咨询与建议

限定检索结果

文献类型

  • 747 篇 会议
  • 331 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 1,096 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 661 篇 工学
    • 520 篇 计算机科学与技术...
    • 432 篇 软件工程
    • 119 篇 信息与通信工程
    • 100 篇 控制科学与工程
    • 68 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 53 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 37 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 302 篇 理学
    • 158 篇 数学
    • 84 篇 物理学
    • 84 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 218 篇 管理学
    • 146 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 56 篇 医学
    • 51 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 32 篇 法学
    • 25 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 14 篇 教育学
  • 12 篇 农学
  • 5 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 43 篇 software enginee...
  • 28 篇 deep learning
  • 25 篇 computers
  • 22 篇 feature extracti...
  • 22 篇 machine learning
  • 22 篇 artificial intel...
  • 21 篇 accuracy
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 computational mo...
  • 19 篇 software
  • 18 篇 software testing
  • 17 篇 optimization
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 14 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 department of so...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 faculty of compu...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 jasni mohamad za...
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,043 篇 英文
  • 45 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems and Software Engineering"
1096 条 记 录,以下是611-620 订阅
排序:
Line of Approach to a Problem of Water Resistance of Anhydrite Cements
收藏 引用
Procedia engineering 2017年 172卷 982-990页
作者: Stanislav Sychugov Yuriy Tokarev Tatiana Plekhanova Olesya Mikhailova Igor Pudov Rinat Faizullin Albert Gaifullin Ruslan Sagdiev Department of Construction and Road-Building Machinery Faculty of Civil Engineering Izhevsk State Technical University named after M.T. Kalashnikov Studencheskaya str. 7 426069 Izhevsk Russia Department of Geo-Engineering and Building Materials Faculty of Civil Engineering Izhevsk State Technical University named after M.T. Kalashnikov Studencheskaya str. 7 426069 Izhevsk Russia Department of Computer Software Faculty of Computer Science Izhevsk State Technical University named after M.T. Kalashnikov Studencheskaya str. 7 426069 Izhevsk Russia Department of Building Materials University of Building Technologies Engineering and Environmental Systems Kazan State University of Architecture and Engineering Zelenaya str. 1420043 Kazan Russia
In the present paper the experimental research dedicated to derivation of anhydrite cements with upgraded mechanical, physical properties and water resistance. The mechanism of the influence of technogenic fine-disper... 详细信息
来源: 评论
Developing a gold price predictive analysis using Grey Wolf Optimizer
Developing a gold price predictive analysis using Grey Wolf ...
收藏 引用
Student Conference on Research and Development (SCOReD)
作者: Nurul Asyikin Zainal Zuriani Mustaffa Faculty of Computer Systems & Software Engineering University Malaysia Pahang Pahang Malaysia
As the value of gold cannot be blindly rejected, forecasting the future prices of gold has long been an intriguing topic and is extensively studied by researchers from different fields including economics, statistics,... 详细信息
来源: 评论
Checking critical software systems: A formal proposal  10
Checking critical software systems: A formal proposal
收藏 引用
10th International Conference on the Quality of Information and Communications Technology, QUATIC 2016
作者: Morales, Luis E. Mendoza Capel, Manuel I. Processes and Systems Department Simón Bolívar University Venezuela Faculty of Electrical and Computer Engineering Escuela Superior Politécnica del Litoral Ecuador Software Engineering Department University of Granada ETSI Informatics and Telecommunication Spain
As a contribution to the specification and verification of critical software systems, this article presents a formal proposal for compositional verification, which uses model checking technique and integrates a modell... 详细信息
来源: 评论
Supervised entity tagger for indonesian labor strike tweets using oversampling technique and low resource features
收藏 引用
Telkomnika (Telecommunication Computing Electronics and Control) 2016年 第4期14卷 1462-1471页
作者: Purwarianti, Ayu Madlberger, Lisa Ibrahim, Muhammad School of Electrical Engineering and Informatics Bandung Institute of Technology Jl. Ganesa No. 10 Bandung Indonesia Institute of Software Technology and Interactive Systems Vienna University of Technology Favoritenstrasse 9-11/188 ViennaA-1040 Austria Faculty of Computer Science University of Indonesia Kampus UI Depok16424 Indonesia
We propose an entity tagger for Indonesian tweets sent during labor strike events using supervised learning methods. The aim of the tagger is to extract the date, location and the person/organization involved in the s... 详细信息
来源: 评论
Iris template protection based on enhanced Hill Cipher  16
Iris template protection based on enhanced Hill Cipher
收藏 引用
2016 International Conference on Communication and Information systems, ICCIS 2016
作者: Khalaf, Emad Taha Mohammed, Muamer N. Sulaiman, Norrozila Faculty of Computer Systems and Software Engineering University Malaysia Pahang Lebuhraya Tun Razak Gambang Pahang26300 Malaysia IBM Center of Excellence University Malaysia Pahang Lebuhraya Tun Razak Gambang Pahang26300 Malaysia
Biometric is uses to identify authorized person based on specific physiological or behavioral features. Template protection is a crucial requirement when designing an authentication system, where the template could be... 详细信息
来源: 评论
A new type of preference relations: Fuzzy preference relations with self-confidence
A new type of preference relations: Fuzzy preference relatio...
收藏 引用
2016 IEEE International Conference on Fuzzy systems, FUZZ-IEEE 2016
作者: Enrique, Herrera-Viedma Liu, Wenqi Dong, Yucheng Chiclana, Francisco Cabrerizo, Francisco Javier Business School Sichuan University Chengdu China Faculty of Technology De Montfort University Leicester United Kingdom DECSAI University of Granada E-Granada Spain UNED Dept. Software Engineering and Computer Systems Madrid Spain
Preference relations are very useful to express decision makers' preferences over alternatives in the process of decision-making. However, multiple self-confidence levels are not considered in existing preference ... 详细信息
来源: 评论
A New Approach to Speed up Combinatorial Search Strategies Using Stack and Hash Table
A New Approach to Speed up Combinatorial Search Strategies U...
收藏 引用
SAI Computing Conference
作者: Bestoun S. Ahmed Luca M. Gambardella Kamal Z. Zamli Istituto Dalle Molle di Studi sullIntelligenza Artificiale (IDSIA) Faculty of Computer Systems and Software Engineering University Malaysia Pahang
Owing to the significance of combinatorial search strategies both for academia and industry, the introduction of new techniques is a fast growing research field these days. These strategies have really taken different... 详细信息
来源: 评论
MICIE: A Model for Identifying and Collecting Intrusion Evidences
MICIE: A Model for Identifying and Collecting Intrusion Evid...
收藏 引用
International IEEE Conference on Signal-Image Technologies and Internet-Based System
作者: Abdulghani Ali Ahmed Yee Wai Kit Universiti Malaysia Pahang Kuantan Pahang MY Faculty of Computer Systems & Software Engineering University Malaysia Pahang Pahang Malaysia
Today it is very important to maintain an intermediary level of security to ensure safe and trusted communication for daily usage. Secured data communication over internet and any other network is hard to achieve due ... 详细信息
来源: 评论
Querying Medical Datasets While Preserving Privacy
收藏 引用
Procedia computer Science 2016年 98卷 324-331页
作者: Nafees Qamar Yilong Yang Andras Nadas Zhiming Liu College of Computer Science and Engineering University of Hafr Al Batin Department of Computer and Information Science Faculty of Science and Technology University of Macau Institute for Software Integrated Systems Vanderbilt University Southwest University China
This paper addresses the challenge of identifying clinically-relevant patterns in medical datasets without endangering patient privacy. To this end, we treat medical datasets as black box for both internal and externa... 详细信息
来源: 评论
Enhancing service quality through Service Level Agreement (SLA) full implementation
Enhancing service quality through Service Level Agreement (S...
收藏 引用
International Conference on Science in Information Technology (ICSITech)
作者: Rodziah binti Atan Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia 43400 Serdang Selangor MALAYSIA
Various SLA monitoring systems are proposed by different features and abilities to evaluate the agreed SLA. The current SLA monitoring systems in cloud computing for its structural, behavioral characteristics and situ... 详细信息
来源: 评论