咨询与建议

限定检索结果

文献类型

  • 1,334 篇 会议
  • 691 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 2,031 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,160 篇 工学
    • 892 篇 计算机科学与技术...
    • 751 篇 软件工程
    • 211 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 91 篇 生物工程
    • 84 篇 电气工程
    • 80 篇 电子科学与技术(可...
    • 74 篇 机械工程
    • 72 篇 生物医学工程(可授...
    • 54 篇 仪器科学与技术
    • 52 篇 安全科学与工程
    • 50 篇 化学工程与技术
    • 46 篇 光学工程
    • 44 篇 建筑学
    • 39 篇 动力工程及工程热...
    • 36 篇 土木工程
  • 568 篇 理学
    • 232 篇 数学
    • 190 篇 物理学
    • 116 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 76 篇 系统科学
    • 50 篇 化学
  • 453 篇 管理学
    • 298 篇 管理科学与工程(可...
    • 195 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 108 篇 医学
    • 87 篇 临床医学
    • 65 篇 基础医学(可授医学...
  • 62 篇 法学
    • 52 篇 社会学
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 43 篇 教育学
    • 41 篇 教育学
  • 23 篇 农学
  • 19 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 74 篇 computer science
  • 70 篇 deep learning
  • 59 篇 information syst...
  • 43 篇 machine learning
  • 41 篇 feature extracti...
  • 37 篇 accuracy
  • 36 篇 neural networks
  • 36 篇 computational mo...
  • 33 篇 data mining
  • 31 篇 security
  • 31 篇 testing
  • 30 篇 information tech...
  • 30 篇 decision making
  • 28 篇 artificial intel...
  • 27 篇 humans
  • 26 篇 internet of thin...
  • 25 篇 mathematical mod...
  • 24 篇 software
  • 23 篇 intrusion detect...
  • 23 篇 application soft...

机构

  • 38 篇 department of co...
  • 34 篇 faculty of compu...
  • 30 篇 faculty of compu...
  • 22 篇 department of co...
  • 21 篇 faculty of compu...
  • 19 篇 department of co...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 14 篇 faculty of compu...
  • 14 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 11 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 applied science ...
  • 8 篇 faculty of compu...
  • 8 篇 department of sy...

作者

  • 25 篇 abdelwahed motwa...
  • 20 篇 mesfer al duhayy...
  • 18 篇 siti mariyam sha...
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 15 篇 habibollah haron
  • 15 篇 shamsuddin siti ...
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 12 篇 sunar mohd shahr...
  • 11 篇 ali selamat
  • 11 篇 shahaboddin sham...
  • 11 篇 yang jing
  • 10 篇 r budiarto
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...

语言

  • 1,985 篇 英文
  • 35 篇 其他
  • 11 篇 中文
检索条件"机构=Faculty of Computer Science and Information system"
2031 条 记 录,以下是81-90 订阅
排序:
An immune system approach to personalize search results
An immune system approach to personalize search results
收藏 引用
2011 11th International Conference on Intelligent systems Design and Applications, ISDA'11
作者: Rastegari, Hamid Shamsuddin, Siti Mariyam Faculty of Computer Science and Information System University Technology Malaysia Malaysia
Since dawn of the World Wide Web, the retrieval of relevant information has been a major problem for search engines. Current Web search engines use search algorithms to generate results that are suitable for discoveri... 详细信息
来源: 评论
The influence of organizational knowledge sharing on employee motivation
The influence of organizational knowledge sharing on employe...
收藏 引用
2012 International Conference on information Retrieval and Knowledge Management, CAMP'12
作者: Usman, Usman Musa Zakari Musa, Mahdi Alhaji Faculty of Computer Science and Information System University Technology Malaysia Malaysia
Knowledge is the most important strategic tool for improving and maintaining organizational performance. Knowledge has become the essential part of every successful organization. This makes the organizations to put mo... 详细信息
来源: 评论
Measurement of ChatGPT Performance in Mapping Natural Language Speficaction into an Entity Relationship Diagram  11
Measurement of ChatGPT Performance in Mapping Natural Langua...
收藏 引用
11th IEEE International Conference on systems and Control, ICSC 2023
作者: Omar, Mussa A. University of Ajdabiya Faculty of Information System Computer Science Department Libya
This paper explores the entity relationship diagram, a popular conceptual model used to depict entities, attributes, and relationships graphically. To help with this, we use ChatGPT, a sophisticated language model bas... 详细信息
来源: 评论
Design of orchid monitoring system based on IoT  3
Design of orchid monitoring system based on IoT
收藏 引用
3rd International Conference on Informatics and Computing, ICIC 2018
作者: Rafi, Farid Al Kowanda, Anacostia Salahuddin, N.S. Saptriani, Trini Computer System Faculty of Computer Science and Information Technology Gunadarma University Jakarta Indonesia
Diversification of the utilization of orchids is now more widespread with the increasing variety of products that can be accepted by the market so that it becomes a business opportunity. Indonesia has a wealth of high... 详细信息
来源: 评论
Location-based system for mobile devices using RFID
Location-based system for mobile devices using RFID
收藏 引用
2nd Asia International Conference on Modelling and Simulation, AMS 2008
作者: Siadat, Seyed Hossein Selamat, Ali Faculty of Computer Science and Information System Universiti Teknologi Malaysia Malaysia
Propagation of wireless technologies, mobile computing devices, and the Internet has provided an opportunity to develop and deliver new types of location-based applications and services to users. This paper presents a... 详细信息
来源: 评论
Relevance feedback of content-based image retrieval using support vector machine
Relevance feedback of content-based image retrieval using su...
收藏 引用
2009 5th IEEE GCC Conference and Exhibition, GCC 2009
作者: Selamat, Ali Lim, Pei-Geok Department of Software Engineering Faculty of Computer Science and Information System Malaysia
The rapid growth of computer technologies and the advent of the World Wide Web have increased the amount and the complexity of multimedia information. A content-based image retrieval (CBIR) system has been developed a... 详细信息
来源: 评论
Control Home Devices with Voice Commands via a Smartphone  4
Control Home Devices with Voice Commands via a Smartphone
收藏 引用
4th International Conference on Informatics and Computing, ICIC 2019
作者: Riza, M. Faishal Salahuddin, Nur Sultan Faculty of Computer Science and Information Technology Gunadarma University Computer System Jakarta Indonesia
In the last few days home automation is one of the biggest developments that technology has achieved today. Nowadays there are many products that control automatically, or by using remote control, or by voice commands... 详细信息
来源: 评论
Fuzzy intrusion detection system via data mining technique with sequences of system calls
Fuzzy intrusion detection system via data mining technique w...
收藏 引用
5th International Conference on information Assurance and Security, IAS 2009
作者: Sekeh, Mohammad Akbarpour Maarof, Mohd. Aizaini Bin Department of Computer System and Communication Faculty of Computer Science and Information UTM Skudai Malaysia
There are two main approaches for implementing IDS;host based and network based. While the former is implemented in the form of software deployed on a host, the latter, usually is built as a hardware product with its ... 详细信息
来源: 评论
Amino Acid Encryption Method Using Genetic Algorithm for Key Generation
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 123-134页
作者: Ahmed S.Sakr M.Y.Shams Amena Mahmoud Mohammed Zidan Department of Information System Faculty of Computers and InformationMenofia UniversityEgypt Department of Machine learning and Information Retrieval Faculty of Artificial IntelligenceKafrelsheikh UniversityEgypt Department of Computer Science Faculty of Computers and InformationKafrelshiekh UniversityEgypt Hurghada Faculty of Computers and Artificial Intelligence South Valley UniversityEgypt
In this new information era,the transfer of data and information has become a very important *** data must be kept secured from unauthorized persons using *** science of cryptography depends not only on complex mathem... 详细信息
来源: 评论
Error Correction on iris biometric template using reed solomon codes
Error Correction on iris biometric template using reed solom...
收藏 引用
Asia Modelling Symposium 2010: 4th International Conference on Mathematical Modelling and computer Simulation, AMS2010
作者: Moi, Sim Hiew Saad, Puteh Rahim, Nazeema Abd Ibrahim, Subariah Department of Software Engineering Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor Malaysia Department of System and Communication Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor Malaysia
Pin number or password that is used for authentication can be easily attacked. This limitation triggered the utilization of biometric for secured transactions. Biometric is unique to each individual and is reliable. A... 详细信息
来源: 评论