咨询与建议

限定检索结果

文献类型

  • 745 篇 会议
  • 331 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 1,094 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 520 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 118 篇 信息与通信工程
    • 100 篇 控制科学与工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 53 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 36 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 299 篇 理学
    • 157 篇 数学
    • 83 篇 物理学
    • 83 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 217 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 55 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 31 篇 法学
    • 23 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 15 篇 教育学
  • 12 篇 农学
  • 5 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 43 篇 software enginee...
  • 27 篇 deep learning
  • 25 篇 computers
  • 22 篇 machine learning
  • 21 篇 feature extracti...
  • 21 篇 artificial intel...
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 accuracy
  • 19 篇 computational mo...
  • 19 篇 software
  • 18 篇 optimization
  • 18 篇 software testing
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 14 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 faculty of compu...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 jasni mohamad za...
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,059 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems and Software Engineering"
1094 条 记 录,以下是981-990 订阅
排序:
Color Grading in Tomato Maturity Estimator using Image Processing Technique
Color Grading in Tomato Maturity Estimator using Image Proce...
收藏 引用
2009 2nd IEEE International Conference on computer Science and Information Technology(ICCSIT 2009)
作者: W.Md.Syahrir A.Suryanti C.Connsynn Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak 26300GambangKuantanPahangMalaysia
This Tomato Maturity Estimator is developed to conduct tomato color grading using machine vision to replace human *** machine has not been widely applied in Malaysia since the cost is too *** major problem in tomato c... 详细信息
来源: 评论
Threats to Health Information Security
Threats to Health Information Security
收藏 引用
The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)
作者: Ganthan Narayana Samy Rabiah Ahmad Zuraini Ismail Department of Computer Systems and Communications Faculty of Computer Science and Information System Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology Department (ITD), M... 详细信息
来源: 评论
A Metadata Search Approach with Branch and Bound Algorithm to Keyword Query in Relational Databases
A Metadata Search Approach with Branch and Bound Algorithm t...
收藏 引用
International Conference on computer Sciences and Convergence Information Technology (ICCIT)
作者: Jarunee Saelee Veera Boonjing Software Systems Engineering Laboratory Department of Computer Science Faculty of Science King Mongkut's Institute of Technology Ladkrabang Bangkok Thailand
Search engines on the Web have popularized the keyword-based search paradigm, while searching in databases users need to know a database schema and a query language. Keyword search techniques on the Web cannot directl... 详细信息
来源: 评论
Measuring Size of Business Process From Use Case Description
Measuring Size of Business Process From Use Case Description
收藏 引用
2009 2nd IEEE International Conference on computer Science and Information Technology(ICCSIT 2009)
作者: Kanjan Dhammaraksa Sarun Intakosum Software Systems Engineering Laborator Department of Mathematics and Computer Science Faculty of ScienceKing Mongkut's Institute of Technology LadkrabangBangkokThailand
The purpose of this paper is to present a new size metric for business process *** metric aims to measure size of process from use case *** metric consists of four series to support four perspectives of business proce... 详细信息
来源: 评论
Retrieving Design Patterns by Case-Based Reasoning and Formal Concept Analysis
Retrieving Design Patterns by Case-Based Reasoning and Forma...
收藏 引用
2009 2nd IEEE International Conference on computer Science and Information Technology(ICCSIT 2009)
作者: Weenawadee Muangon Sarun Intakosum Software Systems Engineering Laboratory Department of Mathematics and Computer Science Faculty of ScienceKing Mongkut's Institute of Technology LadkrabangBangkokThailand
Design patterns are applied to solve the recurring software design problems,Unfortunately,choosing appropriate design patterns for the specific design problem is considered a difficult task.A search tool is,therefore,... 详细信息
来源: 评论
Adaptation of Design Pattern Retrieval Using CBR and FCA
Adaptation of Design Pattern Retrieval Using CBR and FCA
收藏 引用
International Conference on computer Sciences and Convergence Information Technology (ICCIT)
作者: Weenawadee Muangon Sarun Intakosum Software Systems Engineering Laboratory Department of Mathematics and Computer Science Faculty of Science King Mongkut's Institute of Technology Ladkrabang Bangkok Thailand
software developers currently find design patterns through search tools for solving software design problem. However, these search tools still have keyword-search problem. In this paper, we introduce the elementary id... 详细信息
来源: 评论
Energy Efficient Data Dissemination with ATIM Window and Dynamic Sink in Wireless Sensor Networks
Energy Efficient Data Dissemination with ATIM Window and Dyn...
收藏 引用
International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom
作者: Sugam Sharma Mamta Rani S.B. Goyal Department of Computer Science Iowa State University USA Department of Computer Science Manav Rachna International University India Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Malaysia
We illustrate the effective use of ATIM (ad hoc traffic indication message) window in static sensors to obtain potential energy savings for sensors during data dissemination in wireless sensor networks. The network co... 详细信息
来源: 评论
Threats Identification in Healthcare Information systems using Genetic Algorithm and Coz Regression
Threats Identification in Healthcare Information Systems usi...
收藏 引用
The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)
作者: Rabiah Ahmad Ganthan Narayana Samy Nuzulha Khilwani Ibrahim Peter A.Bath Zuraini Ismail Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Department of Computer Systems and Communications Faculty of Computer Science and Information System Department of Information Studies University of Sheffield UK Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which in... 详细信息
来源: 评论
Enhancing student evaluation through student Idol
收藏 引用
World Academy of Science, engineering and Technology 2009年 34卷 379-382页
作者: Roslina, M.S. Syahrul Hakimah Ong, M.O. Syarifah Fazlin, S.F. Faculty of Computer Systems and Software Engineering University Malaysia Pahang Lebuhraya Tun Razak 26300 Kuantan Pahang Malaysia University Malaysia Pahang Lebuhraya Tun Razak 26300 Kuantan Pahang Malaysia
Since after the historical moment of Malaysia Independence Day on the year of 1957, the government had been trying hard in order to find the most efficient methods in learning. However, it is hard to actually access a... 详细信息
来源: 评论
Development of Building Submission Checklist System (BuSCLI)
Development of Building Submission Checklist System (BuSCLI)
收藏 引用
International Symposium on Computing, Communication, and Control(ISCCC 2009)
作者: Noraziah Ahmad Mohd.Affendy Omardin Roslina Mohd Sidek Ahmed N.Abdalla Faculty of Computer Systems & Software Engineering University Malaysia PahangLebuhraya Tun Razak Faculty Civil Engineering and Earth Resources University Malaysia PahangLebuhraya Tun Razak Faculty of Electric & Electronic University Malaysia PahangLebuhraya Tun Razak
In this research,we present the development of Building Submission Checklist System (BuSCLI).The objective of developing BuSCLI is to simplify the management of submission of building plan approval through online syst... 详细信息
来源: 评论