咨询与建议

限定检索结果

文献类型

  • 745 篇 会议
  • 335 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 1,098 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 664 篇 工学
    • 523 篇 计算机科学与技术...
    • 432 篇 软件工程
    • 120 篇 信息与通信工程
    • 100 篇 控制科学与工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 55 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 37 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 302 篇 理学
    • 158 篇 数学
    • 85 篇 物理学
    • 83 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 217 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 55 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 31 篇 法学
    • 23 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 15 篇 教育学
  • 12 篇 农学
  • 5 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 43 篇 software enginee...
  • 27 篇 deep learning
  • 25 篇 computers
  • 22 篇 machine learning
  • 22 篇 artificial intel...
  • 21 篇 feature extracti...
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 accuracy
  • 19 篇 computational mo...
  • 19 篇 software
  • 18 篇 optimization
  • 18 篇 software testing
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 14 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 faculty of compu...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 jasni mohamad za...
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,061 篇 英文
  • 29 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems and Software Engineering"
1098 条 记 录,以下是41-50 订阅
Neurosymbolic Architectural Reasoning: Towards Formal Analysis through Neural software Architecture Inference
arXiv
收藏 引用
arXiv 2025年
作者: Herbold, Steffen Knieke, Christoph Rausch, Andreas Schindler, Christian Faculty of Computer Science and Mathematics Universität Passau Passau Germany Institute for Software and Systems Engineering Technische Universität Clausthal Clausthal-Zellerfeld Germany
Formal analysis to ensure adherence of software to defined architectural constraints is not yet broadly used within software development, due to the effort involved in defining formal architecture models. Within this ... 详细信息
来源: 评论
Multi-probes Fusion Framework for Matching Simultaneous Latent Impressions
Multi-probes Fusion Framework for Matching Simultaneous Late...
收藏 引用
7th International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Yusof, Rozita Mohd Sulaiman, Norrozila Faculty of Computer Systems &amp'||' '||' Software Engineering Universiti Malaysia Pahang Malaysia
A multiple probes fusion framework is proposed in order to provide information at the match score level. This experiment tested 112 simultaneous latent fingerprints from IIITD SLF Database. The Gallery of Optical is u... 详细信息
来源: 评论
IP SafeGuard - An AI-Driven Malicious IP Detection Framework
收藏 引用
IEEE Access 2025年 13卷 90249-90261页
作者: Siam, Abdullah Al Alazab, Moutaz Awajan, Albara Hasan, Md Rakibul Obeidat, Areej Faruqui, Nuruzzaman Daffodil International University Daffodil Smart City Birulia Department of Software Engineering Dhaka 1216 Bangladesh Oryx Universal College with Liverpool John Moores University School of Computing and Data Sciences Cybersecurity Department Doha 34110 Qatar Al-Balqa Applied University Faculty of Artificial Intelligence Department of Intelligent Systems Al-Salt 19385 Jordan Bangladesh University of Professionals (BUP) Department of Computer Science and Engineering Dhaka Bangladesh Amman Jordan
The rising frequency and sophistication of cyberattacks have made real-time malicious IP detection a critical challenge for modern Security Operations Center (SOC). Traditional solutions, such as static blacklists and... 详细信息
来源: 评论
Lowest data replication storage of binary vote assignment data grid
Lowest data replication storage of binary vote assignment da...
收藏 引用
2nd International Conference on 'Networked Digital Technologies', NDT 2010
作者: Ahmad, Noraziah Fauzi, Ainul Azila Che Mohd. Sidek, Roslina Zin, Noriyani Mat Beg, Abul Hashem Faculty of Computer Systems and Software Engineering University Malaysia Pahang Malaysia
Data replication is one of the mechanisms in data grid architecture since it improves data access and reliability. There are many replication techniques exist in distributed systems environment include Read-One-Write-... 详细信息
来源: 评论
Investigation of security awareness on e-learning system among lecturers and students in Higher Education Institution  2
Investigation of security awareness on e-learning system amo...
收藏 引用
2nd International Conference on computer, Communications, and Control Technology, I4CT 2015
作者: Abdul Majid, Hasmanizam Abdul Majid, Mazlina Ibrahim, Mohd Izham Wan Manan, Wan Nurul Safawati Ramli, Muhammed Ramiza Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Malaysia
The advancement of computer and Internet technologies have brought teaching and learning activities to a new dimension. Learners were virtually moved out from their classrooms to a new learning environment where learn... 详细信息
来源: 评论
A study on personality identification using game based theory
A study on personality identification using game based theor...
收藏 引用
2010 2nd International Conference on computer Technology and Development, ICCTD 2010
作者: Yaakub, C.Y. Sulaiman, N. Kim, C.W. Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Malaysia
Game Based Personality Profiling Application had been develop as an application to solve the problems faced by a counselor in capturing and determine personality. There are many types of personality model and theory s... 详细信息
来源: 评论
An expert system for stress management
An expert system for stress management
收藏 引用
International Conference for Internet Technology and Secured Transactions, ICITST 2009
作者: Romli, Awanis Cha, Arnidcha Peri Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Malaysia
An Expert System for Stress Management (ESSM) is a system that mimics the role played by a psychologist or counselor of stress expert to provide a virtual consultancy. Counselor always uses these systems manually to d... 详细信息
来源: 评论
Harnessing optimization with deep learning approach on intelligent transportation system for anomaly detection in pedestrian walkways
收藏 引用
Scientific Reports 2025年 第1期15卷 1-28页
作者: Alotaibi, Sultan Refa Alrayes, Fatma S. Maashi, Mashael Maray, Mohammed Alliheedi, Mohammed A. Badawood, Donia Alotaibi, Moneerah Department of Computer Science College of Science and Humanities Dawadmi Shaqra University Shaqra Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University PO Box 84428 Riyadh 11671 Saudi Arabia Department of Software Engineering College of Computer and Information Sciences King Saud University PO Box 103786 Riyadh 11543 Saudi Arabia Department of Information Systems College of Computer Science King Khalid University Abha Saudi Arabia Department of Computing Faculty of Computing and Information Al-Baha University Al Baha Saudi Arabia Department of Data Science School of Computers Umm Al-Qura University Makkah Saudi Arabia
Anomaly Detection (AD) in pedestrian walkways is significant in urban safety and security methods. It is generally employed for perceiving unusual or abnormal situations, behaviours, or actions in regions devoted to p... 详细信息
来源: 评论
Emerging case oriented agents for sustaining educational institutions going green towards environmental responsibility
收藏 引用
Journal of systems and Information Technology 2019年 第2期21卷 186-214页
作者: Anthony Jnr, Bokolo Abdul Majid, Mazlina Romli, Awanis Department of Computer Science Norwegian University of Science and Technology NTNU Trondheim Norway Universiti Malaysia Pahang Faculty of Computer Systems and Software Engineering Kuantan Malaysia
Purpose: The purpose of this paper is to design a system deployment model that integrates case-based agent technique to develop an eco-responsibility decision support tool for greening educational institutions toward ... 详细信息
来源: 评论
The usage of block average intensity in tamper localization for image watermarking
The usage of block average intensity in tamper localization ...
收藏 引用
4th International Congress on Image and Signal Processing, CISP 2011
作者: Liew, Siau-Chuin Zain, Jasni Mohamad Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Kuantan Malaysia
Tamper localization capable image watermarking scheme is able to detect the location of manipulated areas, and verify other areas as authentic. The usage of block average intensity in the tamper localization process i... 详细信息
来源: 评论