咨询与建议

限定检索结果

文献类型

  • 227 篇 期刊文献
  • 168 篇 会议
  • 3 篇 学位论文
  • 1 册 图书

馆藏范围

  • 399 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 349 篇 工学
    • 172 篇 计算机科学与技术...
    • 124 篇 电气工程
    • 53 篇 信息与通信工程
    • 46 篇 控制科学与工程
    • 36 篇 机械工程
    • 34 篇 软件工程
    • 26 篇 石油与天然气工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 仪器科学与技术
    • 23 篇 材料科学与工程(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 土木工程
    • 14 篇 交通运输工程
    • 14 篇 环境科学与工程(可...
    • 9 篇 力学(可授工学、理...
    • 6 篇 水利工程
    • 6 篇 测绘科学与技术
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 5 篇 建筑学
  • 81 篇 理学
    • 27 篇 数学
    • 20 篇 物理学
    • 12 篇 化学
    • 11 篇 生物学
    • 9 篇 地球物理学
    • 7 篇 统计学(可授理学、...
  • 59 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
  • 21 篇 医学
    • 15 篇 临床医学
  • 12 篇 经济学
    • 9 篇 应用经济学
  • 5 篇 农学
  • 3 篇 教育学
  • 2 篇 法学
  • 1 篇 军事学

主题

  • 399 篇 k-means clusteri...
  • 17 篇 data mining
  • 16 篇 pattern clusteri...
  • 11 篇 feature extracti...
  • 9 篇 image segmentati...
  • 9 篇 machine learning
  • 9 篇 clustering algor...
  • 9 篇 genetic algorith...
  • 8 篇 principal compon...
  • 7 篇 big data
  • 7 篇 support vector m...
  • 6 篇 clustering
  • 6 篇 rbf neural netwo...
  • 5 篇 image classifica...
  • 5 篇 accuracy
  • 5 篇 cloud computing
  • 5 篇 cluster analysis
  • 5 篇 data analysis
  • 5 篇 unsupervised lea...
  • 4 篇 object detection

机构

  • 2 篇 qilu univ techno...
  • 2 篇 st marys univ de...
  • 2 篇 southeast univ s...
  • 2 篇 cent univ financ...
  • 2 篇 harbin engn univ...
  • 2 篇 tianjin universi...
  • 2 篇 northwestern pol...
  • 2 篇 northwest a&f un...
  • 2 篇 north china elec...
  • 2 篇 northwest a&f un...
  • 2 篇 china univ geosc...
  • 2 篇 minist agr key l...
  • 2 篇 school of inform...
  • 2 篇 china agr univ c...
  • 2 篇 beijing universi...
  • 2 篇 tongji univ sch ...
  • 2 篇 yangtze univ key...
  • 1 篇 cent univ financ...
  • 1 篇 yantai univ coll...
  • 1 篇 univ sci & techn...

作者

  • 4 篇 he dongjian
  • 3 篇 xu xin
  • 3 篇 song huaibo
  • 3 篇 li wei
  • 2 篇 wei hu
  • 2 篇 peng chong
  • 2 篇 shen wei
  • 2 篇 zhang chao
  • 2 篇 xu chuanbo
  • 2 篇 wang linlin
  • 2 篇 yao rui
  • 2 篇 chen gang
  • 2 篇 sun jian
  • 2 篇 li yue
  • 2 篇 lu shufeng
  • 2 篇 aref mohamed his...
  • 2 篇 geng yushui
  • 2 篇 wang dandan
  • 2 篇 miao duoqian
  • 2 篇 wang yang

语言

  • 377 篇 英文
  • 14 篇 其他
  • 7 篇 中文
  • 1 篇 法文
检索条件"主题词=K-Means clustering algorithm"
399 条 记 录,以下是311-320 订阅
排序:
Prenatal Detection of Ventricular Septal Defects by VGG -16 Model Using Ultrasound Images  3
Prenatal Detection of Ventricular Septal Defects by VGG -16 ...
收藏 引用
3rd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2023
作者: kavitha, D. Lakshmi, C.R. CMR Institute of Technology Department of Electronics and Communication Engineering Karnataka Bengaluru India Cambridge Institute of Technology Department of Electronics and Communication Engineering Karnataka Bengaluru India
Congenital heart defect is one of the important anomaly. The deformed heart can be differentiated from the normal heart based on several parameters such as the size of auricles, ventricles, valve and position of heart... 详细信息
来源: 评论
Real-time fault detection approach of software under big data environment
Real-time fault detection approach of software under big dat...
收藏 引用
2015 International Conference on Automation,Mechanical Control and Computational Engineering(AMCCE 2015)
作者: Jian xianrui Chengdu vocational and technical college
For large data environment, the traditional k-means clustering algorithm flaw in the software in real-time fault detection process, we propose a k-means clustering software intelligent real-time fault detection method... 详细信息
来源: 评论
Research on intrusion detection based on feature extraction of autoencoder and the improved k-means algorithm
Research on intrusion detection based on feature extraction ...
收藏 引用
作者: Wang, Xingang Wang, Linlin School of Information Qilu University of Technology Jinan China
Nowadays, intrusion detection is a technology to effectively avoid a number of risks of network intrusion. The k-means algorithm is widely used in intrusion detection. But, the algorithm has some shortcomings, such as... 详细信息
来源: 评论
Error Prediction method of Electronic Transformers Based on RBF Neural Network  13
Error Prediction method of Electronic Transformers Based on ...
收藏 引用
2017 13th IEEE International Conference on Electronic Measurement & Instruments (ICEMI)
作者: Wu Qiao Xu Xin Yang Shihai Lu Shufeng Chen Gang Electric Power Research Institute Jiangsu Electric Power Company School of Electrical Engineering Southeast University
With the gradual application of electronic transformers in the intelligent substation, the influence of the typical disturbing source on the electronic transformers is gradually to the industry’s attention. In order ... 详细信息
来源: 评论
Research on ASIC for multi-speaker isolated word recognition
Research on ASIC for multi-speaker isolated word recognition
收藏 引用
2nd International Conference on ASIC
作者: Xiong, B Sun, YH Institute of Microelectronics Tsinghua University Beijing China
The ASIC for multi-speaker speech recognition is design in this paper. The LPC-derived cepstral coefficients are chosen as speech features. Templates are trained by k-means clustering algorithm. Two stage recognition ... 详细信息
来源: 评论
A Cluster Analysis of Power Load Forecasting Based on Power Consumption Data and Meteorological Data  4
A Cluster Analysis of Power Load Forecasting Based on Power ...
收藏 引用
4th International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology, CEI 2024
作者: Wei, Yi Tang, Zhong-Sheng College of Intelligent Networking and New Energy Vehicles Geely University of China Sichuan Province Chengdu City China
With the increasing of the big data volume for power consumption data and the complexity of meteorological data, it has become more difficult to cope with the power load forecasting in the recent energy crisis. To add... 详细信息
来源: 评论
Complexity Analysis of Lumped Parameter Models: Development of Complexity Reduction algorithm
Complexity Analysis of Lumped Parameter Models: Development ...
收藏 引用
作者: YUXI LI Reykjavik University
学位级别:硕士
Lumped parameter models have been shown to be a useful tool for geothermal reservoir analysis and production planning. Tank models are a common form of lumped parameter models, incorporating tanks of given capacitance... 详细信息
来源: 评论
Software Technology Immersive Education Research and Practice Based on Spark Platform  3
Software Technology Immersive Education Research and Practic...
收藏 引用
3rd IEEE International Conference on Electrical Engineering, Big Data and algorithms, EEBDA 2024
作者: Genrang, Zheng Chunping, Huang Zhongshan Polytechnic Department of Information Engineering Guangdong Zhongshan China
From the perspective of education informatization, a teaching resource sharing system with huge storage space and computation amount is established. When the user accesses the teaching materials, it constructs the dat... 详细信息
来源: 评论
Error Prediction method of Electronic Transformers Based on RBF Neural Network
Error Prediction method of Electronic Transformers Based on ...
收藏 引用
13th IEEE International Conference on Electronic Measurement & Instruments (ICEMI)
作者: Wu Qiao Xu Xin Yang Shihai Lu Shufeng Chen Gang Jiangsu Elect Power Co Elect Power Res Inst Nanjing 211103 Jiangsu Peoples R China Southeast Univ Sch Elect Engn Nanjing 210096 Jiangsu Peoples R China
With the gradual application of electronic transformers in the intelligent substation, the influence of the typical disturbing source on the electronic transformers is gradually to the industry's attention. In ord... 详细信息
来源: 评论
Research on Intrusion Detection Based on Feature Extraction of Autoencoder and the Improved k-means algorithm
Research on Intrusion Detection Based on Feature Extraction ...
收藏 引用
10th International Symposium on Computational Intelligence and Design (ISCID)
作者: Wang, Xingang Wang, Linlin Qilu Univ Technol Sch Informat Jinan Shandong Peoples R China
Nowadays, intrusion detection is a technology to effectively avoid a number of risks of network intrusion. The k-means algorithm is widely used in intrusion detection. But, the algorithm has some shortcomings, such as... 详细信息
来源: 评论