咨询与建议

限定检索结果

文献类型

  • 745 篇 会议
  • 331 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 1,094 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 520 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 118 篇 信息与通信工程
    • 100 篇 控制科学与工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 53 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 36 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 299 篇 理学
    • 157 篇 数学
    • 83 篇 物理学
    • 83 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 217 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 55 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 31 篇 法学
    • 23 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 15 篇 教育学
  • 12 篇 农学
  • 5 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 43 篇 software enginee...
  • 27 篇 deep learning
  • 25 篇 computers
  • 22 篇 machine learning
  • 21 篇 feature extracti...
  • 21 篇 artificial intel...
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 accuracy
  • 19 篇 computational mo...
  • 19 篇 software
  • 18 篇 optimization
  • 18 篇 software testing
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 14 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 faculty of compu...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 jasni mohamad za...
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,059 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems Software Engineering"
1094 条 记 录,以下是991-1000 订阅
排序:
Compact modelling of Through-Silicon Vias (TSVs) in three-dimensional (3-D) integrated circuits
Compact modelling of Through-Silicon Vias (TSVs) in three-di...
收藏 引用
IEEE International Conference on 3D System Integration, 3DIC
作者: Roshan Weerasekera Matt Grange Dinesh Pamunuwa Hannu Tenhunen Li-Rong Zheng Department of Electronics Computer and Software Systems KTH School of Information and Communication Technologies Kista Sweden Centre of Microsystems Engineering Faculty of Science & Technology Lancaster University Lancaster UK
Modeling parasitic parameters of Through-Silicon-Via (TSV) structures is essential in exploring electrical characteristics such as delay and signal integrity (SI) of circuits and interconnections in three-dimensional ... 详细信息
来源: 评论
Study of Smart Card Technology and Probe User Awareness about It: A Case Study of Middle Eastern Students
Study of Smart Card Technology and Probe User Awareness abou...
收藏 引用
2009 2nd IEEE International Conference on computer Science and Information Technology(ICCSIT 2009)
作者: Hamed Taherdoost Mazdak Zamani Meysam Namayandeh Centre for Advanced Software Engineering Universiti Teknologi Malaysia 54100 Kuala Lumpur Malaysia Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 54100 Kuala Lumpur Malaysia
Right now,in most of the countries,inside the people’s wallet,they probably have a couple of credit cards,an identification card,automatic machine teller cards(ATM card),and maybe a few other plastic *** realizing it... 详细信息
来源: 评论
A Skipping SvS Intersection Algorithm
A Skipping SvS Intersection Algorithm
收藏 引用
International Conference on Computing, engineering and Information, ICC
作者: Jaratdech Chatchaval Veera Boonjing Pisit Chanvarasuth Software Systems Engineering Laboratory Mathematics and Computer Science Department Faculty of Science King Mongkut''s Institute of Technology Ladkrabang Thailand School of Management Technology Sirindhorn International Institute of Technology Thammasat University Pathum Thani Thailand
In this paper, we propose to improve the SvS algorithm by skipping elements of the smaller set for reducing a search boundary. The boundary of skipped element is determined by boundaries of elements prior to and next ... 详细信息
来源: 评论
Robust audio steganography via genetic algorithm
Robust audio steganography via genetic algorithm
收藏 引用
International Conference on Information and Communication Technologies (ICICT)
作者: Mazdak Zamani Hamed Taherdoost Azizah A. Manaf Rabiah B. Ahmad Akram M. Zeki Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Kuala Lumpur Malaysia College of Science and Technology Universiti Teknologi Malaysia Kuala Lumpur Malaysia Centre of Advanced Software Engineering Universiti Teknologi Malaysia Kuala Lumpur Malaysia
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of... 详细信息
来源: 评论
Managing Malware in Higher Learning Institutions
Managing Malware in Higher Learning Institutions
收藏 引用
International Conference on computer and Electrical engineering, ICCEE
作者: Zuraini Ismail Christine Simfukwe Department of Science College of Science & Technology International Campus Universiti Teknologi Malaysia Kuala Lumpur Malaysia Centre of Advanced Software Engineering Faculty of Computer Science and Information Systems International Campus Universiti Teknologi Malaysia Kuala Lumpur Malaysia
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all busin... 详细信息
来源: 评论
Introduction to the special section on advances in test automation: The evolution of TTCN-3
收藏 引用
International Journal on software Tools for Technology Transfer 2008年 第4期10卷 281-283页
作者: Schieferdecker, Ina Grabowski, Jens Design and Testing of Communication-Based Systems Faculty IV - Electrical Engineering and Computer Science Technical University Berlin Franklinstr. 28-29 Berlin 10587 Germany Software Engineering for Distributed Systems Group Institute of Computer Science University of Göttingen Lotzestrasse 16-18 Göttingen 37083 Germany
No abstract available
来源: 评论
An automatic elaborate requirement specification by using hierarchical text classification
An automatic elaborate requirement specification by using hi...
收藏 引用
International Conference on computer Science and software engineering, CSSE 2008
作者: Polpinij, Jantima Ghose, Aditya Department of Computer Science Faculty of Informatics Mahasarakham University Kantarawichai Mahasarakham 44150 Thailand Decision Systems Lab. School of Computer Science and Software Engineering Faculty of Informatics Wollongong 2500 Australia
Ambiguity is a major problem of software errors because much of the requirements specification is written in a natural language format. Therefore, it is hard to identify consistencies because this format is too ambigu... 详细信息
来源: 评论
An approach using hybrid methods to select informative genes from microarray data for cancer classification
An approach using hybrid methods to select informative genes...
收藏 引用
2nd Asia International Conference on Modelling and Simulation, AMS 2008
作者: Mohamad, Mohd Saberi Omatu, Sigeru Yoshioka, Michifumi Deris, Safaai Department of Computer Science and Intelligent Systems Graduate School of Engineering Osaka Prefecture University Sakai Osaka 599-8531 Japan Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Skudai Johore Malaysia
Recent advances in microarray technology allow scientists to measure expression levels of thousands of genes simultaneously in human tissue samples. This technology has been increasingly used in cancer research becaus... 详细信息
来源: 评论
A multi-objective strategy in genetic algorithm for gene selection of gene expression data
A multi-objective strategy in genetic algorithm for gene sel...
收藏 引用
作者: Mohamad, M.S. Omatu, S. Deris, S. Misman, M.F. Department of Computer Science and Intelligent Systems Graduate School of Engineering Osaka Prefecture University Sakai Osaka 599-8531 Japan Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Skudai Johore Malaysia
Microarray device offers the ability to measure the expression levels of thousands of genes simultaneously. It is used to collect information from tissue and cell samples regarding gene expression differences that cou... 详细信息
来源: 评论
A model for gene selection and classification of gene expression data
A model for gene selection and classification of gene expres...
收藏 引用
作者: Mohamad, M.S. Omatu, S. Deris, S. Hashim, S.Z.M. Department of Computer Science and Intelligent Systems Graduate School of Engineering Osaka Prefecture University Sakai Osaka 599-8531 Japan Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Skudai Johore Malaysia
Gene expression data are expected to be of significant help in the development of efficient cancer diagnosis and classification platforms. One problem arising from these data is how to select a small subset of genes f... 详细信息
来源: 评论