咨询与建议

限定检索结果

文献类型

  • 261 篇 会议
  • 1 册 图书

馆藏范围

  • 262 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 129 篇 计算机科学与技术...
    • 111 篇 软件工程
    • 40 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 23 篇 动力工程及工程热...
    • 20 篇 电气工程
    • 14 篇 生物工程
    • 13 篇 化学工程与技术
    • 11 篇 电子科学与技术(可...
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 9 篇 力学(可授工学、理...
    • 9 篇 机械工程
    • 7 篇 光学工程
    • 7 篇 材料科学与工程(可...
    • 6 篇 土木工程
  • 98 篇 理学
    • 68 篇 数学
    • 22 篇 物理学
    • 21 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 13 篇 化学
    • 13 篇 系统科学
  • 44 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 22 篇 工商管理
    • 21 篇 图书情报与档案管...
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
    • 6 篇 药学(可授医学、理...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 6 篇 法学
  • 4 篇 教育学
  • 2 篇 农学

主题

  • 24 篇 computational mo...
  • 10 篇 computer applica...
  • 10 篇 mathematical mod...
  • 10 篇 data models
  • 9 篇 optimization
  • 9 篇 genetic algorith...
  • 8 篇 training
  • 6 篇 machine learning
  • 6 篇 solid modeling
  • 6 篇 heuristic algori...
  • 5 篇 task analysis
  • 5 篇 neural networks
  • 5 篇 predictive model...
  • 5 篇 decision making
  • 4 篇 internet of thin...
  • 4 篇 simulation
  • 4 篇 computer archite...
  • 4 篇 information tech...
  • 4 篇 real-time system...
  • 4 篇 integrated circu...

机构

  • 3 篇 yaroslav-the-wis...
  • 3 篇 novolipetsk stee...
  • 3 篇 school of comput...
  • 3 篇 school of electr...
  • 2 篇 college of infor...
  • 2 篇 school of comput...
  • 2 篇 faculty of engin...
  • 2 篇 batman universit...
  • 2 篇 faculty of engin...
  • 2 篇 international in...
  • 2 篇 college of compu...
  • 2 篇 school of comput...
  • 2 篇 vocational schoo...
  • 2 篇 hohhot vocationa...
  • 2 篇 institut teknolo...
  • 2 篇 faculty of compu...
  • 2 篇 school of electr...
  • 2 篇 lipetsk state te...
  • 2 篇 faculty of ict u...
  • 2 篇 batman universit...

作者

  • 5 篇 gao zheng-ming
  • 5 篇 zhao juan
  • 3 篇 kornyshev n.p.
  • 2 篇 nananukul narame...
  • 2 篇 ismail saad
  • 2 篇 pepe antonio
  • 2 篇 hekimoglu baran
  • 2 篇 quan nie
  • 2 篇 djalal muhammad ...
  • 2 篇 hariyanto nanang
  • 2 篇 chen yunfang
  • 2 篇 zhang huajie
  • 2 篇 kit guan lim
  • 2 篇 hu yumeng
  • 2 篇 fleischmann domi...
  • 2 篇 lee jae-min
  • 2 篇 duc duy nguyen
  • 2 篇 fu xueliang
  • 2 篇 galkin alexander
  • 2 篇 ekinci serdar

语言

  • 262 篇 英文
检索条件"任意字段=2020 2nd International Conference on Computer Modeling, Simulation and Algorithm, CMSA 2020"
262 条 记 录,以下是201-210 订阅
排序:
An Efficient Lion Optimization Based Cluster Formation and Energy Management in WSN Based IoT  2nd
An Efficient Lion Optimization Based Cluster Formation and E...
收藏 引用
2nd international conference on Intelligent Computing and Optimization, ICO 2019
作者: Yuvaraj, D. Sivaram, M. Mohamed Uvaze Ahamed, A. Nageswari, S. Department of Computer Science Cihan University - Erbil Kurdistan Region Erbil Iraq Department of Computer Science Cihan University - Duhok Kurdistan Region Duhok Iraq Department of Computer Networking Lebanese French University - Erbil Kurdistan Region Erbil Iraq Department of Computer Science and Engineering Bhararh Niketan Engineering College Theni India
For the past few decades, Wireless sensor networks (WSNs) disseminate less expensive sensor nodes (SN’s) in its area, where nodes plays significant role in Internet of Things (IoT). WSN based IoT, nodes are generally... 详细信息
来源: 评论
Performance Analysis of Least Significant Bit Based Watermarking Technique under Various Types of Attacks  2
Performance Analysis of Least Significant Bit Based Watermar...
收藏 引用
2nd international conference of Modern Applications on Information and Communication Technology, ICMAICT 2020
作者: Hasan, Afkar Ali Jawad, Majid Jabbar Naser, Mohammed Abdullah Computer Science Department College of Science for Women University of Babylon Babil Iraq
Digital information transferred through internet should be protection from unauthorized and attack resource using one of the information security system method, one of these methods was digital watermarking was used i... 详细信息
来源: 评论
A Survey of Continuous Collision Detection
A Survey of Continuous Collision Detection
收藏 引用
Information Technology and computer Application (ITCA), international conference on
作者: Quan Nie Yingfeng Zhao Li Xu Bin Li National Key Laboratory of Science and Technology on Vacuum Electronics University of Electronic Science and Technology of China Chengdu China
Continuous collision detection (CCD) is a key technology in the field of virtual surgery, cloth simulation and robot motion planning. It can accurately detect the first time of contact between objects and returns coll... 详细信息
来源: 评论
Performance Analysis of SWIPT System with Imperfect Channel State Information  2
Performance Analysis of SWIPT System with Imperfect Channel ...
收藏 引用
2nd international conference on computer, Big Data and Artificial Intelligence, ICCBDAI 2021
作者: Zhang, Chenxi Meng, Chao Yang, Yu Gao, Yan School of Networks and Telecommunications Engineering Jinling Institute of Technology Nanjing211169 China College of International Education Jinling Institute of Technology Nanjing211169 China
This paper studies the system performance of the multiple-input-single-output (MISO) system using simultaneous wireless information and power transfer (SWIPT) technology under imperfect channel state information. A po... 详细信息
来源: 评论
Permutation Tests for Two-Sample Means of High-dimensional Data
Permutation Tests for Two-Sample Means of High-dimensional D...
收藏 引用
Information Technology and computer Application (ITCA), international conference on
作者: Jing Yang Bo Chen Quan Nie School of Mathematical Sciences UESTC University of Electronic Science and Technology of China Chengdu China School of Electronic Science and Engineering UESTC University of Electronic Science and Technology of China Chengdu China
The generation of high-dimensional data has led people to research permutation tests. Permutation tests are widely used in practice, but unduly strong conditions are often required for its validity. In this paper, we ... 详细信息
来源: 评论
5th international Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the 3rd international Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the 1st international Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the 2nd international Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in conjunction with the 24th European Symposium on Research in computer Security, ESORICS 2019
5th International Workshop on Security of Industrial Control...
收藏 引用
5th international Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the 3rd international Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the 1st international Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the 2nd international Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in conjunction with the 24th European Symposium on Research in computer Security, ESORICS 2019
The proceedings contain 27 papers. The special focus in this conference is on Security of Industrial Control Systems and Cyber-Physical Systems. The topics include: ADIoT 2019 preface;anomaly detection for industrial ...
来源: 评论
Wheeled Mobile Robot Trajectory Planning Using Evolutionary Techniques  2nd
Wheeled Mobile Robot Trajectory Planning Using Evolutionary ...
收藏 引用
2nd international conference on Future Learning Aspects of Mechanical Engineering, FLAME 2020
作者: Ramabalan, S. Sathiya, V. Chinnadurai, M. Department of Mechanical Engineering E.G.S. Pillay Engineering College Nagapattinam Tamil Nadu611002 India Department of Electronics and Communication Engineering E.G.S. Pillay Engineering College Nagapattinam Tamil Nadu611002 India Department of Computer Science and Engineering E.G.S. Pillay Engineering College Nagapattinam Tamil Nadu611002 India
This paper proposes two multi-objective trajectory planning optimization algorithms, namely, Multi-objective differential evolution (MODE) and Elitist Non-dominated sorting genetic algorithm (NSGA-II). They are applie... 详细信息
来源: 评论
A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption  2nd
A Tele Encephalopathy Diagnosis Based on EEG Signal Compress...
收藏 引用
2nd international conference on Advances in Cyber Security, ACeS 2020
作者: Abdulbaqi, Azmi Shawkat Nejrs, Salwa Mohammed Mahmood, Sawsan D. Panessai, Ismail Yusuf College of Computer Science and Information Technology University of Anbar Ramadi Iraq College of Science Department of Physics University of Misan Amarah Iraq College of Engineering University of Tikreet Tikrit Iraq Faculty of Arts Computing and Creative Industry Sultan Idris Education University Tanjong Malim Malaysia
A Telemedicine network that uses connectivity and information technology to transmit medical signals such as neurological signals Electroencephalography (EEG) has become a reality for medical services of long distance... 详细信息
来源: 评论
Product Fraud Judgment Based on Random Forest Model
Product Fraud Judgment Based on Random Forest Model
收藏 引用
Information Technology and computer Application (ITCA), international conference on
作者: JianPeng Huang Bo han Wei Cheng Ziang Zhou Ao Qu The University of Queensland Queensland Australia Chang'an University Xi’An China The Ohio State University Ohio United States Indiana University Bloomington Indiana United States Vanderbilt University Nashville United States
With the rise of IoT technology, more and more companies are using this technology for daily work production. The technology will generate a lot of data in the process of application. If the data can be used reasonabl... 详细信息
来源: 评论
Comprehensive evaluation and analysis of the culture of mining and metallurgy enterprises by combining the spherical network structure model constructed by the calculation algorithm
Comprehensive evaluation and analysis of the culture of mini...
收藏 引用
Information Technology and computer Application (ITCA), international conference on
作者: Qing Zhao Research center for Mining and Metallurgy culture and Socio-economic development in the Middle Reaches of Yangtze river Hubei Polytechnic University Huangshi China
Choosing a more scientific evaluation system can evaluate the cultural construction of an enterprise reasonably. With the development of science and technology, the integration of computers in all fields of various in... 详细信息
来源: 评论