咨询与建议

限定检索结果

文献类型

  • 162 篇 期刊文献
  • 144 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 307 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 276 篇 工学
    • 158 篇 计算机科学与技术...
    • 70 篇 电气工程
    • 58 篇 控制科学与工程
    • 37 篇 信息与通信工程
    • 35 篇 软件工程
    • 34 篇 机械工程
    • 20 篇 材料科学与工程(可...
    • 16 篇 仪器科学与技术
    • 13 篇 土木工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 交通运输工程
    • 7 篇 力学(可授工学、理...
    • 5 篇 建筑学
    • 5 篇 石油与天然气工程
    • 4 篇 环境科学与工程(可...
    • 4 篇 网络空间安全
    • 3 篇 测绘科学与技术
    • 3 篇 船舶与海洋工程
    • 3 篇 核科学与技术
  • 57 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 42 篇 理学
    • 19 篇 数学
    • 10 篇 生物学
    • 9 篇 物理学
    • 6 篇 化学
    • 2 篇 地球物理学
  • 7 篇 教育学
    • 5 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 4 篇 经济学
    • 2 篇 理论经济学
  • 3 篇 农学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 法学
  • 1 篇 文学

主题

  • 307 篇 ant colony optim...
  • 27 篇 path planning
  • 24 篇 genetic algorith...
  • 8 篇 ant colony optim...
  • 7 篇 particle swarm o...
  • 6 篇 traveling salesm...
  • 6 篇 optimization
  • 6 篇 mobile robot
  • 6 篇 artificial intel...
  • 6 篇 feature selectio...
  • 6 篇 cloud computing
  • 5 篇 multi-objective ...
  • 5 篇 load balancing
  • 5 篇 artificial bee c...
  • 5 篇 data mining
  • 5 篇 combinatorial op...
  • 5 篇 scheduling
  • 4 篇 primary-backup a...
  • 4 篇 pid controller
  • 4 篇 heuristic based ...

机构

  • 4 篇 hefei univ techn...
  • 3 篇 chongqing techno...
  • 3 篇 nanyang technol ...
  • 3 篇 northeastern uni...
  • 3 篇 new jersey inst ...
  • 3 篇 anhui univ sch c...
  • 3 篇 univ hong kong f...
  • 2 篇 natl cheng kung ...
  • 2 篇 shanghai jiao to...
  • 2 篇 changshu inst te...
  • 2 篇 southwest jiaoto...
  • 2 篇 dalian jiaotong ...
  • 2 篇 univ hyderabad s...
  • 2 篇 minist educ key ...
  • 2 篇 tamkang univ dep...
  • 2 篇 yonsei univ dept...
  • 2 篇 shandong xiehe c...
  • 2 篇 northwestern pol...
  • 2 篇 silesian tech un...
  • 2 篇 natl tsing hua u...

作者

  • 5 篇 xiao wensheng
  • 5 篇 wu lei
  • 4 篇 jia zhao-hong
  • 4 篇 yang jia
  • 4 篇 xu qiang
  • 4 篇 liu chao
  • 4 篇 li kai
  • 3 篇 afshar m. h.
  • 3 篇 li lin-lin
  • 3 篇 xu yaping
  • 3 篇 wang deliang
  • 3 篇 slota damian
  • 3 篇 zheng yaqian
  • 3 篇 li yanyan
  • 3 篇 huang xiaodong
  • 2 篇 leite walter l.
  • 2 篇 shaofei zang
  • 2 篇 cui junguo
  • 2 篇 xu benlian
  • 2 篇 moon byungin

语言

  • 286 篇 英文
  • 15 篇 其他
  • 6 篇 中文
检索条件"主题词=Ant Colony optimization algorithm"
307 条 记 录,以下是261-270 订阅
排序:
The Research of Topology Control in Wireless Sensor Network Based on The Monitoring of Transmission and Distribution Lines
The Research of Topology Control in Wireless Sensor Network ...
收藏 引用
International Conference on Mechatronics and Semiconductor Materials (ICMSCM 2013)
作者: Jia Huibin Zhang Caixia North China Elect Power Univ Baoding Peoples R China
For the performance of wireless sensor network, topology control plays an important role. In order to save energy, prolong the lifetime of the network and reduce the interference between nodes, while ensuring the conn... 详细信息
来源: 评论
Multi-Stage Partner Selection Based on Genetic-ant colony algorithm in Agile Supply Chain Network
Multi-Stage Partner Selection Based on Genetic-Ant Colony Al...
收藏 引用
9th International Conference for Young Computer Scientists
作者: Lin, Zheng Wang, Lubin Cent Univ Finance & Econ Beijing Peoples R China
It is shown that partner selection in agile supply chain network can be represented as a directed graph model. This paper considers multi-stages in this process instead of one. The natures of the proposed model enable... 详细信息
来源: 评论
Wavelet Threshold Denoising of ACO Optical Lens Image  1st
Wavelet Threshold Denoising of ACO Optical Lens Image
收藏 引用
1st European-Alliance-for-Innovation (EAI) International Conference on Advanced Hybrid Information Processing (ADHIB)
作者: Xue, Ping Niu, Xiangyong Zhu, Xiaohui Wang, Hongmin Chen, Jihua Harbin Univ Sci & Technol Sch Automat Harbin 150080 Heilongjiang Peoples R China
In the system of the image defect detection system, during image acquisition and transmission, the salt-and-pepper Noise will adversely affect the subsequent processing and recognition. To eliminate the salt-and-peppe... 详细信息
来源: 评论
Architecture Design and Implementation of UUV Mission Planning  40
Architecture Design and Implementation of UUV Mission Planni...
收藏 引用
40th Chinese Control Conference (CCC)
作者: Wei, Dunwen Hao, Pengfeng Ma, Hongjiao Univ Elect Sci & Technol China Sch Mech & Elect Engn Chengdu Sichuan Peoples R China
With the rapidly increasing demand for unmanned underwater vehicles (UUVs) application, UUVs have been widely implemented to explore marine resources and perform marine missions. Robust software architecture is a fund... 详细信息
来源: 评论
Task Offloading Scheduling in Mobile Edge Computing Networks
Task Offloading Scheduling in Mobile Edge Computing Networks
收藏 引用
12th International Conference on Ambient Systems, Networks and Technologies (ant) / 4th International Conference on Emerging Data and Industry 4.0 (EDI40)
作者: Wang, Zhonglun Li, Peifeng Shen, Shuai Yang, Kun Univ Elect Sci & Technol China Quzhou Res Inst Quzhou Zhejiang Peoples R China Univ Elect Sci & Technol China Chengdu 611731 Peoples R China Univ Essex Sch Comp Sci & Elect Engn Colchester CO4 3SQ Essex England
In this paper, we investigate the task scheduling in resource-limited mobile edge computing (MEC) network, where multiple base stations (BSs), each equipped with a MEC server, assist multiple latency-sensitive user eq... 详细信息
来源: 评论
Path planning research based on the improved ant colony algorithm in ECDIS  35
Path planning research based on the improved ant colony algo...
收藏 引用
35th Chinese Control Conference (CCC)
作者: Meng, Hao He, Xiaopeng Song, Jingguo Liu, Zhilin Harbin Engn Univ Coll Automat Harbin 150001 Peoples R China
ECDIS (Electronic Chart Display and Information System) is a real-time navigation system, which integrates the chart display, navigation operations, route calculation and navigation marks, etc. and provides a great co... 详细信息
来源: 评论
System Management Model Based on ABC-ACO algorithm under the Background of Digital Economy  1
System Management Model Based on ABC-ACO Algorithm under the...
收藏 引用
1st IEEE International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics, AIKIIE 2023
作者: Fu, Yong College of Economics Sichuan Agricultural University Sichuan Chengdu China
With the rapid development of the digital economy, the need to manage complex systems is increasing day by day, and traditional management methods are often unable to fully adapt to this challenge. Therefore, this res... 详细信息
来源: 评论
Learning ant colony algorithm for Solving Green Multi-compartment Vehicle Routing Problem with Simultaneous Pickup and Delivery  7
Learning Ant Colony Algorithm for Solving Green Multi-compar...
收藏 引用
7th International Conference on Automation Electronics and Electrical Engineering
作者: Geng, Yan Guo, Ning Bin Qian Kunming Univ Sci & Technol Informat Engn & Automat Inst Kunming Yunnan Peoples R China
To solve the Green Multi-Compartment Vehicle Routing Problem with Simultaneous Pickup and Delivery (GMCVRPSPD), a mathematical model is established with the objective of minimizing total costs. The model consists of v... 详细信息
来源: 评论
Study on the application of simulated evolutionary optimization algorithm in optimizing the combination of unit commitments in power system
Study on the application of simulated evolutionary optimizat...
收藏 引用
3rd International Conference on Measuring Technology and Mechatronics Automation (ICMTMA 2011)
作者: Liu Qing-song Tong Jia Li Yi-feng Jiaxing Univ Jiaxing 314001 Zhejiang Peoples R China Guangdong Ocean Univ Zhanjiang Guangdong 524088 Peoples R China
This study adopted a simulated evolutionary optimization algorithm, ant colony optimization algorithm to find the optimal unit commitment operation. The concepts such as status, strategy, and path, etc. were introduce... 详细信息
来源: 评论
A Network-Assisted Approach for Ransomware Detection
A Network-Assisted Approach for Ransomware Detection
收藏 引用
作者: Xia, Tianrou PennState University Libraries
学位级别:Master of Science
Ransomware is one kind of malware using cryptography to prevent victims from normal use of their computers. As a result, victims lose the access to their files and desktops unless they pay the ransom to the attackers.... 详细信息
来源: 评论