咨询与建议

限定检索结果

文献类型

  • 1,099 篇 会议
  • 786 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,058 篇 工学
    • 728 篇 计算机科学与技术...
    • 615 篇 软件工程
    • 190 篇 信息与通信工程
    • 172 篇 控制科学与工程
    • 117 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 96 篇 生物工程
    • 86 篇 机械工程
    • 81 篇 生物医学工程(可授...
    • 64 篇 仪器科学与技术
    • 61 篇 光学工程
    • 59 篇 化学工程与技术
    • 37 篇 动力工程及工程热...
    • 35 篇 安全科学与工程
    • 29 篇 材料科学与工程(可...
  • 590 篇 理学
    • 249 篇 数学
    • 195 篇 物理学
    • 117 篇 生物学
    • 84 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 62 篇 化学
  • 362 篇 管理学
    • 229 篇 管理科学与工程(可...
    • 152 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 110 篇 医学
    • 89 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 30 篇 公共卫生与预防医...
  • 53 篇 法学
    • 45 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 10 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 62 篇 deep learning
  • 54 篇 computer science
  • 41 篇 machine learning
  • 39 篇 feature extracti...
  • 35 篇 systems engineer...
  • 32 篇 accuracy
  • 28 篇 data mining
  • 28 篇 training
  • 27 篇 computational mo...
  • 27 篇 artificial intel...
  • 25 篇 internet of thin...
  • 25 篇 genetic algorith...
  • 24 篇 testing
  • 22 篇 predictive model...
  • 21 篇 support vector m...
  • 21 篇 neural networks
  • 21 篇 semantics
  • 21 篇 humans
  • 20 篇 information syst...
  • 20 篇 decision making

机构

  • 34 篇 department of co...
  • 21 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 faculty of compu...
  • 17 篇 department of co...
  • 16 篇 department of co...
  • 15 篇 faculty of compu...
  • 12 篇 department of co...
  • 11 篇 department of ap...
  • 11 篇 department of sy...
  • 10 篇 department of in...
  • 10 篇 faculty of elect...
  • 10 篇 department of co...
  • 9 篇 faculty of compu...
  • 9 篇 department of co...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of di...
  • 8 篇 department of in...
  • 8 篇 universiti malay...

作者

  • 20 篇 abdelwahed motwa...
  • 17 篇 ishfaq yaseen
  • 17 篇 mesfer al duhayy...
  • 15 篇 mohamed k.nour
  • 15 篇 manar ahmed hamz...
  • 11 篇 abu sarwar zaman...
  • 11 篇 tutut herawan
  • 11 篇 shamshirband sha...
  • 11 篇 siti mariyam sha...
  • 11 篇 t. toyota
  • 11 篇 hala j.alshahran...
  • 11 篇 shahaboddin sham...
  • 10 篇 xin xin
  • 9 篇 r budiarto
  • 9 篇 chen yen-lin
  • 9 篇 mostafa abotaleb
  • 9 篇 r f rahmat
  • 9 篇 heba mohsen
  • 9 篇 saud s.alotaibi
  • 9 篇 ahmedy ismail

语言

  • 1,804 篇 英文
  • 62 篇 其他
  • 19 篇 中文
  • 6 篇 日文
检索条件"机构=Faculty of Computer System and Technology"
1890 条 记 录,以下是1611-1620 订阅
排序:
Sentence Features Fusion for Text Summarization Using Fuzzy Logic
Sentence Features Fusion for Text Summarization Using Fuzzy ...
收藏 引用
2009 Ninth International Conference on Hybrid Intelligent systems(第九届混合智能系统国际会议 HIS 2009)
作者: Ladda Suanmali Naomie Salim Mohammed Salem Binwahlan Faculty of Science and Technology Suan Dusit Rajabhat University Bangkok Thailand 10300 Faculty of Computer Science and Information System Universiti Teknologi Malaysia 81310
The scoring mechanism of the text features is the unique way for determining the key ideas in the text to be presented as text summary. The efficiency of the technique used for scoring the text sentences could produce... 详细信息
来源: 评论
Cache-conscious Feature Construction for Breast Abnormality Detection
Cache-conscious Feature Construction for Breast Abnormality ...
收藏 引用
International Conference on computer Engineering and Applications(ICCEA 2009)
作者: Visanu Changniam Juggapong Natwichai Information System Faculty of Business Administration and Liberal Art Ragamangala University of Technology Lanna Computer Engineering Department Faculty of Engineering Chiang Mai University
Breast cancer has been a cause of women-mortality for many *** is one of the best means to help radiologists to detect the calcification,an indicator for the abnormality,because a very small calcification(1-3 millimet... 详细信息
来源: 评论
Dijkstra beats genetic algorithm: Integrating uncomfortable intersection-turns to subjectively optimal route selection
Dijkstra beats genetic algorithm: Integrating uncomfortable ...
收藏 引用
IEEE 7th International Conference on Computational Cybernetics, ICCC 2009
作者: Kambayashi, Yasushi Yamachi, Hidemi Tsujimura, Yasuhiro Yamamoto, Hisashi Department of Computer and Information Engineering Nippon Institute of Technology 4-1 Gakuedai Miyashiro-cho Minamisaitama-gun Saitama 345-8501 Japan Faculty of System Design Tokyo Metropolitan University 6-6 Asahigaoka Hino City Tokyo 191-0065 Japan
Route selection is one of the most important problems for a car navigation system. Given a pair of origin and destination, there are many possible routes. Most current car navigation systems propose the shortest path ... 详细信息
来源: 评论
Development of electric wheelchair interface based on laser pointer
Development of electric wheelchair interface based on laser ...
收藏 引用
SICE Annual Conference
作者: Yoshihisa Fukuda Yosuke Kurihara Kazuyuki Kobayashi Kajiro Watanabe Department of System Engineering Faculty of Engineering Hosei University Tokyo Japan Department of Computer and Information Science Faculty of Science and Technology Seikei University Tokyo Japan
The rapidly aging society in Japan has resulted in an increased demand for electric wheelchairs to enhance the mobility of elderly persons. However, the increased use of electric wheelchairs means an increase in the n... 详细信息
来源: 评论
The Application of Genetic Algorithm into Membership Function FLC Used Floating Point
The Application of Genetic Algorithm into Membership Functio...
收藏 引用
Japan-China Joint Workshop on Frontier of computer Science and technology (FCST)
作者: Ismail Yusuf Nanna Suryana Herman Siti Maryam Hj Shamsuddin Faculty of Information and Communication Technology Technical University of Malaysia Malacca Malacca Malaysia Faculty of Information and Communication Technology UTeM Melaka Malacca Malaysia Faculty of Computer Science and Information System UTM Skudai Johor Malaysia
This study investigates the use of Genetic Algorithms (GA) to the design and implementation of Fuzzy Logic Controllers (FLC). A fuzzy logic is fully defined by its membership function. What is the best to determine th... 详细信息
来源: 评论
Using Principal Component Analysis and Hidden Markov Model for Hand Recognition systems
Using Principal Component Analysis and Hidden Markov Model f...
收藏 引用
International Conference on Information and Multimedia technology (ICIMT)
作者: Abd Manan Ahmad Abdullah Bade Luqman Al-Hakim Zainal Abidin Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor Malaysia Faculty of Information Technology and Multimedia Universiti Tun Hussein Onn Malaysia Johor Malaysia
There are many approaches and algorithms that can be used to recognize and synthesize the hands gesture. Each approach has its own advantages and characteristics. This paper describes the usage of hidden Markov models... 详细信息
来源: 评论
Threats to Health Information Security
Threats to Health Information Security
收藏 引用
The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)
作者: Ganthan Narayana Samy Rabiah Ahmad Zuraini Ismail Department of Computer Systems and Communications Faculty of Computer Science and Information System Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information technology Department (ITD), M... 详细信息
来源: 评论
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
收藏 引用
World Academy of Science, Engineering and technology 2009年 38卷 1080-1087页
作者: Zeki, Akram M. Manaf, Azizah A. Faculty of Computer Science and Information System University Technology Malaysia UTM Skudai 81310 Johor Malaysia College of Science and Technology University Technology Malaysia City Campus Jalan Semarak 54100 Kuala Lumpur Malaysia
Least Significant Bit (LSB) technique is the earliest developed technique in watermarking and it is also the most simple, direct and common technique. It essentially involves embedding the watermark by replacing the l... 详细信息
来源: 评论
Solving linear ordinary differential equations using singly diagonally implicit runge-kutta fifth order five-stage method
收藏 引用
WSEAS Transactions on Mathematics 2009年 第8期8卷 393-402页
作者: Ismail, Fudziah Jawias, Nur Izzati Che Suleiman, Mohamed Jaafar, Azmi Department of Mathematics Faculty of Science University Putra Malaysia 43400 Serdang Selangor Malaysia Department of Information System Faculty of Computer Science and Information Technology University Putra Malaysia 43400 Serdang Selangor Malaysia
We constructed a new fifth order five-stage singly diagonally implicit Runge-Kutta (DIRK) method which is specially designed for the integrations of linear ordinary differential equations (LODEs). The restriction to l... 详细信息
来源: 评论
Object detection and modeling algorithm for automatic visual people counting system
Object detection and modeling algorithm for automatic visual...
收藏 引用
International Conference on Electrical Engineering/Electronics, computer, Telecommunications and Information technology, ECTI-CON
作者: Kulrapat Jaijing Pakorn Kaewtrakulpong Supakorn Siddhichai Department of Computer Engineering Department of Instrumentation and Control System Engineering Faculty of Engineering King Mongkut's University of Technology Thonburi Bangkok Thailand National Electronics and Computer Technology Center Pathum Thani Thailand
This paper presents object detection and modeling algorithm for automatic visual people counting system to identify individuals from top view images acquired from an overhead surveillance camera. This work proposes Sn... 详细信息
来源: 评论