咨询与建议

限定检索结果

文献类型

  • 982 篇 期刊文献
  • 895 篇 会议
  • 8 篇 学位论文
  • 2 册 图书
  • 2 篇 资讯

馆藏范围

  • 1,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,672 篇 工学
    • 986 篇 计算机科学与技术...
    • 568 篇 电气工程
    • 320 篇 信息与通信工程
    • 245 篇 控制科学与工程
    • 159 篇 软件工程
    • 115 篇 机械工程
    • 99 篇 仪器科学与技术
    • 94 篇 电子科学与技术(可...
    • 58 篇 石油与天然气工程
    • 47 篇 交通运输工程
    • 43 篇 材料科学与工程(可...
    • 41 篇 动力工程及工程热...
    • 38 篇 环境科学与工程(可...
    • 35 篇 测绘科学与技术
    • 34 篇 土木工程
    • 24 篇 网络空间安全
    • 19 篇 力学(可授工学、理...
    • 17 篇 建筑学
  • 291 篇 管理学
    • 265 篇 管理科学与工程(可...
    • 32 篇 工商管理
  • 287 篇 理学
    • 80 篇 数学
    • 62 篇 物理学
    • 59 篇 生物学
    • 37 篇 地球物理学
    • 34 篇 化学
    • 26 篇 统计学(可授理学、...
  • 66 篇 医学
    • 44 篇 临床医学
    • 18 篇 基础医学(可授医学...
  • 34 篇 经济学
    • 27 篇 应用经济学
  • 31 篇 农学
  • 27 篇 教育学
    • 24 篇 教育学
  • 13 篇 法学
  • 3 篇 文学
  • 2 篇 历史学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 1,889 篇 clustering algor...
  • 88 篇 data mining
  • 67 篇 wireless sensor ...
  • 59 篇 wireless sensor ...
  • 56 篇 machine learning
  • 56 篇 k-means
  • 54 篇 clustering algor...
  • 27 篇 pattern clusteri...
  • 27 篇 unsupervised lea...
  • 25 篇 network lifetime
  • 22 篇 image segmentati...
  • 22 篇 feature extracti...
  • 21 篇 pattern recognit...
  • 20 篇 dbscan
  • 19 篇 deep learning
  • 19 篇 optimization
  • 19 篇 k-means algorith...
  • 19 篇 particle swarm o...
  • 18 篇 genetic algorith...
  • 17 篇 cloud computing

机构

  • 8 篇 jilin univ coll ...
  • 6 篇 beijing univ pos...
  • 5 篇 xidian univ sch ...
  • 5 篇 lanzhou univ sch...
  • 5 篇 sichuan univ bus...
  • 4 篇 hong kong polyte...
  • 4 篇 beijing univ tec...
  • 4 篇 northwest normal...
  • 4 篇 harbin inst tech...
  • 4 篇 shenyang ligong ...
  • 4 篇 cent s univ sch ...
  • 4 篇 tianjin univ sch...
  • 4 篇 shanghai univ sc...
  • 4 篇 guangdong univ t...
  • 3 篇 tsinghua univ de...
  • 3 篇 south china norm...
  • 3 篇 hebei univ engn ...
  • 3 篇 northwestern pol...
  • 3 篇 chongqing univ p...
  • 3 篇 shanghai jiao to...

作者

  • 8 篇 xu zeshui
  • 6 篇 wang yan
  • 6 篇 zhang jun
  • 6 篇 zhang hao
  • 5 篇 wang lei
  • 5 篇 liu yang
  • 5 篇 ye jun
  • 5 篇 li zhiwu
  • 5 篇 tseng chih-cheng
  • 5 篇 chen wei
  • 5 篇 liang ying
  • 5 篇 zhang ying
  • 4 篇 zhang yihan
  • 4 篇 yang hao
  • 4 篇 liang bin
  • 4 篇 zhang wenbo
  • 4 篇 wang wei
  • 4 篇 zhang yan
  • 4 篇 shen zijie
  • 4 篇 liu wei

语言

  • 1,773 篇 英文
  • 77 篇 其他
  • 38 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Clustering algorithm"
1889 条 记 录,以下是1831-1840 订阅
排序:
Fuzzy Frequency Response Estimation: a case study for the pH neutralization process
Fuzzy Frequency Response Estimation: a case study for the pH...
收藏 引用
IEEE International Conference on Fuzzy Systems
作者: Carlos Cesar Teixeira Ferreira Ginalber Luiz de Oliveira Serra Department of Electroelectronic Federal Institute of Education Science and Technology (IFMA)
Fuzzy frequency response estimation: a case study for the pH neutralization process is proposed in this paper. A fuzzy c-Means clustering algorithm is used to organize the output experimental data of pH neutralization... 详细信息
来源: 评论
An Outliers Detection Method of Time Series Data for Soft Sensor Modeling
An Outliers Detection Method of Time Series Data for Soft Se...
收藏 引用
第28届中国控制与决策会议
作者: Hui-xin Tian Xing-jun Liu Mei Han School of Electrical Engineering and Automation Tianjin Polytechnic University Key Laboratory of Advanced Electrical Engineering and Energy Technology Tianjin Polytechnic University
Aiming at the particularity of data outliers of soft sensor modeling in complex industrial processes,a new outliers detection method for time series is *** new method combines the traditional density-based clustering ... 详细信息
来源: 评论
NETWORK INTRUSION DETECTION USING clustering AND GRADIENT BOOSTING
NETWORK INTRUSION DETECTION USING CLUSTERING AND GRADIENT BO...
收藏 引用
International Conference on Computing, Communication and Networking Technologies
作者: Parag Verma Shadab Khan Shayan Anwar Sunil B. Mane Department of Computer Engineering & IT College of Engineering Pune
An unauthorized activity on the network is called network intrusion and device or software application which monitors the network parameters in order to detect such an intrusion is called network intrusion detection s... 详细信息
来源: 评论
Noise-Robust Speech Recognition Based on RBF Neural Network
Noise-Robust Speech Recognition Based on RBF Neural Network
收藏 引用
2011 First International Conference on High Performance Structures and Materials Engineering (ICHPSM 2011)
作者: Xuemei Hou College of automation Xi'an Institute of Post and Telecommunication
Considering the actuality of current speech recognition and the characteristic of RBF neural network,a noise-robust speech recognition system based on RBF neural network is proposed with the entire-supervised *** the ... 详细信息
来源: 评论
Computer Graphics and Graphic Image Processing Technology and Application Analysis in the New Period
Computer Graphics and Graphic Image Processing Technology an...
收藏 引用
2018 4th International Conference on Mechatronic Systems and Materials Application(ICMSMA 2018)
作者: Xiaohong Zhang Zhiqiong Liang Jiangxi University of Engineering
Computer graphics uses computers to study graphic representations,process images,and display generated disciplines,realizing the combination of imagery and real-life graphics in people's subjective *** decades of ... 详细信息
来源: 评论
Simulation Experiment on Path Planning in Incomplete Fuzzy System Based on Dominance Rough Set
Simulation Experiment on Path Planning in Incomplete Fuzzy S...
收藏 引用
2015 International Conference on Automation,Mechanical Control and Computational Engineering(AMCCE 2015)
作者: Sheng Pu School of Physical Education Mianyang Normal University
In order to enhance the processing capacity of the inconsistent ordered study information system and transform the rough set of different precision dominance relation, they can enhance the adaptability of inconsistent... 详细信息
来源: 评论
Uncover protein complexes in *** network
Uncover protein complexes in *** network
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine
作者: Wei Liu Aiping Wu Department of Automation Shanghai Jiao Tong University Center for Systems Medicine Institute of Basic Medical Sciences Chinese Academy of Medical Sciences& Peking Union Medical College
Recent advances in proteomic technologies have enabled high-throughput binary data on protein-protein interactions of E. coli to be released into public domain, and many protein complexes have been identified by exper... 详细信息
来源: 评论
Robust clustering for Connected Vehicles using Local Network Criticality
Robust Clustering for Connected Vehicles using Local Network...
收藏 引用
IEEE International Conference on Communications
作者: Weiwei Li Ali Tizghadam Alberto Leon-Garcia Department of Electrical and Computer Engineering University of Toronto
This paper proposes a robust Criticality-based clustering algorithm (CCA) for Vehicular Ad Hoc NETworks (VANETs) based on the concept of network criticality. Network criticality is a global metric on an undirected gra... 详细信息
来源: 评论
Genetic algorithm for Energy Efficient & Coverage-Preserved Positioning in Wireless Sensor Networks
Genetic Algorithm for Energy Efficient & Coverage-Preserved ...
收藏 引用
2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI 2010)
作者: Mojtaba Romoozi Mehdi Vahidipour Morteza Romoozi Sudeh Maghsoodi Member of Young Scholars Club Islamic Azad University KashanI.R.Iran Faculty of Engineering The University of Kashan KashanI.R.Iran Faculty of Engineering Islamic Azad University KashanI.R.Iran Student of Engineering Islamic Azad University KashanI.R.Iran
Layout is an important issue in designing sensor *** paper brings a new idea for the positioning of nodes in a wireless sensor *** sensors communicate with each other to transmit their data to a high energy communicat... 详细信息
来源: 评论
Visualization of Dengue Incidences using Expectation Maximization (EM) algorithm
Visualization of Dengue Incidences using Expectation Maximiz...
收藏 引用
International Conference on Intelligent and Advanced Systems
作者: Nirbhay Mathur Vijanth S. Asirvadam Sarat C. Dass Balvinder Singh Gill Department of Electrical and Electronics Engineering Centre for Intelligent Signal & Imaging Research (CISIR) Universiti Teknologi PETRONAS Department of Fundamental and Applied Science Centre for Intelligent Signal & Imaging Research (CISIR) Universiti Teknologi PETRONAS Disease Control Division Ministry of Health Malaysia (MoH)
The aim of this study was to use the geographical information system (GIS) to visualize the dengue incidences on a weekly basis in Selangor, Malaysia. Along with the prediction modeling on data using centroid model an... 详细信息
来源: 评论