標(biāo)題: Titlebook: Software Engineering and Computer Systems, Part II; Second International Jasni Mohamad Zain,Wan Maseri bt Wan Mohd,Eyas El- Conference proc [打印本頁(yè)] 作者: Gullet 時(shí)間: 2025-3-21 19:57
書目名稱Software Engineering and Computer Systems, Part II影響因子(影響力)
書目名稱Software Engineering and Computer Systems, Part II影響因子(影響力)學(xué)科排名
書目名稱Software Engineering and Computer Systems, Part II網(wǎng)絡(luò)公開度
書目名稱Software Engineering and Computer Systems, Part II網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Software Engineering and Computer Systems, Part II被引頻次
書目名稱Software Engineering and Computer Systems, Part II被引頻次學(xué)科排名
書目名稱Software Engineering and Computer Systems, Part II年度引用
書目名稱Software Engineering and Computer Systems, Part II年度引用學(xué)科排名
書目名稱Software Engineering and Computer Systems, Part II讀者反饋
書目名稱Software Engineering and Computer Systems, Part II讀者反饋學(xué)科排名
作者: 易碎 時(shí)間: 2025-3-21 23:46 作者: 頌揚(yáng)國(guó)家 時(shí)間: 2025-3-22 03:32 作者: 吸引力 時(shí)間: 2025-3-22 07:04 作者: Nibble 時(shí)間: 2025-3-22 10:40 作者: Palatial 時(shí)間: 2025-3-22 15:30
Software Engineering and Computer Systems, Part II978-3-642-22191-0Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Cerebrovascular 時(shí)間: 2025-3-22 19:23
M. Nordin A. Rahman,Yuzarimi M. Lazim,Farham Mohamed,Suhailan Safei,Sufian Mat Deris,M. Kamir Yusof作者: jocular 時(shí)間: 2025-3-23 00:44 作者: 我們的面粉 時(shí)間: 2025-3-23 04:14 作者: Prognosis 時(shí)間: 2025-3-23 08:25
Alternative Model for Extracting Multidimensional Data Based-On Comparative Dimension Reductionsignificantly shorten processing time and increased performance of cluster. DBSCAN within Kernel PCA and Super Vector within Kernel PCA have highest cluster performance compared with cluster without dimension reduction.作者: 蔓藤圖飾 時(shí)間: 2025-3-23 12:58
Software Agents for E-Commerce Data Workflow Managementas buyers satisfy their requirements by using a mobile purchasing agent, which translates their requirements to the e-market place. In addition, the framework customized to satisfy e-business transactions for buyers and sellers.作者: 教育學(xué) 時(shí)間: 2025-3-23 13:59
A Convex Hull-Based Fuzzy Regression to Information Granules Problem – An Efficient Solution to Reallls as well as a main convex hull structure. In the proposed design setting, we emphasize a pivotal role of the convex hull approach or more specifically the Beneath-Beyond algorithm, which becomes crucial in alleviating limitations of linear programming manifesting in system modeling.作者: 圍裙 時(shí)間: 2025-3-23 18:43
ata sets typically found in multidimensional applications, places intensive demands on the communication aspects of the computation. The writ- ing of code that takes into account all the algorithmic possibilities and matches these possibilities to the communication capabilities of the tar- get archi作者: 宴會(huì) 時(shí)間: 2025-3-24 00:59
Hongwu Qin,Xiuqin Ma,Jasni Mohamad Zain,Norrozila Sulaiman,Tutut Herawanata sets typically found in multidimensional applications, places intensive demands on the communication aspects of the computation. The writ- ing of code that takes into account all the algorithmic possibilities and matches these possibilities to the communication capabilities of the tar- get archi作者: Ganglion 時(shí)間: 2025-3-24 06:05 作者: 壯觀的游行 時(shí)間: 2025-3-24 08:12 作者: jettison 時(shí)間: 2025-3-24 13:41
Suzana Basaruddin,Haryani Haron with more freedom than classical theory. For example, in Cosserat elasticity there are characteristic lengths as additional engineering elastic constants. Recent experimental work discloses a variety of cellular and fibrous materials to exhibit such freedom, and the characteristic lengths have been作者: NAVEN 時(shí)間: 2025-3-24 15:12 作者: 靈敏 時(shí)間: 2025-3-24 19:06
Norshuhani Zamin,Alan Oxleye following areas: Disordered Materials; Interfaces and Thin Films; Mechanical Response of Materials from Angstroms to Meters; and Phase Transformation, Composite Materials and Microstructure. The scales treated in these workshops ranged from the atomic to the microstructural to the macroscopic, the作者: 蕁麻 時(shí)間: 2025-3-25 02:10 作者: acrimony 時(shí)間: 2025-3-25 03:23 作者: 莊嚴(yán) 時(shí)間: 2025-3-25 10:12 作者: 記憶 時(shí)間: 2025-3-25 15:16
Zul Hilmi Abdullah,Nur Izura Udzir,Ramlan Mahmod,Khairulmizam Samsudintively. Dark matter and energy then emerge as special or privileged states occurring for alignments of spatial forces with the force in the direction of time. Dark matter is essentially a backward wave and dark energy a forward wave, both propagating at the speed of light.? The model includes specia作者: 飛鏢 時(shí)間: 2025-3-25 19:20
Azizul Azhar Ramli,Junzo Watada,Witold Pedrycz of either a work done function or if the external forces are generated from an applied external potential, then in either case a conservation of energy statement applies. In either of these cases or if we assume the Einstein energy-mass variation with velocity, then Newton’s second law as the total作者: 豐滿中國(guó) 時(shí)間: 2025-3-25 22:21 作者: 無(wú)效 時(shí)間: 2025-3-26 00:24
Abdullahi Mohamud Sharif,Shuib Basri This procedure uses an approximation to the conditional probability distribution which involves factoring the complete likelihood. In this paper, we investigate a new resampling method to make the Vecchia approximation faster. Also, for the first time, the Vecchia method is applied to random fields作者: 盤旋 時(shí)間: 2025-3-26 07:15 作者: Visual-Acuity 時(shí)間: 2025-3-26 10:50
Nureize Arbaiy,Junzo Watada) and Steve Ellacott (Brighton), supported by a programme committee consisting of Nigel Allinson (UMIST), Norman Biggs (London School of Economics), Chris Bisho978-1-4613-7794-8978-1-4615-6099-9Series ISSN 1387-666X Series E-ISSN 2698-5489 作者: Devastate 時(shí)間: 2025-3-26 15:20 作者: 難理解 時(shí)間: 2025-3-26 17:48 作者: SNEER 時(shí)間: 2025-3-26 22:15 作者: 尖酸一點(diǎn) 時(shí)間: 2025-3-27 05:06 作者: grieve 時(shí)間: 2025-3-27 07:37
A Framework for Optimizing Malware Classification by Using Genetic Algorithmo prepare the right and effective antidote for malware. Current techniques in malware classification do not give a good classification result when it deals with the new and unique types of malware. For this reason, we proposed the usage of Genetic Algorithm to optimize the malware classification sys作者: 忙碌 時(shí)間: 2025-3-27 11:16 作者: HALL 時(shí)間: 2025-3-27 16:11
Fuzzy Goal Programming for Multi-level Multi-objective Problem: An Additive Model to achieve overall organization targets. However, the standard formulation of mathematical programming problems assumes that a single decision maker made the decisions. Nevertheless it should be appropriate to establish the formulations of mathematical models based on multi-level programming method作者: 谷類 時(shí)間: 2025-3-27 21:51 作者: dapper 時(shí)間: 2025-3-27 23:42 作者: TRUST 時(shí)間: 2025-3-28 03:03
Rough Set Theory Approach for Classifying Multimedia Datae valuable data must be captured and stored for potential purposes. One of the main problems in Multimedia Information System (MIS) is the management of multimedia data. As a consequence, multimedia data management has emerged as an important research area for querying, retrieving, inserting and upd作者: BAIT 時(shí)間: 2025-3-28 10:13 作者: 輪流 時(shí)間: 2025-3-28 10:50
Super Attribute Representative for Decision Attribute Selectiondecision making using soft set theory. However, these algorithms still concern on a Boolean-valued information system. In this paper, Support Attribute Representative (SAR), a soft set based technique for decision making in categorical-valued information system is proposed. The proposed technique ha作者: 暴行 時(shí)間: 2025-3-28 16:08
The Normal Parameter Value Reduction of Soft Sets and Its Algorithmr value reduction of soft sets. In this paper, we introduce the definition of normal parameter value reduction (NPVR) of soft sets which can overcome the problem of suboptimal choice and added parameter values. More specifically, minimal normal parameter value reduction (MNPVR) is defined as a speci作者: 規(guī)范就好 時(shí)間: 2025-3-28 22:00
Improving Language Identification of Web Page Using Optimum Profile is the process of determining a predetermined language automatically from a given content (e.g., English, Malay, Danish, Estonian, Czech, Slovak, etc.). The ability to identify other languages in relation to English is highly desirable. It is the goal of this research to improve the method used to 作者: 軟弱 時(shí)間: 2025-3-29 01:22
The Grounded Process of KMS Adoption: The Case Study of Knowledge Sharing and CoPs in Oil and Gas Inrature of IT adoption theories. This research documents via Grounded Theory (GT), the adoption of KMS at an Oil and Gas Industry in Malaysia. The model generated offer insights into the technology process adoption scenario, and documents 12 factors arising which can prove useful in stimulating emplo作者: 鄙視讀作 時(shí)間: 2025-3-29 05:09
File Integrity Monitor Scheduling Based on File Security Level Classificationfy these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used to detect any malicious modification to these critical files. Two methods, off-line and on-line file integrity monitoring have their own disadvantages作者: 租約 時(shí)間: 2025-3-29 09:24 作者: 溫和女孩 時(shí)間: 2025-3-29 13:32 作者: inflate 時(shí)間: 2025-3-29 16:00
Software Risk Assessment: A Review on Small and Medium Software Projectscts that each of them can be influenced by a risk. Therefore, it needs a unique assessment process of the possible risks that may cause failure or loss of the project if they occur. In the literature, there are wide range of risk assessment researches conducted toward software projects. But there is作者: 使顯得不重要 時(shí)間: 2025-3-29 22:40
Conference proceedings 2011011, held in Kuantan, Malaysia, in June 2011.The 190 revised full papers presented together with invited papers inthe three volumes were carefully reviewed and selected from numeroussubmissions. The papers are organized in topical sections on softwareengineering; network; bioinformatics and e-health作者: Clinch 時(shí)間: 2025-3-30 02:29
Conference proceedings 2011ment;engineering; software security; graphics and multimedia; databases;algorithms; signal processing; software design/testing; e- technology;ad hoc networks; social networks; software process modeling;miscellaneous topics in software engineering and computer systems.作者: Explosive 時(shí)間: 2025-3-30 06:14 作者: 先鋒派 時(shí)間: 2025-3-30 09:22 作者: 邊緣 時(shí)間: 2025-3-30 15:58
Genetic Algorithm Approach to Path Planning for Intelligent Camera Control for Scientific Visualizates genetic algorithm as an optimization tool. Finally, the paper presents the experimental results of our algorithm including an empirical study to determine the optimal values for the genetic parameters.作者: majestic 時(shí)間: 2025-3-30 17:05
Software Risk Assessment: A Review on Small and Medium Software Projectsight of the current level of risk assessment for small and medium software development projects. Finally, some future directions will be discussed hoping to insight the gap of the risk assessment field for small and medium software development projects.作者: 脆弱帶來(lái) 時(shí)間: 2025-3-30 23:52
A Soft Set Model on Information System and Its Application in Clustering Attribute Selection. Experiment results on UCI benchmark data sets show that the proposed approach provides faster decision for selecting a clustering attribute as compared with maximum dependency attributes (MDA) approach.作者: Harness 時(shí)間: 2025-3-31 02:35
Super Attribute Representative for Decision Attribute Selectione Representative (SAR), a soft set based technique for decision making in categorical-valued information system is proposed. The proposed technique has been tested on two datasets. The results of this research will provide useful information for decision makers to handle categorical datasets.作者: 槍支 時(shí)間: 2025-3-31 05:15
The Normal Parameter Value Reduction of Soft Sets and Its Algorithmthe problem of suboptimal choice and added parameter values. More specifically, minimal normal parameter value reduction (MNPVR) is defined as a special case of NPVR and a heuristic algorithm is presented. Finally, an illustrative example is employed to show our contribution.作者: Optic-Disk 時(shí)間: 2025-3-31 09:11
A Mean Mutual Information Based Approach for Selecting Clustering Attributee define the concept of mean inter-class similarity to measure the accuracy of selecting clustering attribute. The experiment results show that the accuracy of selecting clustering attribute using our method is higher than that using TR, MMR and MDA methods.作者: 規(guī)章 時(shí)間: 2025-3-31 14:36
Knowledge Taxonomy for Developing Organizational Memory System (OMS) for Public Institutions of High on pertinent literature of organizational memory system model, organizational memory sources types and knowledge management technology. Further study can be conducted to validate and verify the developed taxonomy.作者: 匍匐前進(jìn) 時(shí)間: 2025-3-31 19:04
A Framework for Optimizing Malware Classification by Using Genetic Algorithmm this study will create a new framework that designed to optimize the classification of malware. This new malware classification system also has an ability to train and learn by itself, so that it can predict the current and upcoming trend of malware attack.作者: 震驚 時(shí)間: 2025-3-31 23:12
Building a Corpus-Derived Gazetteer for Named Entity Recognitionotated data for the ‘person named’ entity type is presented. The process used has a small computational cost. We combine rule-based grammars and a simple filtering technique for automatically inducing the gazetteer. We conclude with experiments to compare the content of the gazetteer with the manually crafted one.作者: 吞沒(méi) 時(shí)間: 2025-4-1 02:31 作者: 跑過(guò) 時(shí)間: 2025-4-1 09:18
Rough Set Theory Approach for Classifying Multimedia Datatheory method is useful for exploring multimedia data and simplicity to construct multimedia data classification. Classification will help to improve the performance of multimedia data retrieving and organizing process.作者: 厚顏 時(shí)間: 2025-4-1 10:50
File Integrity Monitor Scheduling Based on File Security Level Classificationne monitoring approach with dynamic inspection scheduling by performing file classification technique. Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. The initial testing result shows that our system is effective in on-line detection of file modification.作者: Prophylaxis 時(shí)間: 2025-4-1 16:48 作者: BOLUS 時(shí)間: 2025-4-1 22:31
Application of Rasch Model in Validating the Content of Measurement Instrument for Blog Qualityof 11 families and the 49 criteria assigned have content validity by mean of online survey. These criteria will then be used as a basis of constructing the instrument to measure the acceptability of the criteria for blog quality.作者: Original 時(shí)間: 2025-4-1 23:24