咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=software algorithms"
12566 条 记 录,以下是841-850 订阅
排序:
Field automatic warning network based on LoRa
Field automatic warning network based on LoRa
收藏 引用
Computer Applications and Information Technology (ISCAIT), International Symposium on
作者: Xingyu Yang Tiansong Li Shishen Li School of Information and Communication Guilin University of Electronic Technology Guilin China
Aiming at problems such as insufficient communication coverage, high power consumption and complex deployment, a low- power wide-area monitoring network architecture based on LoRa technology is proposed in this paper.... 详细信息
来源: 评论
Brain Drain Optimization: A Novel Approach for Task Scheduling in the Cloud Computing  27
Brain Drain Optimization: A Novel Approach for Task Scheduli...
收藏 引用
27th International Computer Conference, Computer Society of Iran, CSICC 2022
作者: Rad, SayedAli Basiri, Alireza Isfahan University Of Technology Department Of Electrical And Computer Engineering Isfahan84156-83111 Iran
These days, Cloud Computing is widely used in different applications such as Civis Analytics and AWS (Amazon Web Services). Through the virtualization of hardware and software, Cloud Computing delivers various service... 详细信息
来源: 评论
Diagnosing software System Exploits
收藏 引用
IEEE INTELLIGENT SYSTEMS 2020年 第6期35卷 7-15页
作者: Elmishali, Amir Stern, Roni Kalech, Meir Ben Gurion Univ Negev BGU Cyber Secur Res Ctr Beer Sheva Israel
software vulnerabilities are bugs in a program that an attacker can exploit to make the program deviate from its specification. An attacker exploits a vulnerability by crafting input that causes the program to behave ... 详细信息
来源: 评论
KeySplitWatermark: Zero Watermarking Algorithm for software Protection Against Cyber-Attacks
收藏 引用
IEEE ACCESS 2020年 8卷 72650-72660页
作者: Iwendi, Celestine Jalil, Zunera Javed, Abdul Rehman Reddy, Thippa G. Kaluri, Rajesh Srivastava, Gautam Jo, Ohyun Cent South Univ Forestry & Technol Dept Elect BCC Changsha 410004 Peoples R China Air Univ Dept Cyber Secur Islamabad 44000 Pakistan Air Univ Natl Ctr Cyber Secur Islamabad 44000 Pakistan VIT Sch Informat Technol & Engn Vellore 632014 Tamil Nadu India Brandon Univ Dept Math & Comp Sci Brandon MB R7A 6A9 Canada China Med Univ Res Ctr Interneural Comp Taichung 40402 Taiwan Chungbuk Natl Univ Coll Elect & Comp Engn Dept Comp Sci Cheongju 28644 South Korea
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing wit... 详细信息
来源: 评论
Extreme Learning Machine based Spectrum Sensing in Coloured Noise with RTL-SDR  2
Extreme Learning Machine based Spectrum Sensing in Coloured ...
收藏 引用
2nd International Conference on Power, Control and Computing Technologies, ICPC2T 2022
作者: Majumder, Saikat Giri, Manish Kumar Adarsh, Goldi National Institute of Technology Department of Electronics and Communication Engineering Raipur India
The availability of inexpensive software defined radios (SDR) has enabled the deployment of cognitive radio (CR) features in large-scale networks such as internet-of-things (IoT). However, such radio receivers are lim... 详细信息
来源: 评论
Smart traffic lights  26
Smart traffic lights
收藏 引用
26th IEEE International Conference on Intelligent Engineering Systems, INES 2022
作者: Vokorokos, Liberios Chovancova, Eva Chovanec, Martin Stancel, Martin Technical University of Košice Faculty of Electrical Engineering and Informatics Department of Computers and Informatics Košice04200 Slovakia
The aim of this work is to design and implement a new intelligent dynamic algorithm for traffic lights and compare it with the current static algorithm. At the beginning, the work deals with the issue of intelligent s... 详细信息
来源: 评论
The software/Hardware Co-Design and Implementation of SM2/3/4 Encryption/Decryption and Digital Signature System
收藏 引用
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 2020年 第10期39卷 2055-2066页
作者: Zheng, Xin Xu, Chongyao Hu, Xianghong Zhang, Yun Xiong, Xiaoming Guangdong Univ Technol Sch Automat Guangzhou 510006 Peoples R China Univ Macau State Key Lab Analog & Mixed Signal VLSI Macau Peoples R China
The security of smart devices is facing great challenges. This article presents a new hybrid cipher framework suitable for such devices. Using software/hardware (SW/HW) co-design method, an efficient encryption/decryp... 详细信息
来源: 评论
Development of an Arc Breakdown Simulation Model for Its Practical Use in Low Voltage Distribution Network  6
Development of an Arc Breakdown Simulation Model for Its Pra...
收藏 引用
6th International Conference on Information Technologies in Engineering Education, Inforino 2022
作者: Gudozhnikov, A. Tibryaev, M. Rashevskaya, M. National Research University Moscow Power Engineering Institute Department of Industrial Enterprises Power Supply Systems and Electrical Technologies Moscow Russia
Development of dedicated software for analyzing the currents under fault conditions in a network has quite important prospects. A computer program simulating real emergency conditions of network operation is able to y... 详细信息
来源: 评论
RoboMaze: Swarm Robotics and Coordinated Navigation in Smart City  23
RoboMaze: Swarm Robotics and Coordinated Navigation in Smart...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Song, John Song, Austin Zhang, Fumin Johns Creek High School Johns CreekGA30022 United States School of Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA30303 United States
Swarm robotics and coordinated navigation have many important applications in smart cities. For example, on the street, autonomous cars may coordinate with each other to optimize the routes and city traffic;in a build... 详细信息
来源: 评论
Research on Current Protection Optimization Scheme of Distribution Network Based on Multi-point Information  5
Research on Current Protection Optimization Scheme of Distri...
收藏 引用
5th International Conference on Energy, Electrical and Power Engineering, CEEPE 2022
作者: Jiang, Shuai Zhou, Zexin Li, Zhongqing Qi, Yuchen Zhu, Yulan Li, Bo State Grid Corporation of China Haidian China Electric Power Research Institute Beijing China Southwest Jiaotong University School of Electrical Engineering Chengdu China
Compared with fossil energy with limited reserves and high pollution, clean and reliable distributed power supply has increasingly become an excellent substitute for traditional fossil energy. The gradual increase of ... 详细信息
来源: 评论