咨询与建议

限定检索结果

文献类型

  • 1,971 篇 会议
  • 1,256 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,077 篇 工学
    • 1,644 篇 计算机科学与技术...
    • 1,376 篇 软件工程
    • 401 篇 信息与通信工程
    • 327 篇 控制科学与工程
    • 226 篇 生物工程
    • 191 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 156 篇 机械工程
    • 132 篇 电子科学与技术(可...
    • 126 篇 光学工程
    • 87 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 82 篇 网络空间安全
    • 78 篇 仪器科学与技术
    • 75 篇 化学工程与技术
  • 965 篇 理学
    • 532 篇 数学
    • 251 篇 生物学
    • 241 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 73 篇 化学
  • 675 篇 管理学
    • 413 篇 管理科学与工程(可...
    • 286 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 186 篇 医学
    • 152 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 87 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 113 篇 法学
    • 88 篇 社会学
  • 77 篇 经济学
    • 76 篇 应用经济学
  • 54 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 97 篇 deep learning
  • 93 篇 machine learning
  • 73 篇 accuracy
  • 68 篇 artificial intel...
  • 67 篇 software
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 56 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 49 篇 predictive model...
  • 47 篇 security
  • 46 篇 semantics
  • 44 篇 data mining
  • 43 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 17 篇 muhammad adnan k...
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 ghassan samara

语言

  • 2,767 篇 英文
  • 492 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3285 条 记 录,以下是2951-2960 订阅
排序:
A Partition-Based LEACH Algorithm for Wireless Sensor Networks
A Partition-Based LEACH Algorithm for Wireless Sensor Networ...
收藏 引用
International Conference on computer and Information Technology (CIT)
作者: Haosong Gou Younghwan Yoo Hongqing Zeng School of Computer Science and Engineering Pusan National University Busan South Korea Departmento Ingeniería del Software e Inteligencia Artificial Faculty Informática ISBU Shanghai China
Wireless sensor networks (WSN) have been considered as a promising method for reliably monitoring both civil and military environments under hazardous or dangerous conditions. Due to such environments, the power suppl... 详细信息
来源: 评论
Managing Malware in Higher Learning Institutions
Managing Malware in Higher Learning Institutions
收藏 引用
International Conference on computer and Electrical engineering, ICCEE
作者: Zuraini Ismail Christine Simfukwe Department of Science College of Science & Technology International Campus Universiti Teknologi Malaysia Kuala Lumpur Malaysia Centre of Advanced Software Engineering Faculty of Computer Science and Information Systems International Campus Universiti Teknologi Malaysia Kuala Lumpur Malaysia
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all busin... 详细信息
来源: 评论
A Skipping SvS Intersection Algorithm
A Skipping SvS Intersection Algorithm
收藏 引用
International Conference on Computing, engineering and Information, ICC
作者: Jaratdech Chatchaval Veera Boonjing Pisit Chanvarasuth Software Systems Engineering Laboratory Mathematics and Computer Science Department Faculty of Science King Mongkut''s Institute of Technology Ladkrabang Thailand School of Management Technology Sirindhorn International Institute of Technology Thammasat University Pathum Thani Thailand
In this paper, we propose to improve the SvS algorithm by skipping elements of the smaller set for reducing a search boundary. The boundary of skipped element is determined by boundaries of elements prior to and next ... 详细信息
来源: 评论
A Quadratic Deformation Model for Facial Expression Recognition
A Quadratic Deformation Model for Facial Expression Recognit...
收藏 引用
Proceedings of the Digital Image Computing: Technqiues and Applications (DICTA)
作者: M. Obaid R. Mukundan R. Goecke M. Billinghurst H. Seichter University of Canterbury Christchurch NZ Computer Science and Software Engineering Department University of Canterbury New Zealand HCC Laboratory / NCBS Faculty of Information Sciences and Engineering University of Canberra Australia School of Computer Science CECS Australian National University Canberra Australia HITLab New Zealand University of Canterbury Christchurch New Zealand
In this paper, we propose a novel approach for recognizing facial expressions based on using an active appearance model facial feature tracking system with the quadratic deformation model representations of facial exp... 详细信息
来源: 评论
Robust audio steganography via genetic algorithm
Robust audio steganography via genetic algorithm
收藏 引用
International Conference on Information and Communication Technologies (ICICT)
作者: Mazdak Zamani Hamed Taherdoost Azizah A. Manaf Rabiah B. Ahmad Akram M. Zeki Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Kuala Lumpur Malaysia College of Science and Technology Universiti Teknologi Malaysia Kuala Lumpur Malaysia Centre of Advanced Software Engineering Universiti Teknologi Malaysia Kuala Lumpur Malaysia
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of... 详细信息
来源: 评论
A Novel Approach for Audio Watermarking
A Novel Approach for Audio Watermarking
收藏 引用
The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)
作者: Mazdak Zamani Pritheega Magalingam Azizah Bt Abdul Manaf Akram M.Zeki Rabiah Bt Ahmad Faculty of Computer Science Universiti Teknologi Malaysia 54100 Kuala Lumpur Malaysia College of Science and Technology Universiti Teknologi Malaysia 54100 Kuala Lumpur Malaysia Centre for Advanced Software Engineering Universiti Teknologi Malaysia 54100 Kuala Lumpur Malaysia
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague a... 详细信息
来源: 评论
An Approach to Improve the Robustness of Substitution Techniques of Audio Steganography
An Approach to Improve the Robustness of Substitution Techni...
收藏 引用
2009 2nd IEEE International Conference on computer science and Information Technology(ICCSIT 2009)
作者: Mazdak Zamani Azizah Bt Abdul Manaf Rabiah Bt Ahmad Akram M.Zeki Faculty of Computer Science and Information System University of Technology Malaysia 54100 Kuala Lumpur Malaysia College of Science and Technology University of Technology Malaysia 54100 Kuala Lumpur Malaysia Centre for Advanced Software Engineering University of Technology Malaysia 54100 Kuala Lumpur Malaysia
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible *** transmission must be possible in spite of subsequent imperceptible alterations(attacks)of the modif... 详细信息
来源: 评论
Syllable nucleus Durations Estimation using Linear Regression based ensemble model
Syllable nucleus Durations Estimation using Linear Regressio...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jingli Lu Ruili Wang Liyanage C. De Silva Yang Gao State Key Laboratory of Novel Software Technology Nanjing University Nanjing China School of Engineering and Advanced Technology Massey University Palmerston North New Zealand Faculty of Science Universiti Brunei Darussalam Brunei Darussalam Department of Computer Science Nanjing University Nanjing China
Unlike conventional automatic continuous speech segmentation models that deal with each boundary time-mark individually, in this paper, we propose an interval-data-based linear regression model for syllable nucleus du... 详细信息
来源: 评论
Grid-aware approach to data statistics, data understanding and data preprocessing
收藏 引用
International Journal of High Performance Computing and Networking 2009年 第1期6卷 15-24页
作者: Wöhrer, Alexander Novakova, Lenka Brezany, Peter Tjoa, A. Min Institute for Scientific Computing Faculty of Computer Science University of Vienna Nordbergstrasse 15/C/3 1090 Vienna Austria Czech Technical University in Prague Faculty of Electrical Engineering Department of Cybernetics Technicka 2 166 27 Prague 6 Czech Republic Institute of Software Technology Vienna University of Technology Favoritenstr. 9 - 11/188 1040 Wien Austria
In recent years the focus of grid computing shifted towards more data intensive applications, increasingly needing access to various public and private databases. Relocating the code for Data Preprocessing (DPP) close... 详细信息
来源: 评论
Assessing the needs of CSCL tool and its impacts in Malaysian context
收藏 引用
WSEAS Transactions on computer Research 2008年 第5期3卷 300-310页
作者: Kasirun, Z.M. Salim, S.S. Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya 50603 Kuala Lumpur Malaysia
Reviewing on computer-supported collaborative learning (CSCL) tools revealed that CSCL is important to support collaborative learning (CL) strategy in school. Existing CSCL applications are mostly research-based and a... 详细信息
来源: 评论