咨询与建议

限定检索结果

文献类型

  • 193 篇 期刊文献
  • 65 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 259 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 107 篇 计算机科学与技术...
    • 50 篇 电气工程
    • 42 篇 机械工程
    • 25 篇 控制科学与工程
    • 18 篇 信息与通信工程
    • 15 篇 材料科学与工程(可...
    • 13 篇 力学(可授工学、理...
    • 12 篇 化学工程与技术
    • 10 篇 环境科学与工程(可...
    • 9 篇 仪器科学与技术
    • 9 篇 软件工程
    • 8 篇 土木工程
    • 7 篇 动力工程及工程热...
    • 7 篇 石油与天然气工程
    • 5 篇 交通运输工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 水利工程
    • 3 篇 生物工程
    • 2 篇 测绘科学与技术
  • 63 篇 理学
    • 31 篇 数学
    • 15 篇 生物学
    • 7 篇 化学
    • 3 篇 地球物理学
    • 3 篇 系统科学
    • 2 篇 物理学
  • 39 篇 管理学
    • 37 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 5 篇 农学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 教育学

主题

  • 259 篇 bees algorithm
  • 26 篇 optimization
  • 24 篇 swarm intelligen...
  • 13 篇 particle swarm o...
  • 12 篇 optimisation
  • 12 篇 genetic algorith...
  • 11 篇 problem solving
  • 11 篇 mathematical opt...
  • 7 篇 metaheuristics
  • 7 篇 genetic algorith...
  • 6 篇 firefly algorith...
  • 6 篇 artificial bee c...
  • 6 篇 evolutionary alg...
  • 5 篇 energy consumpti...
  • 5 篇 wireless sensor ...
  • 5 篇 differential evo...
  • 5 篇 feature selectio...
  • 5 篇 accuracy
  • 4 篇 fuzzy logic
  • 4 篇 deep learning

机构

  • 8 篇 univ birmingham ...
  • 6 篇 shahid chamran u...
  • 6 篇 wuhan univ techn...
  • 6 篇 erciyes univ dep...
  • 4 篇 univ chinese aca...
  • 4 篇 erciyes univ civ...
  • 3 篇 phenikaa univ ph...
  • 3 篇 cardiff univ mfg...
  • 3 篇 erciyes univ fac...
  • 3 篇 beihang univ sch...
  • 3 篇 univ birmingham ...
  • 3 篇 dokuz eylul univ...
  • 3 篇 univ birmingham ...
  • 3 篇 shahid chamran u...
  • 3 篇 babol univ techn...
  • 2 篇 univ technol bag...
  • 2 篇 shahid chamran u...
  • 2 篇 natl taiwan univ...
  • 2 篇 gaziantep univ d...
  • 2 篇 wuhan univ techn...

作者

  • 16 篇 pham d. t.
  • 9 篇 tapkan pinar
  • 9 篇 ozbakir lale
  • 8 篇 xu wenjun
  • 8 篇 baykasoglu adil
  • 7 篇 duc truong pham
  • 6 篇 zhou zude
  • 5 篇 deris safaai
  • 5 篇 castellani m.
  • 5 篇 pham duc truong
  • 5 篇 fahmy a. a.
  • 5 篇 ghanbarzadeh a.
  • 5 篇 castellani marco
  • 4 篇 moradi shapour
  • 4 篇 sahran shahnorba...
  • 4 篇 chong chuii khim
  • 4 篇 choon yee wen
  • 4 篇 kalyoncu mete
  • 4 篇 packianather mic...
  • 3 篇 onay m.

语言

  • 243 篇 英文
  • 15 篇 其他
  • 1 篇 中文
检索条件"主题词=BEES algorithm"
259 条 记 录,以下是211-220 订阅
排序:
Improving fusion with optimal weight selection in Face Recognition
收藏 引用
INTEGRATED COMPUTER-AIDED ENGINEERING 2012年 第3期19卷 229-237页
作者: Quang Duc Tran Kantartzis, Panagiotis Liatsis, Panos City Univ London Informat Engn & Med Imaging Grp Sch Engn & Math Sci London EC1V 0HB England
Face recognition has a large number of applications, including security/counterterrorism, person identification, Internet communications, E-commerce, and computer entertainment. Although research in automatic face rec... 详细信息
来源: 评论
Application of Nature Inspired algorithms to Multi-objective Optimization of New Generation Network Problem  22
Application of Nature Inspired Algorithms to Multi-objective...
收藏 引用
Genetic and Evolutionary Computation Conference (GECCO)
作者: Kozdrowski, Stanislaw Wnuk, Kacper Warsaw Univ Technol Warsaw Poland
The subject of the paper is the application of metaheuristic algorithms inspired by nature for multi-criteria optimization in new generation optical networks. In the considered optical network, criteria related to the... 详细信息
来源: 评论
Artificial Bee Colony Optimization for Multi Objective Economic Load Dispatch of a Modern Power system
Artificial Bee Colony Optimization for Multi Objective Econo...
收藏 引用
International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)
作者: Rao, R. Kameswara Srinivas, P. Divakar, M. S. M. Venkatesh, G. S. N. M. Raghu Engn Coll Dept EEE Visakhapatnam Andhra Pradesh India Raghu Inst technol Dept EEE Visakhapatnam Andhra Pradesh India
This paper presents using the bees algorithm approach to multi-objective optimal economic dispatch of electrical power systems. The generation of electricity from the fossil fuel releases several contaminants, such as... 详细信息
来源: 评论
Achieving CO2 Emission Targets for Energy Consumption at Canadian Manufacturing and beyond;using Hybrid Optimization Model
Achieving CO2 Emission Targets for Energy Consumption at Can...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Marzi, Arash Marzi, Elham Marzi, Hosein Dr John Hugh Gillis Reg High Sch Antigonish NS B2G 2W5 Canada St Francis Xavier Univ Dept Informat Syst Antigonish NS B2G 2W5 Canada
Due to sporadic climate change and global warming, world have signed international protocols promising to reduce their nation's emissions. This study focuses on the application of the bees algorithm, embedded with... 详细信息
来源: 评论
Optimal Design and Performance Evaluation of A Grid Independent Hybrid Micro Hydro-Solar-Wind-Fuel Cell Energy System Using Meta-Heuristic Techniques
Optimal Design and Performance Evaluation of A Grid Independ...
收藏 引用
1st International Conference on Non Conventional Energy (ICONCE)
作者: Tudu, B. Mandal, K. K. Chakraborty, N. Jadavpur Univ Dept Power Engn Kolkata India
This paper presents the design and optimal sizing of a grid independent hybrid energy system consisting of micro hydro, solar, wind and fuel cell for catering a specific load. The optimal sizing is obtained using a co... 详细信息
来源: 评论
Vehicle Safety Monitoring System Based on Internet of Things and Identification with Physiological Characteristics  1
Vehicle Safety Monitoring System Based on Internet of Things...
收藏 引用
1st IEEE International Conference on Knowledge Innovation and Invention (ICKII)
作者: Wang, Zhi-Hao Hendrick Wang, Chih-Min Jong, Gwo-Jia Natl Kaohsiung Univ Sci & Technol 415 Jiangong Rd Kaohsiung 80778 Taiwan
In general, it is a Very dangerous condition for a driver driving a car while his mental state is not clear. In this paper, a vehicle safety monitoring system is designed based on the Internet of Things and physiologi... 详细信息
来源: 评论
BPEL - Business Process Execution Language Process Creation and Fault Localization Framework  5
BPEL - Business Process Execution Language Process Creation ...
收藏 引用
5th International Conference on Confluence - The Next Generation Information Technology Summit (Confluence)
作者: Kaur, Usvir Singh, Dheerendra Sri Guru Granth Sahib World Univ Dept Comp Sci & Engn Fatehgarh Sahib India SUS Coll Engn & Technol Dept Comp Sci & Engn Tangori India
Context: WS-BPEL has been recognized as service composition language which is both executable and process-oriented. Customers are benefited from the collaboration of various providers of web services. An XML format ba... 详细信息
来源: 评论
Building synthetic networks of the budding yeast cell-cycle using swarm intelligence
Building synthetic networks of the budding yeast cell-cycle ...
收藏 引用
11th IEEE International Conference on Machine Learning and Applications (ICMLA)
作者: Ruz, Gonzalo A. Timmermann, Tania Goles, Eric Univ Adolfo Ibanez Fac Ingn & Ciencias Av Diagonal Las Torres 2640 Santiago Chile
A swarm intelligence technique called the bees algorithm is formulated to build synthetic networks of the budding yeast cell-cycle. The resulting networks contain the original fixed points of the budding yeast cell-cy... 详细信息
来源: 评论
Biological System Behaviours and Natural-inspired Methods and Their Applications to Supply Chain Management
Biological System Behaviours and Natural-inspired Methods an...
收藏 引用
4th International Conference of Bionic Engineering (ICBE 2013)
作者: Fan, Xuemei Zhang, Shujun Hapeshi, Kevin Yang, Yinsheng Jilin Univ Coll Quartermaster Technol Changchun 130023 Jilin Peoples R China Univ Gloucestershire Sch Comp & Technol Cheltenham Glos England Jilin Univ Coll Biol & Agr Engn Changchun Kagawa Peoples R China
People have learnt from biological system behaviours and structures to design and develop a number of different kinds of optimisation algorithms that have been widely used in both theoretical study and practical appli... 详细信息
来源: 评论
Review on Feature Selection algorithms for Anomaly-Based Intrusion Detection System  3rd
Review on Feature Selection Algorithms for Anomaly-Based Int...
收藏 引用
3rd International Conference of Reliable Information and Communication Technology (IRICT)
作者: Alamiedy, Taief Alaa Anbar, Mohammed Al-Ani, Ahmed K. Al-Tamimi, Bassam Naji Faleh, Nameer Univ Sains Malaysia Natl Adv IPv6 Ctr Usm 11800 Penang Malaysia Taibah Univ Coll Comp Sci & Engn Medina Saudi Arabia USM Sch Elect & Elect Engn Nibong Tebal 14300 Penang Malaysia
As Internet networks expand, the amount of network threats and intrusions increased, the demand for an efficient and reliable defense system is required to detect network security vulnerabilities. Intrusion Detection ... 详细信息
来源: 评论