咨询与建议

限定检索结果

文献类型

  • 745 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 1,075 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 659 篇 工学
    • 519 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 118 篇 信息与通信工程
    • 100 篇 控制科学与工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 53 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 36 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 299 篇 理学
    • 157 篇 数学
    • 83 篇 物理学
    • 83 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 217 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 55 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 31 篇 法学
    • 23 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 15 篇 教育学
  • 12 篇 农学
  • 5 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 36 篇 software enginee...
  • 27 篇 deep learning
  • 25 篇 computers
  • 22 篇 machine learning
  • 21 篇 feature extracti...
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 accuracy
  • 19 篇 computational mo...
  • 19 篇 software
  • 18 篇 optimization
  • 18 篇 software testing
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 artificial intel...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 13 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 department of co...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 jasni mohamad za...
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,040 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems Software Engineering"
1075 条 记 录,以下是381-390 订阅
排序:
An Exploratory Study on the Introduction and Removal of Different Types of Technical Debt
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Jiakun Huang, Qiao Xia, Xin Shihab, Emad Lo, David Li, Shanping College of Computer Science and Technology Zhejiang University China PengCheng Laboratory China College of Computer Science and Technology Zhejiang University China Faculty of Information Technology Monash University Melbourne Australia Department of Computer Science and Software Engineering Concordia University Canada School of Information Systems Singapore Management University Singapore
To complete tasks faster, developers often have to sacrifice the quality of the software. Such compromised practice results in the increasing burden to developers in future development. The metaphor, technical debt, d... 详细信息
来源: 评论
A Review on Type of Attacks on Fingerprint Image and Watermarking Techniques
A Review on Type of Attacks on Fingerprint Image and Waterma...
收藏 引用
International Conference on Green engineering Technology and Applied Computing 2019, IConGETech2 019 and International Conference on Applied Computing 2019, ICAC 2019
作者: Lebcir, Mohamed Awang, Suryanti Faculty of Computer Systems and Software Engineering University Malaysia Pahang UMP Lebuhraya Tun Razak Kuantan Pahang 26300 Malaysia
Fingerprint image watermarking techniques have several advantages over traditional security systems that based on token or knowledge. However, they are also vulnerable to attacks that can decrease their security. In t... 详细信息
来源: 评论
Multi-dimensional K-Means Algorithm for Student Clustering  2nd
Multi-dimensional K-Means Algorithm for Student Clustering
收藏 引用
2nd International Conference on Advanced Data and Information engineering, DaEng 2015
作者: Mohd, Wan Maseri Wan Beg, A.H. Herawan, Tutut Noraziah, Ahmad Chiroma, Haruna Faculty of Computer Systems & Software Engineering University Malaysia Pahang Lebuhraya Tun Razak Gambang KuantanPahang26300 Malaysia
K-Means is one of the popular methods for generating clusters. It is very well-known and commonly used for its convenience and fastness. The main disadvantage of these criteria is that user should specify the number o... 详细信息
来源: 评论
Corrections to “An Ensemble Hybrid Framework: A Comparative Analysis of Metaheuristic Algorithms for Ensemble Hybrid CNN Features for Plants Disease Classification”
收藏 引用
IEEE Access 2025年 13卷 31659-31659页
作者: Khaoula Taji Ali Sohail Tariq Shahzad Bilal Shoaib Khan Muhammad Adnan Khan Khmaies Ouahada Electronic Systems Information Processing Mechanics and Energy Laboratory Kenitra Faculty of Sciences Ibn Tofail University Kenitra Morocco Department of Computer Science Minhaj University Lahore Lahore Pakistan Department of Electrical and Electronic Engineering Science University of Johannesburg Johannesburg South Africa Department of Computer Science Green International University Lahore Pakistan Department of Software Faculty of Artificial Intelligence and Software Gachon University Seongnam-si Republic of Korea
Presents corrections to the paper, Corrections to “An Ensemble Hybrid Framework: A Comparative Analysis of Metaheuristic Algorithms for Ensemble Hybrid CNN Features for Plants Disease Classification”.
来源: 评论
Reasoning like human: Hierarchical reinforcement learning for knowledge graph reasoning  29
Reasoning like human: Hierarchical reinforcement learning fo...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Wan, Guojia Pan, Shirui Gong, Chen Zhou, Chuan Haffari, Gholamreza School of Computer Science Institute of Artificial Intelligence National Engineering Research Center for Multimedia Software Wuhan University China Faculty of Information Technology Monash University Australia School of Computer Science and Engineering Nanjing University of Science and Technology China Department of Computing Hong Kong Polytechnic University Hong Kong Academy of Mathematics and Systems Science Chinese Academy of Sciences China
Knowledge Graphs typically suffer from incompleteness. A popular approach to knowledge graph completion is to infer missing knowledge by multi-hop reasoning over the information found along other paths connecting a pa... 详细信息
来源: 评论
A Brief Review of Explainable Artificial Intelligence in Healthcare
SSRN
收藏 引用
SSRN 2023年
作者: Sadeghi, Zahra Alizadehsani, Roohallah Cifci, Mehmet Akif Kausar, Samina Rehman, Rizwan Mahanta, Priyakshi Bora, Pranjal Kumar Almasri, Ammar Alkhawaldeh, Rami S. Hussain, Sadiq Alatas, Bilal Shoeibi, Afshin Moosaei, Hossein Hladík, Milan Nahavandi, Saeid Pardalo, Panos M. Institute for Big Data Analytics Faculty of Computer Science Dalhousie University Canada Deakin University Geelong Australia The Institute of Computer Technology Tu Wien University Vienna1040 Austria University of Kotli Azad Jammu and Kashmir Azad Kashmir Kotli Pakistan Centre for Computer Science and Applications Dibrugarh University Assam India Department of Management Information Sys Al-Balqa Applied University Salt19117 Jordan Department of Computer Information Systems The University of Jordan Aqaba77110 Jordan Examination Branch Dibrugarh University Assam Dibrugarh India Department of Software Eng. Firat University Elazig23100 Turkey Data Science and Computational Intelligence Institute University of Granada Spain Department of Informatics Faculty of Science Jan Evangelista Purkyně University in Ústí nad Labem Czech Republic Department of Applied Mathematics School of Computer Science Faculty of Mathematics and Physics Charles University Prague Czech Republic Harvard Paulson School of Engineering and Applied Sciences Harvard University AllstonMA02134 United States Swinburne University of Technology HawthornVIC3122 Australia Center for Applied Optimization Department of Industrial and Systems Engineering University of Florida Gainesville32611 United States
XAI refers to the techniques and methods for building AI applications which assist end users to interpret output and predictions of AI models. Black box AI applications in high-stakes decision-making situations, such ... 详细信息
来源: 评论
Mobile-based Intelligent Skin Diseases Diagnosis System  1
Mobile-based Intelligent Skin Diseases Diagnosis System
收藏 引用
1st International Conference of Intelligent Computing and engineering, ICOICE 2019
作者: Sallam, Amer Ba Alawi, Abdulfattah E. Al-Saced Faculty of Engineering IT Taiz University Computer Networks and Distributed Systems Dept Taiz Yemen Al-Saecd Faculty of Engineering IT Taiz University Software Engineering Dept Taiz Yemen
Skin diseases are the most common diseases in humans. The inherent variability in the appearance of skin diseases makes it hard even for medical experts to detect disease type from dermoscopic images. Recent advances ... 详细信息
来源: 评论
Risk Assessment for Power Circuit Breaker by Using Failure Modes, Effects and Criticality Analysis
Risk Assessment for Power Circuit Breaker by Using Failure M...
收藏 引用
2020 International Conference on Power, Energy and Innovations, ICPEI 2020
作者: Promseela, Lineman Suwanasri, Cattareeya Saribut, Surapol Suwanasri, Thanapong Phadungthin, Rattanakorn King Mongkut's University of Technology North Bangkok Electrical and Computer Engineering Faculty of Engineering Bangkok Thailand King Mongkut's University of Technology North Bangkok Electrical and Software Systems Engineering The Sirindhorn International Thai-German School of Engineering Bangkok Thailand King Mongkut's University of Technology North Bangkok Electronics Engineering Technology College of Industrial Technology Bangkok Thailand
This paper explains risk assessment for circuit breaker utilization by using failure modes, effects, and criticality analysis (FMECA). The circuit breaker components are divided into three main parts such as live part... 详细信息
来源: 评论
Multi-Resolution Localization of Individual Logs in Wooden Piles Utilizing YOLO with Tiling on Client/Server Architectures  33
Multi-Resolution Localization of Individual Logs in Wooden P...
收藏 引用
33rd European Modeling and Simulation Symposium, EMSS 2021
作者: Praschl, Christoph Auersperg-Castell, Philipp Forster-Heinlein, Brigitte Zwettler, Gerald Adam Research Group Advanced Information Systems and Technology Research and Development Department University of Applied Sciences Upper Austria Softwarepark 11 Hagenberg4232 Austria Department of Software Engineering School of Informatics Communications and Media University of Applied Sciences Upper Austria Softwarepark 11 Hagenberg4232 Austria Bluedynamics Auersperg-Castell KG Kritzing 31 Freinberg4785 Austria Faculty of Computer Science and Mathematics University of Passau Innstraße 43 Passau94032 Germany
In industrial domains with time and cost intensive manual or semi-automated inspection the demand for automation is high. Utilizing state of the art deep learning models for localization in vision-based domains such a... 详细信息
来源: 评论
The personification of the user’s interface: classification vs. Clusterization of users of online courses  12
The personification of the user’s interface: classification...
收藏 引用
12th International Scientific and Practical Conference on Environment. Technology. Resources
作者: Matrosova, Nataliia D. Shtennikov, Dmitry G. Faculty of Software Engineering and Computer Systems Saint-Petersburg National Research University of Information Technologies Mechanics and Optics Saint-Petersburg Russia
Researchers compared the classification and the clusterization of users of online course for the personification of the users’ information system interface. When interacting with control and information systems, user... 详细信息
来源: 评论