咨询与建议

限定检索结果

文献类型

  • 11,708 篇 会议
  • 771 篇 期刊文献

馆藏范围

  • 12,479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,069 篇 工学
    • 1,072 篇 计算机科学与技术...
    • 1,032 篇 电气工程
    • 455 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 29 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 185 篇 理学
    • 63 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,479 篇 software algorit...
  • 3,731 篇 software
  • 1,965 篇 algorithm design...
  • 1,777 篇 hardware
  • 826 篇 computer archite...
  • 805 篇 heuristic algori...
  • 761 篇 application soft...
  • 706 篇 software enginee...
  • 645 篇 computer science
  • 598 篇 software systems
  • 571 篇 computational mo...
  • 559 篇 prediction algor...
  • 545 篇 optimization
  • 521 篇 clustering algor...
  • 473 篇 testing
  • 428 篇 accuracy
  • 412 篇 signal processin...
  • 371 篇 costs
  • 348 篇 machine learning...
  • 320 篇 software testing

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...
  • 8 篇 college of compu...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,401 篇 英文
  • 49 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12479 条 记 录,以下是4591-4600 订阅
排序:
NORA and RODS the two Data Mining Technologies for National Security-A Review
NORA and RODS the two Data Mining Technologies for National ...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), International Conference on
作者: Puneet Kaur Deepika Chaudhary Jaiteg Singh Chitkara University Institute of Engineering & Technology Chitkara University Punjab India
Although data mining and machine learning are among the popular technologies still very few people are aware of the impact which these technologies play in our daily lives. The role of data mining and machine learning... 详细信息
来源: 评论
SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems
SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power Hig...
收藏 引用
IEEE International Conference on software Reliability Engineering Workshops (ISSRE Wksp)
作者: Yuta Akiya Kyle Thomas Le Megan Luong Justin C Wilson Anas Salah Eddin Valerio Formicola Mohamed El-Hadedy California State Polytechnic University Pomona United-States Air Force Academy RecoIoT
In the last decade, the world transitioned from using Secure Hash Algorithm 1 (SHA-1) to Secure Hash Algorithm 2 (SHA-2) due to the flaws in SHA-1. However, SHA-2 still uses a similar internal structure with the same ... 详细信息
来源: 评论
Automated Synthetic Aperture Sonar Image Segmentation using Spatially Coherent Clustering
Automated Synthetic Aperture Sonar Image Segmentation using ...
收藏 引用
OCEANS
作者: Shannon-Morgan Steele Jillian Ejdrygiewicz Jeremy Dillon Kraken Robotic Systems Inc Dartmouth Canada
Seabed image segmentation is an important product for a variety of fields, including, habitat mapping, geological surveys, mine counter measures, and naval route planning. Developing a clustering algorithm that can bo... 详细信息
来源: 评论
High Performance Uncertainty Quantification with Parallelized Multilevel Markov Chain Monte Carlo
High Performance Uncertainty Quantification with Parallelize...
收藏 引用
Supercomputing Conference
作者: Linus Seelinger Anne Reinarz Leonhard Rannabauer Michael Bader Peter Bastian Robert Scheichl Institute for Scientific Computing Heidelberg University Heidelberg Germany Department of Computer Science Durham University Durham United Kingdom Department of Informatics Technical University of Munich Garching Germany Institute for Applied Mathematics Heidelberg University Heidelberg Germany
Numerical models of complex real-world phenomena often necessitate High Performance Computing (HPC). Uncertainties increase problem dimensionality further and pose even greater challenges. We present a parallelization... 详细信息
来源: 评论
Area efficient VLSI architecture for reversible radix_2 FFT algorithm
Area efficient VLSI architecture for reversible radix_2 FFT ...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Syeda Farhat Sultana Basavarja Patil VTU Centre for PG Studies Kalaburagi India
In this work, we propose a new way of implementing Fast Fourier transform multiplier. Previous approaches achieve FFTs with a unity gain using a complex multiplier or a non-unity gain factor. The IEEE 754 format is us... 详细信息
来源: 评论
Petri net implementation in programmable logic controllers: methodology for development and validation
Petri net implementation in programmable logic controllers: ...
收藏 引用
International Symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Igor Azkarate Fernández Juan Carlos Mugarza Cortabarría Luka Eciolaza Echeverría Mondragon Unibertsitatea Arrasate-Mondragón Spain
Lead times are key to good market positioning of providers of automated solutions based on a programmable logic controller (PLC). Testing control software against a digital twin (DT) of the process, any programming er... 详细信息
来源: 评论
Recurrent Neural Networks algorithms and applications
Recurrent Neural Networks algorithms and applications
收藏 引用
Big Data & Artificial Intelligence & software Engineering (ICBASE), International Conference on
作者: Yuexing Chen Jiarun Li Rutgers Business School The State University of New Jersey New Brunswick New Jersey United Stated School of Beijing Institute of Petrochemical Technology Beijing China
Since recurrent neural networks (RNNs) were firstly proposed, it is widely used, and many extended RNNs algorithms have been developed, which achieve good results in many application fields. To report the latest resea... 详细信息
来源: 评论
Optimization and Operation of Stand-alone Hybrid PV/Biomass/Hydroelectric Pumped Storage Energy System in Iraq
Optimization and Operation of Stand-alone Hybrid PV/Biomass/...
收藏 引用
IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (EIConRusNW)
作者: Ahmed S. Al-akayshee Oleg N. Kuznetsov Hamdy M. Sultan Jabir ibn Hayyan Medical University Al Najaf Iraq National Research University "MPEI" Moscow Russia Minia University Minia Egypt
Isolated load is considered a popular case and especially in the remote or rural areas in which diesel generators are used to cover the demand with special care of their environmental impact. This paper introduces an ... 详细信息
来源: 评论
An Anatomization for Classification Skin Lesion Using Custom CNN Framework
An Anatomization for Classification Skin Lesion Using Custom...
收藏 引用
Industrial Electronics Research and Applications (ICIERA), International Conference on
作者: Shubham Gupta Acropolis Institute of Technology and Research Indore India
A skin lesion is a growth or appearance anomaly in the dermis that is different from the rest of the body. A tiny scratch or something more serious like skin cancer might be completely unnoticeable. The use of deep le... 详细信息
来源: 评论
Information Transmission Protection Using Linguistic Steganography With Arithmetic Encoding And Decoding Approach
Information Transmission Protection Using Linguistic Stegano...
收藏 引用
IEEE International Conference on Advanced Trends in Information Theory (ATIT)
作者: Maksym Ivasenko Olha Suprun Oleh Suprun Taras Shevchenko National University of Kyiv Kyiv Ukraine National Academy of the Security Service of Ukraine Kyiv Ukraine
Security of Internet of Things and Internet space in general is one of the main areas of research in the field of information technology today and steganography - one of the best methods of message encryption and tran... 详细信息
来源: 评论