咨询与建议

限定检索结果

文献类型

  • 1,526 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 1,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,137 篇 工学
    • 965 篇 计算机科学与技术...
    • 824 篇 软件工程
    • 269 篇 信息与通信工程
    • 207 篇 控制科学与工程
    • 170 篇 生物工程
    • 150 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 84 篇 动力工程及工程热...
    • 81 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 66 篇 光学工程
    • 64 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 34 篇 环境科学与工程(可...
    • 29 篇 仪器科学与技术
  • 537 篇 理学
    • 258 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 41 篇 化学
  • 317 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 138 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 70 篇 法学
    • 59 篇 社会学
  • 59 篇 医学
    • 55 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 24 篇 农学
  • 19 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学

主题

  • 35 篇 software
  • 32 篇 internet of thin...
  • 32 篇 computer softwar...
  • 27 篇 application soft...
  • 26 篇 computer archite...
  • 24 篇 software enginee...
  • 24 篇 real-time system...
  • 20 篇 deep learning
  • 20 篇 cloud computing
  • 20 篇 computer vision
  • 19 篇 computational mo...
  • 17 篇 costs
  • 17 篇 convolutional ne...
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 15 篇 programming
  • 15 篇 recommender syst...
  • 14 篇 computer science
  • 14 篇 object detection

机构

  • 22 篇 wuhan donghu uni...
  • 17 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 school of inform...
  • 8 篇 university of ta...
  • 8 篇 school of electr...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 school of electr...
  • 6 篇 school of electr...
  • 6 篇 school of automa...
  • 6 篇 school of inform...
  • 5 篇 chitkara univers...
  • 5 篇 beijing key labo...
  • 5 篇 beijing universi...
  • 4 篇 college of engin...
  • 4 篇 school of comput...
  • 4 篇 school of big da...
  • 4 篇 school of comput...
  • 4 篇 beijing engineer...

作者

  • 8 篇 lian ren-zun
  • 7 篇 zhang bo
  • 5 篇 wang jing
  • 5 篇 li zixin
  • 5 篇 li jiawen
  • 5 篇 li jianqiang
  • 4 篇 mirchandani sanj...
  • 4 篇 liang meiyu
  • 4 篇 zhang rui
  • 4 篇 surendran r.
  • 4 篇 chen xiangning
  • 4 篇 li weixin
  • 4 篇 li jian
  • 4 篇 zhang li
  • 4 篇 liu hai
  • 4 篇 meiyu liang
  • 3 篇 wang lei
  • 3 篇 yawen li
  • 3 篇 li yang
  • 3 篇 dai fei

语言

  • 1,513 篇 英文
  • 16 篇 中文
  • 14 篇 其他
  • 3 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023"
1532 条 记 录,以下是211-220 订阅
排序:
Human Cognition and Artificial Intelligence: A Survey  8
Human Cognition and Artificial Intelligence: A Survey
收藏 引用
8th international conference on Communication and Electronics systems, ICCES 2023
作者: Sharma, Vipasha Walia, Navpreet Kaur Chandigarh University Department of Computer Science & Engineering Mohali Punjab Gharuan India
Cognitive science is a rich field of study that can provide useful information to the developers of Artificial Intelligence (AI) systems. this study investigates the relationship between AI and cognitive science. this... 详细信息
来源: 评论
Work in Progress: Github-Driven Learning: A Case Study in Agile-Infused software Design Courses  8
Work in Progress: GitHub-Driven Learning: A Case Study in Ag...
收藏 引用
8th international conference on Information systems engineering (ICISE)
作者: Chen, Wei-Yang Chen, Hsi-Min Hsueh, Yen-Tse Feng Chia Univ Taichung Taiwan
In computer Science education, the ever-changing nature of professional environments demands that students be actively prepared for future challenges. Project-based learning (PBL) has become increasingly significant, ... 详细信息
来源: 评论
Overview of Synthetic Data Generation for computer Vision in Industry  8
Overview of Synthetic Data Generation for Computer Vision in...
收藏 引用
8th international conference on Mechanical engineering and Robotics Research, ICMERR 2023
作者: Nandakumar, Nishanth Eberhardt, Jorg Ravensburg-Weingarten University of Applied Sciences Institute for Photonic Systems Weingarten Germany
the introduction of Industrial Artificial Intelligence led us to adopt a variety of innovative technologies that add value to the product's life cycle. One such breakthrough is computer vision-based quality inspec... 详细信息
来源: 评论
the research on the construction method of evaluation indicator system based on software product line
The research on the construction method of evaluation indica...
收藏 引用
2011 8th international conference on Fuzzy systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th international conference on Natural Computation, ICNC'11
作者: Liu, Yu-Yan Zhao, Qing Liu, Yu-Lin Department of Computer Science Technology of Kunming University Yunnan China Trade and Administration College Chongqing University Chongqing China
the software product line development goal is whole domain rather than a single software system, with the results that effectively improved the software system development productivity and quality, shortened developme... 详细信息
来源: 评论
A Comparative Analysis on three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method
A Comparative Analysis on Three Duplication Elements in Copy...
收藏 引用
international conference on software engineering and computer systems (icsecs)
作者: Nur Izzati Nor Azaimi Nor Bakiah Abd Warif Nor-Syahidatul N Ismail Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Johor Malaysia Faculty of Computer Science and Information Technology Centre for Information Security Research Universiti Tun Hussein Onn Malaysia Johor Malaysia Department of Computer System and Networking Faculty of Computing Universiti Malaysia Pahang Al-Sultan Abdullah Pekan Pahang Malaysia
Image forgery is the alteration of a digital image to hide some of the important and useful information. Copy-move forgery (CMF) is one of the most difficult to detect because the copied part of the image has the same...
来源: 评论
An evaluation of software requirements tools  8
An evaluation of software requirements tools
收藏 引用
8th international conference on Intelligent Computing and Information systems, ICICIS 2017
作者: Shah, Atif Alasow, Mohamed Ali Sajjad, Faisal Baig, Jawad Javed Akbar Information and Computer Science Department King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia
software requirements gathering from users, customers, and stakeholders is the very first and critical step in software development. Requirements are volatile due to change in needs, processes and technology. this mak... 详细信息
来源: 评论
PMSM Sliding Mode Control Based on a New Approach Law  8
PMSM Sliding Mode Control Based on a New Approach Law
收藏 引用
8th international conference on Intelligent Informatics and Biomedical Sciences, ICIIBMS 2023
作者: Wang, Bulai Li, Zixin Shanghai Institute of Technology School of Electrical and Electronic Engineering Shanghai China
A new type of exponential reaching law is proposed to address the problems of large overshoot and weak anti-interference ability of traditional exponential reaching law sliding mode control in permanent magnet synchro... 详细信息
来源: 评论
FedCo: Self-Supervised Learning in Federated Learning with Momentum Contrast  24
FedCo: Self-Supervised Learning in Federated Learning with M...
收藏 引用
24th ieee international conference on High Performance Computing and Communications, 8th ieee international conference on Data Science and systems, 20th ieee international conference on Smart City and 8th ieee international conference on Dependability in Sensor, Cloud and Big Data systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Wei, Shuai Cao, Guitao Dai, Cheng Dai, Shengxin Guo, Bing College of Computer Science Sichuan University Chengdu China MoE Engineering Research Center of SW/HW Co-design Technology and Application MoE East China Normal University Shanghai China MoE Engineering Research Center of SW/HW Co-design Technology and Application MoE East China Normal University Chengdu China Sichuan University Chengdu China
Federated learning(FL) enables multiple partici-pants to build a common, robust machine learning model without sharing data, which is a key technique to address data privacy, security, access rights, and access to het... 详细信息
来源: 评论
Secure software engineering: Evaluation of emerging trends  8
Secure software engineering: Evaluation of emerging trends
收藏 引用
8th international conference on Information Technology, ICIT 2017
作者: Mohammad, Adel Alqatawna, Ja'far Abushariah, Mohammad King Abdullah II School for Information Technology University of Jordan Jordan Department of Computer Information Systems Jordan Amman Jordan
With the dramatic increase in the number of software security problems, a growing body of research in how to integrate security within software development is notable. Many security approaches have appeared to solve s... 详细信息
来源: 评论
Transient stability analysis of TNGT power system  8
Transient stability analysis of TNGT power system
收藏 引用
2014 8th ieee international conference on Intelligent systems and Control, ISCO 2014
作者: Monica, A. Narayanappa Power Systems Engineering Department of Electrical and Electronics Adhiyamaan College of Engineering HosurTN India Department of Electrical and Electronics Adhiyamaan College of Engineering HosurTN India
the increase in size and complexity of power system networks with a large number of interconnections has exposed the system to various contingencies, which lead to system instability. therefore, it is necessary for a ... 详细信息
来源: 评论