iraqi International Conference on Communication and Information Technologies, IICCIT 2022
作者: Ghurkan, Dhurgham Kareem Abdulrahman, Amer A. Middle Technical University Informatics Institute for Post Graduate Studies Iraqi Commission for Computers and Informatics Technical Institute-Suwaira Dept of Computer Baghdad Iraq Dept. of Computer Baghdad Iraq
Distributed Denial of Service (DDoS) attacks are intended to drain network resources and increase malicious traffic. This paper describes the mechanism and methods of DDoS attacks. By studying and analyzing a data set... 详细信息
来源: 评论