咨询与建议

限定检索结果

文献类型

  • 745 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 1,075 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 659 篇 工学
    • 519 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 118 篇 信息与通信工程
    • 100 篇 控制科学与工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 53 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 36 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 299 篇 理学
    • 157 篇 数学
    • 83 篇 物理学
    • 83 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 217 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 55 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 31 篇 法学
    • 23 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 15 篇 教育学
  • 12 篇 农学
  • 5 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 36 篇 software enginee...
  • 27 篇 deep learning
  • 25 篇 computers
  • 22 篇 machine learning
  • 21 篇 feature extracti...
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 accuracy
  • 19 篇 computational mo...
  • 19 篇 software
  • 18 篇 optimization
  • 18 篇 software testing
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 artificial intel...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 13 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 department of co...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 jasni mohamad za...
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,040 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems Software Engineering"
1075 条 记 录,以下是371-380 订阅
排序:
Weather Data Analysis Using Hadoop: Applications and Challenges
Weather Data Analysis Using Hadoop: Applications and Challen...
收藏 引用
International Conference on Green engineering Technology and Applied Computing 2019, IConGETech2 019 and International Conference on Applied Computing 2019, ICAC 2019
作者: Adam Ibrahim Fakherldin, Mohammed Adam, Khalid Akma Abu Bakar, Noor Abdul Majid, Mazlina Faculty of Computer System and Software Engineering Universiti Malaysia Pahang Malaysia Faculty of Electric and Electronic Engineering Universiti Malaysia Pahang Malaysia Faculty of Computer Science and Information Systems Jazan University Malaysia
Weather data is very crucial in every aspect of human daily life. It plays an important role in many sectors such as agriculture, tourism, government planning, industry and so on. Weather has a variety of parameters l... 详细信息
来源: 评论
Detection and Prevention of Jellyfish Attacks Using kNN Algorithm and Trusted Routing Scheme in MANET
收藏 引用
International Journal of Network Security 2021年 第1期23卷 77-87页
作者: Zardari, Zulfiqar Ali He, Jingsha Pathan, Muhammad Salman Qureshi, Sirajuddin Hussain, Muhammad Iftikhar Razaque, Fahad He, Peng Zhu, Nafei Faculty of Information Technology Beijing Engineering Research Center for IoT Software and Systems Beijing University of Technology Beijing100124 China College of Computer and Information Science China Three Gorges University YichangHubei443002 China
Mobile ad hoc networks (MANETs) are surrounded by various vulnerabilities and attacks due to open medium, dynamic topology, limited energy, and absence of central control. In MANET, each attack has different behavior ... 详细信息
来源: 评论
Russian natural language generation: Creation of a language modeling dataset and evaluation with modern neural architectures
arXiv
收藏 引用
arXiv 2020年
作者: Shaheen, Z. Wohlgenannt, G. Zaity, B. Mouromtsev, D.I. Pak, V.G. Faculty of Software Engineering and Computer Systems Itmo University St. Petersburg Russia St. Petersburg Russia
Generating coherent, grammatically correct, and meaningful text is very challenging, however, it is crucial to many modern NLP systems. So far, research has mostly focused on English language, for other languages both... 详细信息
来源: 评论
T
arXiv
收藏 引用
arXiv 2020年
作者: Aloufi, Khalid S. Alsewari, Abdulrahman A. Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Kuantan Mala sia26300 Department of Computer Engineering College of Computer Science and Engineering Taibah University Medina Saudi Arabia
This research presents a methodology for trusting the provenance of data on the web. The implication is that data does not change after publication and the source of the data is stable. There are different data that s... 详细信息
来源: 评论
An Improved Image Compression Technique using Large Adaptive DCT Psychovisual Thresholds  2
An Improved Image Compression Technique using Large Adaptive...
收藏 引用
2nd IEEE International Conference on Knowledge Innovation and Invention, ICKII 2019
作者: Ernawan, Ferda Kabir, Muhammad Nomani Mustaffa, Zuriani Moorthy, Kohbalan Ramalingam, Mritha Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak Gambang Pahang26300 Malaysia
High quality multimedia requires high bandwidth and data transfer rate to transmit multimedia data in communication networks. Image compression is one of solutions to reduce the storage of multimedia data which in tur... 详细信息
来源: 评论
A Brief Review of Explainable Artificial Intelligence in Healthcare
arXiv
收藏 引用
arXiv 2023年
作者: Sadeghi, Zahra Alizadehsani, Roohallah Cifci, Mehmet Akif Kausar, Samina Rehman, Rizwan Mahanta, Priyakshi Bora, Pranjal Kumar Almasri, Ammar Alkhawaldeh, Rami S. Hussain, Sadiq Alatas, Bilal Shoeibi, Afshin Moosaei, Hossein Hladík, Milan Nahavandi, Saeid Pardalos, Panos M. Institute for Big Data Analytics Faculty of Computer Science Dalhousie University Canada Deakin University Geelong Australia The Institute of Computer Technology Tu Wien University Vienna1040 Austria University of Kotli Azad Jammu and Kashmir Azad Kashmir Kotli Pakistan Centre for Computer Science and Applications Dibrugarh University Assam India Department of Management Information Sys Al-Balqa Applied University Salt19117 Jordan Department of Computer Information Systems The University of Jordan Aqaba77110 Jordan Examination Branch Dibrugarh University Assam Dibrugarh India Department of Software Eng. Firat University Elazig23100 Turkey Data Science and Computational Intelligence Institute University of Granada Spain Department of Informatics Faculty of Science Jan Evangelista Purkyně University in Ústí nad Labem Czech Republic Department of Applied Mathematics School of Computer Science Faculty of Mathematics and Physics Charles University Prague Czech Republic Harvard Paulson School of Engineering and Applied Sciences Harvard University AllstonMA02134 United States Center for Applied Optimization Department of Industrial and Systems Engineering University of Florida Gainesville32611 United States
XAI refers to the techniques and methods for building AI applications which assist end users to interpret output and predictions of AI models. Black box AI applications in high-stakes decision-making situations, such ... 详细信息
来源: 评论
PhenoProfiler: Advancing Phenotypic Learning for Image-based Drug Discovery
arXiv
收藏 引用
arXiv 2025年
作者: Li, Bo Zhang, Bob Zhang, Chengyang Zhou, Minghao Huang, Weiliang Wang, Shihang Wang, Qing Li, Mengran Zhang, Yong Song, Qianqian PAMI Research Group Department of Computer and Information Science University of Macau Taipa China Beijing Key Laboratory of Multimedia and Intelligent Software Technology Beijing Institute of Artificial Intelligence Beijing University of Technology Beijing China Department of Health Outcomes and Biomedical Informatics College of Medicine University of Florida Florida United States Faculty of Applied Sciences Macao Polytechnic University Taipa China School of Intelligent Systems Engineering Sun Yat-sen University Guangdong China Department of Cancer Biology Wake Forest School of Medicine Winston SalemNC United States
In the field of image-based drug discovery, capturing the phenotypic response of cells to various drug treatments and perturbations is a crucial step. This process involves transforming high-throughput cellular images... 详细信息
来源: 评论
AN IMPROVED GENERIC ER SCHEMA FOR CONCEPTUAL MODELLING OF INFORMATION systems
arXiv
收藏 引用
arXiv 2020年
作者: Pieris, D. Wijegunasekera, M.C. Dias, N.G.J. Department of HRM Faculty of Commerce and Management Studies Department of Software Engineering Faculty of Computing and Technology Department of Computer Systems Engineering Faculty of Computing and Technology University of Kelaniya Sri Lanka
The Entity Relationship (ER) model is widely used for creating ER schemas for modelling application domains in the field of Information systems development. However, when an ER schema is transformed to a Relational Da... 详细信息
来源: 评论
A framework for managing enterprise architecture debts - Outline and research directions  10
A framework for managing enterprise architecture debts - Out...
收藏 引用
10th International Workshop on Enterprise Modeling and Information systems Architectures, EMISA 2020
作者: Alexander, Peter Hacks, Simon Jung, Jürgen Lichter, Horst Steffens, Ulrike Uludağ, Ömer RWTH Aachen University Research Group Software Construction Aachen Germany KTH Royal Institute of Technology Network and Systems Engineering Stockholm Sweden Frankfurt University of Applied Sciences Faculty of Computer Science and Engineering Frankfurt Germany Hamburg University of Applied Sciences Department of Computer Science Hamburg Germany Technical University of Munich Department of Informatics Munich Germany
Even though enterprise architecture management (EAM) offers a wide range of methods and tools for aligning business with IT, an architect’s work is challenged by reality. The evolution of enterprise architecture (EA)... 详细信息
来源: 评论
Natidroid: Cross-language android permission specification
arXiv
收藏 引用
arXiv 2021年
作者: Li, Chaoran Chen, Xiao Sun, Ruoxi Xue, Jason Wen, Sheng Ahmed, Muhammad Ejaz Camtepe, Seyit Xiang, Yang School of Software and Electrical Engineering Swinburne University of Technology HawthornVIC3122 Australia Department of Software Systems and Cybersecurity Faculty of IT Monash University ClaytonVIC3800 Australia School of Computer Science University of Adelaide North TerraceSA5005 Australia CSIRO Data61 Australia
The Android system manages access to sensitive APIs by permission enforcement. An application (app) must declare proper permissions before invoking specific Android APIs. However, there is no official documentation pr... 详细信息
来源: 评论