咨询与建议

限定检索结果

文献类型

  • 997 篇 期刊文献
  • 896 篇 会议
  • 4 篇 学位论文
  • 2 册 图书
  • 2 篇 资讯

馆藏范围

  • 1,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,680 篇 工学
    • 988 篇 计算机科学与技术...
    • 574 篇 电气工程
    • 317 篇 信息与通信工程
    • 244 篇 控制科学与工程
    • 160 篇 软件工程
    • 114 篇 机械工程
    • 99 篇 仪器科学与技术
    • 96 篇 电子科学与技术(可...
    • 59 篇 石油与天然气工程
    • 48 篇 交通运输工程
    • 44 篇 材料科学与工程(可...
    • 40 篇 动力工程及工程热...
    • 36 篇 环境科学与工程(可...
    • 35 篇 土木工程
    • 34 篇 测绘科学与技术
    • 23 篇 网络空间安全
    • 19 篇 力学(可授工学、理...
    • 17 篇 生物医学工程(可授...
  • 289 篇 管理学
    • 264 篇 管理科学与工程(可...
    • 31 篇 工商管理
  • 288 篇 理学
    • 80 篇 数学
    • 64 篇 物理学
    • 59 篇 生物学
    • 36 篇 化学
    • 36 篇 地球物理学
    • 26 篇 统计学(可授理学、...
  • 64 篇 医学
    • 43 篇 临床医学
    • 18 篇 基础医学(可授医学...
  • 30 篇 经济学
    • 23 篇 应用经济学
  • 28 篇 农学
  • 27 篇 教育学
    • 23 篇 教育学
  • 10 篇 法学
  • 3 篇 文学
  • 2 篇 历史学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 1,901 篇 clustering algor...
  • 88 篇 data mining
  • 68 篇 wireless sensor ...
  • 59 篇 wireless sensor ...
  • 57 篇 machine learning
  • 57 篇 k-means
  • 52 篇 clustering algor...
  • 29 篇 pattern clusteri...
  • 27 篇 unsupervised lea...
  • 25 篇 network lifetime
  • 22 篇 image segmentati...
  • 22 篇 pattern recognit...
  • 22 篇 feature extracti...
  • 21 篇 dbscan
  • 20 篇 optimization
  • 19 篇 deep learning
  • 19 篇 k-means algorith...
  • 19 篇 particle swarm o...
  • 18 篇 genetic algorith...
  • 17 篇 cloud computing

机构

  • 8 篇 jilin univ coll ...
  • 6 篇 beijing univ pos...
  • 5 篇 xidian univ sch ...
  • 5 篇 lanzhou univ sch...
  • 5 篇 sichuan univ bus...
  • 4 篇 hong kong polyte...
  • 4 篇 beijing univ tec...
  • 4 篇 northwest normal...
  • 4 篇 harbin inst tech...
  • 4 篇 shenyang ligong ...
  • 4 篇 cent s univ sch ...
  • 4 篇 tianjin univ sch...
  • 4 篇 shanghai univ sc...
  • 4 篇 guangdong univ t...
  • 3 篇 tsinghua univ de...
  • 3 篇 south china norm...
  • 3 篇 hebei univ engn ...
  • 3 篇 northwestern pol...
  • 3 篇 chongqing univ p...
  • 3 篇 shanghai jiao to...

作者

  • 8 篇 xu zeshui
  • 7 篇 wang yan
  • 6 篇 zhang jun
  • 6 篇 zhang hao
  • 5 篇 wang lei
  • 5 篇 liu yang
  • 5 篇 ye jun
  • 5 篇 li zhiwu
  • 5 篇 tseng chih-cheng
  • 5 篇 chen wei
  • 5 篇 liang ying
  • 5 篇 zhang ying
  • 4 篇 zhang yihan
  • 4 篇 yang hao
  • 4 篇 liang bin
  • 4 篇 zhang wenbo
  • 4 篇 wang wei
  • 4 篇 zhang yan
  • 4 篇 shen zijie
  • 4 篇 liu wei

语言

  • 1,758 篇 英文
  • 90 篇 其他
  • 37 篇 中文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=clustering Algorithm"
1901 条 记 录,以下是961-970 订阅
排序:
A Method of Voltage Stability Monitoring Based on Pattern and Information Entropy
A Method of Voltage Stability Monitoring Based on Pattern an...
收藏 引用
Chinese Automation Congress (CAC)
作者: Su, Zhaolu Yu, Yang Duan, Mingming Wang, Mushu Electrificat Co CCCC First Highway Engn Co Ltd Beijing Peoples R China Shandong Jiaotong Univ Sch Informat Sci & Elect Engn Jinan Peoples R China
With the development of high-speed roads and increase of lighting, ventilation and monitoring devices, it is necessary to study a real-time and robust voltage stability monitoring method. In this paper, a new method o... 详细信息
来源: 评论
Network embedding architecture using laplace regularization-non-negative matrix factorization for virtualization
收藏 引用
MICROPROCESSORS AND MICROSYSTEMS 2021年 81卷
作者: Sudhakar, Sengan Kanmani, P. Amudha, K. Raja, P. Vishnu Dubey, Anil Kumar Sulthana, A. Razia Subramaniyaswamy, V Priya, V Sree Sakthi Engn Coll Dept Comp Sci & Engn Coimbatore 641104 Tamil Nadu India SRM Inst Sci & Technol Dept Comp Sci Chennai 603203 Tamil Nadu India Kongunadu Coll Engn & Technol Dept Elect & Commun Engn Tiruchy 621215 Tamil Nadu India Kongu Engn Coll Dept Comp Sci & Engn Perundurai 638060 Tamil Nadu India ABES Engn Coll Dept Comp Sci & Engn Ghaziabad Ncr India Birla Inst Sci & Technol Pilani Dept Comp Sci & Engn Dubai Campus Dubai 45055 U Arab Emirates SASTRA Deemed Univ Sch Comp Thanjavur 613401 Tamil Nadu India Mahendra Inst Technol Dept Comp Sci & Engn Namakkal 637503 Tamil Nadu India
While modeling the applications for a problem in cloud computing, researchers and scientists frequently use graphs as abstractions. Graphs provide structural models that make it possible to analyze and understand how ... 详细信息
来源: 评论
Filtering-Based Correlation Power Analysis (CPA) with Signal Envelopes Against Shuffling Methods  21st
Filtering-Based Correlation Power Analysis (CPA) with Signal...
收藏 引用
21st International World Conference on Information Security Applications (WISA)
作者: Jeon, Youngbae Yoon, Ji Won Korea Univ Sch Cybersecur Inst Cyber Secur & Privacy ICSP Seoul South Korea
The Correlation Power Analysis (CPA) is one of the powerful Side-Channel Analysis (SCA) methods to reveal the secret key using linear relationship between intermediate values and power consumption. To defense the anal... 详细信息
来源: 评论
Cooperative trajectory planning for mother/child aircrafts in aerial recovery  3
Cooperative trajectory planning for mother/child aircrafts i...
收藏 引用
3rd International Conference on Unmanned Systems (ICUS)
作者: Liu, Yongbei Qi, Naiming Tang, Mengying Yao, Weiran Zhao, Jun Harbin Inst Technol Sch Astronaut Harbin Peoples R China Expace Technol Co Ltd Fourth Acad China Aerosp Sci & Ind Corp Wuhan Peoples R China
Aerial recovery technology for aircrafts plays a significant role in practical applications, which presents a challenging problem in cooperative trajectory planning. To solve the problem, a hierarchical trajectory pla... 详细信息
来源: 评论
clustering and supervised response for XACML policy evaluation and management
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2020年 205卷
作者: Deng, Fan Yu, Zhenhua Zhang, Liyong Ge, Xiaodong Zhao, Ruiyu Li, Xiaotong Ma, Yuhao Yan, Yang Wen, Zhe Xian Univ Sci & Technol Sch Comp Sci & Technol Inst Syst Secur & Control Xian 710054 Peoples R China Xidian Univ Sch Comp Sci & Technol Xian 710071 Peoples R China
To meet the increasingly complex requirements in access control using XACML (eXtensible Access Control Markup Language), it is necessary for a policy decision engine to deal with large-scale policy sets and intensivel... 详细信息
来源: 评论
Research on the Application of Curriculum Knowledge Point Recommendation algorithm Based on Learning Diagnosis Model  5
Research on the Application of Curriculum Knowledge Point Re...
收藏 引用
5th International Conference on Electromechanical Control Technology and Transportation (ICECTT)
作者: Gan, Baiqiang Zhang, Chi Guangzhou Nanyang Polytech Guangzhou 510900 Peoples R China Sun Yat Sen Univ Nanfang Coll Guangzhou 510900 Peoples R China
Because the degree of mastering knowledge points in courses in traditional cognitive diagnostic models cannot be probabilistic, there are only two situations: mastery and non-mastery. Therefore, for the current resear... 详细信息
来源: 评论
Energy-Efficient and QoS-Improved D2D Small Cell Deployment for Smart Grid
Energy-Efficient and QoS-Improved D2D Small Cell Deployment ...
收藏 引用
IEEE Global Communications Conference (GLOBECOM) on Advanced Technology for 5G Plus
作者: Chi, Hao Ran Domingues, M. Fatima Refaey, Ahmed Radwan, Ayman Inst Telecommunicacoes Aveiro Portugal Univ Aveiro Aveiro Portugal Manhattan Coll Dept Elect & Comp Engn Bronx NY 10471 USA
This paper proposes a device-to-device communication based small cell (SC) deployment scheme in Smart Grid, named as JODI-D2D, to achieve high QoS, high reliability, and high energy efficiency. SC deployment is formul... 详细信息
来源: 评论
Using an algorithmic approach for grouping roles and sub-units
收藏 引用
JOURNAL OF ORGANIZATION DESIGN 2020年 第1期9卷 1-19页
作者: Worren, Nicolay Christiansen, Tore Soldal, Kim Verner Norwegian Univ Life Sci NMBU Sch Econ & Business POB 5003 N-1432 As Norway Inkubator As Reconfig A 5 Postboks 19 N-1431 As Norway
A key task in organization design is to group elements (e.g., roles) into sub-units (e.g., teams or departments). This task is computationally challenging as one must take into consideration a potentially large number... 详细信息
来源: 评论
Study and Evaluation of Unsupervised algorithms Used in Network Anomaly Detection  4th
Study and Evaluation of Unsupervised Algorithms Used in Netw...
收藏 引用
Future Technologies Conference (FTC)
作者: Dromard, Juliette Owezarski, Philippe Univ Toulouse CNRS LAAS CNRS Toulouse France
Network anomalies are unusual traffic mainly induced by network attacks or network failures. Therefore it is important for network operators as end users to detect and diagnose them to protect their network. However, ... 详细信息
来源: 评论
Intelligent Production and Detection Template of Outlier Dataset Using clustering  5
Intelligent Production and Detection Template of Outlier Dat...
收藏 引用
IEEE 5th Conference on Knowledge Based Engineering and Innovation (KBEI)
作者: Kiani, Rasoul Montazeri, Mojtaba Minaei-Bidgoli, Behrouz Iran Univ Sci & Technol Sch Comp Engn Tehran Iran
Outliers are data with anomalous behaviors to other datasets. There are three different types of outliers, namely point anomaly, collective anomaly, and conditional anomaly. Different density-, clustering-, distance-,... 详细信息
来源: 评论