咨询与建议

限定检索结果

文献类型

  • 44,200 篇 会议
  • 7,141 篇 期刊文献
  • 14 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 51,356 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,360 篇 工学
    • 12,224 篇 计算机科学与技术...
    • 5,842 篇 电气工程
    • 5,658 篇 软件工程
    • 3,785 篇 信息与通信工程
    • 1,963 篇 控制科学与工程
    • 994 篇 机械工程
    • 940 篇 仪器科学与技术
    • 671 篇 电子科学与技术(可...
    • 532 篇 生物工程
    • 473 篇 生物医学工程(可授...
    • 453 篇 交通运输工程
    • 339 篇 化学工程与技术
    • 332 篇 动力工程及工程热...
    • 323 篇 土木工程
    • 318 篇 测绘科学与技术
    • 262 篇 光学工程
    • 209 篇 建筑学
  • 9,254 篇 管理学
    • 8,088 篇 图书情报与档案管...
    • 1,765 篇 管理科学与工程(可...
    • 299 篇 工商管理
  • 5,694 篇 理学
    • 3,542 篇 数学
    • 1,028 篇 统计学(可授理学、...
    • 834 篇 生物学
    • 800 篇 物理学
    • 780 篇 系统科学
    • 383 篇 化学
    • 237 篇 地球物理学
  • 716 篇 医学
    • 566 篇 临床医学
    • 229 篇 基础医学(可授医学...
  • 238 篇 法学
    • 229 篇 社会学
  • 206 篇 农学
  • 201 篇 文学
  • 101 篇 经济学
  • 77 篇 艺术学
  • 66 篇 教育学
  • 29 篇 军事学
  • 1 篇 哲学

主题

  • 51,356 篇 clustering algor...
  • 5,905 篇 algorithm design...
  • 4,701 篇 partitioning alg...
  • 4,410 篇 data mining
  • 3,089 篇 feature extracti...
  • 2,931 篇 image segmentati...
  • 2,722 篇 clustering metho...
  • 2,698 篇 wireless sensor ...
  • 2,691 篇 computer science
  • 2,635 篇 classification a...
  • 2,622 篇 heuristic algori...
  • 2,234 篇 optimization
  • 1,826 篇 training
  • 1,791 篇 computational mo...
  • 1,683 篇 accuracy
  • 1,483 篇 routing
  • 1,453 篇 data models
  • 1,445 篇 robustness
  • 1,386 篇 neural networks
  • 1,299 篇 indexes

机构

  • 66 篇 school of comput...
  • 46 篇 state key labora...
  • 44 篇 department of co...
  • 38 篇 tsinghua univers...
  • 37 篇 ibm thomas j. wa...
  • 36 篇 microsoft resear...
  • 34 篇 institute of inf...
  • 34 篇 school of comput...
  • 32 篇 college of compu...
  • 32 篇 department of co...
  • 31 篇 school of softwa...
  • 31 篇 northwestern pol...
  • 29 篇 school of inform...
  • 28 篇 school of comput...
  • 27 篇 school of comput...
  • 26 篇 university of sc...
  • 26 篇 software school ...
  • 25 篇 school of inform...
  • 24 篇 school of electr...
  • 23 篇 college of infor...

作者

  • 76 篇 nie feiping
  • 39 篇 jun wang
  • 39 篇 jun zhang
  • 38 篇 lei wang
  • 38 篇 wei liu
  • 34 篇 sriparna saha
  • 32 篇 liu yang
  • 32 篇 yasunori endo
  • 29 篇 sanghamitra band...
  • 26 篇 wang lei
  • 25 篇 r. krishnapuram
  • 25 篇 yu wang
  • 25 篇 li li
  • 23 篇 hui wang
  • 22 篇 jian wang
  • 22 篇 wei li
  • 21 篇 feng liu
  • 20 篇 rahman md. saidu...
  • 20 篇 jing zhang
  • 18 篇 hau-san wong

语言

  • 50,715 篇 英文
  • 382 篇 其他
  • 207 篇 中文
  • 20 篇 法文
  • 14 篇 土耳其文
  • 5 篇 葡萄牙文
  • 4 篇 日文
  • 3 篇 德文
  • 3 篇 俄文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Clustering Algorithms"
51356 条 记 录,以下是1111-1120 订阅
排序:
Error Mitigation for TDoA UWB Indoor Localization Using Unsupervised Machine Learning
收藏 引用
IEEE SENSORS JOURNAL 2025年 第1期25卷 1959-1968页
作者: Duong, Phuong Bich Van Herbruggen, Ben Broering, Arne Shahid, Adnan De Poorter, Eli Siemens AG D-85748 Garching Germany Univ Ghent Dept Engn & Architecture B-9000 Ghent Belgium Univ Ghent IDLab B-9052 Ghent Belgium Imec B-9052 Ghent Belgium
Indoor positioning systems based on ultrawideband (UWB) technology are gaining recognition for their ability to provide cm-level localization accuracy. However, these systems often encounter challenges caused by dense... 详细信息
来源: 评论
Anomaly Detection and Business Process Orchestration for Low-Code Platform in Power System Based on Deep-Cross Model With Data Balancing
收藏 引用
IEEE ACCESS 2025年 13卷 6350-6361页
作者: Huang, Jin Xu, Ming Sheng Zhu, Chang Ming Wang, Guo An Jiangsu Elect Power Informat Technol CO Ltd Nanjing 210003 Jiangsu Peoples R China
This paper presents an innovative approach to anomaly detection in electric vehicle (EV) charging platforms, centered around four key innovations that significantly advance the field of charging infrastructure securit... 详细信息
来源: 评论
A Method for Abnormality Detection of Lithium-Ion Battery Packs Based on Kullback-Leibler Test and Greenwald-Khanna clustering  11th
A Method for Abnormality Detection of Lithium-Ion Battery Pa...
收藏 引用
11th Frontier Academic Forum of Electrical Engineering, FAFEE 2024
作者: Wang, Chong Liu, Yajie Song, Yuanming Wang, Yu College of System Engineering National University of Defense Technology Changsha410073 China Hunan Key Laboratory of Multi-Energy System Intelligent Interconnection Technology Changsha410073 China
During the operation of lithium-ion battery packs, there often exhibit certain abnormalities due to cell faults such as internal short circuit or unavoidable inconsistencies among cells, which affects the operation sa... 详细信息
来源: 评论
TCMS: A Multi-Sequence Log Parsing Method Based on Token Conversion
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2025年 第3期22卷 3028-3045页
作者: Wei, Mingkuan Wen, Jigang He, Shiming Xie, Kun Liang, Wei Xie, Gaogang Li, Kenli Zhu, Ziyu Hunan Univ Coll Comp Sci & Elect Engn Key Lab Fus Comp Supercomp & Artificial Intelligen Minist Educ Changsha 410012 Peoples R China Hunan Univ Sci & Technol Sch Comp Sci & Engn Xiangtan 411201 Peoples R China Changsha Univ Sci & Technol Sch Comp & Commun Engn Hunan Prov Key Lab Intelligent Proc Big Data Trans Changsha 410114 Peoples R China Chinese Acad Sci Comp Network Informat Ctr CNIC Beijing 100045 Peoples R China Columbia Univ Elect Engn New York NY 10027 USA
Detailed system operations are recorded in logs. To ensure system reliability, developers can detect system anomalies through log anomaly detection. Log parsing, which converts semi-structured log messages into struct... 详细信息
来源: 评论
New Evaluation Method for Fuzzy Cluster Validity Indices
收藏 引用
IEEE ACCESS 2025年 13卷 22728-22744页
作者: Perez-Sanchez, Ismay Medina-Perez, Miguel Angel Monroy, Raul Loyola-Gonzalez, Octavio Gutierrez-Rodriguez, Andres Eduardo Tecnol Monterrey Sch Engn & Sci Atizapan De Zaragoza 52926 Estado De Mexic Mexico Kayak Analyt Dubai U Arab Emirates NTT DATA Madrid 28050 Spain Tecnol Monterrey Inst Future Educ Monterrey 64849 Mexico MAHLE Shared Serv Monterrey 64650 Mexico
Cluster analysis is the process of associating data objects with classes of similar objects. One key aspect of the clustering problem is to determine the optimal number of groups on a data set to effectively partition... 详细信息
来源: 评论
Learning From Crowds by Class-Specific Instance Weighting
收藏 引用
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE 2025年
作者: Ji, Qiang Jiang, Liangxiao Zhang, Wenjun Li, Chaoqun China Univ Geosci Sch Comp Sci Wuhan 430074 Peoples R China China Univ Geosci Sch Math & Phys Wuhan 430074 Peoples R China
In crowdsourcing scenarios, we can acquire each instance's multiple noisy label set from crowd workers and then infer its integrated label via label integration. To further enhance the quality of integrated labels... 详细信息
来源: 评论
A Collaborative Programmable LFA Defense Using Temporal Graph Learning in AIoT
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第3期12卷 2514-2529页
作者: Li, Yikun Liu, Ying Xia, Yu Zhang, Weiting Quan, Wei Kang, Jiawen Zhang, Hongke Beijing Jiaotong Univ Sch Elect & Informat Engn Beijing 100044 Peoples R China Peng Cheng Lab Dept New Networks Shenzhen 518000 Guangdong Peoples R China Guangdong Univ Technol Sch Automat Guangzhou 510006 Peoples R China Guangdong Univ Technol Guangdong Key Lab IoT Informat Technol Guangzhou 510006 Peoples R China
In the current era of rapid advancements in Artificial Intelligence of Things (AIoT), with the increase in cloud data center operations and the limited security computing capabilities of AIoT terminal devices, link fl... 详细信息
来源: 评论
TIRDH: A Novel Three-Shadow-Image Reversible Data Hiding Algorithm Using Weight and Modulo
收藏 引用
IEEE ACCESS 2025年 13卷 49232-49248页
作者: Chin, Li-Chian Li, Yu-Chen Hsieh, Hung-Mo Wang, Chung-Ming Natl Chung Hsing Univ Dept Comp Sci & Engn Taichung 40223 Taiwan Natl Taiwan Univ Dept Comp Sci & Informat Engn Taipei 106319 Taiwan
Reversible data hiding (RDH) in image media is crucial for securely embedding confidential information while ensuring complete recovery of both the cover image and the hidden data. Traditional RDH techniques often str... 详细信息
来源: 评论
ASDroid: Resisting Evolving Android Malware With API Clusters Derived From Source Code
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2025年 20卷 1822-1835页
作者: Hu, Qihua Wang, Weiping Song, Hong Guo, Song Zhang, Jian Zhang, Shigeng Cent South Univ Sch Comp Sci & Engn Changsha 410083 Peoples R China Hong Kong Univ Sci & Technol Dept Comp Sci & Engn Hong Kong Peoples R China
Machine learning-based Android malware detection has consistently demonstrated superior results. However, with the continual evolution of the Android framework, the efficacy of the deployed models declines markedly. E... 详细信息
来源: 评论
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2025年 20卷 4408-4421页
作者: Lv, Yunna Tang, Long Ye, Dengpan Xie, Caiyun Deng, Jiacheng He, Yiheng Shen, Sipeng Wuhan Univ Sch Cyber Sci & Engn Key Lab Aerosp Informat Secur & Trusted Comp Minist Educ Wuhan 430072 Peoples R China
Deep hash-based retrieval techniques are widely used in facial retrieval systems to improve the efficiency of facial matching. However, it also carries the danger of exposing private information. Deep hash models are ... 详细信息
来源: 评论