咨询与建议

限定检索结果

文献类型

  • 2,777 篇 会议
  • 1,439 篇 期刊文献
  • 7 篇 学位论文
  • 1 册 图书

馆藏范围

  • 4,224 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,334 篇 工学
    • 1,820 篇 计算机科学与技术...
    • 1,115 篇 电气工程
    • 1,031 篇 软件工程
    • 932 篇 信息与通信工程
    • 686 篇 控制科学与工程
    • 398 篇 电子科学与技术(可...
    • 160 篇 机械工程
    • 151 篇 仪器科学与技术
    • 108 篇 生物医学工程(可授...
    • 94 篇 力学(可授工学、理...
    • 92 篇 生物工程
    • 82 篇 航空宇航科学与技...
    • 77 篇 动力工程及工程热...
    • 67 篇 光学工程
    • 63 篇 交通运输工程
    • 56 篇 化学工程与技术
    • 49 篇 土木工程
    • 46 篇 材料科学与工程(可...
  • 1,842 篇 理学
    • 1,316 篇 数学
    • 461 篇 物理学
    • 333 篇 统计学(可授理学、...
    • 233 篇 系统科学
    • 124 篇 生物学
    • 60 篇 化学
  • 345 篇 管理学
    • 246 篇 管理科学与工程(可...
    • 104 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 119 篇 医学
    • 100 篇 临床医学
    • 42 篇 基础医学(可授医学...
  • 46 篇 经济学
    • 42 篇 应用经济学
  • 43 篇 法学
  • 19 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 9 篇 文学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 4,224 篇 adaptive algorit...
  • 106 篇 convergence
  • 88 篇 adaptive filters
  • 69 篇 signal processin...
  • 53 篇 algorithm design...
  • 52 篇 optimization
  • 50 篇 adaptive systems
  • 40 篇 heuristic algori...
  • 38 篇 signal to noise ...
  • 38 篇 algorithms
  • 37 篇 estimation
  • 36 篇 simulation
  • 31 篇 approximation al...
  • 30 篇 robustness
  • 29 篇 system identific...
  • 29 篇 active noise con...
  • 27 篇 steady-state
  • 27 篇 mathematical mod...
  • 27 篇 filtering algori...
  • 26 篇 neural networks

机构

  • 7 篇 univ torino dept...
  • 7 篇 univ york dept e...
  • 6 篇 ieee
  • 6 篇 carnegie mellon ...
  • 6 篇 nanyang technol ...
  • 5 篇 king fahd univ p...
  • 5 篇 int islamic univ...
  • 5 篇 jordan univ sci ...
  • 5 篇 univ warsaw fac ...
  • 5 篇 department of el...
  • 5 篇 harbin institute...
  • 5 篇 univ penn dept e...
  • 5 篇 stanford univ st...
  • 5 篇 stanford univ de...
  • 5 篇 department of el...
  • 4 篇 columbia univers...
  • 4 篇 hughes adv dev g...
  • 4 篇 school of automa...
  • 4 篇 electrical engin...
  • 4 篇 inria paris rocq...

作者

  • 37 篇 de lamare rodrig...
  • 15 篇 praetorius dirk
  • 11 篇 zhang lei
  • 11 篇 dahlke stephan
  • 10 篇 abed-meraim kari...
  • 9 篇 luo haipeng
  • 8 篇 cavoretto robert...
  • 8 篇 scarlett jonatha...
  • 8 篇 zerguine azzedin...
  • 8 篇 wang hao
  • 8 篇 sitjongsataporn ...
  • 8 篇 benesty jacob
  • 8 篇 naylor patrick a...
  • 7 篇 douglas scott c.
  • 7 篇 nowak robert
  • 7 篇 li xiang
  • 7 篇 ko cc
  • 7 篇 schober r
  • 7 篇 wang yu-xiang
  • 6 篇 khong andy w. h.

语言

  • 4,038 篇 英文
  • 113 篇 其他
  • 56 篇 中文
  • 7 篇 日文
  • 4 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"主题词=adaptive algorithms"
4224 条 记 录,以下是541-550 订阅
排序:
Learning to Understand: Identifying Interactions via the Möbius Transform
arXiv
收藏 引用
arXiv 2024年
作者: Kang, Justin Singh Erginbas, Yigit Efe Butler, Landon Pedarsani, Ramtin Ramchandran, Kannan UC Berkeley United States UC Santa Barbara United States
One of the key challenges in machine learning is to find interpretable representations of learned functions. The Möbius transform is essential for this purpose, as its coefficients correspond to unique importance... 详细信息
来源: 评论
Troubleshooting Solution for Traffic Congestion Control
SSRN
收藏 引用
SSRN 2024年
作者: Tong, Van Souihi, Sami Tran, Hai Anh Mellouk, Abdelhamid School of Information and Communications Technology Hanoi University of Science and Technology Hanoi Viet Nam University of Paris-Est Creteil LISSI Vitry-sur-SeineF-94400 France
The Internet has existed since the 1970s as a means of data exchange between network devices in small networks. In the early stage, there was a small number of devices, but today there is an ever-increasing number of ... 详细信息
来源: 评论
FPGA Implementation of 32-Bit Parallel LMS adaptive Beamforming Architecture using Two 8-Bit Stages
FPGA Implementation of 32-Bit Parallel LMS Adaptive Beamform...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Mohini R. Damodar Yogita Vaidya Electronics and Telecommunication VLSI & Embedded system COEP Technological university Pune India
This research project analyses a hardware pipelined reduced complexity parallel least mean square (RC-pLMS) implementation for adaptive beamforming. The composite of every single stage of defects in RC-pLMS, which is ... 详细信息
来源: 评论
Repetitive positioning control for DISO systems by adaptive feed-forward cancellation
Repetitive positioning control for DISO systems by adaptive ...
收藏 引用
IEEE/ASME (AIM) International Conference on Advanced Intelligent Mechatronics
作者: Shota Yabui Takenori Atsumi Faculty of Science and Engineering Tokyo City University Tokyo Japan Faculty of Engineering Chiba Institute of Technology Chiba Japan
Repetitive motion is an important operation in manufacturing processes and other applications. It is thus necessary to design control systems that can track repetitive-motion reference signals for dual-input-single-ou... 详细信息
来源: 评论
adaptive Iterative Learning Optimal Control for Linear Multi-Agent Systems
Adaptive Iterative Learning Optimal Control for Linear Multi...
收藏 引用
Data Driven Control and Learning Systems (DDCLS)
作者: Duhui Chang Yan Geng School of Science Xi'an Polytechnic University Xi'an China
In order to improve tracking performance of a class of linear discrete time-invariant multi-agent systems, an adaptive optimal iterative learning control strategy is designed. To design the control protocol, a paramet... 详细信息
来源: 评论
adaptive Climbing Strategy of Snake Robot Based on Compliance Control
Adaptive Climbing Strategy of Snake Robot Based on Complianc...
收藏 引用
Intelligent Robotics and Systems (ISoIRS), International Symposium on
作者: Huizhuo Yang Jiyuan Dong Meng Wang Shiyong Meng Lei Yang Jiashuo Xue School of Electronic and Information Engineering Tiangong University Tianjin China Department of Computer Science and Technology Tiangong University Tianjin China Department of Software Engineering Tiangong University Tianjin China
Snake robots, exhibiting a high degree of redundancy, are a class of biomimetic robots capable of forming a helical rolling gait for climbing trees and pipes. The surface structure of naturally grown trees is irregula... 详细信息
来源: 评论
Constant-Factor Distortion Mechanisms for k-Committee Election
arXiv
收藏 引用
arXiv 2025年
作者: Pulyassary, Haripriya Swamy, Chaitanya School of ORIE Cornell University IthacaNY14853 United States Dept. of Combinatorics & Optimization Univ. Waterloo WaterlooONN2L 3G1 Canada
In the k-committee election problem, we wish to aggregate the preferences of n agents over a set of alternatives and select a committee of k alternatives that minimizes the cost incurred by the agents. While we typica... 详细信息
来源: 评论
Underwater Frequency Selection Algorithm Based on the Received Signal
Underwater Frequency Selection Algorithm Based on the Receiv...
收藏 引用
International Symposium on Underwater Technology
作者: Raji Alahmad Mohammad Albaroudi Abdullah Alraee Kazuo Ishii Department of Human Intelligence Systems Kyushu Institute of Technology Kitakyushu Fukuoka Japan Department of Life Science and System Engineering Kyushu Institute of Technology Kitakyushu Fukuoka Japan
Underwater communication is widely regarded as one of the most significant challenges due to the unique physical properties of water. Among the available communication methods, radiofrequency communication offers high... 详细信息
来源: 评论
HEX: Hierarchical Emergence Exploitation in Self-Supervised algorithms
HEX: Hierarchical Emergence Exploitation in Self-Supervised ...
收藏 引用
IEEE Workshop on Applications of Computer Vision (WACV)
作者: Kiran Kokilepersaud Seulgi Kim Mohit Prabhushankar Ghassan AlRegib OLIVES at the Center for Signal and Information Processing CSIP School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta GA USA
In this paper, we propose an algorithm that can be used on top of a wide variety of self-supervised (SSL) approaches to take advantage of hierarchical structures that emerge during training. SSL approaches typically w... 详细信息
来源: 评论
Implementing a Pass-Through Mechanism to Mitigate Ransomware-Induced Encryption on NTFS
Research Square
收藏 引用
Research Square 2024年
作者: Lerivi, Vincenzo Vasquez, Eduardo Hoffmann, Lucas Caruso, Alessandro
Ransomware attacks have increasingly exploited the NT File System (NTFS) to encrypt critical data, leading to significant disruptions and financial losses across various sectors. The introduction of a pass-through mec... 详细信息
来源: 评论