咨询与建议

限定检索结果

文献类型

  • 1,333 篇 会议
  • 689 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,161 篇 工学
    • 892 篇 计算机科学与技术...
    • 748 篇 软件工程
    • 210 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 91 篇 生物工程
    • 82 篇 电气工程
    • 79 篇 电子科学与技术(可...
    • 74 篇 机械工程
    • 72 篇 生物医学工程(可授...
    • 54 篇 仪器科学与技术
    • 52 篇 安全科学与工程
    • 51 篇 化学工程与技术
    • 45 篇 光学工程
    • 45 篇 建筑学
    • 39 篇 动力工程及工程热...
    • 37 篇 土木工程
  • 571 篇 理学
    • 232 篇 数学
    • 189 篇 物理学
    • 116 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 77 篇 系统科学
    • 51 篇 化学
  • 454 篇 管理学
    • 299 篇 管理科学与工程(可...
    • 195 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 109 篇 医学
    • 88 篇 临床医学
    • 66 篇 基础医学(可授医学...
  • 62 篇 法学
    • 52 篇 社会学
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 43 篇 教育学
    • 41 篇 教育学
  • 24 篇 农学
  • 19 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 74 篇 computer science
  • 70 篇 deep learning
  • 59 篇 information syst...
  • 43 篇 machine learning
  • 41 篇 feature extracti...
  • 38 篇 accuracy
  • 36 篇 neural networks
  • 36 篇 computational mo...
  • 33 篇 data mining
  • 31 篇 security
  • 31 篇 testing
  • 30 篇 information tech...
  • 30 篇 decision making
  • 28 篇 artificial intel...
  • 27 篇 humans
  • 26 篇 internet of thin...
  • 25 篇 mathematical mod...
  • 24 篇 software
  • 24 篇 training
  • 23 篇 intrusion detect...

机构

  • 38 篇 department of co...
  • 34 篇 faculty of compu...
  • 30 篇 faculty of compu...
  • 23 篇 department of co...
  • 21 篇 faculty of compu...
  • 19 篇 department of co...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 14 篇 faculty of compu...
  • 14 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 department of sy...
  • 9 篇 applied science ...
  • 8 篇 faculty of compu...

作者

  • 25 篇 abdelwahed motwa...
  • 20 篇 mesfer al duhayy...
  • 18 篇 siti mariyam sha...
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 15 篇 habibollah haron
  • 15 篇 shamsuddin siti ...
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 12 篇 sunar mohd shahr...
  • 11 篇 ali selamat
  • 11 篇 shahaboddin sham...
  • 11 篇 yang jing
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...
  • 10 篇 stiawan deris

语言

  • 1,986 篇 英文
  • 32 篇 其他
  • 11 篇 中文
检索条件"机构=Faculty of Computer Science and Information System"
2029 条 记 录,以下是91-100 订阅
排序:
Velocity and acceleration analysis from kinematics linear punch using optical motion capture  2
Velocity and acceleration analysis from kinematics linear pu...
收藏 引用
2nd International Conference on Informatics and Computing, ICIC 2017
作者: Dharmayanti Iqbal, Mohammad Suhendra, Adang Benny Mutiara, Achmad Faculty of Computer Science and Information System Gunadarma University Indonesia
Martial arts athletes are usually trained to focus on the balance between the strength and capacity of the number of recruits called muscle optimization. To find out the muscle optimization needs to be done research o... 详细信息
来源: 评论
Trust based Grid batch mode scheduling algorithms
Trust based Grid batch mode scheduling algorithms
收藏 引用
2012 8th International Conference on Informatics and systems, INFOS 2012
作者: Abuelenin, Sherihan Faculty of Information System and Computer Science Mansoura University Egypt
Trust has been recognized as important factor for Grid computing security. Trust is the degree of belief in the resource provider's competence to complete user's task dependably, securely and reliably in a spe... 详细信息
来源: 评论
Similarity analysis of taekwondo movement using data motion  3
Similarity analysis of taekwondo movement using data motion
收藏 引用
3rd International Conference on Informatics and Computing, ICIC 2018
作者: Dharmayanti Iqbal, Mohammad Suhendra, Adang Mutiara, Achmad Benny Faculty of Computer Science Information System Gunadarma University Indonesia
Humans have limitations in vision so to observe and measure the similarity of a movement requires a tool. By digitizing motion in motion data form, it can be measured similarity of movement based on angle degree. This... 详细信息
来源: 评论
A service based framework for integration of ITIL V3 and Enterprise Architecture
A service based framework for integration of ITIL V3 and Ent...
收藏 引用
2010 International Symposium on information Technology, ITSim'10
作者: Nabiollahi, Akbar Alias, Rose Alinda Sahibuddin, Shamsul Faculty of Computer Science Information System Johor Bahru Malaysia
ITIL V3 could be introduced as a governance framework for IT service management (ITSM) and attempts to align IT investments with business objectives. Enterprise Architecture (EA) is also referred as a general framewor... 详细信息
来源: 评论
Environmental Recognition Using RAM-Network based Type-2 Fuzzy Neural for Navigation of Mobile Robot
Environmental Recognition Using RAM-Network based Type-2 Fuz...
收藏 引用
International Conference on computer and Automation Engineering
作者: Nurmaini, Siti Hashim, Siti Zaiton Mohd Jawawi, Dayang Norhayati A. Faculty of Computer Science University of Sriwijaya Indonesia Faculty of Computer Science and Information System Universiti Teknologi Skudai Johor Bahru Indonesia
Reactive autonomous mobile robot navigating in real time environment is one of the most important requirements. Most of the systems have some common drawbacks such as, large computation, expensive equipment, hard impl... 详细信息
来源: 评论
Multi-criteria decision making for group decision support system
Multi-criteria decision making for group decision support sy...
收藏 引用
2012 International Conference on information Retrieval and Knowledge Management, CAMP'12
作者: Rosanty, Elvira Soufyani Dahlan, Halina Mohamed Che Hussin, Ab. Razak Information System Department Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor Malaysia
Group Decision Support system (GDSS) is suitable if used in decision-related meeting as a medium for them to share ideas, extract and analyze the information, and making decision. However, making decision is more comp... 详细信息
来源: 评论
An Optimal Distribution of RSU for Improving Self-Driving Vehicle Connectivity
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3311-3319页
作者: Khattab Alheeti Abdulkareem Alaloosy Haitham Khalaf Abdulkareem Alzahrani Duaa Al_Dosary Department of Computer Networking System College of Computer Sciences and Information TechnologyUniversity of AnbarRamadiIraq College of Medicine University of AnbarRamadiIraq Department of Computer Science Faculty of Computer Science and Information TechnologyAlbaha UniversityAlbahaSaudi Arabia College of Computer Sciences and Information Technology University of AnbarRamadiIraq
Self-driving and semi-self-driving cars play an important role in our daily *** effectiveness of these cars is based heavily on the use of their surrounding areas to collect sensitive and vital ***,external infrastruc... 详细信息
来源: 评论
Using store-forward technique to conserve energy in wireless sensor networks: Initial step for routing mechanism
Using store-forward technique to conserve energy in wireless...
收藏 引用
2012 8th International Conference on Computing Technology and information Management, ICCM 2012
作者: Ahmedy, Ismail Ngadi, Md. Asri Omar, Syaril Nizam Department of Computer System and Communication Faculty of Computer Science and Information System Universiti Teknologi Malaysia Malaysia
Wireless sensor network (WSN) is a technology which consists a number of sensor nodes distributed among of an area usually for monitoring purposes. As the emerging of this technology has been rapidly increased nowaday... 详细信息
来源: 评论
Artificial immune system based intrusion detection  7
Artificial immune system based intrusion detection
收藏 引用
7th IEEE International Conference on Intelligent Computing and information systems, ICICIS 2015
作者: Abas, Eman Abd El Raoof Abdelkader, Hatem Keshk, Arabi Information System Department Faculty of Computer and Information Suez Canal University Egypt Information System Department Faculty of Computer and Information Menoufiya University Egypt Computer Science Department Faculty of Computers and Information Menoufiya University Egypt
Due to the growing of internet applications, the needs of internet security are increasing. Intrusion detection system is the primary approaches used for saving systems from internal and external intruders. Several te... 详细信息
来源: 评论
Security backlog in scrum security practices
Security backlog in scrum security practices
收藏 引用
2011 5th Malaysian Conference in Software Engineering, MySEC 2011
作者: Azham, Zulkarnain Ghani, Imran Ithnin, Norafida Department of Post Graduate Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor Malaysia Department of Computer System and Communication Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor Malaysia
The rapid development of software nowadays requires the high speed software product delivery by development teams. In order to deliver the product faster, the development teams make a transformation to their conventio... 详细信息
来源: 评论