咨询与建议

限定检索结果

文献类型

  • 210 篇 会议
  • 107 篇 期刊文献

馆藏范围

  • 317 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 180 篇 工学
    • 142 篇 计算机科学与技术...
    • 119 篇 软件工程
    • 26 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 19 篇 生物工程
    • 15 篇 电气工程
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 光学工程
    • 10 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 土木工程
    • 5 篇 食品科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 网络空间安全
  • 102 篇 理学
    • 49 篇 数学
    • 31 篇 物理学
    • 21 篇 生物学
    • 18 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 9 篇 化学
  • 80 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 33 篇 工商管理
    • 29 篇 图书情报与档案管...
  • 13 篇 医学
    • 11 篇 临床医学
  • 8 篇 法学
    • 8 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 2 篇 教育学
  • 2 篇 农学

主题

  • 15 篇 computer science
  • 13 篇 software enginee...
  • 10 篇 neural networks
  • 9 篇 data mining
  • 9 篇 training
  • 8 篇 decision making
  • 8 篇 software
  • 8 篇 accuracy
  • 7 篇 feature extracti...
  • 6 篇 deep learning
  • 6 篇 costs
  • 6 篇 software design
  • 5 篇 information syst...
  • 5 篇 system software
  • 5 篇 application soft...
  • 5 篇 xml
  • 5 篇 laboratories
  • 5 篇 databases
  • 5 篇 software testing
  • 5 篇 machine learning

机构

  • 8 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 6 篇 gombe nigeria
  • 6 篇 department of ar...
  • 5 篇 faculty of compu...
  • 5 篇 department of in...
  • 4 篇 faculty of compu...
  • 4 篇 department of co...
  • 4 篇 department of so...
  • 4 篇 faculty of compu...
  • 4 篇 faculty of compu...
  • 4 篇 tianjin key labo...
  • 4 篇 department of so...
  • 4 篇 department of so...
  • 4 篇 universiti malay...
  • 4 篇 department of co...
  • 4 篇 software enginee...
  • 4 篇 department of in...
  • 4 篇 faculty of compu...
  • 3 篇 department of co...

作者

  • 15 篇 tutut herawan
  • 14 篇 herawan tutut
  • 6 篇 mungad m.
  • 6 篇 arshah ruzaini a...
  • 6 篇 suriya kumar sin...
  • 6 篇 sutoyo edi
  • 6 篇 mohammed mohamme...
  • 6 篇 mohd wan maseri ...
  • 6 篇 chiroma haruna
  • 6 篇 prima vitasari
  • 6 篇 muhammad nubli a...
  • 5 篇 embong abdullah
  • 5 篇 d. heric
  • 5 篇 zazula damjan
  • 5 篇 zain jasni moham...
  • 4 篇 muhammad waseem ...
  • 4 篇 deris mustafa ma...
  • 4 篇 ahmed mohammed a...
  • 4 篇 ahmad othman
  • 4 篇 khalid ali almar...

语言

  • 307 篇 英文
  • 7 篇 其他
  • 3 篇 中文
检索条件"机构=Faculty of Computer System and Software Engineering"
317 条 记 录,以下是271-280 订阅
排序:
A soft set approach for clustering student assessment datasets
收藏 引用
Journal of Computational and Theoretical Nanoscience 2015年 第12期12卷 5928-5939页
作者: Suhirman Herawan, Tutut Yanto, Iwan Tri Riyadi Zain, Jasni Mohamad Hongwu, Qin Abdullah, Zailani Universitas Teknologi Yogyakarta Yogyakarta Indonesia Faculty of Computer System and Software Engineering Universiti Malaysia Pahang Gambang Kuantan Pahang Malaysia AMCS Research Center Yogyakarta Indonesia University Ahmad Dahlan Yogyakarta Yogyakarta Indonesia Universiti Malaysia Terengganu Terengganu Malaysia
Educational data mining has been studied extensively as it provides useful information for educators to make more accurate decisions concerning their students, and to adapt their teaching strategies accordingly. Data ... 详细信息
来源: 评论
Switching Transient of Multi-step 3-Phase Capacitor Bank in 66/11 kV Bhutan Silicon Metal Private Ltd
Switching Transient of Multi-step 3-Phase Capacitor Bank in ...
收藏 引用
International Electrical engineering Congress (iEECON)
作者: Chophel Thanapong Suwanasri Phanupong Fuangpian Cattreeya Suwanasri Warunee Srisongkram Electrical and Software System Engineering The Sirindhorn International Thai-German Graduate School of Engineering King Mongkut’s University of Technology North Bangkok Bangkok Thailand Department of Electrical and Computer Engineering Faculty of Engineering King Mongkut’s University of Technology North Bangkok Bangkok Thailand Faculty of Engineering and Architecture Rajamangala University of Technology Suvarnabhumi Nonthaburi Thailand
Capacitor banks are finding greater acceptability in application with the integration of many Ferro Silicon Industries in Bhutan; however, switching of capacitor banks is one of the most challenging operations because... 详细信息
来源: 评论
A pilot study of pre- post anxiety treatment to improve academic performance for engineering students
收藏 引用
Procedia - Social and Behavioral Sciences 2011年 15卷 3826-3830页
作者: Prima Vitasari Muhammad Nubli Abdul Wahab Tutut Herawan Ahmad Othman Suriya Kumar Sinnadurai Faculty of Manufacturing Engineering and Technology Management Universiti Malaysia Pahang Lebuhraya Tun Razak 26300 Kuantan Pahang MALAYSIA Center of Modern Language and Human Science Universiti Malaysia Pahang Lebuhraya Tun Razak 26300 Kuantan Pahang MALAYSIA Faculty of Computer System and Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak 26300 Kuantan Pahang MALAYSIA
In this paper, we present a pilot study of pre- post treatment toward overcoming anxiety in improving academic performance for engineering's students. The anxiety level measurement was used to examine the effect o... 详细信息
来源: 评论
A secure self-destruction scheme with IBE for the internet content privacy
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2014年 第1期37卷 139-150页
作者: Xiong, Jin-Bo Yao, Zhi-Qiang Ma, Jian-Feng Li, Feng-Hua Liu, Xi-Meng Faculty of Software Fujian Normal University Fuzhou 350108 China School of Computer Science and Technology Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p... 详细信息
来源: 评论
Smart Home Gas Sensor Optimization Using Kalman Filter for Data Processing
Smart Home Gas Sensor Optimization Using Kalman Filter for D...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Somantri Muhamad Ikhsan Thohir Alun Sujjada Deni Setiawan Ilham Komara Fikri Ardiansyah Efendi Muhamad Muslih Zubaile Bin Abdullah Mohd Zainuri Saringat Department of Software Engineering University Tun Hussein Onn Malaysia Informatics Engineering Study Program Nusa Putra University Sukabumi Indonesia Informatics Engineering Study Program Nusa Putra University Sukabumi Indonesia Department of Software Engineering University Tun Hussein Onn Malaysia Sukabumi Indonesia Department of Information System Nusa Putra University Sukabumi Indonesia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Johor Bahru Malaysia
The integration of Internet of Things (IoT) technologies into modern homes has enhanced safety and comfort, particularly in detecting gas leaks, which pose serious fire hazards. Gas leaks can often be detected by smel... 详细信息
来源: 评论
Real time traffic congestion degree computation for minor sensorless roads using cost efficient context reasoning
Real time traffic congestion degree computation for minor se...
收藏 引用
International IEEE Conference on Intelligent Transportation systems
作者: Raphiphan, Panraphee Prathombutr, Passakon Zaslavsky, Arkady Meesad, Phayung Caulfield School of Information Technology Monash University 900 Dandenong Rd Caulfield East VIC 3145 Australia 112 Thailand Science Park Phahon Yothin Rd Pathumthani 12120 Thailand Department of Computer Science and Electrical Engineering Luleå University of Technology Luleå Sweden Centre for Distributed System and Software Engineering Monash University Australia Department of Teacher Training in Electrical Education Faculty of Technical Education King Mongkut's University of Technology North Bangkok 1518 Pibulsongkram Rd Bangsue Bangkok 10800 Thailand
Traffic congestion is the cause of pollution and economic loss. The Real time traffic state report can alleviate this problem by assisting drivers for route planning and choosing unblocked roads. More traffic informat... 详细信息
来源: 评论
An Approach to Improve the Robustness of Substitution Techniques of Audio Steganography
An Approach to Improve the Robustness of Substitution Techni...
收藏 引用
2009 2nd IEEE International Conference on computer Science and Information Technology(ICCSIT 2009)
作者: Mazdak Zamani Azizah Bt Abdul Manaf Rabiah Bt Ahmad Akram M.Zeki Faculty of Computer Science and Information System University of Technology Malaysia 54100 Kuala Lumpur Malaysia College of Science and Technology University of Technology Malaysia 54100 Kuala Lumpur Malaysia Centre for Advanced Software Engineering University of Technology Malaysia 54100 Kuala Lumpur Malaysia
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible *** transmission must be possible in spite of subsequent imperceptible alterations(attacks)of the modif... 详细信息
来源: 评论
Utilizing Information from Task-Independent Aspects via GAN-Assisted Knowledge Transfer
Utilizing Information from Task-Independent Aspects via GAN-...
收藏 引用
International Joint Conference on Neural Networks
作者: Lunkai Fu Jun Li Langxiong Zhou Zhenyuan Ma Shaopeng Liu Zhiyong Lin Mukesh Prasad School of Computer Science Guangdong Polytechnic Normal University Guangzhou China School of Software and Centre for Artificial Intelligence Faculty of Engineering and Information Technology University of Technology Sydney Sydney Australia School of Mathematics and System Sciences Guangdong Polytechnic Normal University Guangzhou China
Observed data often have multiple labels with respect to different aspects. For example, a picture can have one label specifying the contents in terms of the object category such as aeroplane, building, cat, etc. and ... 详细信息
来源: 评论
EventTrojan: Manipulating Non-Intrusive Speech Quality Assessment via Imperceptible Events
EventTrojan: Manipulating Non-Intrusive Speech Quality Asses...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Ying Ren Kailai Shen Zhe Ye Diqun Yan Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Juphoon System Software Co. Ltd Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-Intrusive speech quality assessment (NISQA) has gained significant attention for predicting speech’s mean opinion score (MOS) without requiring the reference speech. Researchers have gradually started to apply NI... 详细信息
来源: 评论
GAN2C: Information Completion GAN with Dual Consistency Constraints
GAN2C: Information Completion GAN with Dual Consistency Cons...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Lujuan Zhang Jun Li Tao Huang Zhenyuan Ma Zhiyong Lin Mukesh Prasad School of Mathematics and System Sciences Guangdong Polytechnic Normal University Guangzhou China School of Software and Center for Artificial Intelligence Faculty of Engineering and Information Technology University of Technology Sydney Sydney Australia School of Computer Science Guangdong Polytechnic Normal University Guangzhou China
This paper proposes an information completion technique, GAN2C, by imposing dual consistency constraints (2C) to a closed loop encoder-decoder architecture based on the generative adversarial nets (GAN). When adopting... 详细信息
来源: 评论