咨询与建议

限定检索结果

文献类型

  • 1,099 篇 会议
  • 786 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,058 篇 工学
    • 728 篇 计算机科学与技术...
    • 615 篇 软件工程
    • 190 篇 信息与通信工程
    • 172 篇 控制科学与工程
    • 117 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 96 篇 生物工程
    • 86 篇 机械工程
    • 81 篇 生物医学工程(可授...
    • 64 篇 仪器科学与技术
    • 61 篇 光学工程
    • 59 篇 化学工程与技术
    • 37 篇 动力工程及工程热...
    • 35 篇 安全科学与工程
    • 29 篇 材料科学与工程(可...
  • 590 篇 理学
    • 249 篇 数学
    • 195 篇 物理学
    • 117 篇 生物学
    • 84 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 62 篇 化学
  • 362 篇 管理学
    • 229 篇 管理科学与工程(可...
    • 152 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 110 篇 医学
    • 89 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 30 篇 公共卫生与预防医...
  • 53 篇 法学
    • 45 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 10 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 62 篇 deep learning
  • 54 篇 computer science
  • 41 篇 machine learning
  • 39 篇 feature extracti...
  • 35 篇 systems engineer...
  • 32 篇 accuracy
  • 28 篇 data mining
  • 28 篇 training
  • 27 篇 computational mo...
  • 27 篇 artificial intel...
  • 25 篇 internet of thin...
  • 25 篇 genetic algorith...
  • 24 篇 testing
  • 22 篇 predictive model...
  • 21 篇 support vector m...
  • 21 篇 neural networks
  • 21 篇 semantics
  • 21 篇 humans
  • 20 篇 information syst...
  • 20 篇 decision making

机构

  • 34 篇 department of co...
  • 21 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 faculty of compu...
  • 17 篇 department of co...
  • 16 篇 department of co...
  • 15 篇 faculty of compu...
  • 12 篇 department of co...
  • 11 篇 department of ap...
  • 11 篇 department of sy...
  • 10 篇 department of in...
  • 10 篇 faculty of elect...
  • 10 篇 department of co...
  • 9 篇 faculty of compu...
  • 9 篇 department of co...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of di...
  • 8 篇 department of in...
  • 8 篇 universiti malay...

作者

  • 20 篇 abdelwahed motwa...
  • 17 篇 ishfaq yaseen
  • 17 篇 mesfer al duhayy...
  • 15 篇 mohamed k.nour
  • 15 篇 manar ahmed hamz...
  • 11 篇 abu sarwar zaman...
  • 11 篇 tutut herawan
  • 11 篇 shamshirband sha...
  • 11 篇 siti mariyam sha...
  • 11 篇 t. toyota
  • 11 篇 hala j.alshahran...
  • 11 篇 shahaboddin sham...
  • 10 篇 xin xin
  • 9 篇 r budiarto
  • 9 篇 chen yen-lin
  • 9 篇 mostafa abotaleb
  • 9 篇 r f rahmat
  • 9 篇 heba mohsen
  • 9 篇 saud s.alotaibi
  • 9 篇 ahmedy ismail

语言

  • 1,804 篇 英文
  • 62 篇 其他
  • 19 篇 中文
  • 6 篇 日文
检索条件"机构=Faculty of Computer System and Technology"
1890 条 记 录,以下是1511-1520 订阅
排序:
Image retrieval using contour feature with rough set method
Image retrieval using contour feature with rough set method
收藏 引用
International Conference on computer, Mechatronics, Control and Electronic Engineering
作者: Wasinphongwanit, Pheerawit Phokharatkul, Pisit Technology of Information System Management Faculty of Engineering Mahidol University Nakhon Pathom 73170 Thailand Department of Computer Engineering Faculty of Engineering Mahidol University Nakhon Pathom 73170 Thailand
Content based image retrieval (CBIR) is well-known in the field of image retrieval. It uses contents of an image from image processing and analysis to retrieve images that users were looking for from an image search. ... 详细信息
来源: 评论
Design of a new distributed model for intrusion detection system based on artificial immune system
Design of a new distributed model for intrusion detection sy...
收藏 引用
作者: Hosseinpour, Farhoud Bakar, Kamalrulnizam Abu Hardoroudi, Amir Hatami Dareshur, Ali Farhang Faculty of Computer Science and Information System University of Technology Malaysia 54100 Kuala Lumpur Malaysia University of Technology Malaysia 54100 Kuala Lumpur Malaysia
Currently Intrusion detection systems have grown to be an ordinary component of network security infrastructure. With mounting global network connectivity, the issue of intrusion has achieved importance, promoting act... 详细信息
来源: 评论
Interpretative key management (IKM), A novel framework
Interpretative key management (IKM), A novel framework
收藏 引用
2nd International Conference on computer Research and Development, ICCRD 2010
作者: Chaeikar, Saman Shojae Razak, Shukor Abd Honarbakhsh, Shohreh Zeidanloo, Hossein Rouhani Zamani, Mazdak Jaryani, Farhang Centre for Advanced Software Engineering University Technology Malaysia 54100 Kuala Lumpur Malaysia Faculty of Computer Science and Information System University Technology Malaysia 54100 Kuala Lumpur Malaysia
Nowadays, we use cryptography keys to secure our communications. One of the common ways for securing data exchanging is via the use of symmetric keys to encipher transmitted data over network. Today's practices fo... 详细信息
来源: 评论
Integration of chaotic map and confusion technique for color medical image encryption
Integration of chaotic map and confusion technique for color...
收藏 引用
作者: Abokhdair, Nuha Omran Manaf, Azizah Bt. Abdul Zamani, Mazdak Faculty of Computer Science and Information System University of Technology Malaysia 54100 Kuala Lumpur Malaysia College of Science and Technology University of Technology Malaysia 54100 Kuala Lumpur Malaysia
In order to achieve secure access to color medical image, a symmetric color medical image encryption is proposed in this paper. The proposed algorithm is base on combination of scrambling and confusion processes. 2D l... 详细信息
来源: 评论
Online information sharing issues in website personalization
Online information sharing issues in website personalization
收藏 引用
1st International Conference on User Science and Engineering 2010, iUSEr 2010
作者: Razali, Mohd Norhisham Fun, Tan Soo Razak, Fariza Hanis Abdul Hanapi, Rozita Software Engineering School of Engineering and Information Technology University Malaysia Sabah Malaysia Network and System Management School of Engineering and Information Technology University Malaysia Sabah Malaysia Department of System Science Faculty of Computer and Mathematical Sciences University Teknologi MARA Shah Alam Selangor Malaysia Office System Management Faculty of Office Management and Technology Universiti Teknologi MARA Puncak Alam Selangor Malaysia
Website Personalization is one of strategic technique in delivering services in online applications. A part of process for building personalization applications is to collect particular information from the user which... 详细信息
来源: 评论
Multi-fault diagnosis of gear based on sequential fuzzy inference
Multi-fault diagnosis of gear based on sequential fuzzy infe...
收藏 引用
2010 International Conference on Mechanic Automation and Control Engineering, MACE2010
作者: Luo, Zhigao Chen, Qiang Chen, Peng Zhou, Xiong School of Mechanical Engineering Jiangsu University Zhenjiang China Faculty of Computer Science and System Engineering Kyushu Institute of Technology Iizuka-shi Japan School of Mechanical Engineering Chongqing University of Science and Technology Chongqing China
The article briefly analyzes the vibration mechanism of the gear fault and kinds of typical signal characteristics of the gears, and introduces successive fuzzy reasoning into the fault diagnosis of the gears. For the... 详细信息
来源: 评论
Effects of delayed presentation of self-embodied avatar motion with network delay
Effects of delayed presentation of self-embodied avatar moti...
收藏 引用
2010 4th International Universal Communication Symposium, IUCS 2010
作者: Ishii, Yutaka Sejima, Yoshihiro Watanabe, Tomio Information Science and Technology Center Kobe University 1-1 Rokkodai Nada Kobe Japan Graduate School of Science and Engineering Yamaguchi University Faculty of Computer Science and System Engineering 2-16-1 Tokiwadai Ube Yamaguchi Japan Faculty of Computer Science and System Engineering Okayama Prefectural University CREST 111 Kuboki Soja Okayama Japan
A large network delay is likely to obstruct human interaction in telecommunication systems such as telephony or video conferencing systems. In spite of the extensive investigations that have been carried out on networ... 详细信息
来源: 评论
A new accurate technique for Iris boundary detection
收藏 引用
WSEAS Transactions on computers 2010年 第6期9卷 654-663页
作者: Shamsi, Mahboubeh Saad, Puteh Bt Ibrahim, Subariah Bt Rasouli, Abdolreza Abdulrahim, Nazeema Bt Faculty of Computer Science and Information System University Technology Malaysia Skudai Johor 81310 Malaysia
The Iris based identification systems have been noticed exceedingly, presently. In this process, the iris should be segmented from captured eye image. The low contrast between pupil and iris, usually, will harden the ... 详细信息
来源: 评论
Noninvasive biosignal measurement of a subject in bed using ceramic sensors
Noninvasive biosignal measurement of a subject in bed using ...
收藏 引用
作者: Shino, Toshihiro Watanabe, Kajiro Kobayashi, Kazuyuki Suzuki, Kaoru Kurihara, Yosuke System Control Engineering Department Faculty of Engineering Hosei University Koganei-shi Tokyo Japan Department of Computer and Information Science Faculty of Science and Technology Seikei University Musashino-shi Tokyo Japan
This paper describes a novel noninvasive method for sensing heartbeat, respiration and body-movement biosignals of a subject in bed by using ceramic piezo devices set under the legs of the bed. © 2010 SICE.
来源: 评论
Botnet detection based on common network behaviors by utilizing Artificial Immune system(AIS)
Botnet detection based on common network behaviors by utiliz...
收藏 引用
International Conference on Software technology and Engineering (ICSTE)
作者: Hossein Rouhani Zeidanloo Farhoud Hosseinpour Parnian Najafi Borazjani Faculty of Computer Science and Information System University of Technology Kuala Lumpur Malaysia
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots)... 详细信息
来源: 评论