咨询与建议

限定检索结果

文献类型

  • 528 篇 会议
  • 291 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 837 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 519 篇 工学
    • 399 篇 计算机科学与技术...
    • 332 篇 软件工程
    • 92 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 53 篇 生物工程
    • 50 篇 生物医学工程(可授...
    • 42 篇 电气工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 机械工程
    • 27 篇 光学工程
    • 24 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 建筑学
    • 15 篇 交通运输工程
  • 236 篇 理学
    • 127 篇 数学
    • 67 篇 生物学
    • 66 篇 物理学
    • 48 篇 统计学(可授理学、...
    • 37 篇 系统科学
    • 17 篇 化学
  • 172 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 53 篇 工商管理
  • 49 篇 医学
    • 43 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 22 篇 药学(可授医学、理...
  • 27 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 12 篇 教育学
  • 11 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 26 篇 deep learning
  • 24 篇 software enginee...
  • 23 篇 machine learning
  • 19 篇 artificial intel...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 16 篇 software testing
  • 12 篇 computer science
  • 12 篇 data mining
  • 12 篇 feature extracti...
  • 11 篇 computer communi...
  • 11 篇 optimization
  • 11 篇 computers
  • 11 篇 mathematical mod...
  • 10 篇 monitoring
  • 10 篇 software
  • 9 篇 internet of thin...
  • 9 篇 surveys
  • 9 篇 reliability
  • 9 篇 servers

机构

  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 department of co...
  • 8 篇 dept. of technol...
  • 8 篇 itmo university ...
  • 8 篇 university of re...
  • 7 篇 faculty of infoc...
  • 7 篇 gamf faculty of ...
  • 6 篇 saint-petersburg...
  • 6 篇 department of ap...

作者

  • 19 篇 zamli kamal z.
  • 12 篇 ahmed bestoun s.
  • 12 篇 noraziah ahmad
  • 10 篇 ahmad noraziah
  • 9 篇 herawan tutut
  • 8 篇 bei zeng
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 jasni mohamad za...
  • 8 篇 zhengfeng ji
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 zain ul abideen
  • 7 篇 din fakhrud
  • 7 篇 usama arshad
  • 7 篇 omatu s.
  • 7 篇 arshad usama
  • 7 篇 sidek roslina mo...
  • 7 篇 mohamad m.s.

语言

  • 803 篇 英文
  • 27 篇 其他
  • 5 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Software Engineering and Computer Systems Itmo University"
837 条 记 录,以下是681-690 订阅
排序:
Heart beat monitoring using optical interferometric signal and pseudo wigner-ville distribution
Heart beat monitoring using optical interferometric signal a...
收藏 引用
7th International Conference on Information Technology and Application, ICITA 2011
作者: Šprager, Sebastijan Donlagić, Denis Zazula, Damjan University of Maribor Faculty of Electrical Engineering and Computer Science System Software Laboratory Smetanova ulica 17 SI-2000 Maribor Slovenia University of Maribor Faculty of Electrical Engineering and Computer Science Laboratory for Electro-Optics and Sensor Systems Smetanova ulica 17 SI-2000 Maribor Slovenia
The paper presents a method for monitoring heartbeats based on time-frequency analysis of optic interferometric signal by using smoothed pseudo Wigner-Ville distribution. Optical interferometer is a sensitive device t... 详细信息
来源: 评论
Analysis of Joint Channel Estimation and Joint Data Detection in TD-SCDMA systems
Analysis of Joint Channel Estimation and Joint Data Detectio...
收藏 引用
Asia-Pacific Conference on Communications
作者: Ali K. Marzook A. Ismail B. M. Ali A. Sali Mohannad H. Khalaf S. Khatun Department of Computer and Communication Systems Engineering Faculty of Engineering University Putra Malaysia Computer Engineering Department Basrah University Faculty of Computer Systems and Software Engineering University Malaysia Pahang
Time Division-Synchronous Code Division Multiple Access (TD-SCDMA) has several attractive characteristics that made it capable of meeting the requirements of G4 systems when applied as a platform directly. Joint detec... 详细信息
来源: 评论
Scalable rekeying algorithm in IEEE 802.16e
Scalable rekeying algorithm in IEEE 802.16e
收藏 引用
17th Asia Pacific Conference on Communications, APCC 2011
作者: Sadeghi, Mohammad Mehdi Gilanian Ali, Borhanuddin Mohd Ma, Maode Manan, Jamalul-Lail Ab Noordin, Nor Kamariah Khatun, Sabira Department of Computer and Communication Systems Engineering Universiti Putra Malaysia Malaysia School of Electrical and Electronic Engineering Nanyang Technological University Singapore Singapore Cluster MIMOS Berhad Malaysia Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Malaysia Institute of Advanced Technology Universiti Putra Malaysia Malaysia
IEEE 802.16e standard provides wide coverage and high bandwidth for subscribers in a metropolitan area network. It introduces Multicast and Broadcast Rekeying Algorithm (MBRA) which is a multicasting scheme to communi... 详细信息
来源: 评论
Malaysian car plates recognition using freeman chain codes and characters' features
Malaysian car plates recognition using freeman chain codes a...
收藏 引用
2nd International Conference on software engineering and computer systems, ICSECS 2011
作者: Jusoh, Nor Amizam Mohamad Zain, Jasni School of Science and Technology IKIP International College Kampus 3 Kuantan Pahang 25050 Malaysia Faculty of Computer Systems and Software Engineering University Malaysia of Pahang Kuantan Pahang 25000 Malaysia
Car plate recognition (CPR) system is an important application of image detection and recognition used to overcome the challenges of monitoring modern day traffic. The Freeman chain codes (FCC) is applied in this rese... 详细信息
来源: 评论
A New Binary Vote Assignment on Grid Algorithm to Manage Replication in Distributed Database Environment
A New Binary Vote Assignment on Grid Algorithm to Manage Rep...
收藏 引用
International Conference on computer Communication and Management(ICCCM 2011)
作者: Ainul Azila Che Fauzi A.Noraziah Noriyani Mohd Zain A.H.Beg Faculty of Computer Systems & Software Engineering University Malaysia Pahang Pahang Malaysia
Data replication is one of the mechanisms in data grid architecture since it improves data access and reliability. Therefore, the storage, availability, and consistency are important issues to be addressed in order to... 详细信息
来源: 评论
Segmenting and hiding data randomly based on index channel
收藏 引用
International Journal of computer Science Issues 2011年 第3 3-1期8卷 522-529页
作者: Khalaf, Emad T. Sulaiman, Norrozila Faculty of Computer Systems and Software Engineering University Malaysia Pahang Kuantan 26300 Malaysia
Information hiding is a technique of hiding secret using redundant cover data such as images, audios, movies, documents, etc. In this paper, a new technique of hiding secret data using LSB insertion is proposed, by us... 详细信息
来源: 评论
Hybrid simple artificial immune system (SAIS) and particle swarm optimization (PSO) for spam detection
Hybrid simple artificial immune system (SAIS) and particle s...
收藏 引用
Malaysian Conference in software engineering (MySEC)
作者: Saber Salehi Ali Selamat Software Engineering Research Group Department of Software Engineering Faculty of Computer Science & Information Systems University of Technology of Malaysia Johor Malaysia
Spam detection is a significant problem which considered by many researchers by various developed strategies. Among many others, simple artificial immune system is one of those being proposed. There is a deficiency in... 详细信息
来源: 评论
An hybrid model through the fusion of sensitivity based linear learning method and type-2 fuzzy logic systems for modeling PVT properties of crude oil systems
An hybrid model through the fusion of sensitivity based line...
收藏 引用
2011 5th Malaysian Conference in software engineering, MySEC 2011
作者: Olatunji, Sunday Olusanya Selamat, Ali Raheem, Abdul Azeez Abdul Intelligent Software Engineering Laboratory Faculty of Computer Science and Information Systems University Teknologi Malaysia 81310 UTM Skudai Johor Malaysia Centre for Petroleum and Minerals Research Institute King Fahd University of Petroleum and Mineral Dhahran 31261 Saudi Arabia
Sensitivity based linear learning method (SBLLM) has recently been used as predictive tool due to its unique characteristics and performance, particularly its high stability and consistency during predictions. However... 详细信息
来源: 评论
A novel intrusion detection system by using intelligent data mining in weka environment
收藏 引用
Procedia computer Science 2011年 3卷 1237-1242页
作者: Muamer N. Mohammad Norrozila Sulaiman Osama Abdulkarim Muhsin Faculty of Computer Systems & Software Engineering University Malaysia Pahang 26300 Kuantan Malaysia Collage of Information Technology University Tenaga Nasional 43000 Selangor Malaysia
Nowadays, the using of intelligent data mining approaches to predict intrusion in local area networks has been increasing rapidly. In this paper, an improved approach for Intrusion Detection System (IDS) based on comb... 详细信息
来源: 评论
A Mobile Camera Tracking System Using GbLN-PSO with an Adaptive Window
A Mobile Camera Tracking System Using GbLN-PSO with an Adapt...
收藏 引用
International Conference on Computational Intelligence, Modelling and Simulation (CSSIM)
作者: Zalili Musa Rohani Abu Bakar Junzo Watada Faculty of Computer System and Software Engineering University of Malaysia Kuantan Pahang Malaysia Faculty of Computer System and Software Engineering University Malaysia Pahang Kuantan Malaysia Graduate School of Information Production & Systems Waseda University Fukuoka Japan
The availability of high quality and inexpensive video camera, as well as the increasing need for automated video analysis is leading towards a great deal of interest in numerous applications. However the video tracki... 详细信息
来源: 评论