咨询与建议

限定检索结果

文献类型

  • 261 篇 会议
  • 1 册 图书

馆藏范围

  • 262 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 129 篇 计算机科学与技术...
    • 111 篇 软件工程
    • 40 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 23 篇 动力工程及工程热...
    • 20 篇 电气工程
    • 14 篇 生物工程
    • 13 篇 化学工程与技术
    • 11 篇 电子科学与技术(可...
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 9 篇 力学(可授工学、理...
    • 9 篇 机械工程
    • 7 篇 光学工程
    • 7 篇 材料科学与工程(可...
    • 6 篇 土木工程
  • 98 篇 理学
    • 68 篇 数学
    • 22 篇 物理学
    • 21 篇 统计学(可授理学、...
    • 14 篇 生物学
    • 13 篇 化学
    • 13 篇 系统科学
  • 44 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 22 篇 工商管理
    • 21 篇 图书情报与档案管...
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
    • 6 篇 药学(可授医学、理...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 6 篇 法学
  • 4 篇 教育学
  • 2 篇 农学

主题

  • 24 篇 computational mo...
  • 10 篇 computer applica...
  • 10 篇 mathematical mod...
  • 10 篇 data models
  • 9 篇 optimization
  • 9 篇 genetic algorith...
  • 8 篇 training
  • 6 篇 machine learning
  • 6 篇 solid modeling
  • 6 篇 heuristic algori...
  • 5 篇 task analysis
  • 5 篇 neural networks
  • 5 篇 predictive model...
  • 5 篇 decision making
  • 4 篇 internet of thin...
  • 4 篇 simulation
  • 4 篇 computer archite...
  • 4 篇 information tech...
  • 4 篇 real-time system...
  • 4 篇 integrated circu...

机构

  • 3 篇 yaroslav-the-wis...
  • 3 篇 novolipetsk stee...
  • 3 篇 school of comput...
  • 3 篇 school of electr...
  • 2 篇 college of infor...
  • 2 篇 school of comput...
  • 2 篇 faculty of engin...
  • 2 篇 batman universit...
  • 2 篇 faculty of engin...
  • 2 篇 international in...
  • 2 篇 college of compu...
  • 2 篇 school of comput...
  • 2 篇 vocational schoo...
  • 2 篇 hohhot vocationa...
  • 2 篇 institut teknolo...
  • 2 篇 faculty of compu...
  • 2 篇 school of electr...
  • 2 篇 lipetsk state te...
  • 2 篇 faculty of ict u...
  • 2 篇 batman universit...

作者

  • 5 篇 gao zheng-ming
  • 5 篇 zhao juan
  • 3 篇 kornyshev n.p.
  • 2 篇 nananukul narame...
  • 2 篇 ismail saad
  • 2 篇 pepe antonio
  • 2 篇 hekimoglu baran
  • 2 篇 quan nie
  • 2 篇 djalal muhammad ...
  • 2 篇 hariyanto nanang
  • 2 篇 chen yunfang
  • 2 篇 zhang huajie
  • 2 篇 kit guan lim
  • 2 篇 hu yumeng
  • 2 篇 fleischmann domi...
  • 2 篇 lee jae-min
  • 2 篇 duc duy nguyen
  • 2 篇 fu xueliang
  • 2 篇 galkin alexander
  • 2 篇 ekinci serdar

语言

  • 262 篇 英文
检索条件"任意字段=2020 2nd International Conference on Computer Modeling, Simulation and Algorithm, CMSA 2020"
262 条 记 录,以下是71-80 订阅
排序:
D2D Task Allocation System for Industrial Robots Based on JXTA  2
D2D Task Allocation System for Industrial Robots Based on JX...
收藏 引用
2nd international conference on Electrical, Communication and computer Engineering, ICECCE 2020
作者: Wang, Zhaoqi Zhang, Mengxin Lu, Xuanmin School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China School of Electronics and Information Northwestern Polytechnical University Beijing China
Traditional manufacturing industries are turning into intelligent factories. If industrial robots can communicate with each other and automatically allocate tasks, the pressure in the control center will be greatly re... 详细信息
来源: 评论
Development of a Tool for modeling Security Threats of an Enterprise Information System  2
Development of a Tool for Modeling Security Threats of an En...
收藏 引用
2nd international conference on Electrical, Communication and computer Engineering, ICECCE 2020
作者: Kalugina, Olga Barankova, Inna Mikhailova, Uliana Computer Science and Iformation Security Nosov Magnitogorsk State Technical University Magnitogorsk Russia
A qualitative risk assessment of information security threats make it possible to solve the problem of information security most effectively. The paper analyzes existing approaches to assessing the security risks of i... 详细信息
来源: 评论
Breaches Detection in Zebra Cross Traffic Light Using Haar Cascade Classifier  2
Breaches Detection in Zebra Cross Traffic Light Using Haar C...
收藏 引用
2nd international conference on Informatics, Multimedia, Cyber, and Information System, ICIMCIS 2020
作者: Anggadhita, Mahada Panji Widiastiwi, Yuni Faculty of Computer Science University of Pembangunan Nasional Veteran Jakarta Jakarta Indonesia
Traffic violations are common in the area zebra crossing at the location of traffic lights, violations are generally caused by the negligence of motorists who do not comply with existing regulations. As a result, ther... 详细信息
来源: 评论
Fault detection in active hybrid distribution networks: Overcoming uncertainty  2
Fault detection in active hybrid distribution networks: Over...
收藏 引用
2nd international conference on Smart Power and Internet Energy Systems, SPIES 2020
作者: Negari, Shahram Xu, David Ryerson University Depratement of Electrical and Computer Engineering TorontoON Canada
Fault detection in active hybrid distribution networks that contain distributed energy resources and employ both alternating current and direct current is a highly complex and challenging task. Such networks are inher... 详细信息
来源: 评论
Heterogeneous mayfly optimization algorithm  2
Heterogeneous mayfly optimization algorithm
收藏 引用
2nd international conference on Machine Learning, Big Data and Business Intelligence, MLBDBI 2020
作者: Gao, Zheng-Ming Li, Su-Ruo Zhao, Juan Hu, Yu-Rong Jingchu University of Technology School of Computer Engineering Jingmen China
It appeared that with more updating ways, the optimization algorithms would perform better in optimization. In this paper, the heterogeneous mayfly optimization (HMO) algorithm was proposed. The individuals in the HMO... 详细信息
来源: 评论
Machine learning algorithms against hacking attack and detection success comparison  2
Machine learning algorithms against hacking attack and detec...
收藏 引用
2nd international conference on Smart Power and Internet Energy Systems, SPIES 2020
作者: Yavuz, Levent Soran, Ahmet Onen, Ahmet Muyeen, S.M. Abdullah Gül University Electrical and Computer Engineering Department Kayseri Turkey Curtin University Electrical and Computer Engineering Department Curtin Australia
Power system protection units has got enormous importance with the growing risk of cyber-attacks. To create sustainable and well protected system, power system data must be healthy. For that purpose, many machine lear... 详细信息
来源: 评论
Securing vehicular adhoc network against malicious vehicles using advanced clustering technique  2
Securing vehicular adhoc network against malicious vehicles ...
收藏 引用
2nd international conference on Data, Engineering and Applications, IDEA 2020
作者: Temurnikar, Ankit Verma, Pushpneel Choudhary, Jaytrilok Bhagwant University Computer Science and Engineering Ajmer Rajasthan India MANIT Bhopal Computer Science and Engineering Bhopal MP India
VANET is one of most emerging and unique topics among the scientist and researcher. Due to its mobility, high dynamic nature and frequently changing topology not predictable, mobility attracts too much to researchers ... 详细信息
来源: 评论
New strategy based on large scale fading coefficients to mitigate the pilot contamination problem in massive MIMO systems  2
New strategy based on large scale fading coefficients to mit...
收藏 引用
2nd IEEE international conference on Electronics, Control, Optimization and computer Science, ICECOCS 2020
作者: Belhabib, Abdelfettah Boulouird, Mohamed Hassani, Moha M'Rabet Group Faculty of Sciences Semlalia Marrakesh Morocco I2SP Group Faculty of Sciences Semlalia Cadi Ayyad University Marrakesh Morocco Cadi Ayyad University Marrakesh Morocco
This paper provides an algorithm that aims to address the problem of Pilot Contamination (PC) within Massive MIMO systems. The algorithm is mainly derived from the asymptotic regime, where Base Stations (BSs) are equi... 详细信息
来源: 评论
Estimation of the probability of correct determination of the coordinates of an object in computer modeling of methods for selecting their images  2
Estimation of the probability of correct determination of th...
收藏 引用
2nd international Scientific and Practical conference on Mathematical modeling, Programming and Applied Mathematics, ISPCMMPAM 2020
作者: Kornyshev, N.P. Serebrjakov, D.A. Yaroslav-the-Wise Novgorod State University 41 ul. B. St. Petersburgskaya Veliky Novgorod Russia
The article discusses the issues of computer modeling of methods for selecting images of objects. It considers a test video sequence with given background and object parameters. The issues of computer simulation of th... 详细信息
来源: 评论
Fault Detection and Diagnosis of Photovoltaic Systems through I-V Curve Analysis  2
Fault Detection and Diagnosis of Photovoltaic Systems throug...
收藏 引用
2nd international conference on Electrical, Communication and computer Engineering, ICECCE 2020
作者: Zbib, Batoul Al Sheikh, Hiba Lebanese University Faculty of Engineering Department of Electrical Engineering Beirut Lebanon Lebanese International University - School of Engineering Department of Electrical and Electronic Engineering Tripoli Lebanon
This work presents an algorithm to detect and diagnose faults in PhotoVoltaic (PV) systems based on the I-V curve analysis. Three types of faults are investigated: mismatch and shading faults, connectivity faults and ... 详细信息
来源: 评论