咨询与建议

限定检索结果

文献类型

  • 132 篇 会议
  • 44 册 图书

馆藏范围

  • 176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 100 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 26 篇 信息与通信工程
    • 24 篇 生物医学工程(可授...
    • 19 篇 生物工程
    • 14 篇 化学工程与技术
    • 9 篇 电气工程
    • 8 篇 光学工程
    • 7 篇 机械工程
    • 6 篇 控制科学与工程
    • 6 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 网络空间安全
    • 3 篇 轻工技术与工程
  • 65 篇 理学
    • 29 篇 数学
    • 26 篇 生物学
    • 12 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 9 篇 物理学
    • 9 篇 化学
  • 46 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 22 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 20 篇 医学
    • 20 篇 基础医学(可授医学...
    • 20 篇 临床医学
    • 13 篇 公共卫生与预防医...
    • 11 篇 药学(可授医学、理...
  • 7 篇 法学
    • 5 篇 社会学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 1 篇 军事学

主题

  • 38 篇 computational in...
  • 25 篇 artificial intel...
  • 20 篇 data engineering
  • 6 篇 students
  • 5 篇 internet of thin...
  • 5 篇 forecasting
  • 5 篇 mathematical and...
  • 4 篇 covid-19
  • 4 篇 blockchain
  • 3 篇 project manageme...
  • 3 篇 business and man...
  • 3 篇 neural networks
  • 3 篇 authentication
  • 3 篇 sentiment analys...
  • 2 篇 surveys
  • 2 篇 fuzzy logic
  • 2 篇 support vector m...
  • 2 篇 smartphones
  • 2 篇 acceptance tests
  • 2 篇 android malware

机构

  • 8 篇 universiti malay...
  • 8 篇 telkom universit...
  • 4 篇 universiti malay...
  • 4 篇 universiti malay...
  • 4 篇 university of ne...
  • 4 篇 universiti malay...
  • 3 篇 iseg university ...
  • 3 篇 jct college of e...
  • 3 篇 bina nusantara u...
  • 3 篇 universiti malay...
  • 3 篇 universiti malay...
  • 3 篇 muscat college d...
  • 3 篇 department of bu...
  • 3 篇 university of li...
  • 3 篇 sister nivedita ...
  • 2 篇 federal college ...
  • 2 篇 university moham...
  • 2 篇 diponegoro unive...
  • 2 篇 universidad de l...
  • 2 篇 united internati...

作者

  • 7 篇 alvaro rocha
  • 6 篇 álvaro rocha
  • 6 篇 ernawan ferda
  • 4 篇 alexandru tugui
  • 4 篇 narasimha rao va...
  • 4 篇 s. manoharan
  • 3 篇 islam salekul
  • 3 篇 razak mohd faiza...
  • 3 篇 soumi dutta
  • 3 篇 shashi kant gupt...
  • 3 篇 arshah ruzaini a...
  • 3 篇 awang suryanti
  • 3 篇 ramalingam mrith...
  • 3 篇 mohamed rozlina
  • 3 篇 romli awanis
  • 3 篇 rahman nur shams...
  • 3 篇 firdaus ahmad
  • 3 篇 chuin liew siau
  • 3 篇 sallim jamaludin
  • 3 篇 zabidi azlee

语言

  • 176 篇 英文
检索条件"丛书名=Information Systems Engineering and Management"
176 条 记 录,以下是41-50 订阅
排序:
Gender Differences in Computational Thinking Skills among Malaysian's Primary School Students using Visual Programming  7
Gender Differences in Computational Thinking Skills among Ma...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Abdullah, Osmanullrazi Kamaludin, Adzhar Rahman, Nur Shamsiah Abdul University Malaysia Pahang Faculty of Computing Malaysia
Computational Thinking (CT) is a thought process which utilize computer science concepts to solve problem in the real life. One of the methods to develop CT among the Children is by using visual programming to create ... 详细信息
来源: 评论
WiroTomo SourDuino: Instrument for Measuring the Acidic Level of Home-Industry Fruit Juice Production  7
WiroTomo SourDuino: Instrument for Measuring the Acidic Leve...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Pratama, Wahyu Rangga Koo, Genoveva Audrey Annabella Atmojo, Robertas Nugroho Perwiro Telkom University Department of Engineering Physics Bandung-Jawa Barat Indonesia Bina Nusantara University School of Information Systems Department of Information Systems Jakarta Indonesia
The Covid-19 epidemic makes the availability of vitamins and immune-enhancing supplements in Indonesia rare and costly. To deal with this situation, people produce and sell alternative vitamin products and supplements... 详细信息
来源: 评论
Components for COVID19 Outbreak Control Model: A System Dynamics Perspective  7
Components for COVID19 Outbreak Control Model: A System Dyna...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Ibrahim, Aisyah Abdul Kadir, Tuty Asmawaty Daniyal, Hamdan Kamaludin, Adzhar Faculty of Computing College of Computing Applied Sciences Universiti Malaysia Pahang Pahang Pekan Malaysia Faculty of Electrical and Electronic Engineering Technology Universiti Malaysia Pahang Pahang Pekan Malaysia
The world is facing a massive challenge as the COVID-19 outbreak strikes across the globe. Many efforts have been made to detect, control and contain the coronavirus proactively and aggressively before a further catas... 详细信息
来源: 评论
Reversible Face Watermarking Scheme using Hash Function for Tamper Localization and Recovery  7
Reversible Face Watermarking Scheme using Hash Function for ...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Lian, Kiung Siew Chuin, Liew Siau Ernawan, Ferda Universiti Malaysia Pahang Faculty of Computing College of Computing and Applied Sciences Pahang Pekan26600 Malaysia
Recently, since digital cameras are widely used, face recognition has attracted great attention. Face recognition has been used in different fields which are airport security management and IC cards for e-commerce. Fo... 详细信息
来源: 评论
User Authentication Model based on Mobile Phone IMEI Number: A Proposed Method Application for Online Banking System  7
User Authentication Model based on Mobile Phone IMEI Number:...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Hammood, Waleed A. Arshah, Ruzaini Abdullah Mohamad Asmara, Salwana Hammood, Omar A. University Malaysia Pahang Faculty of Computing College of Computing and Applied Sciences Pahang Pekan26600 Malaysia
The conventional banking structure is improved with the incorporation of elements of electronic banking, such as transfers over the counter using bank books, where all transfers can now be carried out through the netw... 详细信息
来源: 评论
Web Engagement Readiness for Program Need Analysis (PNA) in Malaysian Community College  7
Web Engagement Readiness for Program Need Analysis (PNA) in ...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Ahmad, Norita Abdullah, Aziman Jalan Gambang-Maran Kolej Komuniti Paya Besar Gambang Pahang Malaysia Universiti Malaysia Pahang Faculty of Computing College of Computing Applied Sciences Pekan Pahang Malaysia
The purpose of college community is to provide education and training based on the needs of the local community. Before any new educational program can be offered, a program needs analysis (PNA) must be conducted to e... 详细信息
来源: 评论
The Impact of Instagram E-Marketing in SME Fashion Industry on Customer Satisfaction  7
The Impact of Instagram E-Marketing in SME Fashion Industry ...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Sanny, Lim Marselli, Dahlia Effandi, Rorie Simek, Lea Bina Nusantara University Binus Business School Master Program Management Department Jakarta Indonesia
This research explores the impact of e-promotion and e-service quality on consumer satisfaction and effect on repurchase interest. One hundred Instagram users who have purchased fashion products from online SMEs on In... 详细信息
来源: 评论
Improving Messenger Accessibility for Elderly Users using User Centered Design (UCD) Methods (Study Case: WhatsApp)  7
Improving Messenger Accessibility for Elderly Users using Us...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Zahida, Wafa Effendy, Veronikha Hadikusuma, Aristyo Telkom University School of Computing Bandung Indonesia
In Indonesia, the definition of elderly is a person who has reached the age of 60 years and over. In addition to increasing age, the elderly also experience a decrease in perceptual, cognitive, and psychomotor functio... 详细信息
来源: 评论
Speech Emotion Recognition Using 2D-CNN with Data Augmentation  7
Speech Emotion Recognition Using 2D-CNN with Data Augmentati...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Mujaddidurrahman, Auliya Ernawan, Ferda Wibowo, Adi Sarwoko, Eko Adi Sugiharto, Aris Wahyudi, Muhammad Didik Rohmad Diponegoro University Department of Informatics Semarang Indonesia Universiti Malaysia Pahang Faculty of Computing College of Computing and Applied Sciences Pahang Malaysia Universitas Islam Negeri Sunan Kalijaga Yogyakarta Indonesia
Speech emotion recognition becomes a challenging issue, especially interaction between human-machine. Each person expressed their emotions in various ways and the features of speech are still unclear to distinguish be... 详细信息
来源: 评论
Watermarking Scheme based on Chinese Remainder Theorem and Integer Wavelet Filters for Copyright Protection  7
Watermarking Scheme based on Chinese Remainder Theorem and I...
收藏 引用
7th International Conference on Software engineering and Computer systems and 4th International Conference on Computational Science and information management, ICSECS-ICOCSIM 2021
作者: Adi, Prajanto Wahyu Ernawan, Ferda Wibowo, Adi Sarwoko, Eko Adi Agung Nugroho, Fajar Universitas Diponegoro Department of Informatics Semarang Indonesia Universiti Malaysia Pahang Faculty of Computing College of Computing and Applied Sciences Pekan26600 Malaysia
The development of image watermarking schemes has grown rapidly especially in non-block watermarking. However, non-block watermarking produced less robustness against compression and filtering attacks. This study prop... 详细信息
来源: 评论