咨询与建议

限定检索结果

文献类型

  • 745 篇 会议
  • 335 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 1,098 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 664 篇 工学
    • 523 篇 计算机科学与技术...
    • 432 篇 软件工程
    • 120 篇 信息与通信工程
    • 100 篇 控制科学与工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 55 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 37 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 302 篇 理学
    • 158 篇 数学
    • 85 篇 物理学
    • 83 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 217 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 55 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 31 篇 法学
    • 23 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 15 篇 教育学
  • 12 篇 农学
  • 5 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 43 篇 software enginee...
  • 27 篇 deep learning
  • 25 篇 computers
  • 22 篇 machine learning
  • 22 篇 artificial intel...
  • 21 篇 feature extracti...
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 accuracy
  • 19 篇 computational mo...
  • 19 篇 software
  • 18 篇 optimization
  • 18 篇 software testing
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 14 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 faculty of compu...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 jasni mohamad za...
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,061 篇 英文
  • 29 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems Software Engineering"
1098 条 记 录,以下是301-310 订阅
排序:
Collaborative Filtering Similarity Measures: Revisiting
Collaborative Filtering Similarity Measures: Revisiting
收藏 引用
作者: Hael Al-bashiri Mansoor Abdullateef Abdulgabber Awanis Romli Fadhl Hujainah Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang
This paper discussed the most commonly used similarity measures in Collaborative Filtering(CF) recommender system. In addition, the author introduced some recommendations related to CF system quality improvement which... 详细信息
来源: 评论
Effect of Using Different Propagations on Performance of OLSR and DSDV Routing Protocols
Effect of Using Different Propagations on Performance of OLS...
收藏 引用
International Conference on Intelligent systems, Modelling and Simulation
作者: Norrozila Sulaiman Ghaidaa M. Abdulsahib Osamah I. Khalaf Muamer N. Mohammed Faculty of Computer Systems & Software Engineering University Malaysia Pahang
The performance of Ad hoc routing protocol always has been measured by using free-space model and Two-ray ground model. But these two models are very simple and can't represent real world propagation, because they... 详细信息
来源: 评论
Using an Enhanced Feed-Forward Neural Network Technique for Prediction of Students' Performance
Using an Enhanced Feed-Forward Neural Network Technique for ...
收藏 引用
3rd International Multi-Conference on computer, Electrical, Electronics and Mechanical engineering (IMCEEME’15);3rd International Multi-Conference on Agricultural Chemical, Biological and Ecosystems (IMACBE’15)
作者: Adeleke Ajiboye Ruzaini Abdullah-Arshah Hongwu Qin the Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang
The newly admitted students for the undergraduate programmes in the institutions of higher learning sometimes experience some academic adjustment that is associated with stress;many factors have been attributed to thi... 详细信息
来源: 评论
Parameter Free Flower Algorithm Based Strategy for Pairwise Testing
Parameter Free Flower Algorithm Based Strategy for Pairwise ...
收藏 引用
2018年第七届软件与计算机应用国际会议
作者: Abdullah B.Nasser Kamal Z.Zamli Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang
Adopted to solve optimization problems, meta-heuristic algorithms aim to judiciously explore the search space in search of the good optimal solution. As such, the effectiveness of any particular meta-heuristic algorit... 详细信息
来源: 评论
Intrusion Detection System Based on SVM for WLAN
收藏 引用
Procedia Technology 2012年 1卷 313-317页
作者: Muamer N. Mohammed Norrozila Sulaiman Faculty of Computer Systems and Software Engineering University Malaysia Pahang 26300 Kuantan Malaysia
Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion sys... 详细信息
来源: 评论
Preserving data replication consistency through ROWA-MSTS
Preserving data replication consistency through ROWA-MSTS
收藏 引用
2nd International Conference on software engineering and computer systems, ICSECS 2011
作者: Ahmad, Noraziah Mohd. Sidek, Roslina Klaib, Mohammad F. J. Che Fauzi, Ainul Azila Abd Wahab, Mohd. Helmy Wan Mohd., Wan Maseri Faculty of Computer Systems and Software Engineering University Malaysia Pahang Pahang Malaysia Faculty of Science and Information Technology Jadara University Irbid Jordan Faculty of Electric and Electronic Universiti Tun Hussein Onn Malaysia Johor Malaysia
In modern distributed systems, replication receives particular awareness to provide high data availability, reliability and enhance the performance of the system. Replication becomes as significant mechanism since it ... 详细信息
来源: 评论
An algorithm of conversion between relational data and graph schema  2nd
An algorithm of conversion between relational data and graph...
收藏 引用
2nd International conference on Europe Middle East and North Africa Information systems and Technologies to support Learning, EMENA-ISTL 2018
作者: Ait El Mouden, Zakariyaa Jakimi, Abdeslam Hajar, Moha Software Engineering and Information Systems Engineering Team Faculty of Sciences Technologies Errachidia Moulay Ismail University Meknes Morocco Operational Research and Computer Science Team Faculty of Sciences Technologies Errachidia Moulay Ismail University Meknes Morocco
This paper presents an approach of modeling a relational data by graphs using a specific open source format named Graph Exchange XML Format (GEXF), this approach can take us from a random data stored in a relational m... 详细信息
来源: 评论
I-superior approach to study the stability of logistic map
I-superior approach to study the stability of logistic map
收藏 引用
International Conference on Mechanical and Electrical Technology
作者: Rani, Mamta Goel, Saurabh Faculty of Computer Systems and Software Engineering University Malaysia Pahang 26300 Gambang Kuantan Pahang Malaysia Dep. of Computer Science Galgotias Institute of Mang. and Tech. Greater Noida India
Verlhust logistic map f(x) = r x (1 - x) is a widely studied and applicable model in discrete dynamical system. Its behavior has been, extensively, studied in Picard orbit and recently studied in superior orbit. Rani ... 详细信息
来源: 评论
Scheduling Tool for Deterministic Communication in Distributed Real-Time systems  10
Scheduling Tool for Deterministic Communication in Distribut...
收藏 引用
10th Workshop on software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2023
作者: Mach, Jan Tašková, Valéria Kohútka, Lukáš Institute of Computer Engineering and Applied Informatics Faculty of Informatics and Information Technologies Slovak University of Technology Bratislava Slovakia Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology Bratislava Slovakia
A network with critical data streams, where the timing of incoming and outgoing data is a necessity, is called a deterministic network. These networks are mostly used in association with real-time systems that use per... 详细信息
来源: 评论
Anonymous yoking-group proofs  15
Anonymous yoking-group proofs
收藏 引用
10th ACM Symposium on Information, computer and Communications Security, ASIACCS 2015
作者: Li, Nan Mu, Yi Susilo, Willy Varadharajan, Vijay Centre for Computer and Information Security School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Information and Networked Systems Security Research Department of Computing Faculty of Science Macquarie University Sydney Australia
Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that multi-group of tags... 详细信息
来源: 评论