咨询与建议

限定检索结果

文献类型

  • 1,099 篇 会议
  • 786 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,058 篇 工学
    • 728 篇 计算机科学与技术...
    • 615 篇 软件工程
    • 190 篇 信息与通信工程
    • 172 篇 控制科学与工程
    • 117 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 96 篇 生物工程
    • 86 篇 机械工程
    • 81 篇 生物医学工程(可授...
    • 64 篇 仪器科学与技术
    • 61 篇 光学工程
    • 59 篇 化学工程与技术
    • 37 篇 动力工程及工程热...
    • 35 篇 安全科学与工程
    • 29 篇 材料科学与工程(可...
  • 590 篇 理学
    • 249 篇 数学
    • 195 篇 物理学
    • 117 篇 生物学
    • 84 篇 统计学(可授理学、...
    • 63 篇 系统科学
    • 62 篇 化学
  • 362 篇 管理学
    • 229 篇 管理科学与工程(可...
    • 152 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 110 篇 医学
    • 89 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 30 篇 公共卫生与预防医...
  • 53 篇 法学
    • 45 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 10 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 62 篇 deep learning
  • 54 篇 computer science
  • 41 篇 machine learning
  • 39 篇 feature extracti...
  • 35 篇 systems engineer...
  • 32 篇 accuracy
  • 28 篇 data mining
  • 28 篇 training
  • 27 篇 computational mo...
  • 27 篇 artificial intel...
  • 25 篇 internet of thin...
  • 25 篇 genetic algorith...
  • 24 篇 testing
  • 22 篇 predictive model...
  • 21 篇 support vector m...
  • 21 篇 neural networks
  • 21 篇 semantics
  • 21 篇 humans
  • 20 篇 information syst...
  • 20 篇 decision making

机构

  • 34 篇 department of co...
  • 21 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 faculty of compu...
  • 17 篇 department of co...
  • 16 篇 department of co...
  • 15 篇 faculty of compu...
  • 12 篇 department of co...
  • 11 篇 department of ap...
  • 11 篇 department of sy...
  • 10 篇 department of in...
  • 10 篇 faculty of elect...
  • 10 篇 department of co...
  • 9 篇 faculty of compu...
  • 9 篇 department of co...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of di...
  • 8 篇 department of in...
  • 8 篇 universiti malay...

作者

  • 20 篇 abdelwahed motwa...
  • 17 篇 ishfaq yaseen
  • 17 篇 mesfer al duhayy...
  • 15 篇 mohamed k.nour
  • 15 篇 manar ahmed hamz...
  • 11 篇 abu sarwar zaman...
  • 11 篇 tutut herawan
  • 11 篇 shamshirband sha...
  • 11 篇 siti mariyam sha...
  • 11 篇 t. toyota
  • 11 篇 hala j.alshahran...
  • 11 篇 shahaboddin sham...
  • 10 篇 xin xin
  • 9 篇 r budiarto
  • 9 篇 chen yen-lin
  • 9 篇 mostafa abotaleb
  • 9 篇 r f rahmat
  • 9 篇 heba mohsen
  • 9 篇 saud s.alotaibi
  • 9 篇 ahmedy ismail

语言

  • 1,804 篇 英文
  • 62 篇 其他
  • 19 篇 中文
  • 6 篇 日文
检索条件"机构=Faculty of Computer System and Technology"
1890 条 记 录,以下是1621-1630 订阅
排序:
Identifying Zigzag based Perceptually Important Points for indexing financial time series
Identifying Zigzag based Perceptually Important Points for i...
收藏 引用
IEEE International Conference on Cognitive Informatics
作者: Chaliaw Phetking Mohd Noor Md. Sap Ali Selamat Faculty of Science and Technology Rajabhat Suan Dusit Unviersity Wachira Bangkok 10170 Thailand Faculty of Computer Science and Information System Universiti Teknologi Malaysia Skudai Johor Malaysia
Financial time series often exhibit high degrees of fluctuation which are considered as noise in time series analysis. To remove noise, several lower bounding the Euclidean distance based dimensionality reduction meth... 详细信息
来源: 评论
Dijkstra beats genetic algorithm: Integrating uncomfortable intersection-turns to subjectively optimal route selection
Dijkstra beats genetic algorithm: Integrating uncomfortable ...
收藏 引用
International Conference on Computational Cybernetics (ICCC)
作者: Yasushi Kambayashi Hidemi Yamachi Yasuhiro Tsujimura Hisashi Yamamoto Department of Computer and Information Engineering Nippon Institute of Technology Saitama Japan Faculty of System Design Tokyo Metropolitan University Hino Tokyo Japan
Route selection is one of the most important problems for a car navigation system. Given a pair of origin and destination, there are many possible routes. Most current car navigation systems propose the shortest path ... 详细信息
来源: 评论
A study of trust & privacy models in pervasive computing
A study of trust & privacy models in pervasive computing
收藏 引用
International Conference for Technical Postgraduates (TECHPOS)
作者: Hamed Khiabani Jamalul-Lail Ab Manan Zailani Mohamed Sidek Faculty of Computer Science and Information System University Technology of Malaysia Kuala Lumpur Malaysia Information Security Cluster Technology Park Malaysia MIMOS Berhad Kuala Lumpur Malaysia
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So trust and privacy would be a major issue i... 详细信息
来源: 评论
Modelling and simulation of modified unipolar PWM scheme on a single phase DC-AC converter using PSIM
Modelling and simulation of modified unipolar PWM scheme on ...
收藏 引用
Student Conference on Research and Development (SCOReD)
作者: M. F. N. Tajuddin N. H. Ghazali T. C. Siong N. Ghazali School of Electrical System Engineering Universiti Malaysia Pedis Perlis Malaysia Faculty of Computer Science and Information Technology Universiti Teknologi Malaysia Johor Malaysia
Pulse-width modulation (PWM) of a signal or power source involves the modulation of its duty cycle, to either convey information over a communications channel or control the amount of power sent to a load. This paper ... 详细信息
来源: 评论
TMS320F2812 Digital Signal Processor (DSP) implementation of DPWM
TMS320F2812 Digital Signal Processor (DSP) implementation of...
收藏 引用
Student Conference on Research and Development (SCOReD)
作者: M. F. N. Tajuddin N. H. Ghazali M. F. Mohammed B. Ismail Z. M. Isa T. C. Siong N. Ghazali School of Electrical System Engineering Universiti Malaysia Pedis Perlis Malaysia Faculty of Computer Science and Information Technology Universiti Teknologi Malaysia Johor Malaysia
This paper presents the programming and use of TMS320F2812 digital signal processor (DSP) in generating the digital pulse width modulation (DPWM). The structure and functions of eZdsp 2812 board used in this work is e... 详细信息
来源: 评论
Using Self-Announcer Approach for Resource Availability Detection in Grid Environment
Using Self-Announcer Approach for Resource Availability Dete...
收藏 引用
International Multi-Conference on Computing in the Global Information technology, ICCGI
作者: Asgarali Bouyer Ehsan Mohebi Abdul Hanan Abdullah Islamic Azad university-Miyandoab branch Miyandoad west Azarbayjan Iran Faculty of Computer Science and Information System University Technology of Malaysia Skudai Johor Malaysia
Since the Grid is a dynamic environment, the detection of available resources and prediction of resource availability in near future is important for resource scheduling. In a Grid environment, prediction and evaluati... 详细信息
来源: 评论
A Metrics Suite for Measuring Reusability of Learning Objects
A Metrics Suite for Measuring Reusability of Learning Object...
收藏 引用
International Conference on Intelligent systems Design and Applications (ISDA)
作者: Siti Fadzilah Mat Noor Norazah Yusof Siti Zaiton Mohd Hashim Department of Information Science Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Software Engineering Faculty of Computer Science & Information System Universiti Teknologi Malaysia Skudai Malaysia
Learning Object (LO) is one of the main research topics in the E-Learning community in the recent years, and most researchers pay attention to the issue of Learning Object Reusability. The most obvious motivation is t... 详细信息
来源: 评论
Threats Identification in Healthcare Information systems using Genetic Algorithm and Coz Regression
Threats Identification in Healthcare Information Systems usi...
收藏 引用
The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)
作者: Rabiah Ahmad Ganthan Narayana Samy Nuzulha Khilwani Ibrahim Peter A.Bath Zuraini Ismail Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Department of Computer Systems and Communications Faculty of Computer Science and Information System Department of Information Studies University of Sheffield UK Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which in... 详细信息
来源: 评论
An Approach to Improve the Robustness of Substitution Techniques of Audio Steganography
An Approach to Improve the Robustness of Substitution Techni...
收藏 引用
2009 2nd IEEE International Conference on computer Science and Information technology(ICCSIT 2009)
作者: Mazdak Zamani Azizah Bt Abdul Manaf Rabiah Bt Ahmad Akram M.Zeki Faculty of Computer Science and Information System University of Technology Malaysia 54100 Kuala Lumpur Malaysia College of Science and Technology University of Technology Malaysia 54100 Kuala Lumpur Malaysia Centre for Advanced Software Engineering University of Technology Malaysia 54100 Kuala Lumpur Malaysia
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible *** transmission must be possible in spite of subsequent imperceptible alterations(attacks)of the modif... 详细信息
来源: 评论
Evaluation of P2P overlays for AoI management in Distributed Virtual Environments
Evaluation of P2P overlays for AoI management in Distributed...
收藏 引用
International Conference on Ultra Modern Telecommunications and Workshops (ICUMT)
作者: Christian Bettinger Rainer Oechsle Markus Esch Hermann Schloss Peter Sturm Department of Computer Science Trier University of Applied Sciences Trier Germany Faculty of Sciences Technology and Communication University of Luxembourg Luxembourg System Software and Distributed Systems University of Trier Trier Germany
Client/Server-based DVE approaches incur scalability and load balancing problems while addressing massive number of users. In order to mitigate these problems P2P overlays are proposed for content provision and manage... 详细信息
来源: 评论