咨询与建议

限定检索结果

文献类型

  • 19,973 篇 会议
  • 249 册 图书
  • 143 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 20,364 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 15,271 篇 工学
    • 10,589 篇 计算机科学与技术...
    • 8,778 篇 软件工程
    • 2,207 篇 电气工程
    • 2,069 篇 信息与通信工程
    • 1,938 篇 控制科学与工程
    • 1,403 篇 电子科学与技术(可...
    • 1,322 篇 机械工程
    • 1,194 篇 土木工程
    • 964 篇 材料科学与工程(可...
    • 877 篇 建筑学
    • 871 篇 动力工程及工程热...
    • 860 篇 仪器科学与技术
    • 848 篇 生物工程
    • 841 篇 化学工程与技术
    • 749 篇 生物医学工程(可授...
    • 728 篇 安全科学与工程
    • 689 篇 力学(可授工学、理...
    • 552 篇 光学工程
    • 531 篇 交通运输工程
  • 6,262 篇 理学
    • 3,600 篇 数学
    • 1,866 篇 物理学
    • 971 篇 生物学
    • 944 篇 统计学(可授理学、...
    • 765 篇 系统科学
    • 741 篇 化学
  • 3,602 篇 管理学
    • 2,413 篇 管理科学与工程(可...
    • 1,500 篇 图书情报与档案管...
    • 1,341 篇 工商管理
  • 689 篇 教育学
    • 685 篇 教育学
  • 590 篇 医学
    • 525 篇 临床医学
  • 466 篇 经济学
  • 425 篇 法学
  • 159 篇 农学
  • 103 篇 文学
  • 54 篇 艺术学
  • 52 篇 军事学

主题

  • 781 篇 software enginee...
  • 326 篇 application soft...
  • 303 篇 software
  • 262 篇 computer science
  • 221 篇 knowledge engine...
  • 221 篇 neural networks
  • 221 篇 data mining
  • 178 篇 knowledge based ...
  • 177 篇 educational inst...
  • 170 篇 computer archite...
  • 160 篇 software systems
  • 153 篇 knowledge manage...
  • 145 篇 software testing
  • 136 篇 programming
  • 128 篇 software archite...
  • 127 篇 software design
  • 113 篇 semantics
  • 112 篇 artificial intel...
  • 110 篇 computational mo...
  • 109 篇 fuzzy logic

机构

  • 39 篇 school of comput...
  • 33 篇 dmms core lab fl...
  • 32 篇 state key labora...
  • 30 篇 school of electr...
  • 29 篇 school of automa...
  • 26 篇 college of compu...
  • 26 篇 nanjing univ sta...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 21 篇 school of reliab...
  • 21 篇 national univers...
  • 20 篇 ieee
  • 19 篇 university of ch...
  • 19 篇 school of reliab...
  • 18 篇 hunan university...
  • 15 篇 shenyang normal ...
  • 15 篇 school of comput...
  • 15 篇 school of softwa...
  • 15 篇 institute of inf...
  • 14 篇 wuhan univ state...

作者

  • 21 篇 biffl stefan
  • 18 篇 liu yan
  • 15 篇 wang tao
  • 15 篇 wang wei
  • 14 篇 desmet w.
  • 14 篇 liu yang
  • 14 篇 liu jie
  • 12 篇 wang lei
  • 12 篇 jin zhi
  • 11 篇 huang tao
  • 11 篇 li li
  • 11 篇 wang jian
  • 11 篇 li yong
  • 10 篇 zhang lin
  • 10 篇 zhang tao
  • 10 篇 li yang
  • 10 篇 wei jun
  • 10 篇 wang qing
  • 10 篇 li juan
  • 10 篇 yang yang

语言

  • 19,613 篇 英文
  • 610 篇 其他
  • 106 篇 中文
  • 21 篇 西班牙文
  • 10 篇 葡萄牙文
  • 7 篇 土耳其文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 俄文
  • 2 篇 乌克兰文
  • 1 篇 捷克文
检索条件"任意字段=Proceedings of the 9th Knowledge-Based Software Engineering Conference"
20366 条 记 录,以下是591-600 订阅
排序:
Deep Learning based FPN and MT-CNN Face Mask Detection System  9
Deep Learning Based FPN and MT-CNN Face Mask Detection Syste...
收藏 引用
9th International conference on Science, Technology, engineering and Mathematics, ICONSTEM 2024
作者: Nirmaladevi, J. Poornachandra, S. Jayavardhini, P. Ragsana, R.V. Mahalakame, R.M. Bannari Amman Institute of Technology Department of Information Science And Engineering Tamil Nadu Erode638401 India St Peter's College of Engineering Department of Electronics And Communications Engineering Tamil Nadu Chennai600054 India Bannari Amman Institute of Technology Department of Electrical And Electronics Engineering Tamil Nadu Erode638401 India
In this study, we provide a novel face mask identification method that utilizes FPN and MT-CNN models trained using deep learning. Images of persons with and without face masks were used to test the proposed models. T... 详细信息
来源: 评论
FedDAN: Federated Learning with Distillation and Adapter Net Model Using in Intrusion Detection System  24
FedDAN: Federated Learning with Distillation and Adapter Net...
收藏 引用
9th International conference on Cyber Security and Information engineering, ICCSIE 2024
作者: Han, Peng Zhou, Shaowen Chen, Guimin Lian, Yifeng Institute of Software Chinese Academy of Sciences China University of Chinese Academy of Sciences China Ningbo Municipal Public Security Bureau China Xiamen Anscen Network Technology Co. Ltd China
Intrusion detection technology is one of the core technologies of dynamic security technology. the traffic monitoring method based on machine learning is a more advanced method at present, but this method needs to tra... 详细信息
来源: 评论
BFT Consensus Algorithms  10
BFT Consensus Algorithms
收藏 引用
10th IEEE International conference on Cyber Security and Cloud Computing and 9th IEEE International conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Zhang, Xiaojun Zhong, Weiyu Yang, Ce Chen, Lin Liao, Jing Xiong, Naixue QuanZhou University of Information Engineering Software College QuanZhou362000 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China
With the advent of Bitcoin, the blockchain as the underlying technology of Bitcoin has entered people9;s field of vision. In recent years, the blockchain and its related technologies have developed rapidly. the con... 详细信息
来源: 评论
Multi-Scale Feature Extraction with Supervised Contrastive Learning for Vulnerability Detection  36
Multi-Scale Feature Extraction with Supervised Contrastive L...
收藏 引用
36th International conference on software engineering and knowledge engineering, SEKE 2024
作者: Zhao, Yahui Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
the capacity of Deep Learning to automatically learn features from source code has facilitated its extensive utilization in detecting software vulnerabilities. However, existing pre-trained models regard code snippets... 详细信息
来源: 评论
Low Power Design Techniques for IoT Devices  9
Low Power Design Techniques for IoT Devices
收藏 引用
9th International conference on Science, Technology, engineering and Mathematics, ICONSTEM 2024
作者: Goud, D. Shekar Kumar, C. Devipriya, S. Dhanalakshmi, S. Mageshwari, P.S. Latha Anitha Mary, M. Ellenki College of Engineering And Technology Department of Electronics And Communication Engineering Telangana Hyderabad502319 India Department of Electronics And Communication Engineering Andhra Pradesh Madanapalle517325 India Annapoorana Engineering College Department of Electronics And Communication Engineering Tamil Nadu Salem636308 India Bannari Amman Institute of Technology Department of Electronics And Communication Engineering Tamil Nadu Sathyamangalam638401 India Tamil Nadu Kavaraipettai601206 India Rajalakshmi Engineering College Department of Electronics And Communication Engineering Tamil Nadu Chennai602105 India
As Internet of things (IoT) devices become more common, there is a greater need for energy-efficient solutions that make devices more self-sufficient and battery life longer. Internet of things (IoT) devices must be a... 详细信息
来源: 评论
Subsynchronous Oscillation Identification Method based on Unthresholded Recurrence Plot and Convolutional Neural Networks  9
Subsynchronous Oscillation Identification Method Based on Un...
收藏 引用
9th Asia conference on Power and Electrical engineering, ACPEE 2024
作者: Li, Cong Liu, Hao North China Electric Power University School of Electrical and Electronic Engineering Beijing China
With the integration of a large number of new energy sources such as wind power and photovoltaics plant into the grid, the power system is developing towards a 9;double-high9; trend. the problem of subsynchronou... 详细信息
来源: 评论
An Approach for Providing Recommendation for Requirements Non-Conformant with Requirement Templates (RTs)  24
An Approach for Providing Recommendation for Requirements No...
收藏 引用
17th Innovations in software engineering conference (ISEC)
作者: Balwani, Shivani Tiwari, Saurabh Dasgupta, Sourish Sharma, Akhilesh DA IICT Gandhinagar Software Engn Res Lab Gandhinagar India DA IICT Gandhinagar Knowledge Discovery & Management Lab Gandhinagar India Indian Space Res Org ISRO Space Applicat Ctr SAC Ahmadabad Gujarat India
RTs generally possess a fixed syntactic structure and comprise predefined slots, and requirements written in the format of RTs must conform with the template structure. Suppose the requirements do not conform to the R... 详细信息
来源: 评论
Operational Cost Analysis of an Earth Station System Using Parallel Configuration  9
Operational Cost Analysis of an Earth Station System Using P...
收藏 引用
9th International conference on Computer and Communication engineering, ICCCE 2023
作者: Aris, Wan Muhammad Syaamil W Rahim, Nadirah Abdul International Islamic University Malaysia Department of Electrical and Computer Engineering Kuala Lumpur Malaysia
the earth station is crucial in delivering regular communication worldwide. Earth station requires costs to operate. the operational cost is the main cost involved in running the earth station. this operational cost c... 详细信息
来源: 评论
An Evaluation on ICT Anxiety and Resilience of Phrada Bos Student and Improving Core Skill in Project Course  9
An Evaluation on ICT Anxiety and Resilience of Phrada Bos St...
收藏 引用
9th International conference on Business and Industrial Research, ICBIR 2024
作者: Alongkrontuksin, Chokchai Korajintanakarn, Piya Saeheaw, Teerapun Chonchaiya, Ratchanikorn Chomboot, Rungrueng King Mongkut's University of Technology North Bangkok Department of Teacher Training in Mechanical Engineering Bangkok Thailand King Mongkut's University of Technology Thonburi Department of Mathematics Bangkok Thailand
the objectives of this paper were to develop the problem-based learning for improving using information technology, problem solving skill for Phrada Bos students. Starting from analysis, design, development, implement... 详细信息
来源: 评论
Design Rearch on Electronic Sphygmomanometer for the Elderly based on Miryoku engineering  9
Design Rearch on Electronic Sphygmomanometer for the Elderly...
收藏 引用
9th International conference on Control, Automation and Robotics (ICCAR)
作者: Wu, Xiao-Jie Zhang, Bao-Yi Huang, Jing-Jing Xiamen Univ Technol Dept Prod Design Xiamen Peoples R China
By studying the connection between the perceptual factors of elderly users9; psychology and the design elements of electronic sphygmomanometers, we determine the design elements, so as to carry out the innovative d... 详细信息
来源: 评论