咨询与建议

限定检索结果

文献类型

  • 210 篇 会议
  • 105 篇 期刊文献

馆藏范围

  • 315 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 178 篇 工学
    • 141 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 26 篇 信息与通信工程
    • 23 篇 控制科学与工程
    • 19 篇 生物工程
    • 15 篇 电气工程
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 光学工程
    • 10 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 土木工程
    • 5 篇 食品科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 网络空间安全
  • 100 篇 理学
    • 47 篇 数学
    • 31 篇 物理学
    • 21 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 9 篇 化学
  • 79 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 32 篇 工商管理
    • 29 篇 图书情报与档案管...
  • 13 篇 医学
    • 11 篇 临床医学
  • 8 篇 法学
    • 8 篇 社会学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 2 篇 教育学
  • 2 篇 农学

主题

  • 15 篇 computer science
  • 13 篇 software enginee...
  • 10 篇 neural networks
  • 9 篇 data mining
  • 9 篇 training
  • 8 篇 decision making
  • 8 篇 software
  • 8 篇 accuracy
  • 7 篇 feature extracti...
  • 6 篇 deep learning
  • 6 篇 costs
  • 6 篇 software design
  • 5 篇 information syst...
  • 5 篇 system software
  • 5 篇 application soft...
  • 5 篇 xml
  • 5 篇 laboratories
  • 5 篇 databases
  • 5 篇 software testing
  • 5 篇 machine learning

机构

  • 8 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 6 篇 gombe nigeria
  • 6 篇 department of ar...
  • 5 篇 faculty of compu...
  • 5 篇 department of in...
  • 4 篇 faculty of compu...
  • 4 篇 department of co...
  • 4 篇 department of so...
  • 4 篇 faculty of compu...
  • 4 篇 faculty of compu...
  • 4 篇 tianjin key labo...
  • 4 篇 department of so...
  • 4 篇 department of so...
  • 4 篇 universiti malay...
  • 4 篇 department of co...
  • 4 篇 software enginee...
  • 4 篇 department of in...
  • 4 篇 faculty of compu...
  • 3 篇 department of co...

作者

  • 15 篇 tutut herawan
  • 14 篇 herawan tutut
  • 6 篇 mungad m.
  • 6 篇 arshah ruzaini a...
  • 6 篇 suriya kumar sin...
  • 6 篇 sutoyo edi
  • 6 篇 mohammed mohamme...
  • 6 篇 mohd wan maseri ...
  • 6 篇 chiroma haruna
  • 6 篇 prima vitasari
  • 6 篇 muhammad nubli a...
  • 5 篇 embong abdullah
  • 5 篇 d. heric
  • 5 篇 zazula damjan
  • 5 篇 zain jasni moham...
  • 4 篇 muhammad waseem ...
  • 4 篇 deris mustafa ma...
  • 4 篇 ahmed mohammed a...
  • 4 篇 ahmad othman
  • 4 篇 khalid ali almar...

语言

  • 304 篇 英文
  • 8 篇 其他
  • 3 篇 中文
检索条件"机构=Faculty of Computer System and software Engineering"
315 条 记 录,以下是301-310 订阅
排序:
Agent Design Patterns Framework for MaSE/POAD Methodology
Agent Design Patterns Framework for MaSE/POAD Methodology
收藏 引用
ACS/IEEE International Conference on computer systems and Applications
作者: R. Mohamad S. Deris H.H. Ammar Software Engineering Department Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor Malaysia Computer Science and Electrical Engineering Department West Virginia University Morgantown WV USA
来源: 评论
Meeting the Information Assurance Crisis in the U.S. Now
收藏 引用
EDPACS 2006年 第6期28卷 1-14页
作者: Corey Schou Deborah Frincke Charles Reynolds James Frost The Associate Dean of Information Systems Programs at Idaho State University (ISU) in Pocatello and the director of the Center for Decision Support. Currently he serves as the Chair of the National Colloquium on Information System Security Education. Schou also directs the ISU National Center of Excellence in Information Assurance Education and the ISU Technology Innovation Center. Contact Corey Schou one of the authors of this article and the Chair of the NCISSE by email at Schou@*** for help in finding additional ways to address the issues raised in this article. A member of the University of Idaho College of Engineering faculty. She graduated from the University of California at Davis. Frincke is the co-director and co-founder of the university's Center for Secure and Dependable Software (CSDS). She was the program chair for the 2nd International Workshop on Recent Advances in Intrusion Detection (RAID). A professor of Computer Science at the College of Integrated Science and Technology at James Madison University in Harrisonburg Virginia. He holds a Ph.D. in computer science from the University of Texas at Austin and a BA in philosophy from the University of Houston. Reynolds is the Director of Information System Security Education at James Madison University. Since 1997 Reynolds has led the development of the first remote Internet-based curriculum that leads to an M.S. degree in computer science with a concentration in information security. Thus far 160 students have completed this program. A professor of computer information systems at Idaho State University and the manager of its Simplot Decision Support Center.
T he only difference etween evolution and revolution is the speed at which each occurs.
来源: 评论
Modulus maximum image energy using maximum entropy
Modulus maximum image energy using maximum entropy
收藏 引用
International Symposium on Electronics in Marine (ELMAR)
作者: D. Heric D. Zazula Univerza v Mariboru Maribor SI Faculty of Electrical Engineering and Computer Science Laboratory of System Software Laboratory Maribor Slovenia
A negative gradient of the image energy is a driving force, which controls the movement of an active contour. We might say that the final shape depends most on how well the image energy is defined. Traditional image e... 详细信息
来源: 评论
An architecture design of the intelligent agent for speech recognition and translation
An architecture design of the intelligent agent for speech r...
收藏 引用
IEEE TENCON 2004 - 2004 IEEE Region 10 Conference: Analog and Digital Techniques in Electrical engineering
作者: Bin Ahmad, Abd. Manan Bin Ag.Nordin, Ag.Noorajis Saaim, Emrul Hamide Md. Bin Samaon, Den Fairol Bin Ibrahim, Mohd Danial Department of Software Engineering Faculty of Computer Science and Information System University of Technology Malaysia
An architecture design of the intelligent agent for speech recognition and translation is presented in this paper. The design involves the agent architecture and the method of the agent is used. The architecture desig... 详细信息
来源: 评论
Recurrent neural network with backpropagation through time for speech recognition
Recurrent neural network with backpropagation through time f...
收藏 引用
IEEE International Symposium on Communications and Information Technologies: Smart Info-Media systems, ISCIT 2004
作者: Ahmad, Abdul Manan Ismail, Saliza Samaon, Den Fairol Universiti Teknologi Malaysia Department of Software Engineering Faculty of Computer Science and Information System Universiti Teknologi Malaysia 81310 Skudai Johor Darul Takzim Malaysia
The study on speech recognition and understanding has been done for many years. In this paper, we propose a fully-connected hidden layer between the input and state nodes and the output. Besides that, we also investig... 详细信息
来源: 评论
Bone segmentation WA-algorithm
Bone segmentation WA-algorithm
收藏 引用
Proceedings of the Nordic Signal Processing Symposium (NORSIG)
作者: D. Heric B. Potocnik Faculty of Electrical Engineering and Computer Science System Software Laboratory University of Maribor Maribor Slovenia
来源: 评论
Image processing verification tool-IPVT
Image processing verification tool-IPVT
收藏 引用
Proceedings of the Nordic Signal Processing Symposium (NORSIG)
作者: D. Heric B. Potocnik Faculty of Laboratory of Electrical Engineering and Computer Science System Software Laboratory University of Maribor Maribor Slovenia
来源: 评论
An architecture design of the intelligent agent for speech recognition and translation
An architecture design of the intelligent agent for speech r...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: A.M.B. Ahmad A.N.B.A. Nordin E.H.M. Saaim Den Fairol bin Samaon M.D.B. Ibrahim Speech Recognition Laboratory Department of Software Engineering Faculty of Computer Science and Information System University of Technology Malaysia
An architecture design of the intelligent agent for speech recognition and translation is presented in this paper. The design involves the agent architecture and the method of the agent is used. The architecture desig... 详细信息
来源: 评论
Recurrent neural network with backpropagation through time for speech recognition
Recurrent neural network with backpropagation through time f...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: A.M. Ahmad S. Ismail D.F. Samaon Universiti Teknologi Malaysia Malaysia Department of Software Engineering Faculty of Computer Science and Information System Universiti Teknologi Malaysia Skudai Johor Malaysia
Speech recognition and understanding have been studied for many years. The neural network is well-known as a technique that is able to classify nonlinear problems. Much research has been done in applying neural networ... 详细信息
来源: 评论
Architecture of the virtual training system for buoyancy control  03
Architecture of the virtual training system for buoyancy con...
收藏 引用
9th EUROGRAPHICS Workshop on Virtual Environments, EGVE 2003
作者: Korošec, Dean Slavinec, Mitja Bernad, Dani Kolarič, Primož Prnaver, Katja University of Maribor Faculty of Electrical Engineering and Computer Science System Software Laboratory Slovenia University of Maribor Faculty of Education Department of Physics Slovenia Regional Development Agency Mura Murska Sobota Slovenia
In this paper we present the structure of the simulator which would allow diving beginners to experience the effect of buoyancy control mechanisms before actually entering the *** believe such training would be less s... 详细信息
来源: 评论