咨询与建议

限定检索结果

文献类型

  • 745 篇 会议
  • 334 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 1,097 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 661 篇 工学
    • 521 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 118 篇 信息与通信工程
    • 101 篇 控制科学与工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 53 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 36 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 300 篇 理学
    • 157 篇 数学
    • 84 篇 生物学
    • 83 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 217 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 56 篇 医学
    • 51 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 32 篇 法学
    • 24 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 16 篇 教育学
  • 12 篇 农学
  • 5 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 43 篇 software enginee...
  • 28 篇 deep learning
  • 25 篇 computers
  • 23 篇 artificial intel...
  • 22 篇 feature extracti...
  • 22 篇 machine learning
  • 21 篇 accuracy
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 computational mo...
  • 19 篇 software
  • 18 篇 optimization
  • 18 篇 software testing
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 14 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 faculty of compu...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 jasni mohamad za...
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,062 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems Software Engineering"
1097 条 记 录,以下是591-600 订阅
排序:
Cloud scalable multi-objective task scheduling algorithm for cloud computing using cat swarm optimization and simulated annealing  8
Cloud scalable multi-objective task scheduling algorithm for...
收藏 引用
8th International Conference on Information Technology, ICIT 2017
作者: Gabi, Danlami Ismail, Abdul Samad Zainal, Anazida Zakaria, Zalmiyah Al-Khasawneh, Ahmad Department of Computer Science Faculty of Computing Universiti Teknologi Malaysia Skudai Johor81310 Malaysia Department of Computer Science Kebbi State University of Science and Technology Aliero Nigeria Department of Software Engineering Faculty of Computing Universiti Teknologi Malaysia Skudai Johor81310 Malaysia Computer and Information Systems Faculty of Prince Al-Hussein Bin Abdullah II of Information Technology Hashemite University Zarqa Jordan
In cloud computing, customers-desired Quality of Service (QoS) expectations are quite superficial due to lack of scalable task scheduling solutions that can adjust to long-time changes. Researchers in the literature h... 详细信息
来源: 评论
A conceptual model of e-learning based on cloud computing adoption in higher education institutions
A conceptual model of e-learning based on cloud computing ad...
收藏 引用
International Conference on Electrical and Computing Technologies and Applications (ICECTA)
作者: Qasim Al Ajmi Ruzaini Abdullah Arshah Adzhar Kamaludin Ali Safa Sadiq Mohammed A. Al-Sharafi Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Gambang Kuantan Pahang Malaysia Faculty of Computer Science & MIS Oman College of Management & Technology Barka Oman Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Gambang Kuantan Pahang Malaysia School of Information Technology Monash University Bandar Sunway Malaysia
Cloud computing refers to adopting advanced virtualized resources for high scalability that can be shared with end users. Utilization of this technology is expediting in the world to intensify the potential of cloud c... 详细信息
来源: 评论
Review of deep convolution neural network in image classification
Review of deep convolution neural network in image classific...
收藏 引用
International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET)
作者: Ahmed Ali Mohammed Al-Saffar Hai Tao Mohammed Ahmed Talab Universiti Malaysia Pahang Kuantan Pahang MY Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Pahang Malaysia
With the development of large data age, Convolutional neural networks (CNNs) with more hidden layers have more complex network structure and more powerful feature learning and feature expression abilities than traditi... 详细信息
来源: 评论
Multi-view hybrid embedding: A divide-and-conquer approach
arXiv
收藏 引用
arXiv 2018年
作者: Xu, Jiamiao Yu, Shujian You, Xinge Leng, Mengjun Jing, Xiao-Yuan Chen, C. L. Philip School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States Department of Computer Science University of Houston HoustonTX77204 United States State Key Laboratory of Software Engineering School of Computer Wuhan University China Department of Computer and Information Science Faculty of Science and Technology University of Macau Macau99999 China Dalian Maritime University Dalian116026 China State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing100080 China
We present a novel cross-view classification algorithm where the gallery and probe data come from different views. A popular approach to tackle this problem is the multiview subspace learning (MvSL) that aims to learn... 详细信息
来源: 评论
Assessing self-efficacy and college readiness level among new undergraduate students in computer science using metacognitive awareness inventory (MAI)
收藏 引用
IOP Conference Series: Materials Science and engineering 2018年 第1期342卷
作者: Wan Nor Afiqah Wan Othman Aziman Abdullah Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Lebuh Raya Tun Razak 26300 Kuantan Pahang Malaysia.
This preliminary study was conducted to address the issue of academic planning skills among new university student. Due to lack of proper measurement mechanism for awareness and readiness among students, this study pr...
来源: 评论
Circular antenna array design for breast Cancer detection
arXiv
收藏 引用
arXiv 2018年
作者: Ouerghi, K. Fadlallah, N. Smida, A. Ghayoula, R. Fattahi, J. Boulejfen, N. Unit of Research in High Frequency Electronic Circuits and Systems Faculty of Mathematical Physical and Natural Sciences of Tunis Tunis El Manar University Tunisia RADIOCOM Institut of Technology saida P.O.Box 813 #36 Lebanon Department of Computer Science and Software Engineering Laval University Quebec Canada Research Center for Microelectronics and Nanotechnology Technopole Sousse Sousse4050 Tunisia
— —Microwave imaging for breast cancer detection is based on the contrast in the electrical properties of healthy fatty breast tissues. This paper presents an industrial, scientific and medical (ISM) bands comparati... 详细信息
来源: 评论
Mobile Cloud Computing with SOAP and REST Web Services
收藏 引用
Journal of Physics: Conference Series 2018年 第1期1018卷 012005-012005页
作者: Mushtaq, Ali Mohamad Fadli Zolkipli Anwar, Shahid Jasni Mohamad Zain Faculty of Computer Systems & Software Engineering. Universiti Malaysia Pahang Gambang 26300 Malaysia Faculty of Computer & Mathematical Sciences Universiti Teknology MARA (UiTM) 40450 Shah Alam Selangor Malaysia
Mobile computing in conjunction with Mobile web services drives a strong approach where the limitations of mobile devices may possibly be tackled. Mobile Web Services are based on two types of technologies; SOAP and R...
来源: 评论
SSERBC 2017: Sclera segmentation and eye recognition benchmarking competition
SSERBC 2017: Sclera segmentation and eye recognition benchma...
收藏 引用
2017 IEEE International Joint Conference on Biometrics, IJCB 2017
作者: Das, Abhijit Pal, Umapada Ferrer, Miguel A. Blumenstein, Michael Štepec, Dejan Rot, Peter Emeršič, Žiga Peer, Peter Štruc, Vitomir Kumar, S.V. Aruna Harish, B.S. Institute for Integrated and Intelligent Systems Griffith University QLD Australia Computer Vision and Pattern Recognition Unit Indian Statistical Institute Kolkata India IDeTIC University of Las Palmas de Gran Canaria Las Palmas Spain School of Software University of Technology Sydney Australia Faculty of Computer and Information Science University of Ljubljana Ljubljana Slovenia Department of Information Science and Engineering Sri Jayachamrajendra College of Engineering Mysusru Karnataka India
This paper summarises the results of the Sclera Segmentation and Eye Recognition Benchmarking Competition (SSERBC 2017). It was organised in the context of the International Joint Conference on Biometrics (IJCB 2017).... 详细信息
来源: 评论
Information Leakage Problem in High-Capacity Quantum Secure Communication with Authentication Using Einstein-Podolsky-Rosen Pairs
收藏 引用
Chinese Physics Letters 2016年 第7期33卷 14-15页
作者: 刘志昊 陈汉武 刘文杰 School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration(Ministry of Education) Southeast University Centre for Quantum Computation and Intelligent Systems Faculty of Engineering and Information TechnologyUniversity of Technology Sydney School of Computer and Software Nanjing University of Information Science & Technology
The information leakage problem often exists in bidirectional quantum secure direct communication or quantum dialogue. In this work, we find that this problem also exists in the one-way quantum secure communication pr... 详细信息
来源: 评论
AIRSE: An approach for attack intention recognition based on similarity of evidences  1
AIRSE: An approach for attack intention recognition based on...
收藏 引用
1st EAI International Conference on computer Science and engineering, COMPSE 2016
作者: Ahmed, Abdulghani Ali Zaman, Noorul Ahlami Kamarul Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Kuantan Pahang26300 Malaysia
Sensitive information can be exposed to critical risks when communicated through computer networks. The ability of attackers in hiding their attacks' intention obstructs existing protection systems to early preven... 详细信息
来源: 评论