咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=software algorithms"
12566 条 记 录,以下是851-860 订阅
排序:
algorithms of Natural Language Dialogue with Intelligent Robot NAO EVOLUTION  6
Algorithms of Natural Language Dialogue with Intelligent Rob...
收藏 引用
6th International Conference on Information Technologies in Engineering Education, Inforino 2022
作者: Shvetcov, Anatoliy Gorbunov, Vyacheslav Dianov, Sergey Sukonschikov, Alexey Rapakov, George Kinyakin, Kyril Vologda State University Department of Automation and Computer Engineering Vologda Russia
This article is devoted to the usage of anthropomorphic robot NAO Evolution in teaching process of bachelors and masters at Automation and Computer Engineering department of Vologda State University. The paper discuss... 详细信息
来源: 评论
Analysis of Extended Kalman Filter for SOC Estimation in Lithium-ion Batteries  2
Analysis of Extended Kalman Filter for SOC Estimation in Lit...
收藏 引用
2nd International Conference on Power, Control and Computing Technologies, ICPC2T 2022
作者: Shiekh, Solihah Sharief Khan, Khuban Lateef Mir, Tabish Nazir Bhat, Abdul Hamid National Institute of Technology Srinagar Department of Electrical Engineering Jammu Kashmir 190006 India
Battery management system is essential for most electric vehicles (EVs) to ensure the safe operation of the vehicle. State of charge (SOC) estimation plays a vital role in checking and controlling the status of the ba... 详细信息
来源: 评论
Recommendation Algorithm based on Relative Features  5
Recommendation Algorithm based on Relative Features
收藏 引用
5th International Conference on Advanced Electronic Materials, Computers and software Engineering, AEMCSE 2022
作者: Wang, Xuan Zhu, Cui Zhu, Wenjun Xue, Bingxin Beijing University of Technology Faculty of Information Technology Chaoyang District Beijing China
Ratings and reviews on e-commerce platforms often contain a lot of useful information. In recent years, researchers aim to mine more information from ratings and reviews to improve recommendation performance. However,... 详细信息
来源: 评论
Survey of the Security algorithms over Cloud Environment to Protect Information  10
Survey of the Security Algorithms over Cloud Environment to ...
收藏 引用
10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing, ICETET-SIP-22 2022
作者: Nema, Rajneesh Kumar Saxena, Aumreesh Kumar Srivastava, Rajiv SRK University Bhopal India SIRT Bhopal India
Well suited data protection has emerged as a critical trouble for data generation. In cloud it is in particular essential due to the fact the information is saved in one of a kind place around the cloud arena. Records... 详细信息
来源: 评论
Presenting method to schedule tasks in the cloud computing environment using the whale optimization algorithm  27
Presenting method to schedule tasks in the cloud computing e...
收藏 引用
27th International Computer Conference, Computer Society of Iran, CSICC 2022
作者: Dinani, Armin Tavakoli Mirabi, Meqdad Khademi, Maryam Islamic Azad University Electronic Campus Computer Engineering In Software Tehran Iran Islamic Azad University South Tehran Branch Tehran Iran Islamic Azad University South Tehran Branch Applied Mathematics Tehran Iran
Cloud computing, the distributed computing template, is a model for providing easy access based on the user demand through changeable and configurable computing resources with the slightest need to manage the help of ... 详细信息
来源: 评论
Meta-Heuristics for Solving the software Component Allocation Problem
收藏 引用
IEEE ACCESS 2020年 8卷 153067-153076页
作者: Al-Azzoni, Issam Iqbal, Saqib Al Ain Univ Dept Software Engn & Comp Sci Al Ain 64141 U Arab Emirates
The software component allocation problem is concerned with mapping a set of software components to the computational units available in a heterogeneous computing system while maximizing a certain objective function. ... 详细信息
来源: 评论
Research on Obstacle Avoidance Trajectory for Robots Based on RRT Algorithm
Research on Obstacle Avoidance Trajectory for Robots Based o...
收藏 引用
Robotics, Control and Automation (ICRCA), International Conference on
作者: Jiaran Wang Pengfei Sun Rao Yao Dazhong Wang School of Mechanical and Automotive Engineering Shanghai University of Engineering Science Shanghai China
Aerospace engine blade remanufacturing technology requires intelligent adaptive techniques for support. Due to the complexity of the operating environment and the demand for intelligence, in order to maximize machinin... 详细信息
来源: 评论
Formation Navigation and Positioning of Quadrotor UAV Based on Multi-Source Information Fusion Improved RRT* Algorithm
Formation Navigation and Positioning of Quadrotor UAV Based ...
收藏 引用
Sensors and Information Technology (ICSI), International Conference on
作者: Qihao Gong Tao Deng School of Aeronautics Chongqing Jiaotong University Chongqing China Chongqing Key Laboratory of Green Aviation Energy and Power Chongqing China The Green Aerotechnics Research Institute of Chongqing Jiaotong University Chongqing China
This paper analyzes the traditional RRT* algorithm. Considering the performance constraints of quadrotor unmanned aerial vehicles (UAVs) and the limitations of the RRT* algorithm itself, the traditional RRT* algorithm... 详细信息
来源: 评论
Research on the Security Assessment Method for Mimetic Multivariate Systems Based on Multi-Granularity Features
Research on the Security Assessment Method for Mimetic Multi...
收藏 引用
Consumer Electronics and Computer Engineering (ICCECE), 2021 IEEE International Conference on
作者: Junwei Wang Qinglei Zhou Liming Zhang Shiliang Yu School of Cyber Science and Engineering Zhengzhou University Zhengzhou China Songshan Laboratory Zhengzhou China School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China
Aiming at the current status quo that the security assessment of mimetic multivariate systems generally adopts a single level of assessment, which is unable to establish a security link between its internal software d... 详细信息
来源: 评论
A generative model for synchrophasor network traffic in smart grids
A generative model for synchrophasor network traffic in smar...
收藏 引用
Annual Conference on Information Sciences and Systems (CISS)
作者: Leo Kosta Aaron St. Leger Department of Electrical Engineering and Computer Science United States Military Academy NY
Smart grid technologies can revolutionize power distribution. However, engineers can’t write the software to realize this goal without large, publicly available datasets. Power companies are reluctant to share the da... 详细信息
来源: 评论