咨询与建议

限定检索结果

文献类型

  • 11,708 篇 会议
  • 771 篇 期刊文献

馆藏范围

  • 12,479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,069 篇 工学
    • 1,072 篇 计算机科学与技术...
    • 1,032 篇 电气工程
    • 455 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 29 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 185 篇 理学
    • 63 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,479 篇 software algorit...
  • 3,731 篇 software
  • 1,965 篇 algorithm design...
  • 1,777 篇 hardware
  • 826 篇 computer archite...
  • 805 篇 heuristic algori...
  • 761 篇 application soft...
  • 706 篇 software enginee...
  • 645 篇 computer science
  • 598 篇 software systems
  • 571 篇 computational mo...
  • 559 篇 prediction algor...
  • 545 篇 optimization
  • 521 篇 clustering algor...
  • 473 篇 testing
  • 428 篇 accuracy
  • 412 篇 signal processin...
  • 371 篇 costs
  • 348 篇 machine learning...
  • 320 篇 software testing

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...
  • 8 篇 college of compu...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,401 篇 英文
  • 49 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software algorithms"
12479 条 记 录,以下是201-210 订阅
排序:
Computer-Simulated Performance Comparison of T-type and Π-type Network based Microwave Angular Displacement Sensors
Computer-Simulated Performance Comparison of T-type and Π-t...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Hongxu Zhu Zhongming Yang Computer Engineering Technical College (Artificial Intelligence College) Guangdong Polytechnic of Science and Technology Zhuhai China
In this paper, the T-type and Π-type network based microwave angular displacement sensors are compared and analyzed. By incorporating neural networks, one can optimize the design parameters of microwave sensors, enha... 详细信息
来源: 评论
An Automatic Intrinsic and Extrinsic Calibration Method for Multi-Camera Systems Without a Common Field of View Under Weak Observation Conditions Based on Total-Station-Assisted Point Localization
An Automatic Intrinsic and Extrinsic Calibration Method for ...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Wenfeng Bai Haitao Luo Xiankang Yu Mingjie Chen Wenjun Chen Yihe Yin Biao Hu Xiaolin Liu Guangzhou Metro Design&Research Institute Co. Ltd. Guangzhou China Institute of Intelligent Optical Measurement and Detection Shenzhen University Shenzhen China
To address the calibration challenges of multi-camera measurement systems without a common field of view under weak observation conditions, this paper proposes an automatic intrinsic and extrinsic calibration method b... 详细信息
来源: 评论
Leveraging Fine-Tuned LightGBM for Advanced AI-Driven Android Malware Detection
Leveraging Fine-Tuned LightGBM for Advanced AI-Driven Androi...
收藏 引用
Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), International Conference on
作者: Rajasekar Kanniappan V. Jamuna Anna University Chennai Tamil Nadu India Department of Electrical and Electronics Engineering Jerusalem College of Engineering Chennai Tamil Nadu India
Increasing instances of cyber threats, specifically malware, require faster creation of proper detection systems that utilize higher learning algorithms. This paper examines the effectiveness of an AI-malware detectio... 详细信息
来源: 评论
The Experience of Creating Information Measuring and Control Systems in Metallurgy
The Experience of Creating Information Measuring and Control...
收藏 引用
International Russian Smart Industry Conference (SmartIndustryCon)
作者: Dokov Dmitriy Novikov Anatoly Efimov Aleksey Coherent LLC Ryazan Russian Federation Department of Electronic Computing Machines Ryazan State Radio Engineering University named after V.F. Utkin Ryazan Russian Federation
The article discusses two tasks of information systems for monitoring the parameters of technological processes in metalworking creating. In the first task, the width and sickle shape of metal sheets are estimated bas... 详细信息
来源: 评论
Testing of Asymmetric Cryptographic Authentication Protocols for Vehicle Communication
Testing of Asymmetric Cryptographic Authentication Protocols...
收藏 引用
International Symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Alžbeta Kanáliková Emília Bubeníková Peter Peniak Department of Control and Information systems University of Zilina Zilina Slovakia
Many vehicles move in automobile traffic, and their increase is higher than the necessary traffic on roads. For this reason, situations arise when these roads in cities, and towns, but also outside them, are often cro... 详细信息
来源: 评论
Verification of the Denning-Sacco Protocol Based on APTC
Verification of the Denning-Sacco Protocol Based on APTC
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Yuqi Liu Yong Wang School of Computer Science Beijing University of Technology Beijing China
With the rapid development of information technology, network communication security has become one of the core issues in ensuring information security. As a typical representative in the field of key exchange, the se... 详细信息
来源: 评论
Guiding Grokking: How Curriculum Learning Shapes Algorithmic Understanding in Neural Networks
Guiding Grokking: How Curriculum Learning Shapes Algorithmic...
收藏 引用
software Engineering and Computer Science (CSECS), International Conference on
作者: Haotian Chen Zihao Wang College of Computer Science-College of Software Inner Mongolia University Hohhot China
Understanding how neural networks suddenly achieve strong generalization after extended training (grokking) remains a fundamental challenge in deep learning. While this phenomenon has been observed in algorithmic task... 详细信息
来源: 评论
Advanced Darknet Traffic Detection through Minority-Class Augmentation and Multi-Model Fusion
Advanced Darknet Traffic Detection through Minority-Class Au...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Zikang Liu School of Cyber Science and Technology Shandong University Qingdao China
The Tor network is an anonymous communication technology that can protect user privacy and break through network censorship, but it can also be used by malicious actors and is a focus of network security research. Bec... 详细信息
来源: 评论
A Novel Sky-Aware Dehazing Approach for Outdoor Autonomous Systems
A Novel Sky-Aware Dehazing Approach for Outdoor Autonomous S...
收藏 引用
software Engineering and Computer Science (CSECS), International Conference on
作者: Xiaoyan Wu Dali Xu Fangfa Fu Bing Yang Hongyang Liu Kanglong Liu Xiyu Ding Chao Wu Na Niu School of Computer and Control Engineering Northeast Forestry University Harbin China School of Astronautics Harbin Institute of Technology Harbin China School of Computer Science Harbin University of Science and Technology Harbin China
Clear outdoor images are essential for autonomous driving and accurate target detection, especially in haze. The majority of algorithms are unable to adequately address the issue of dehazing, resulting in a range of d... 详细信息
来源: 评论
Vedic Mathematics Techniques - Real World Applications in Various Fields
Vedic Mathematics Techniques - Real World Applications in Va...
收藏 引用
Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), International Conference on
作者: Malini S Nivedha G Vijeta Iyer K. Meena Department of ECE Kumaraguru College of Technology Coimbatore India Department of Mathematics Kumaraguru College of Technology Coimbatore India
Vedic mathematics is an ancient system of mathematical principles, rooted in Vedas which offers unique and efficient methods for solving complex problems. This paper aims to review and compare various research studies... 详细信息
来源: 评论