咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=software algorithms"
12566 条 记 录,以下是1051-1060 订阅
排序:
Size-Insensitive Network for Visible-Infrared Image Fusion Model
Size-Insensitive Network for Visible-Infrared Image Fusion M...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Yihan Zhang Qian Zhang Dave Towey School of Computer Science University of Nottingham Ningbo China Ningbo China
Visible-infrared image fusion is a technique that extracts information from different sensors. It could be used to enhance human visual perception of video surveillance under low-light conditions, and provide rich inf... 详细信息
来源: 评论
Fully Integrated Quantum Method for Classical Register Allocation in LLVM
Fully Integrated Quantum Method for Classical Register Alloc...
收藏 引用
Quantum Computing and Engineering (QCE), IEEE International Conference on
作者: Brice Chichereau Stéphane Vialle Patrick Carribault CEA DAM DIF Arpajon France Laboratoire en Informatique Haute Performance pour le Calcul et la simulation Université Paris-Saclay CEA Bruyeres-le-Chatel France CenturaleSupélec Gif-sur- Yvette France Laboratoire Interdisciplinaire des Sciences du Numérique Université Paris-Saclay CNRS Orsay France
Quantum computing devices are being installed alongside supercomputing clusters to serve as hardware accel-erators. This new type of architecture will require an integrated hybrid software stack. With this goal in min... 详细信息
来源: 评论
A Classification Method Based Deep Learning for Educational News Comments
A Classification Method Based Deep Learning for Educational ...
收藏 引用
Cloud Computing, Big Data Applications and software Engineering (CBASE), International Conference on
作者: Liluxi Xu XI'AN UNIVERSITY OF ARCHITECTURE AND TECHNOLOGY Shaanxi China
This article designs a classification method for long educational news texts based on labeled educational news reports. Firstly, CNN is used to extract local features of text information. Then, a bidirectional long sh... 详细信息
来源: 评论
A Battery State of Charge Algorithm with Observer for Engineering Application
A Battery State of Charge Algorithm with Observer for Engine...
收藏 引用
Power Engineering (ICPE), International Conference on
作者: Zengpeng Diao Xiao Li Yang Li Jingkuan Guo Jianying Zhong Minhua Qian China Electrical Equipment Group Co. Ltd. China Electrical Equipment Research Institue of Science and Technology Co. Ltd. Shanghai China
This paper describes an observer algorithm to supersede Extended Kalman Filter (EKF) algorithm to calculate the state of charge (SOC) of battery, including: obtaining battery characteristic data and estimating the ope... 详细信息
来源: 评论
Computer Python Network Security Monitoring System Based on Intelligent algorithms
Computer Python Network Security Monitoring System Based on ...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE International Conference on
作者: Ren Na Rui Xiang Department of Mathematics and Computer Engineering Ordos Institute of Applied Technology Ordos China
In response to the increasingly complex and diverse network security threats, a network security monitoring system is introduced that combines intelligent algorithms and Python software to achieve efficient and accura... 详细信息
来源: 评论
Optimization of Sensor Network's Operation Parameters with Mobile Nodes
Optimization of Sensor Network's Operation Parameters with M...
收藏 引用
International Russian Smart Industry Conference (SmartIndustryCon)
作者: Andrey P. Tsarev Vitaly E. Dementev Department of Radio Engineering Information Security and Telecommunications Ulyanovsk State Technical University Ulyanovsk Russia
This paper discusses the construction of sensor networks that include highly mobile elements. A brief analysis of modern technologies used in sensor networks is carried out. The difficulties of organizing communicatio... 详细信息
来源: 评论
Lightweight Multimodal Algorithm for Automated Pain Detection
Lightweight Multimodal Algorithm for Automated Pain Detectio...
收藏 引用
software Engineering and Computer Science (CSECS), International Conference on
作者: Yiqi Yu Hongyi Zhu Xinquan Li Nanlin Jin School of Advanced Technology Xi'an Jiaotong-Liverpool University Suzhou China Apon Medical Shanghai China
Pain assessment is crucial in medicine, as it indicates patient health and guides diagnosis and treatment. Traditional methods have significant limitations, especially for children, unconscious patients, and those in ... 详细信息
来源: 评论
Many-Objective Neuroevolution for Testing Games
Many-Objective Neuroevolution for Testing Games
收藏 引用
International Conference on software Testing, Verification, and Validation, ICST
作者: Patric Feldmeier Katrin Schmelz Gordon Fraser University of Passau Germany
Games are designed to challenge human players, but this also makes it challenging to generate software tests for computer games automatically. Neural networks have therefore been proposed to serve as dynamic test case... 详细信息
来源: 评论
A New Arduino Compatible Pulse Width Modulation Algorithm for a Five Level Inverter
A New Arduino Compatible Pulse Width Modulation Algorithm fo...
收藏 引用
Smart Systems for applications in Electrical Sciences (ICSSES), International Conference on
作者: N Kaushik Raja R Pradyumna Meenakshi Jayaraman Nilanjan Tewari School of Electrical Engineering Vellore Institute of Technology Chennai Tamil Nadu India
An algorithm is developed for the generation of pulse width modulated signals using Dual Reference Modulation (DRM) for a five level inverter used in Photovoltaic (PV) based electrical power generation systems. With f... 详细信息
来源: 评论
Investigation Algorithm for Access Violation Incidents in Cybersecurity
Investigation Algorithm for Access Violation Incidents in Cy...
收藏 引用
Euromicro Conference on Parallel, Distributed and Network-Based Processing
作者: Maxim Gorda Andrey Chechulin St. Petersburg Federal Research Center of the Russian Academy of Sciences Saint Petersburg Russia
Cybersecurity incidents have been growing globally, with access rights violations emerging as a critical threat to organizations and individuals alike. This paper presents a focused investigation algorithm for handlin... 详细信息
来源: 评论