咨询与建议

限定检索结果

文献类型

  • 997 篇 期刊文献
  • 896 篇 会议
  • 4 篇 学位论文
  • 2 册 图书
  • 2 篇 资讯

馆藏范围

  • 1,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,680 篇 工学
    • 988 篇 计算机科学与技术...
    • 574 篇 电气工程
    • 317 篇 信息与通信工程
    • 244 篇 控制科学与工程
    • 160 篇 软件工程
    • 114 篇 机械工程
    • 99 篇 仪器科学与技术
    • 96 篇 电子科学与技术(可...
    • 59 篇 石油与天然气工程
    • 48 篇 交通运输工程
    • 44 篇 材料科学与工程(可...
    • 40 篇 动力工程及工程热...
    • 36 篇 环境科学与工程(可...
    • 35 篇 土木工程
    • 34 篇 测绘科学与技术
    • 23 篇 网络空间安全
    • 19 篇 力学(可授工学、理...
    • 17 篇 生物医学工程(可授...
  • 289 篇 管理学
    • 264 篇 管理科学与工程(可...
    • 31 篇 工商管理
  • 288 篇 理学
    • 80 篇 数学
    • 64 篇 物理学
    • 59 篇 生物学
    • 36 篇 化学
    • 36 篇 地球物理学
    • 26 篇 统计学(可授理学、...
  • 64 篇 医学
    • 43 篇 临床医学
    • 18 篇 基础医学(可授医学...
  • 30 篇 经济学
    • 23 篇 应用经济学
  • 28 篇 农学
  • 27 篇 教育学
    • 23 篇 教育学
  • 10 篇 法学
  • 3 篇 文学
  • 2 篇 历史学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 1,901 篇 clustering algor...
  • 88 篇 data mining
  • 68 篇 wireless sensor ...
  • 59 篇 wireless sensor ...
  • 57 篇 machine learning
  • 57 篇 k-means
  • 52 篇 clustering algor...
  • 29 篇 pattern clusteri...
  • 27 篇 unsupervised lea...
  • 25 篇 network lifetime
  • 22 篇 image segmentati...
  • 22 篇 pattern recognit...
  • 22 篇 feature extracti...
  • 21 篇 dbscan
  • 20 篇 optimization
  • 19 篇 deep learning
  • 19 篇 k-means algorith...
  • 19 篇 particle swarm o...
  • 18 篇 genetic algorith...
  • 17 篇 cloud computing

机构

  • 8 篇 jilin univ coll ...
  • 6 篇 beijing univ pos...
  • 5 篇 xidian univ sch ...
  • 5 篇 lanzhou univ sch...
  • 5 篇 sichuan univ bus...
  • 4 篇 hong kong polyte...
  • 4 篇 beijing univ tec...
  • 4 篇 northwest normal...
  • 4 篇 harbin inst tech...
  • 4 篇 shenyang ligong ...
  • 4 篇 cent s univ sch ...
  • 4 篇 tianjin univ sch...
  • 4 篇 shanghai univ sc...
  • 4 篇 guangdong univ t...
  • 3 篇 tsinghua univ de...
  • 3 篇 south china norm...
  • 3 篇 hebei univ engn ...
  • 3 篇 northwestern pol...
  • 3 篇 chongqing univ p...
  • 3 篇 shanghai jiao to...

作者

  • 8 篇 xu zeshui
  • 7 篇 wang yan
  • 6 篇 zhang jun
  • 6 篇 zhang hao
  • 5 篇 wang lei
  • 5 篇 liu yang
  • 5 篇 ye jun
  • 5 篇 li zhiwu
  • 5 篇 tseng chih-cheng
  • 5 篇 chen wei
  • 5 篇 liang ying
  • 5 篇 zhang ying
  • 4 篇 zhang yihan
  • 4 篇 yang hao
  • 4 篇 liang bin
  • 4 篇 zhang wenbo
  • 4 篇 wang wei
  • 4 篇 zhang yan
  • 4 篇 shen zijie
  • 4 篇 liu wei

语言

  • 1,758 篇 英文
  • 90 篇 其他
  • 37 篇 中文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=clustering Algorithm"
1901 条 记 录,以下是1111-1120 订阅
排序:
Academic Circle Mining Based on the Citation Relationship  2018
Academic Circle Mining Based on the Citation Relationship
收藏 引用
2nd International Conference on Management Engineering, Software Engineering and Service Sciences (ICMSS)
作者: Zhang, MinYi Zhang, Pingjian South China Univ Technol Sch Software Engn Guangzhou Guangdong Peoples R China
Academic circle are groups of similar scholars in academic networks. The academic circle also called community circle. A reliable and efficient community discovery method can play an important role in the communicatio... 详细信息
来源: 评论
An Integrated Model for Crime Prediction Using Temporal and Spatial Factors  18
An Integrated Model for Crime Prediction Using Temporal and ...
收藏 引用
18th IEEE International Conference on Data Mining Workshops (ICDMW)
作者: Yi, Fei Yu, Zhiwen Zhuang, Fuzhen Zhang, Xiao Xiong, Hui Northwestern Polytech Univ Xian Shaanxi Peoples R China Chinese Acad Sci Key Lab Intelligent Informat Proc Inst Comp Technol Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China Najing Univ Nanjing Jiangsu Peoples R China Rutgers State Univ New Brunswick NJ USA
Given its importance, crime prediction has attracted a lot of attention in the literature, and several methods have been proposed to discover different aspects of characteristics for crime prediction. In this paper, w... 详细信息
来源: 评论
Application of Deep Learning Method in Short-term Load Forecasting of Characteristic Enterprises  18
Application of Deep Learning Method in Short-term Load Forec...
收藏 引用
International Conference on Artificial Intelligence and Cloud Computing (AICCC)
作者: Dou, Yuchen Zhang, Xinman Wu, Zhihui Zhang, Hang Xi An Jiao Tong Univ Sch Elect & Informat Engn Xian 710049 Shaanxi Peoples R China Guangdong Xian Jiaotong Univ Acad 3 Daliangdesheng East Rd Foshan 528000 Guangdong Peoples R China
Short-term load forecasting is an important basic work for the normal operation and control of power systems. The results of power load forecasting have a great impact on dispatching operation of the power system and ... 详细信息
来源: 评论
IOT Enabled Security System for Android users
IOT Enabled Security System for Android users
收藏 引用
International Conference on Recent Innovations in Electrical, Electronics and Communication Engineering (ICRIEECE)
作者: Roy, Sulochana Ramaiah Inst Technol Dept Comp Sci & Engn Bangalore Karnataka India
Staying connected 24 X 7 with our near and dear ones and providing them with continuous added security services, especially when women and children step out of their houses to meet their daily needs, is one of the maj... 详细信息
来源: 评论
A new validity index for evaluating the clustering results by partitional clustering algorithms
收藏 引用
SOFT COMPUTING 2016年 第3期20卷 1127-1138页
作者: Yue, Shihong Wang, Jianpei Wang, Jeenshing Bao, Xiujuan Tianjin Univ Sch Elect Engn & Automat Tianjin 300072 Peoples R China Natl Cheng Kung Univ Dept Elect Engn Tainan 701 Taiwan
Partitional clustering algorithms are the most widely used approach in clustering problems. However, how to evaluate the clustering performance of these algorithms remains unanswered due to the lack of an efficient me... 详细信息
来源: 评论
Video Anomaly Detection using Ensemble One-class Classifiers  37
Video Anomaly Detection using Ensemble One-class Classifiers
收藏 引用
37th Chinese Control Conference (CCC)
作者: Li, Gang Feng, Zuren Lv, Na Xi An Jiao Tong Univ Syst Engn Inst Xian 710049 Shaanxi Peoples R China Inner Mongolia Univ Sci & Technol Baotou 014010 Peoples R China
In this paper we present a novel algorithm for video anomaly detection. It is based on multiple local cells, which are acquired by splitting entire monitor scene. At each local cell, we group all feature vectors with ... 详细信息
来源: 评论
A Synergistic Cloud Service Approach for Cold Start Problems  4
A Synergistic Cloud Service Approach for Cold Start Problems
收藏 引用
IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)
作者: Qi, Rui-dong Zhou, Jian-tao Song, Xiaoyu Inner Mongolia Univ Coll Comp Sci Hohhot Peoples R China Portland State Univ Dept Elect & Comp Engn Portland OR 97207 USA
More and more new cloud users use the personalised cloud service combination strategy (CSCS). Solving the Cold Start problem of the cloud environment becomes intractable. The paper represents a novel method of choosin... 详细信息
来源: 评论
An Energy-Efficient Adaptive Overlapping clustering Method for Dynamic Continuous Monitoring in WSNs
收藏 引用
IEEE SENSORS JOURNAL 2017年 第3期17卷 834-847页
作者: Hu, Yuan Niu, Yugang Lam, James Shu, Zhan East China Univ Sci & Technol Minist Educ Key Lab Adv Control & Optimizat Chem Proc Shanghai 200237 Peoples R China Univ Hong Kong Dept Mech Engn Hong Kong Hong Kong Peoples R China Univ Southampton Fac Engn & Environm Electromech Engn Grp Southampton SO17 1BJ Hants England
clustering is a key technique to improve energy efficiency in wireless sensor networks (WSNs). In continuous monitoring applications, the clusters should be formed dynamically according to the event development for en... 详细信息
来源: 评论
Slice_OP: Selecting Initial Cluster Centers Using Observation Points  1
收藏 引用
14th International Conference on Advanced Data Mining and Applications (ADMA)
作者: Masud, Md Abdul Huang, Joshua Zhexue Zhong, Ming Fu, Xianghua Mahmud, Mohammad Sultan Shenzhen Univ Coll Comp Sci & Software Engn Big Data Inst Shenzhen 518060 Peoples R China
This paper proposes a new algorithm, Slice_OP, which selects the initial cluster centers on high-dimensional data. A set of observation points is allocated to transform the high-dimensional data into one-dimensional d... 详细信息
来源: 评论
Mining Anomaly Communication Patterns for Industrial Control Systems
Mining Anomaly Communication Patterns for Industrial Control...
收藏 引用
Australasian Universities Power Engineering Conference (AUPEC)
作者: Yu, Tsung-Chiao Huang, Jyun-Yao Liao, I-En Kao, Kuo-Fong NCHU Taiwan Informat Secur Ctr Dept Comp Sci & Engn Taichung Taiwan Hsiuping Univ Sci & Technol Taiwan Informat Secur Ctr NCHU Dept Informat Networking Technol Taichung Taiwan
The attacks on industrial control systems ( ICS) have been exemplified by the malwares Stuxnet, Industroyer, and Triton that targeted nuclear facilities of Iran in 2010, power grid of Ukraine in 2016, and Safety Instr... 详细信息
来源: 评论